26
Implementation of Decimation in Implementation of Decimation in Time-Radix-2 FFT Algorithms in Time-Radix-2 FFT Algorithms in Signal Processing of Encrypted Signal Processing of Encrypted Domain(SPED) Domain(SPED) AJAY KUMAR.M.ANNAIAH AJAY KUMAR.M.ANNAIAH Ph.D Research scholar Ph.D Research scholar Dept of IT Dept of IT NITK-Surathkal NITK-Surathkal [email protected] [email protected]

DIT-Radix-2-FFT in SPED

Embed Size (px)

DESCRIPTION

Ajay Kumar.Ph.D Research scholar at National Institute of Technology my mail id:-- [email protected] In this presentation slide i have Explained how to reducing Computational time complexity of Discrete Fourier transform(DFT) from O(n^2 ) to nlogn through Radix-2 .FFT Algorithm in this work i have also introduced how we can use Radix-2 FFT in encrypted signal processing application by considering homomarphic properties(RSA) of Paillier cryptosystem.

Citation preview

Page 1: DIT-Radix-2-FFT in SPED

Implementation of Decimation in Time-Radix-2 Implementation of Decimation in Time-Radix-2 FFT Algorithms in Signal Processing of FFT Algorithms in Signal Processing of

Encrypted Domain(SPED)Encrypted Domain(SPED)

AJAY KUMAR.M.ANNAIAHAJAY KUMAR.M.ANNAIAHPh.D Research scholar Ph.D Research scholar

Dept of ITDept of IT

NITK-SurathkalNITK-Surathkal

[email protected]@gmail.com

Page 2: DIT-Radix-2-FFT in SPED

CONTENT INTRODUCTION

REVIEW OF DFT –FFT ALGORITHM

TIME COMPLEXITY ANALYSIS OF RADIX-2

S.P.E.D

HOMOMORPHISM V/S SIGNAL ENCRYPTION

IMPLEMENTATION OF e-DFT

Page 3: DIT-Radix-2-FFT in SPED

1.Introduction

• Discrete Fourier Transform(DFT) invented around 1805 by Carls Friedrich Gauss.

Limitation –computation time.

• In the mid-1965 DFT is reinvented as The Fast Fourier Transform (FFT), By Cooley-Tukey

• FFT reduced the complexity of a Discrete Fourier Transform from O(N²), to O(N·logN),

purpose of reducing time complexity

large number of Application developed

• FFT algorithms became known as the Radix- 2 algorithm and was shortly followed by the Radix-3, Radix-4, and Mixed Radix algorithms

• Evaluation of research Fast Hartley Transform (FHT)and the Split Radix (SRFFT), QFT. DITF

Page 4: DIT-Radix-2-FFT in SPED

2.Review of FFT Algorithms• The basic principle behind most Radix-based FFT algorithms is to exploit the

symmetry properties of a complex exponential that is the cornerstone of the Discrete Fourier Transform (DFT). These algorithms

Complex conjugate symmetry

Periodicity

• Divide the problem into similar sub-problems (butterfly computations) and achieve a reduction in computational complexity.

• All Radix algorithms are similar in structure differing only in the core computation of the butterflies. The FHT differs from the other algorithms in that it uses a real kernel

• The DITF algorithm uses both the Decimation-In-Time (DIT) and Decimation-In-Frequency (DIF) frameworks for separate parts of thecomputation to achieve a reduction in the computational complexity.

Page 5: DIT-Radix-2-FFT in SPED

Discrete Fourier Transform(DFT)Discrete Fourier Transform(DFT) Allows us to compute an approximation of Allows us to compute an approximation of

the Fourier Transform on a discrete set of the Fourier Transform on a discrete set of frequencies from a discrete set of time frequencies from a discrete set of time samples.samples.

