SlideShare a Scribd company logo
Data Compression, Data Security,
and Machine Learning
Prof. Ja-Ling Wu
Dept. of Computer Science and Information Engineering
and
Graduate Institute of Networking and Multimedia
National Taiwan University
Data Science : Challenges and Directions
Prof. Longbing Cao, Communications ACM, Aug. 2017
Data Science =
{sta6s6cs ∩
informa6cs ∩
compu6ng ∩
communica6on ∩
sociology ∩
management |
data ∩ Domain ∩
thinking },
where “|” means
“condi6onal on.”
Computer Science
and
Information
Engineering
Data Science and Engineering
Data-Driven and Security-aware Information Processing
SecurityScienceandEngineering
Network
Security
Data
Security
DRM
and
Forensics
AI/ML
(DNN)
Algo/Architect
CloudComputing
and
MobileClients
Platform
Communication
Computing
and storage
Bandwidth
Others
(Law and
Regulations)
1
10
2 3
6 7
11 12
8
4
9
5
TypicalApproachtoReducethecomplexityofLearningModels:
Data
High-resolution
Large-volume
DNN/CNN
Based
MachineLearning
Mechanisms
GPU
Model
Compression
or
Reduction
Methods
Simplified
DNN/CNN
Models
Mobile Devices
Classification Results
with nearly the
same accuracy rate!
這是一種 DNN model reduction (compression) 的方法:第一個stage 將原有model 中
weight 小於某個threshold 的connection 去除(減斷),並進行重新的training ( 以確保
error rate 沒有增加);第二個 stage 將 network 中每一層的weights 做分群並將各群的中
心(or 平均值)做為 code book 來表示每一層的 weights ( 此步驟 很像 vector
quantization ); 第三個 stage 則是依據 code book 中 code words 出現的機率大小,以
Huffman code 壓缩之。
大部分的 DNN 可壓個 20 倍,執行速度也比較快!(35x to 49x compression ratio was
reported in literature, as expected, this approach is very time and computing
resources consuming in the training phase)。
Original
Data
Large-volume
Lossless
Compression
algorithm
Equivalent
Representation
with
Reduced
Data Volume
Machine Learning with
the aid of Lossless Compression
The same classification
result with reduced storage
requirement and much
faster execution speed !
GPU/CPU
ML/DNN
Mechanisms
with
Modified
Loss-Function
An illustration of our paradigm for using Compression to
accelerate Machine Learning algorithms.
• Intuitively, there are three aspects that should be considered for ML
over encoded data:
• (1) the structure of the ML model we want to learn (with its
associated loss function),
• (2) the optimization algorithm (for example, batch gradient descent
or stochastic gradient descent), and
• (3) the compression scheme, which creates opportunities for new
techniques.
• In the following paper, the authors take a first step towards examining
the interplay of all three aspects.
• Surprisingly and intriguingly, they find that a slight variant of the
classical Lempel-Ziv-Welch (LZW) coding scheme fits well for two
popular ML techniques: The k-means clustering and generalized linear
models (GLMs).
arXiv:1702.06943v2 [cs.LG] 1 March 2017
Media
Data
High-resolution
Large-volume
Compression
algorithm
for
Media Data
Compressed
Data
Low-resolution
Small-volume
GPU/CPU
Compression
Preferred
ML/DNN
Mechanisms
Mobile
Devices
Compression
Domain
Learning
Models
Classification Results with
nearly the same accuracy
rate!
Compression-Domain ML/DNN Mechanisms for Media Data
What are the major differences of Image Processing
between Human Vision System (HVS) and
Deep Neural Networks (DNNs)?
• Our major observation is :
• DNNs can respond to any important frequency component
precisely, but human visual system focuses more on the low-
frequency information than high-frequency ones, indicating
“ fewer features to be learned by DNNs after the HVS-inspired
compression.”
Feature degradation will impact the
classification.
The left Figure
demonstrates an
example that –the
“junco" is mis-
predicted as “robin"
after removing the top
six high-frequency
components, despite
that the differences
are almost
indistinguishable by
human eyes
燈心草雀
知更鳥
Media Data
with
Super-high
Resolution
and
Data volume
Compressed
Media
Data
with
Reduced
Resolution
and
Data Volume
Compression
-Domain
ML/DNN
Models
Model
Reduction
Methods
Efficient Compression-Domain ML/DNN mechanisms
Classification
Results
with nearly the
same accuracy
and much faster
execution speed!
Media
Compression
GPU/CPU/MD
Simplified
Learning
Models
End-To-End Secure Platform for Machine Learning
Training
Data
Machine
Learning
algorithms
Training
Data
In
Cyphertext
Domain
Learning
Algorithm
In
Cyphertext
Domain
Classification
Results
In
