A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy...

Preview:

Citation preview

A New Approach to Lossy Compression and Applicationsto Security

Eva C. Song

Department of Electrical EngineeringPrinceton University

Joint work with: Paul Cuff and H. Vincent Poor

November 9, 2015

Overview

security

data compression

data transmission

1

23

45

6

7

1 compression/source coding2 transmission/channel coding3 security/cryptography4 rate-distortion based

information-theoreticsecrecy

5 joint source-channel coding6 traditional

information-theoretic secrecy7 joint source-channel

information-theoreticsecrecy

E. C. Song (Princeton University) Rising Star November 9, 2015 2 / 12

Lossy compression

Low compression (high quality) JPEG High compression (low quality) JPEG

tradeoff between compression and qualitycommon in: audio, video, images, streaming, etcpopular technique: MP3, JPEG, MPEG-4, etcgood for data storage and transmission

E. C. Song (Princeton University) Rising Star November 9, 2015 3 / 12

Looking through the engineering glass

Encoder DecoderX M Y

X : data sourceM: encoded message (used for storage or transmission)Y : reconstructed dataencoder/decoder: data encoding methods such as JPEG, MP3, MP4objective: (size(M), distance(X ,Y ))

E. C. Song (Princeton University) Rising Star November 9, 2015 4 / 12

Information theory

Encoder fn Decoder gn

X n M Y n

Assumption 1 (general): known source distributionAssumption 2 (a bit less general and this work)

I i.i.d. source distributionI large n

E. C. Song (Princeton University) Rising Star November 9, 2015 5 / 12

My contribution

Invented compressor: Likelihood EncoderAchieves best rate-distortion:

I point-to-point lossy compressionI multiuser lossy compressionI SECURITY

E. C. Song (Princeton University) Rising Star November 9, 2015 6 / 12

Perfect secrecy

X n Encoder fn Decoder gn X̂ n

K ∈ [1 : 2nR0 ]

Eavesdropper

M ∈ [1 : 2nR ]

Theorem (Shannon)A rate pair (R,R0) is achievable under perfect secrecy if and only if

R ≥ H(X ),

R0 ≥ H(X ).

E. C. Song (Princeton University) Rising Star November 9, 2015 7 / 12

What if we reduce key size?

not perfect secrecyhow “imperfect”?1nH(X n|M) < H(X )

I hard to interpretI what can the eavesdropper do with the information?

more practical metric for secrecy

E. C. Song (Princeton University) Rising Star November 9, 2015 8 / 12

Rate-distortion based secrecy

X n Encoder fn Decoder gn Y n

K ∈ [1 : 2nR0 ]

PZn|M Zn

M ∈ [1 : 2nR ]

Average distortion for the legitimate receiver:

E[db(X n,Y n)] ≤ Db

Minimum average distortion for the eavesdropper:

minPZn|M

E [de(X n,Zn)] ≥ De

Conclusion: secrecy is almost FREE!

E. C. Song (Princeton University) Rising Star November 9, 2015 9 / 12

Really FREE?

assumption: one attempt!one-bit secrecy

E. C. Song (Princeton University) Rising Star November 9, 2015 10 / 12

Secure source coding with causal disclosure

X n Encoder fn Decoder gn Y n

K ∈ [2nR0 ]

Eavesdropper Zn

X t−1

t = 1, ..., nM ∈ [2nR ]

Average distortion for the legitimate receiver:

E [db(X n,Y n)] ≤ Db

Minimum average distortion for the eavesdropper:

min{PZt |MXt−1}nt=1

E [de(X n,Zn)] ≥ De

E. C. Song (Princeton University) Rising Star November 9, 2015 11 / 12

About causal disclosure

Fully generalizes Shannon cipher systemCorresponding setting under noisy broadcast channels (physical layer)More about our work: http://www.princeton.edu/~csong

E. C. Song (Princeton University) Rising Star November 9, 2015 12 / 12

Recommended