Secure Signal Processing





This archive includes a C++ prototype implementation of encrypted domain fast Fourier transform (e-FFT) based on Paillier homomorphic cryptosystem [1]. Both radix-2 and radix-4 decimation in time versions are provided. If you find the code useful, please cite the following reference:
 
[1] T.Bianchi, A.Piva, M.Barni, "On the Implementation of the Discrete Fourier Transform in the Encrypted Domain", IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, Mar. 2009, pp. 86-97.
 

This archive includes a C++ prototype implementation of encrypted domain discrete cosine transform (e-DCT) based on Paillier homomorphic cryptosystem [1]. It provides both standard and fast (based on Hou's algorithm) DCT-II and DCT-III. The archive also includes routines for composite representation [2] and a demo applying encrypted domain 8x8 block DCT/fast DCT using both standard and composite representations. If you find the code useful, please cite the following references:
 
[1] T.Bianchi, A.Piva, M.Barni, "Encrypted Domain DCT based on Homomorphic Cryptosystems",  EURASIP Journal on Information Security, vol. 2009,  no. Article ID 716357,  2009,  pp. 12 pages.
 [2] T.Bianchi, A.Piva, M.Barni, "Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals",  IEEE Transactions on Information Forensics and Security, vol. 5,  no. 1,  March 2010,  pp. 180-187.
 

This archive includes a C++ demo implementation of encrypted domain watermark embedding based on Paillier homomorphic cryptosystem and composite representation [1]. Different watermarking schemes (QIM, DC-QIM, RDM) and different encrypted domain embedding strategies are considered. If you find the code useful, please cite the following reference:
 
[1] M.Deng, T.Bianchi, A.Piva, B.Preneel, "Efficient implementation of a buyer-seller watermarking protocol using a composite signal representation",  Proceedings of the First International Workshop on Signal Processing in the EncryptEd Domain (SPEED 2009), Lausanne, Switzerland,  Sept. 2009.
 

This archive includes a prototype implementation of client-side spread transform dither modulation (ST-DM) based on look-up tables [1]. It provides three java applications implementing the three entities required by the client-side watermarking protocol: the Server, the Client, and the Trusted Third Party. A simple demo script show how to run the three entities to perform system setup, encryption, client-side joint decryption and watermarking, watermark detection. If you find the code useful, please cite the following reference:
 
[1] A. Piva, T. Bianchi, A. De Rosa, "Secure Client-Side ST-DM Watermark Embedding",  IEEE Transactions on Information Forensics and Security, vol. 5,  no. 1,  March 2010,  pp. 13-26.