Cyphertext
Domain
Classifica6on
Results
In
Plaintext
Domain
Partial/Fully
Homomorphic
Encryption
Map
key
Execution Times (seconds)
• Interplay between Data security and AI/ Machine Learning
→ Crypto-analysis
• Interplay between Data security and Data compression
→ Distributed Video Coding
→ Joint Compression and Encryption schemes
→ VLC-based Authentication and Data Integrity checking
• Interplay between Forensics and AI/Machine Learning
→ Anti-spoofing
→ Fake News Detection
Example :
Interplay between Data Security and Data
Compression
• In the past few years, combining both coding and
encryption in a single algorithm to reduce the
complexity is a new tempting approach for securing
data during transmission and storage.
• This new approach aims to extend the functionality of
compression algorithms to achieve both compression
and encryption simultaneously in a single process
without an additional encryption stage.
• It has been proven that the combined approach highly
reduces the required resources for encryption
(computational and power resources).
• Also, the new approach preserves all available standard
features which are not available when applying traditional
encryption schemes, such as progressive transmission for
JPEG2000 (also available for JPEG) and the random access
feature (also called compressed domain processing) in
JPEG2000.
• Furthermore, the new approach achieves more features
and capabilities over traditional encryption schemes such as
multilevel security access.
• The most attracting target for this new approach is the
arithmetic coder.
• Arithme6c coder is a lossless entropy coder used for
most widespread mul6media coding standards as a last
compression stage. This is due to its higher compression
efficiency than tradimonal Huffman coder.
• Arithmemc coder is included in JPEG image codec and
H.263 video codec as an alterna6ve op6on for Huffman
coder.
• For more recent mul6media standards, which require
more compression performance like JPEG2000 and JBIG
image codecs, H.264 and H.265 (HEVC) video codecs,
arithme6c coder is mandatory.
Avalanche effect for Arithmetic Coder
• Arithmetic coder is characterized by its high error sensitivity
and error propagation properties.
• The avalanche effect for the arithmetic coder is an important
criteria for using the arithmetic coder for security.
• It is proven by [1] that any arithmetic coder can be
considered a chaotic random generator with proven
cryptographic nonlinear properties.
• [1] N. Nagaraj, P. G. Vaidya, and K. G. Bhat, “Arithmetic coding as a
nonlinear dynamical system,” Communications in Nonlinear Science and
Numerical Simulation, vol. 14, no. 4, pp. 1013 – 1020, 2009.
• Moreover, a practical experiment is described in [2] uses the
NIST’s statistical test tool [3] to support these cryptographic
properties.
• Consequently, this means that any change in the input bit-
stream for the encoder/decoder side (even in a single bit),
leads to a huge avalanche effect for the all the following
encoded/decoded output bit-stream.
• [2] M. Sinaie and V. T. Vakili, “Secure arithmetic coding with error
detection capability,” EURASIP J. on Information Security, vol. 2010, pp.
4:1–4:9, Sep 2010. [Online]. Available: http:
//dx.doi.org/10.1155/2010/621521
• [3] N. I. of Standards and Technology. (2010, April) Nist statistical test suite.
[Online]. Available: http://csrc.nist.gov/groups/ST/toolkit/rng/
documentation_software.html
Lightweight Joint
Compression-Encryption-Authentication
Integrity Framework Based on Arithmetic
Coding
arXiv:1804.04300v1 [cs.CR] 12 April 2018
A VLC-based Authentication and Data Integrity
checking System :
Example of AR’s Avalanche effect
• Assuming discrete-memoryless source with four symbols
{A,B,C,D} with probabilities {PA = 0.1, PB = 0.2, PC = 0.3, PD = 0.4} . Let
the input message is : {ABDCDCBCDD} , then the point 0.026189424
can be used as a result for AR-coding the message.
• The binary representation of the coded message 0.026189424 would
be : 000001101011010001011001101000100101.
• Now, changing it to be 000001111011010001011001101000100101,
that is, with a single bit error which leads to another coded point :
0.030095674635959.
• Here, the recovered message will be {ACAACADADC} with 80% errors.
Clearly, this AR’s characteristics can be applied to check data integrity.
Ad

