Secure Signal Processing

e-FFT.rar

This archive includes a C++ prototype implementation of encrypted domain fast Fourier transform (e-FFT) based on Paillier homomorphic cryptosystem [1]. Both radix-2 and radix-4 decimation in time versions are provided. If you find the code useful, please cite the following reference:

[1] T.Bianchi, A.Piva, M.Barni, "On the Implementation of the Discrete Fourier Transform in the Encrypted Domain", IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, Mar. 2009, pp. 86-97.

e-DCT.rar

This archive includes a C++ prototype implementation of encrypted domain discrete cosine transform (e-DCT) based on Paillier homomorphic cryptosystem [1]. It provides both standard and fast (based on Hou's algorithm) DCT-II and DCT-III. The archive also includes routines for composite representation [2] and a demo applying encrypted domain 8x8 block DCT/fast DCT using both standard and composite representations. If you find the code useful, please cite the following references:

[1] T.Bianchi, A.Piva, M.Barni, "Encrypted Domain DCT based on Homomorphic Cryptosystems",  EURASIP Journal on Information Security, vol. 2009,  no. Article ID 716357,  2009,  pp. 12 pages.

[2] T.Bianchi, A.Piva, M.Barni, "Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals",  IEEE Transactions on Information Forensics and Security, vol. 5,  no. 1,  March 2010,  pp. 180-187.

ECoMark.rar

This archive includes a C++ demo implementation of encrypted domain watermark embedding based on Paillier homomorphic cryptosystem and composite representation [1]. Different watermarking schemes (QIM, DC-QIM, RDM) and different encrypted domain embedding strategies are considered. If you find the code useful, please cite the following reference:

[1] M.Deng, T.Bianchi, A.Piva, B.Preneel, "Efficient implementation of a buyer-seller watermarking protocol using a composite signal representation",  Proceedings of the First International Workshop on Signal Processing in the EncryptEd Domain (SPEED 2009), Lausanne, Switzerland,  Sept. 2009.

stdmMark.rar

This archive includes a prototype implementation of client-side spread transform dither modulation (ST-DM) based on look-up tables [1]. It provides three java applications implementing the three entities required by the client-side watermarking protocol: the Server, the Client, and the Trusted Third Party. A simple demo script show how to run the three entities to perform system setup, encryption, client-side joint decryption and watermarking, watermark detection. If you find the code useful, please cite the following reference:

[1] A. Piva, T. Bianchi, A. De Rosa, "Secure Client-Side ST-DM Watermark Embedding",  IEEE Transactions on Information Forensics and Security, vol. 5,  no. 1,  March 2010,  pp. 13-26.

Research group:

Content type:

Research area: