Security &amp; Privacy https://lesc.dinfo.unifi.it/en en Secure Signal Processing https://lesc.dinfo.unifi.it/it/node/188 <span class="field field--name-title field--type-string field--label-hidden">Secure Signal Processing</span> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><u><strong><a href="https://drive.google.com/open?id=11l6hZWlP3FJqjAp2UFYw852p3_6nADj1" style="font-family: Arial, Helvetica, sans-serif; font-size: 16px; text-decoration: initial; color: rgb(34, 41, 42);">e-FFT.rar</a></strong></u></p> <p>This archive includes a C++ prototype implementation of encrypted domain fast Fourier transform (e-FFT) based on Paillier homomorphic cryptosystem [1]. Both radix-2 and radix-4 decimation in time versions are provided. If you find the code useful, please cite the following reference:</p> <p>[1] T.Bianchi, A.Piva, M.Barni, <a href="http://iapp.dinfo.unifi.it/PubEngine/index.php?mode=DET&amp;id_pubblicazioni=173" style="font-family: Arial, Helvetica, sans-serif; color: rgb(0, 0, 204);" target="blank">"On the Implementation of the Discrete Fourier Transform in the Encrypted Domain",</a> <em>IEEE Transactions on Information Forensics and Security</em>, vol. 4, no. 1, Mar. 2009, pp. 86-97.</p> <h4><u><strong><a href="https://drive.google.com/open?id=11rADP5QpynElGyXbMjg-C9LP5OsMPj0E" style="text-decoration: initial; color: rgb(34, 41, 42);">e-DCT.rar</a></strong></u></h4> <p>This archive includes a C++ prototype implementation of encrypted domain discrete cosine transform (e-DCT) based on Paillier homomorphic cryptosystem [1]. It provides both standard and fast (based on Hou's algorithm) DCT-II and DCT-III. The archive also includes routines for composite representation [2] and a demo applying encrypted domain 8x8 block DCT/fast DCT using both standard and composite representations. If you find the code useful, please cite the following references:</p> <p>[1] T.Bianchi, A.Piva, M.Barni, <a href="http://iapp.dinfo.unifi.it/PubEngine/index.php?mode=DET&amp;id_pubblicazioni=211" style="font-family: Arial, Helvetica, sans-serif; color: rgb(0, 0, 204);" target="blank">"Encrypted Domain DCT based on Homomorphic Cryptosystems",  </a><em>EURASIP Journal on Information Security</em>, vol. 2009,  no. Article ID 716357,  2009,  pp. 12 pages.</p> <p>[2] T.Bianchi, A.Piva, M.Barni, <a href="http://iapp.dinfo.unifi.it/PubEngine/index.php?mode=DET&amp;id_pubblicazioni=213" style="font-family: Arial, Helvetica, sans-serif; color: rgb(0, 0, 204);" target="blank">"Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals",  </a><em>IEEE Transactions on Information Forensics and Security</em>, vol. 5,  no. 1,  March 2010,  pp. 180-187.</p> <h4><u><strong><a href="https://drive.google.com/open?id=11ryjfJoM1Z7Pe70EDiBskP7nVfPSKcL8" style="text-decoration: initial; color: rgb(34, 41, 42);">ECoMark.rar</a></strong></u></h4> <p>This archive includes a C++ demo implementation of encrypted domain watermark embedding based on Paillier homomorphic cryptosystem and composite representation [1]. Different watermarking schemes (QIM, DC-QIM, RDM) and different encrypted domain embedding strategies are considered. If you find the code useful, please cite the following reference:</p> <p>[1] M.Deng, T.Bianchi, A.Piva, B.Preneel, <a href="http://iapp.dinfo.unifi.it/PubEngine/index.php?mode=DET&amp;id_pubblicazioni=206" style="font-family: Arial, Helvetica, sans-serif; color: rgb(0, 0, 204);" target="blank">"Efficient implementation of a buyer-seller watermarking protocol using a composite signal representation",  </a><em>Proceedings of the First International Workshop on Signal Processing in the EncryptEd Domain (SPEED 2009)</em>, Lausanne, Switzerland,  Sept. 2009.</p> <h4><u><strong><a href="https://drive.google.com/open?id=11trsk3ty5e0VbRtg4utEMfedFzqusFtS" style="text-decoration: initial; color: rgb(34, 41, 42);">stdmMark.rar</a></strong></u></h4> <p>This archive includes a prototype implementation of client-side spread transform dither modulation (ST-DM) based on look-up tables [1]. It provides three java applications implementing the three entities required by the client-side watermarking protocol: the Server, the Client, and the Trusted Third Party. A simple demo script show how to run the three entities to perform system setup, encryption, client-side joint decryption and watermarking, watermark detection. If you find the code useful, please cite the following reference:</p> <p>[1] A. Piva, T. Bianchi, A. De Rosa, <a href="http://iapp.dinfo.unifi.it/PubEngine/index.php?mode=DET&amp;id_pubblicazioni=212" style="font-family: Arial, Helvetica, sans-serif; color: rgb(0, 0, 204);" target="blank">"Secure Client-Side ST-DM Watermark Embedding",  </a><em>IEEE Transactions on Information Forensics and Security</em>, vol. 5,  no. 1,  March 2010,  pp. 13-26.</p> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/en/user/4" typeof="schema:Person" property="schema:name" datatype="">nozzoli</span></span> <span class="field field--name-created field--type-created field--label-hidden">Mon, 01/21/2013 - 12:11</span> <div class="field field--name-field-research-group field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Research group</div> <div class="field__items"> <div class="field__item"><a href="/it/taxonomy/term/5" hreflang="it">IAPP</a></div> </div> </div> <div class="field field--name-field-content-type field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Content type</div> <div class="field__item"><a href="/en/taxonomy/term/47" hreflang="en">Materials</a></div> </div> <div class="field field--name-field-research-area field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Research area</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/12" hreflang="und">Security &amp; Privacy</a></div> </div> </div> <section class="field field--name-comment-node-book field--type-comment field--label-hidden comment-wrapper"> </section> Mon, 21 Jan 2013 11:04:15 +0000 nozzoli 188 at https://lesc.dinfo.unifi.it