More Related Content

What's hot (16)

Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSo
surya kumar palla
 
Task Scheduling using Tabu Search algorithm in Cloud Computing Environment us...
Task Scheduling using Tabu Search algorithm in Cloud Computing Environment us...Task Scheduling using Tabu Search algorithm in Cloud Computing Environment us...
Task Scheduling using Tabu Search algorithm in Cloud Computing Environment us...
AzarulIkhwan
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
IJEEE
 
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
Eswar Publications
 
Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud
Shyam Hajare
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
Pvrtechnologies Nellore
 
Task scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud ComputingTask scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud Computing
Ramandeep Kaur
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
 
Genetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing EnvironmentGenetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing Environment
Swapnil Shahade
 
A Review on Scheduling in Cloud Computing
A Review on Scheduling in Cloud ComputingA Review on Scheduling in Cloud Computing
A Review on Scheduling in Cloud Computing
ijujournal
 
An optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computingAn optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computing
DIGVIJAY SHINDE
 
Eventual Consistency - JUG DA
Eventual Consistency - JUG DAEventual Consistency - JUG DA
Eventual Consistency - JUG DA
Susanne Braun
 
A survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmentA survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environment
eSAT Publishing House
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shree Bhargava and Associate
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Muthu Samy
 
Task Scheduling using Tabu Search algorithm in Cloud Computing Environment us...
Task Scheduling using Tabu Search algorithm in Cloud Computing Environment us...Task Scheduling using Tabu Search algorithm in Cloud Computing Environment us...
Task Scheduling using Tabu Search algorithm in Cloud Computing Environment us...
AzarulIkhwan
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
IJEEE
 
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
Eswar Publications
 
Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud
Shyam Hajare
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
Pvrtechnologies Nellore
 
Task scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud ComputingTask scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud Computing
Ramandeep Kaur
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
 
Genetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing EnvironmentGenetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing Environment
Swapnil Shahade
 
A Review on Scheduling in Cloud Computing
A Review on Scheduling in Cloud ComputingA Review on Scheduling in Cloud Computing
A Review on Scheduling in Cloud Computing
ijujournal
 
An optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computingAn optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computing
DIGVIJAY SHINDE
 
Eventual Consistency - JUG DA
Eventual Consistency - JUG DAEventual Consistency - JUG DA
Eventual Consistency - JUG DA
Susanne Braun
 
A survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmentA survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environment
eSAT Publishing House
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Muthu Samy
 

Similar to Data compression, data security, and machine learning (20)

Image Compression Through Combination Advantages From Existing Techniques
Image Compression Through Combination Advantages From Existing TechniquesImage Compression Through Combination Advantages From Existing Techniques
Image Compression Through Combination Advantages From Existing Techniques
CSCJournals
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
IAEME Publication
 
Compression technologies
Compression technologiesCompression technologies
Compression technologies
Ketan Hulaji
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic scheme
iaemedu
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation Approach
Eswar Publications
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
IJERA Editor
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
IJERA Editor
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
ijsc
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
ijsc
 
M.sc.iii sem digital image processing unit v
M.sc.iii sem digital image processing unit vM.sc.iii sem digital image processing unit v
M.sc.iii sem digital image processing unit v
Shri Shankaracharya College, Bhilai,Junwani
 
A Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosA Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System Videos
INFOGAIN PUBLICATION
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
 
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
IJCSEA Journal
 
Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...
Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...
Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...
IJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
IJCSEA Journal
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
IAEME Publication
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
IAEME Publication
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
TELKOMNIKA JOURNAL
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
Sameer Ahmed
 
40520130101005
4052013010100540520130101005
40520130101005
IAEME Publication
 
Image Compression Through Combination Advantages From Existing Techniques
Image Compression Through Combination Advantages From Existing TechniquesImage Compression Through Combination Advantages From Existing Techniques
Image Compression Through Combination Advantages From Existing Techniques
CSCJournals
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
IAEME Publication
 
Compression technologies
Compression technologiesCompression technologies
Compression technologies
Ketan Hulaji
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic scheme
iaemedu
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation Approach
Eswar Publications
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
IJERA Editor
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
IJERA Editor
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
ijsc
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
ijsc
 
A Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosA Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System Videos
INFOGAIN PUBLICATION
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
 
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
IJCSEA Journal
 
Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...
Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...
Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...
IJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
IJCSEA Journal
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
IAEME Publication
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
IAEME Publication
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
TELKOMNIKA JOURNAL
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
Sameer Ahmed
 
Ad

More from Chris Huang (20)

Real time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystemReal time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystem
Chris Huang
 
A Graph Service for Global Web Entities Traversal and Reputation Evaluation B...
A Graph Service for Global Web Entities Traversal and Reputation Evaluation B...A Graph Service for Global Web Entities Traversal and Reputation Evaluation B...
A Graph Service for Global Web Entities Traversal and Reputation Evaluation B...
Chris Huang
 
Approaching real-time-hadoop
Approaching real-time-hadoopApproaching real-time-hadoop
Approaching real-time-hadoop
Chris Huang
 
20130310 solr tuorial
20130310 solr tuorial20130310 solr tuorial
20130310 solr tuorial
Chris Huang
 
Scaling big-data-mining-infra2
Scaling big-data-mining-infra2Scaling big-data-mining-infra2
Scaling big-data-mining-infra2
Chris Huang
 
Applying Media Content Analysis to the Production of Musical Videos as Summar...
Applying Media Content Analysis to the Production of Musical Videos as Summar...Applying Media Content Analysis to the Production of Musical Videos as Summar...
Applying Media Content Analysis to the Production of Musical Videos as Summar...
Chris Huang
 