Where Where k k are the index of the discrete are the index of the discrete frequencies and frequencies and n n the index of the time samplesthe index of the time samples

N N complex multiplies complex multiplies N-1 N-1 complex addition complex addition

1N10kenxkXn

N

k2j1N

0n

,, ,for

1N10kenxkXn

N

k2j1N

0n

,, ,for

Page 6: DIT-Radix-2-FFT in SPED

Symmetries properties of FFTSymmetries properties of FFT FFT algorithms exploits two symmetric properties FFT algorithms exploits two symmetric properties

Complex conjugate symmetryComplex conjugate symmetry

Periodicity Periodicity

FinallyFinally

or or

*N

K

N Wn -N

W KnN

Kn W

*N

K

N Wn -N

W KnN

Kn W

nNkN

nNK W N K

N Wn W nNkN

nNK W N K

N Wn W

nN

k2j

N eW

nN

k2j

N eW

n

N

k2j

KnN eW

n

N

k2j

KnN eW

Page 7: DIT-Radix-2-FFT in SPED

Fast Fourier Transform Fast Fourier Transform Cooley-Tukey algorithm:Cooley-Tukey algorithm:

Based on decimation, leads to a factorization of Based on decimation, leads to a factorization of computations.computations.

Let us first look at the classical Let us first look at the classical radix 2 radix 2 decimation in time.decimation in time.

FFT uses the Divide and conquer rule split the FFT uses the Divide and conquer rule split the Big DFT computation between Big DFT computation between odd and even odd and even partpart

knN

1

0

knN

1

0

W W

N

n

N

n

nxnxkX knN

1

0

knN

1

0

W W

N

n

N

n

nxnxkX

1N10kenxkXn

N

k2j1N

0n

,, ,for

1N10kenxkXn

N

k2j1N

0n

,, ,for

nN

k2j

KnN eW

n

N

k2j

KnN eW

Page 8: DIT-Radix-2-FFT in SPED

Fast Fourier Transform Fast Fourier Transform Consider and replace even and odd indices partConsider and replace even and odd indices part Even part of nEven part of n2r2r Odd part of nOdd part of n2r+1 for all r=0,1…N/2-12r+1 for all r=0,1…N/2-1

12rkN

12/

0

k2rN

12/

0

W12 W2

N

n

N

r

rxrxkX 12rkN

12/

0

k2rN

12/

0

W12 W2

N

n

N

r

rxrxkX

KN

12N

0n

kr12N

0r

W1r2xr2xkX

2krN

/2N

/

WW KN

12N

0n

kr12N

0r

W1r2xr2xkX

2krN

/2N

/

WW

Kr212/

0

2N

12/

0

12W 2 N

N

n

KN

krN

r

WrxWrxkX

Kr212/

0

2N

12/

0

12W 2 N

N

n

KN

krN

r

WrxWrxkX

Page 9: DIT-Radix-2-FFT in SPED

Fast Fourier Transform Fast Fourier Transform

Simplify the termSimplify the term

Now the sum of two N/2 point DFT’s we Now the sum of two N/2 point DFT’s we can use to get a N point DFTcan use to get a N point DFT

NWNW 2

NW2

NW

Kr212/

0

2N

12/

0

12W 2 N

N

n

KN

krN

r

WrxWrxkX

Kr212/

0

2N

12/

0

12W 2 N

N

n

KN

krN

r

WrxWrxkX

kr12N

0n

KN

12N

0r2

1r2xWr2xkX N2

N W W/

kr/

kr12N

0n

KN

12N

0r2

1r2xWr2xkX N2

N W W/

kr/

kXWke

XkX 0KN kXWk

eXkX 0

KN

Page 10: DIT-Radix-2-FFT in SPED

2 point Butterfly2 point Butterfly Example if N=8 the even number[0,2,4,8] Example if N=8 the even number[0,2,4,8]

odd number[0.3.5.7] odd number[0.3.5.7]

TFD N/2TFD N/2

TFD N/2TFD N/2

x(0)x(0)x(2)x(2)

x(N-2)x(N-2)

x(1)x(1)x(3)x(3)

x(N-1)x(N-1)

X(0)X(0)X(1)X(1)

X(N/2-1)X(N/2-1)

X(N/2)X(N/2)X(N/2+1)X(N/2+1)

X(N-1)X(N-1)

WW00

WW11

WWN/2-1N/2-1

----

--

We need:We need:

•N/2(N/2-1) N/2(N/2-1) complex ‘complex ‘+’ for +’ for each each N/2 N/2 DFT.DFT.

•((N/2N/2))2 2 complex ‘complex ‘×’ for each ×’ for each DFT.DFT.

•N/2 N/2 complex ‘complex ‘×’ at the input of ×’ at the input of the butterflies.the butterflies.

•N N complex ‘complex ‘+’ for the butter-+’ for the butter-flies.flies.

