biometric security through visual encryption for fog edge ......biometric security through visual...
TRANSCRIPT
![Page 1: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/1.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Biometric Security Through Visual Encryption forFog Edge Computing
Ghadir Mostafa 31-0810Hana Hani 31-2206
Lama Ahmed 31-4892Mina Eshak 31-15454Karim Samy 31-15456
German University in Cairo
February 24, 2018
1 / 27
![Page 2: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/2.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Outline
1 Motivation
2 Fog Edge Computing
3 Cryptography
4 Watermarking
5 Encryption
6 Decryption
7 Conclusion
2 / 27
![Page 3: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/3.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Motivation
Motivation
3 / 27
![Page 4: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/4.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Motivation
Applications:
4 / 27
![Page 5: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/5.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Motivation
IoT challenges:
Tons of devices connected to cloud.
Massive processing needed.
5 / 27
![Page 6: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/6.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Fog Edge Computing
6 / 27
![Page 7: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/7.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Advantages:
Intermediate layer.
Edge server physically closer.
Work offloaded from cloud.
7 / 27
![Page 8: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/8.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Fog Edge Computing security coin
Side 1: Improved security.
Static data.Closer to where created.Less sharing, less vulnerability.
Side 2: Less secure.
Vulnerable edge devices.Data encryption/ VPN needed.
8 / 27
![Page 9: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/9.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Fog Edge Computing security coin
Side 1: Improved security.
Static data.Closer to where created.Less sharing, less vulnerability.
Side 2: Less secure.
Vulnerable edge devices.Data encryption/ VPN needed.
8 / 27
![Page 10: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/10.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Cryptography
Cryptography
9 / 27
![Page 11: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/11.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
History
In 1300 paper companies used dandy roll process to watermark their products.
roll.jpg
10 / 27
![Page 12: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/12.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights2 Security3 Hiding useful information.
11 / 27
![Page 13: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/13.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights
2 Security3 Hiding useful information.
11 / 27
![Page 14: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/14.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights2 Security
3 Hiding useful information.
11 / 27
![Page 15: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/15.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights2 Security3 Hiding useful information.
11 / 27
![Page 16: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/16.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
![Page 17: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/17.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
![Page 18: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/18.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
![Page 19: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/19.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.
2 Separated from the image.
12 / 27
![Page 20: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/20.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
![Page 21: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/21.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
![Page 22: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/22.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
![Page 23: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/23.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
![Page 24: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/24.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
![Page 25: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/25.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
![Page 26: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/26.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
![Page 27: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/27.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
![Page 28: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/28.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Gray scale image structure
14 / 27
![Page 29: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/29.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Gray scale image structure
15 / 27
![Page 30: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/30.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Gray scale image structure
16 / 27
![Page 31: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/31.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Converting to gray-scale
Retrieving bit planes
A pixel will be positioned at positions ( j , j , : )Same dimensions as original image
17 / 27
![Page 32: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/32.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Generating the secret shares
(n) by (n-2) G matrix(n) by (n) identity H matrix(n) by (2n-2) GH concatenated matrixGH’: Complement of GH
18 / 27
![Page 33: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/33.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption Matrices
19 / 27
![Page 34: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/34.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
![Page 35: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/35.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
![Page 36: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/36.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
![Page 37: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/37.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
![Page 38: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/38.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
![Page 39: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/39.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
![Page 40: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/40.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
![Page 41: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/41.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
![Page 42: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/42.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
![Page 43: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/43.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
![Page 44: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/44.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
![Page 45: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/45.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
![Page 46: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/46.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
![Page 47: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/47.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
![Page 48: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/48.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
![Page 49: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/49.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
![Page 50: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/50.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
![Page 51: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/51.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
![Page 52: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/52.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
![Page 53: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/53.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
![Page 54: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/54.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
![Page 55: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/55.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
![Page 56: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/56.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
![Page 57: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/57.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
![Page 58: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/58.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
![Page 59: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/59.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Original, Watermarked, Decrypted Images
25 / 27
![Page 60: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/60.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Original, Watermarked, Decrypted Images
25 / 27
![Page 61: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/61.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Original, Watermarked, Decrypted Images
25 / 27
![Page 62: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/62.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
![Page 63: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/63.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
![Page 64: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/64.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
![Page 65: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/65.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
![Page 66: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can](https://reader034.vdocument.in/reader034/viewer/2022051807/5ffbf492070d1972d737bb3c/html5/thumbnails/66.jpg)
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Any Questions ?!
27 / 27