Wissbi osdc pdf
Wissbi osdc pdfWissbi osdc pdf
Wissbi osdc pdf
Chris Huang
 
Hbase status quo apache-con europe - nov 2012
Hbase status quo   apache-con europe - nov 2012Hbase status quo   apache-con europe - nov 2012
Hbase status quo apache-con europe - nov 2012
Chris Huang
 
Hbase schema design and sizing apache-con europe - nov 2012
Hbase schema design and sizing   apache-con europe - nov 2012Hbase schema design and sizing   apache-con europe - nov 2012
Hbase schema design and sizing apache-con europe - nov 2012
Chris Huang
 
重構—改善既有程式的設計(chapter 12,13)
重構—改善既有程式的設計(chapter 12,13)重構—改善既有程式的設計(chapter 12,13)
重構—改善既有程式的設計(chapter 12,13)
Chris Huang
 
重構—改善既有程式的設計(chapter 10)
重構—改善既有程式的設計(chapter 10)重構—改善既有程式的設計(chapter 10)
重構—改善既有程式的設計(chapter 10)
Chris Huang
 
重構—改善既有程式的設計(chapter 9)
重構—改善既有程式的設計(chapter 9)重構—改善既有程式的設計(chapter 9)
重構—改善既有程式的設計(chapter 9)
Chris Huang
 
重構—改善既有程式的設計(chapter 8)part 2
重構—改善既有程式的設計(chapter 8)part 2重構—改善既有程式的設計(chapter 8)part 2
重構—改善既有程式的設計(chapter 8)part 2
Chris Huang
 
重構—改善既有程式的設計(chapter 8)part 1
重構—改善既有程式的設計(chapter 8)part 1重構—改善既有程式的設計(chapter 8)part 1
重構—改善既有程式的設計(chapter 8)part 1
Chris Huang
 
重構—改善既有程式的設計(chapter 7)
重構—改善既有程式的設計(chapter 7)重構—改善既有程式的設計(chapter 7)
重構—改善既有程式的設計(chapter 7)
Chris Huang
 
重構—改善既有程式的設計(chapter 6)
重構—改善既有程式的設計(chapter 6)重構—改善既有程式的設計(chapter 6)
重構—改善既有程式的設計(chapter 6)
Chris Huang
 
重構—改善既有程式的設計(chapter 4,5)
重構—改善既有程式的設計(chapter 4,5)重構—改善既有程式的設計(chapter 4,5)
重構—改善既有程式的設計(chapter 4,5)
Chris Huang
 
重構—改善既有程式的設計(chapter 2,3)
重構—改善既有程式的設計(chapter 2,3)重構—改善既有程式的設計(chapter 2,3)
重構—改善既有程式的設計(chapter 2,3)
Chris Huang
 
重構—改善既有程式的設計(chapter 1)
重構—改善既有程式的設計(chapter 1)重構—改善既有程式的設計(chapter 1)
重構—改善既有程式的設計(chapter 1)
Chris Huang
 
Designs, Lessons and Advice from Building Large Distributed Systems
Designs, Lessons and Advice from Building Large Distributed SystemsDesigns, Lessons and Advice from Building Large Distributed Systems
Designs, Lessons and Advice from Building Large Distributed Systems
Chris Huang
 
Real time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystemReal time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystem
Chris Huang
 
A Graph Service for Global Web Entities Traversal and Reputation Evaluation B...
A Graph Service for Global Web Entities Traversal and Reputation Evaluation B...A Graph Service for Global Web Entities Traversal and Reputation Evaluation B...
A Graph Service for Global Web Entities Traversal and Reputation Evaluation B...
Chris Huang
 
Approaching real-time-hadoop
Approaching real-time-hadoopApproaching real-time-hadoop
Approaching real-time-hadoop
Chris Huang
 
20130310 solr tuorial
20130310 solr tuorial20130310 solr tuorial
20130310 solr tuorial
Chris Huang
 
Scaling big-data-mining-infra2
Scaling big-data-mining-infra2Scaling big-data-mining-infra2
Scaling big-data-mining-infra2
Chris Huang
 
Applying Media Content Analysis to the Production of Musical Videos as Summar...
Applying Media Content Analysis to the Production of Musical Videos as Summar...Applying Media Content Analysis to the Production of Musical Videos as Summar...
Applying Media Content Analysis to the Production of Musical Videos as Summar...
Chris Huang
 
Hbase status quo apache-con europe - nov 2012
Hbase status quo   apache-con europe - nov 2012Hbase status quo   apache-con europe - nov 2012
Hbase status quo apache-con europe - nov 2012
Chris Huang
 
Hbase schema design and sizing apache-con europe - nov 2012
Hbase schema design and sizing   apache-con europe - nov 2012Hbase schema design and sizing   apache-con europe - nov 2012
Hbase schema design and sizing apache-con europe - nov 2012
Chris Huang
 