•Grand total:Grand total:

NN22/2 /2 complex ‘complex ‘+’+’

N/2(N/2+1) N/2(N/2+1) complex ‘complex ‘×’×’

N222

N ........................... N222

N ...........................

Page 11: DIT-Radix-2-FFT in SPED

Fast Fourier Transform Fast Fourier Transform 2.point FFT splitting in to multiple pass i.e.2.point FFT splitting in to multiple pass i.e.

simplify the given form by applying simplify the given form by applying mathematical rule …mathematical rule …

Finally computational time complexity of Finally computational time complexity of Radix-2 FFT algorithm is Radix-2 FFT algorithm is

N222

N ........................... N222

N ...........................

16842 *8......*4.........*2..... NNNN till16842 *8......*4.........*2..... NNNN till

NN 2log NN 2log

Page 12: DIT-Radix-2-FFT in SPED

Algorithm Parameters 2/2Algorithm Parameters 2/2

The parameters are shown below:The parameters are shown below:

1st stage 2nd stage 3rd stage … Last stage

Node Spacing

1 2 3 … N/2

Butterflies per group

1 2 3 … N/2

Number of groups

N/2 N/4 N/8 … 1

Twiddle factor

… / 2

0

N kNW

k

/ 4

0,1

N kNW

k

/8

0, ,3

N kNW

k

0, , / 2 1

kNW

k N

Page 13: DIT-Radix-2-FFT in SPED

Algorithm Parameters Algorithm Parameters

The FFT can be computed according to the The FFT can be computed according to the following pseudo-code:following pseudo-code: For each For each stagestage

For each For each group of butterflygroup of butterfly For each For each butterflybutterfly

compute butterflycompute butterfly endend

endend endend

Page 14: DIT-Radix-2-FFT in SPED

Number of OperationsNumber of Operations

If If NN==22rr, , we have we have r=r=loglog22((NN) stages. For each ) stages. For each one we have:one we have: N/2N/2 complex ‘ complex ‘×’ (some of them are by ‘1’).×’ (some of them are by ‘1’). NN complex ‘+’. complex ‘+’.

Thus the grand total of operations is:Thus the grand total of operations is: N/2N/2 log log22((NN)) complex ‘ complex ‘×’.×’. NN log log22((NN)) complex ‘ complex ‘+’.+’.

N + x

128 896 4481024 10240 51204096 49152 24576

These counts can be compared with the ones for the DFTThese counts can be compared with the ones for the DFT

Page 15: DIT-Radix-2-FFT in SPED

3.Signal processing in encrypted domain

• Signal processing is an area of systems engineering electrical engineering and  applied mathematics that deals with operations on or analysis of analog  as well as digitized  signals representing time-varying or spatially varying physical quantities.

• Signals of interest can include sound. Electromagnetic radiation images and sensor  readings telecommunication transmission signals, and many others

• Signal transmission using electronic signal processing. Transducers  convert signals from other physical waveforms  to electrical current  or voltage waveforms, which then are processed, transmitted as electromagnetic waves, received and converted by another transducer to final form.

Page 16: DIT-Radix-2-FFT in SPED

4. Encrypted Signal processing

• Statistical signal processing – analyzing and extracting information from signals and noise based on their stochastic properties

• Spectral estimation – for determining the spectral content (i.e., the distribution of power over frequency) of a time series

• Audio signal processing – for electrical signals representing sound, such as speech or music

• Speech signal processing – for processing and interpreting spoken words

• Image processing – in digital cameras, computers and various imaging systems

• Video processing – for interpreting moving pictures

• Filtering – used in many fields to process signals

• Time-frequency analysis – for processing non-stationary signals

Page 17: DIT-Radix-2-FFT in SPED

5.Signal processing module v/s cryptosystem • Signal processing modules working directly on encrypted Signal data

provide better solution to application scenarios

• valuable signals must be protected from a malicious processing device.

• investigate the implementation of the discrete Fourier transform (DFT) in the encrypted domain, by using the homomorphic properties of the underlying cryptosystem.

• Several important issues are considered for the direct DFT, the radix-2, and the radix-4 fast Fourier algorithms, including the error analysis and the maximum size of the sequence that can be transformed.

