20 20

Transactions on
Data Privacy
Foundations and Technologies

http://www.tdp.cat


Articles in Press

Accepted articles here

Latest Issues

Year 2024

Volume 17 Issue 3
Volume 17 Issue 2
Volume 17 Issue 1

Year 2023

Volume 16 Issue 3
Volume 16 Issue 2
Volume 16 Issue 1

Year 2022

Volume 15 Issue 3
Volume 15 Issue 2
Volume 15 Issue 1

Year 2021

Volume 14 Issue 3
Volume 14 Issue 2
Volume 14 Issue 1

Year 2020

Volume 13 Issue 3
Volume 13 Issue 2
Volume 13 Issue 1

Year 2019

Volume 12 Issue 3
Volume 12 Issue 2
Volume 12 Issue 1

Year 2018

Volume 11 Issue 3
Volume 11 Issue 2
Volume 11 Issue 1

Year 2017

Volume 10 Issue 3
Volume 10 Issue 2
Volume 10 Issue 1

Year 2016

Volume 9 Issue 3
Volume 9 Issue 2
Volume 9 Issue 1

Year 2015

Volume 8 Issue 3
Volume 8 Issue 2
Volume 8 Issue 1

Year 2014

Volume 7 Issue 3
Volume 7 Issue 2
Volume 7 Issue 1

Year 2013

Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1

Year 2012

Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1

Year 2011

Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1

Year 2010

Volume 3 Issue 3
Volume 3 Issue 2
Volume 3 Issue 1

Year 2009

Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1

Year 2008

Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1


Volume 15 Issue 3


Pixel-Batched Homomorphic Encryption for Secure-at-Rest Image Convolution

Chris R. Giannella(a),(*), Adrian V. Mariano(a), James H. Tanis(a)

Transactions on Data Privacy 15:3 (2022) 193 - 211

Abstract, PDF

(a) The MITRE Corp., 7515 Colshire Dr. McLean, VA 22102, USA.

e-mail:cgiannella @mitre.org; adrian @mitre.org; jhtanis @mitre.org


Abstract

We consider a secure image processing workflow where the data owner keeps their raw imagery encrypted at all times to reduce the risk of sensitive information exposure in the event of a data breach. However, the owner also makes unencrypted, convolution-filtered versions of the images available to consumers (upon request) who specify a convolution kernel. To acheive this workflow, we utilize homomorphic encryption through the Paillier cryptosystem. We start by considering a simple approach where each pixel is encrypted separately. To reduce overall computation, we next develop a more complex approach where vectors of pixels are batched before encryption (an idea applied by others to different image processing algorithms). Through simulation experiments, we observe the approach involving batching to require one to two orders of magnitude less computation time.

* Corresponding author.

Follow us




Supports



ISSN: 1888-5063; ISSN (Digital): 2013-1631; D.L.:B-11873-2008; Web Site: http://www.tdp.cat/
Contact: Transactions on Data Privacy; Vicenç Torra; Umeå University; 90187 Umeå (Sweden); e-mail:tdp@tdp.cat
Note: TDP's web site does not use cookies. TDP does not keep information neither on IP addresses nor browsers. For the privacy policy access here.

 


Vicenç Torra, Last modified: 15 : 47 December 23 2022.