重構—改善既有程式的設計(chapter 12,13)
重構—改善既有程式的設計(chapter 12,13)重構—改善既有程式的設計(chapter 12,13)
重構—改善既有程式的設計(chapter 12,13)
Chris Huang
 
重構—改善既有程式的設計(chapter 10)
重構—改善既有程式的設計(chapter 10)重構—改善既有程式的設計(chapter 10)
重構—改善既有程式的設計(chapter 10)
Chris Huang
 
重構—改善既有程式的設計(chapter 9)
重構—改善既有程式的設計(chapter 9)重構—改善既有程式的設計(chapter 9)
重構—改善既有程式的設計(chapter 9)
Chris Huang
 
重構—改善既有程式的設計(chapter 8)part 2
重構—改善既有程式的設計(chapter 8)part 2重構—改善既有程式的設計(chapter 8)part 2
重構—改善既有程式的設計(chapter 8)part 2
Chris Huang
 
重構—改善既有程式的設計(chapter 8)part 1
重構—改善既有程式的設計(chapter 8)part 1重構—改善既有程式的設計(chapter 8)part 1
重構—改善既有程式的設計(chapter 8)part 1
Chris Huang
 
重構—改善既有程式的設計(chapter 7)
重構—改善既有程式的設計(chapter 7)重構—改善既有程式的設計(chapter 7)
重構—改善既有程式的設計(chapter 7)
Chris Huang
 
重構—改善既有程式的設計(chapter 6)
重構—改善既有程式的設計(chapter 6)重構—改善既有程式的設計(chapter 6)
重構—改善既有程式的設計(chapter 6)
Chris Huang
 
重構—改善既有程式的設計(chapter 4,5)
重構—改善既有程式的設計(chapter 4,5)重構—改善既有程式的設計(chapter 4,5)
重構—改善既有程式的設計(chapter 4,5)
Chris Huang
 
重構—改善既有程式的設計(chapter 2,3)
重構—改善既有程式的設計(chapter 2,3)重構—改善既有程式的設計(chapter 2,3)
重構—改善既有程式的設計(chapter 2,3)
Chris Huang
 
重構—改善既有程式的設計(chapter 1)
重構—改善既有程式的設計(chapter 1)重構—改善既有程式的設計(chapter 1)
重構—改善既有程式的設計(chapter 1)
Chris Huang
 
Designs, Lessons and Advice from Building Large Distributed Systems
Designs, Lessons and Advice from Building Large Distributed SystemsDesigns, Lessons and Advice from Building Large Distributed Systems
Designs, Lessons and Advice from Building Large Distributed Systems
Chris Huang
 
Ad

Recently uploaded (20)

Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025
Shiva Nejati
 
4. Chapter 4 - FINAL Promoting Inclusive Culture (2).pdf
4. Chapter 4 - FINAL Promoting Inclusive Culture (2).pdf4. Chapter 4 - FINAL Promoting Inclusive Culture (2).pdf
4. Chapter 4 - FINAL Promoting Inclusive Culture (2).pdf
abayamargaug
 
Zoonosis, Types, Causes. A comprehensive pptx
Zoonosis, Types, Causes. A comprehensive pptxZoonosis, Types, Causes. A comprehensive pptx
Zoonosis, Types, Causes. A comprehensive pptx
Dr Showkat Ahmad Wani
 
whole ANATOMY OF EYE with eye ball .pptx
whole ANATOMY OF EYE with eye ball .pptxwhole ANATOMY OF EYE with eye ball .pptx
whole ANATOMY OF EYE with eye ball .pptx
simranjangra13
 
Lecture 12 Types of farming system
Lecture 12       Types of farming systemLecture 12       Types of farming system
Lecture 12 Types of farming system
Nickala1
 
Water analysis practical for ph, tds, hardness, acidity, conductivity, and ba...
Water analysis practical for ph, tds, hardness, acidity, conductivity, and ba...Water analysis practical for ph, tds, hardness, acidity, conductivity, and ba...
Water analysis practical for ph, tds, hardness, acidity, conductivity, and ba...
ss0077014
 
Causes of mortalities of eggs and spawn and remedies.pptx
Causes of mortalities of eggs and spawn and remedies.pptxCauses of mortalities of eggs and spawn and remedies.pptx
Causes of mortalities of eggs and spawn and remedies.pptx
anshumanmohanty9090
 
Metallurgical process class 11_Govinda Pathak
Metallurgical process class 11_Govinda PathakMetallurgical process class 11_Govinda Pathak
Metallurgical process class 11_Govinda Pathak
GovindaPathak6
 
APES 6.5 Presentation Fossil Fuels .pdf
APES 6.5 Presentation Fossil Fuels   .pdfAPES 6.5 Presentation Fossil Fuels   .pdf
APES 6.5 Presentation Fossil Fuels .pdf
patelereftu
 