• The results show that the radix-4 FFT is best suited for an encrypted domain implementation. With computational complexity and error analysis

Page 18: DIT-Radix-2-FFT in SPED

6.Traditional approach of signal Encryption • Most of technological solutions proposed issues of multimedia security

rely on the use of cryptography.

• Early works in this direction by applying cryptographic primitives, is to build a secure layer on top of signal application.

• secure layer is able to protect them from leakage of critical information Signal processing modules.

• Examples of such an approach include the encryption of content before its transmission or storage (like encrypted digital TV channels), or wrapping multimedia objects into an encrypted system with an application (the reader)

• encryption layer is used only to protect the data against third parties and authorized to access the data.

• signal processing tools capable of operating directly on encrypted data highlighting the benefits offered by the availability

Page 19: DIT-Radix-2-FFT in SPED

7.Public key cryptography for signal encryption

Page 20: DIT-Radix-2-FFT in SPED

Homomorphism for encrypted domain • Homomorphic encryption is a concept where specific computations can be

performed on the cipher text of a message. The result of these computations is the same as if the operations were performed on the plaintext first and encrypted afterwards. So homomorphic encryption allows parties who do not have an decryption key and thus don't know the plaintext value, still perform computation on this value

• The two group homomorphism operations are the arithmetic addition and multiplication.

• A homomorphic encryption is additive is

E(x + y) = E(x) . E(y)

1) where E denotes an encryption function, 2) . denotes an operation depending on cipher

3) x and y are plaintext messages.

• A homomorphic encryption is multiplicative if:

E(x y) = E(x) . E(y)

Page 21: DIT-Radix-2-FFT in SPED

Homomorphism signal encryption Signal encryption

Homomorphism  encryption       

Page 22: DIT-Radix-2-FFT in SPED

simple example of how a homomorphic encryption scheme might work in cloud computing:

• Company X  has a very important data set (VIDS) that consists of the numbers 5 and 10.  To encrypt the data set, Company X multiplies each element in the set by 2, creating a new set whose members are 10 and 20.

• Company X  sends the encrypted VIDS set to the cloud for safe storage.  A few months later, the government contacts Company X and requests the sum of VIDS elements.   

• Company X  is very busy, so it asks the cloud provider to perform the operation.  The cloud provider, who only has access to the encrypted data set,  finds the sum of 10 + 20 and returns the answer 30.

• Company X decrypts the cloud provider’s reply and provides the government with the decrypted answer, 15.

Page 23: DIT-Radix-2-FFT in SPED

Encrypted domain DFT (e-DFT)Encrypted domain DFT (e-DFT) Consider the DFT sequence x(n) is defined as :Consider the DFT sequence x(n) is defined as :

w and x(n) is a finite duration sequences with w and x(n) is a finite duration sequences with length M length M

Consider the scenario the where electronic Consider the scenario the where electronic processor fed the input data signal as encrypted processor fed the input data signal as encrypted data format as in digital form such as 0’s and 1’s data format as in digital form such as 0’s and 1’s

1 ,,1 ,0for 21

0

NkenxkX

nN

kjN

n

1 ,,1 ,0for 21

0

NkenxkX

nN

kjN

n

1 ,,1 ,0for 1

0

NkWnxkX nkN

n

1 ,,1 ,0for 1

0

NkWnxkX nkN

n

Page 24: DIT-Radix-2-FFT in SPED

Encrypted domain DFT (e-DFT)Encrypted domain DFT (e-DFT)

Encrypted input data signal in the form Encrypted input data signal in the form of digital 0’s and 1’s in the form of of digital 0’s and 1’s in the form of equation equation

E(X)=E(X)=((E[x(0)],E[x(1)],…..E[x(N-1)]E[x(0)],E[x(1)],…..E[x(N-1)]

in order to make possible linear in order to make possible linear computation for encrypted input signal computation for encrypted input signal use homographic technique of Additive use homographic technique of Additive that is represented by that is represented by

E(x + y) = E(x)E(x + y) = E(x) . . E(y)E(y)

Page 25: DIT-Radix-2-FFT in SPED

Encrypted domain DFT (e-DFT)

• Issues of DFT in SPED is

• both input sample of encrypted signal and DFT coefficients need to represented as integer values

• Paillier homographic cryptosystem uses modular operation

• Uses of FFT-Radix 4 reduces the time complexity in SPED and best suited for encryption

Page 26: DIT-Radix-2-FFT in SPED

.

THANK YOU