Fully Homomorphic Image Processing

10/08/2018
by   William Fu, et al.
0

Fully homomorphic encryption has allowed devices to outsource computation to third parties while preserving the secrecy of the data being computed on. Many images contain sensitive information and are commonly sent to cloud services to encode images for different devices. We implement image processing homomorphically that ensures secrecy of the image while also providing reasonable overhead. We first present some previous related work, as well as the fully homomorphic encryption scheme we use. Then, we introduce our schemes for JPEG encoding and decoding, as well as schemes for bilinear and bicubic image resizing, as well as some data and analysis of our homomorphic schemes. Finally, we outline several issues with the homomorphic evaluation of proprietary algorithms, and how a third party can gain information on the algorithm through noise.

READ FULL TEXT

page 9

page 10

research
03/01/2022

FHEBench: Benchmarking Fully Homomorphic Encryption Schemes

Fully Homomorphic Encryption (FHE) emerges one of the most promising sol...
research
01/11/2018

Generalized Quantum Shannon Impossibility for Quantum Encryption

The famous Shannon impossibility result says that any encryption scheme ...
research
03/15/2023

Verifiable encodings in multigroup fully homomorphic encryption

This article presents the application of homomorphic authenticators, rep...
research
03/20/2021

Encrypted Value Iteration and Temporal Difference Learning over Leveled Homomorphic Encryption

We consider an architecture of confidential cloud-based control synthesi...
research
04/26/2018

Application of Lowner-John's Ellipsoid in the Steganography of Lattice Vectors and a Review of The Gentry's FHE

In this paper, first, we utilize the Lowner-John's ellipsoid of a convex...
research
09/06/2021

FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption

Computation on ciphertexts of all known fully homomorphic encryption (FH...
research
10/14/2019

On the reliability of computational chaos-based cryptography for information exchange

This paper investigates the use of dynamical chaotic systems to encrypt ...

Please sign up or login with your details

Forgot password? Click here to reset