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptxVERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
hipachi8
 
Skin function_protective_absorptive_Presentatation.pptx
Skin function_protective_absorptive_Presentatation.pptxSkin function_protective_absorptive_Presentatation.pptx
Skin function_protective_absorptive_Presentatation.pptx
muralinath2
 
Lipids: Classification, Functions, Metabolism, and Dietary Recommendations
Lipids: Classification, Functions, Metabolism, and Dietary RecommendationsLipids: Classification, Functions, Metabolism, and Dietary Recommendations
Lipids: Classification, Functions, Metabolism, and Dietary Recommendations
Sarumathi Murugesan
 
SuperconductingMagneticEnergyStorage.pptx
SuperconductingMagneticEnergyStorage.pptxSuperconductingMagneticEnergyStorage.pptx
SuperconductingMagneticEnergyStorage.pptx
BurkanAlpKale
 
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdfBotany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
JseleBurgos
 
Chapter 4_Part 2_Infection and Immunity.ppt
Chapter 4_Part 2_Infection and Immunity.pptChapter 4_Part 2_Infection and Immunity.ppt
Chapter 4_Part 2_Infection and Immunity.ppt
JessaBalanggoyPagula
 
Influenza-Understanding-the-Deadly-Virus.pptx
Influenza-Understanding-the-Deadly-Virus.pptxInfluenza-Understanding-the-Deadly-Virus.pptx
Influenza-Understanding-the-Deadly-Virus.pptx
diyapadhiyar
 
amino compounds.pptx class 12_Govinda Pathak
amino compounds.pptx class 12_Govinda Pathakamino compounds.pptx class 12_Govinda Pathak
amino compounds.pptx class 12_Govinda Pathak
GovindaPathak6
 
Gender Bias and Empathy in Robots: Insights into Robotic Service Failures
Gender Bias and Empathy in Robots:  Insights into Robotic Service FailuresGender Bias and Empathy in Robots:  Insights into Robotic Service Failures
Gender Bias and Empathy in Robots: Insights into Robotic Service Failures
Selcen Ozturkcan
 
Parallel resonance circuits of science.pdf
Parallel resonance circuits of science.pdfParallel resonance circuits of science.pdf
Parallel resonance circuits of science.pdf
rk5867336912
 
Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...
Sérgio Sacani
 
Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025
Shiva Nejati
 
4. Chapter 4 - FINAL Promoting Inclusive Culture (2).pdf
4. Chapter 4 - FINAL Promoting Inclusive Culture (2).pdf4. Chapter 4 - FINAL Promoting Inclusive Culture (2).pdf
4. Chapter 4 - FINAL Promoting Inclusive Culture (2).pdf
abayamargaug
 
Zoonosis, Types, Causes. A comprehensive pptx
Zoonosis, Types, Causes. A comprehensive pptxZoonosis, Types, Causes. A comprehensive pptx
Zoonosis, Types, Causes. A comprehensive pptx
Dr Showkat Ahmad Wani
 
whole ANATOMY OF EYE with eye ball .pptx
whole ANATOMY OF EYE with eye ball .pptxwhole ANATOMY OF EYE with eye ball .pptx
whole ANATOMY OF EYE with eye ball .pptx
simranjangra13
 
Lecture 12 Types of farming system
Lecture 12       Types of farming systemLecture 12       Types of farming system
Lecture 12 Types of farming system
Nickala1
 
Water analysis practical for ph, tds, hardness, acidity, conductivity, and ba...
Water analysis practical for ph, tds, hardness, acidity, conductivity, and ba...Water analysis practical for ph, tds, hardness, acidity, conductivity, and ba...
Water analysis practical for ph, tds, hardness, acidity, conductivity, and ba...
ss0077014
 
Causes of mortalities of eggs and spawn and remedies.pptx
Causes of mortalities of eggs and spawn and remedies.pptxCauses of mortalities of eggs and spawn and remedies.pptx
Causes of mortalities of eggs and spawn and remedies.pptx
anshumanmohanty9090
 
Metallurgical process class 11_Govinda Pathak
Metallurgical process class 11_Govinda PathakMetallurgical process class 11_Govinda Pathak
Metallurgical process class 11_Govinda Pathak
GovindaPathak6
 
APES 6.5 Presentation Fossil Fuels .pdf
APES 6.5 Presentation Fossil Fuels   .pdfAPES 6.5 Presentation Fossil Fuels   .pdf
APES 6.5 Presentation Fossil Fuels .pdf
patelereftu
 
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptxVERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
hipachi8
 
Skin function_protective_absorptive_Presentatation.pptx
Skin function_protective_absorptive_Presentatation.pptxSkin function_protective_absorptive_Presentatation.pptx
Skin function_protective_absorptive_Presentatation.pptx
muralinath2
 
