A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy...

12
A New Approach to Lossy Compression and Applications to Security Eva C. Song Department of Electrical Engineering Princeton University Joint work with: Paul Cuff and H. Vincent Poor November 9, 2015

Transcript of A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy...

Page 1: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

A New Approach to Lossy Compression and Applicationsto Security

Eva C. Song

Department of Electrical EngineeringPrinceton University

Joint work with: Paul Cuff and H. Vincent Poor

November 9, 2015

Page 2: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

Overview

security

data compression

data transmission

1

23

45

6

7

1 compression/source coding2 transmission/channel coding3 security/cryptography4 rate-distortion based

information-theoreticsecrecy

5 joint source-channel coding6 traditional

information-theoretic secrecy7 joint source-channel

information-theoreticsecrecy

E. C. Song (Princeton University) Rising Star November 9, 2015 2 / 12

Page 3: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

Lossy compression

Low compression (high quality) JPEG High compression (low quality) JPEG

tradeoff between compression and qualitycommon in: audio, video, images, streaming, etcpopular technique: MP3, JPEG, MPEG-4, etcgood for data storage and transmission

E. C. Song (Princeton University) Rising Star November 9, 2015 3 / 12

Page 4: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

Looking through the engineering glass

Encoder DecoderX M Y

X : data sourceM: encoded message (used for storage or transmission)Y : reconstructed dataencoder/decoder: data encoding methods such as JPEG, MP3, MP4objective: (size(M), distance(X ,Y ))

E. C. Song (Princeton University) Rising Star November 9, 2015 4 / 12

Page 5: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

Information theory

Encoder fn Decoder gn

X n M Y n

Assumption 1 (general): known source distributionAssumption 2 (a bit less general and this work)

I i.i.d. source distributionI large n

E. C. Song (Princeton University) Rising Star November 9, 2015 5 / 12

Page 6: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

My contribution

Invented compressor: Likelihood EncoderAchieves best rate-distortion:

I point-to-point lossy compressionI multiuser lossy compressionI SECURITY

E. C. Song (Princeton University) Rising Star November 9, 2015 6 / 12

Page 7: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

Perfect secrecy

X n Encoder fn Decoder gn X̂ n

K ∈ [1 : 2nR0 ]

Eavesdropper

M ∈ [1 : 2nR ]

Theorem (Shannon)A rate pair (R,R0) is achievable under perfect secrecy if and only if

R ≥ H(X ),

R0 ≥ H(X ).

E. C. Song (Princeton University) Rising Star November 9, 2015 7 / 12

Page 8: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

What if we reduce key size?

not perfect secrecyhow “imperfect”?1nH(X n|M) < H(X )

I hard to interpretI what can the eavesdropper do with the information?

more practical metric for secrecy

E. C. Song (Princeton University) Rising Star November 9, 2015 8 / 12

Page 9: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

Rate-distortion based secrecy

X n Encoder fn Decoder gn Y n

K ∈ [1 : 2nR0 ]

PZn|M Zn

M ∈ [1 : 2nR ]

Average distortion for the legitimate receiver:

E[db(X n,Y n)] ≤ Db

Minimum average distortion for the eavesdropper:

minPZn|M

E [de(X n,Zn)] ≥ De

Conclusion: secrecy is almost FREE!

E. C. Song (Princeton University) Rising Star November 9, 2015 9 / 12

Page 10: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

Really FREE?

assumption: one attempt!one-bit secrecy

E. C. Song (Princeton University) Rising Star November 9, 2015 10 / 12

Page 11: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

Secure source coding with causal disclosure

X n Encoder fn Decoder gn Y n

K ∈ [2nR0 ]

Eavesdropper Zn

X t−1

t = 1, ..., nM ∈ [2nR ]

Average distortion for the legitimate receiver:

E [db(X n,Y n)] ≤ Db

Minimum average distortion for the eavesdropper:

min{PZt |MXt−1}nt=1

E [de(X n,Zn)] ≥ De

E. C. Song (Princeton University) Rising Star November 9, 2015 11 / 12

Page 12: A New Approach to Lossy Compression and …storage.googleapis.com/.../presentation.pdfLossy compression Low compression (high quality) JPEG High compression (low quality) JPEG tradeoffbetweencompression

About causal disclosure

Fully generalizes Shannon cipher systemCorresponding setting under noisy broadcast channels (physical layer)More about our work: http://www.princeton.edu/~csong

E. C. Song (Princeton University) Rising Star November 9, 2015 12 / 12