Lipids: Classification, Functions, Metabolism, and Dietary Recommendations
Lipids: Classification, Functions, Metabolism, and Dietary RecommendationsLipids: Classification, Functions, Metabolism, and Dietary Recommendations
Lipids: Classification, Functions, Metabolism, and Dietary Recommendations
Sarumathi Murugesan
 
SuperconductingMagneticEnergyStorage.pptx
SuperconductingMagneticEnergyStorage.pptxSuperconductingMagneticEnergyStorage.pptx
SuperconductingMagneticEnergyStorage.pptx
BurkanAlpKale
 
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdfBotany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
JseleBurgos
 
Chapter 4_Part 2_Infection and Immunity.ppt
Chapter 4_Part 2_Infection and Immunity.pptChapter 4_Part 2_Infection and Immunity.ppt
Chapter 4_Part 2_Infection and Immunity.ppt
JessaBalanggoyPagula
 
Influenza-Understanding-the-Deadly-Virus.pptx
Influenza-Understanding-the-Deadly-Virus.pptxInfluenza-Understanding-the-Deadly-Virus.pptx
Influenza-Understanding-the-Deadly-Virus.pptx
diyapadhiyar
 
amino compounds.pptx class 12_Govinda Pathak
amino compounds.pptx class 12_Govinda Pathakamino compounds.pptx class 12_Govinda Pathak
amino compounds.pptx class 12_Govinda Pathak
GovindaPathak6
 
Gender Bias and Empathy in Robots: Insights into Robotic Service Failures
Gender Bias and Empathy in Robots:  Insights into Robotic Service FailuresGender Bias and Empathy in Robots:  Insights into Robotic Service Failures
Gender Bias and Empathy in Robots: Insights into Robotic Service Failures
Selcen Ozturkcan
 
Parallel resonance circuits of science.pdf
Parallel resonance circuits of science.pdfParallel resonance circuits of science.pdf
Parallel resonance circuits of science.pdf
rk5867336912
 
Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...
Sérgio Sacani
 

Data compression, data security, and machine learning

  • 1. Data Compression, Data Security, and Machine Learning Prof. Ja-Ling Wu Dept. of Computer Science and Information Engineering and Graduate Institute of Networking and Multimedia National Taiwan University
  • 2. Data Science : Challenges and Directions Prof. Longbing Cao, Communications ACM, Aug. 2017 Data Science = {sta6s6cs ∩ informa6cs ∩ compu6ng ∩ communica6on ∩ sociology ∩ management | data ∩ Domain ∩ thinking }, where “|” means “condi6onal on.”
  • 3. Computer Science and Information Engineering Data Science and Engineering Data-Driven and Security-aware Information Processing SecurityScienceandEngineering Network Security Data Security DRM and Forensics AI/ML (DNN) Algo/Architect CloudComputing and MobileClients Platform Communication Computing and storage Bandwidth Others (Law and Regulations) 1 10 2 3 6 7 11 12 8 4 9 5
  • 5. 這是一種 DNN model reduction (compression) 的方法:第一個stage 將原有model 中 weight 小於某個threshold 的connection 去除(減斷),並進行重新的training ( 以確保 error rate 沒有增加);第二個 stage 將 network 中每一層的weights 做分群並將各群的中 心(or 平均值)做為 code book 來表示每一層的 weights ( 此步驟 很像 vector quantization ); 第三個 stage 則是依據 code book 中 code words 出現的機率大小,以 Huffman code 壓缩之。 大部分的 DNN 可壓個 20 倍,執行速度也比較快!(35x to 49x compression ratio was reported in literature, as expected, this approach is very time and computing resources consuming in the training phase)。
  • 6. Original Data Large-volume Lossless Compression algorithm Equivalent Representation with Reduced Data Volume Machine Learning with the aid of Lossless Compression The same classification result with reduced storage requirement and much faster execution speed ! GPU/CPU ML/DNN Mechanisms with Modified Loss-Function
  • 7. An illustration of our paradigm for using Compression to accelerate Machine Learning algorithms.
  • 8. • Intuitively, there are three aspects that should be considered for ML over encoded data: • (1) the structure of the ML model we want to learn (with its associated loss function), • (2) the optimization algorithm (for example, batch gradient descent or stochastic gradient descent), and • (3) the compression scheme, which creates opportunities for new techniques.
  • 9. • In the following paper, the authors take a first step towards examining the interplay of all three aspects. • Surprisingly and intriguingly, they find that a slight variant of the classical Lempel-Ziv-Welch (LZW) coding scheme fits well for two popular ML techniques: The k-means clustering and generalized linear models (GLMs). arXiv:1702.06943v2 [cs.LG] 1 March 2017
  • 11. What are the major differences of Image Processing between Human Vision System (HVS) and Deep Neural Networks (DNNs)? • Our major observation is : • DNNs can respond to any important frequency component precisely, but human visual system focuses more on the low- frequency information than high-frequency ones, indicating “ fewer features to be learned by DNNs after the HVS-inspired compression.”
  • 12. Feature degradation will impact the classification. The left Figure demonstrates an example that –the “junco" is mis- predicted as “robin" after removing the top six high-frequency components, despite that the differences are almost indistinguishable by human eyes 燈心草雀 知更鳥
  • 13. Media Data with Super-high Resolution and Data volume Compressed Media Data with Reduced Resolution and Data Volume Compression -Domain ML/DNN Models Model Reduction Methods Efficient Compression-Domain ML/DNN mechanisms Classification Results with nearly the same accuracy and much faster execution speed! Media Compression GPU/CPU/MD Simplified Learning Models
  • 14. End-To-End Secure Platform for Machine Learning Training Data Machine Learning algorithms Training Data In Cyphertext Domain Learning Algorithm In Cyphertext Domain Classification Results In Cyphertext Domain Classifica6on Results In Plaintext Domain Partial/Fully Homomorphic Encryption Map key
  • 16. • Interplay between Data security and AI/ Machine Learning → Crypto-analysis • Interplay between Data security and Data compression → Distributed Video Coding → Joint Compression and Encryption schemes → VLC-based Authentication and Data Integrity checking • Interplay between Forensics and AI/Machine Learning → Anti-spoofing → Fake News Detection
  • 17. Example : Interplay between Data Security and Data Compression
  • 18. • In the past few years, combining both coding and encryption in a single algorithm to reduce the complexity is a new tempting approach for securing data during transmission and storage. • This new approach aims to extend the functionality of compression algorithms to achieve both compression and encryption simultaneously in a single process without an additional encryption stage. • It has been proven that the combined approach highly reduces the required resources for encryption (computational and power resources).
  • 19. • Also, the new approach preserves all available standard features which are not available when applying traditional encryption schemes, such as progressive transmission for JPEG2000 (also available for JPEG) and the random access feature (also called compressed domain processing) in JPEG2000. • Furthermore, the new approach achieves more features and capabilities over traditional encryption schemes such as multilevel security access. • The most attracting target for this new approach is the arithmetic coder.
  • 20. • Arithme6c coder is a lossless entropy coder used for most widespread mul6media coding standards as a last compression stage. This is due to its higher compression efficiency than tradimonal Huffman coder. • Arithmemc coder is included in JPEG image codec and H.263 video codec as an alterna6ve op6on for Huffman coder. • For more recent mul6media standards, which require more compression performance like JPEG2000 and JBIG image codecs, H.264 and H.265 (HEVC) video codecs, arithme6c coder is mandatory.
  • 21. Avalanche effect for Arithmetic Coder • Arithmetic coder is characterized by its high error sensitivity and error propagation properties. • The avalanche effect for the arithmetic coder is an important criteria for using the arithmetic coder for security. • It is proven by [1] that any arithmetic coder can be considered a chaotic random generator with proven cryptographic nonlinear properties. • [1] N. Nagaraj, P. G. Vaidya, and K. G. Bhat, “Arithmetic coding as a nonlinear dynamical system,” Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 4, pp. 1013 – 1020, 2009.
  • 22. • Moreover, a practical experiment is described in [2] uses the NIST’s statistical test tool [3] to support these cryptographic properties. • Consequently, this means that any change in the input bit- stream for the encoder/decoder side (even in a single bit), leads to a huge avalanche effect for the all the following encoded/decoded output bit-stream. • [2] M. Sinaie and V. T. Vakili, “Secure arithmetic coding with error detection capability,” EURASIP J. on Information Security, vol. 2010, pp. 4:1–4:9, Sep 2010. [Online]. Available: http: //dx.doi.org/10.1155/2010/621521 • [3] N. I. of Standards and Technology. (2010, April) Nist statistical test suite. [Online]. Available: http://csrc.nist.gov/groups/ST/toolkit/rng/ documentation_software.html
  • 23. Lightweight Joint Compression-Encryption-Authentication Integrity Framework Based on Arithmetic Coding arXiv:1804.04300v1 [cs.CR] 12 April 2018 A VLC-based Authentication and Data Integrity checking System :
  • 24. Example of AR’s Avalanche effect • Assuming discrete-memoryless source with four symbols {A,B,C,D} with probabilities {PA = 0.1, PB = 0.2, PC = 0.3, PD = 0.4} . Let the input message is : {ABDCDCBCDD} , then the point 0.026189424 can be used as a result for AR-coding the message. • The binary representation of the coded message 0.026189424 would be : 000001101011010001011001101000100101. • Now, changing it to be 000001111011010001011001101000100101, that is, with a single bit error which leads to another coded point : 0.030095674635959. • Here, the recovered message will be {ACAACADADC} with 80% errors. Clearly, this AR’s characteristics can be applied to check data integrity.