The Internet has plenty of images that are transformations (e.g., resize, blur) of confidential original images. Several scenarios (e.g., selling images over the Internet, fighting disinformation, detecting deep fakes) would highly benefit from systems allowing to verify that an image is the result of a transformation applied to a confidential authentic image. In this paper, we focus on systems for proving and verifying the correctness of transformations of authentic images guaranteeing: 1) confidentiality (i.e., the original image remains private), 2) efficient proof generation (i.e., the proof certifying the correctness of the transformation can be computed with a common laptop) even for high-resolution images, 3) authenticity (i.e., only the advertised transformations have been applied) and 4) fast detection of fraud proofs.. Our contribution consists of new definitions modelling confidentiality and adaptive adversaries, techniques to speed up the prover of a ZK-snark, an efficient construction relying on ad-hoc signatures and hashes, and a less efficient construction that works according to signatures and hashes included in the C2PA specifications. Experimental results confirm the viability of our approach, allowing to compute an authentic transformation of a high-resolution image on a common computer. Prior results instead either require expensive computing resources or provide unsatisfying confidentiality.

Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop / Della Monica, Pierpaolo; Visconti, Ivan; Vitaletti, Andrea; Zecchini, Marco. - (2025), pp. 4624-4642. ( IEEE Symposium on Security and Privacy San Francisco ) [10.1109/sp61157.2025.00014].

Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop

Della Monica, Pierpaolo
;
Visconti, Ivan
;
Vitaletti, Andrea
;
Zecchini, Marco
2025

Abstract

The Internet has plenty of images that are transformations (e.g., resize, blur) of confidential original images. Several scenarios (e.g., selling images over the Internet, fighting disinformation, detecting deep fakes) would highly benefit from systems allowing to verify that an image is the result of a transformation applied to a confidential authentic image. In this paper, we focus on systems for proving and verifying the correctness of transformations of authentic images guaranteeing: 1) confidentiality (i.e., the original image remains private), 2) efficient proof generation (i.e., the proof certifying the correctness of the transformation can be computed with a common laptop) even for high-resolution images, 3) authenticity (i.e., only the advertised transformations have been applied) and 4) fast detection of fraud proofs.. Our contribution consists of new definitions modelling confidentiality and adaptive adversaries, techniques to speed up the prover of a ZK-snark, an efficient construction relying on ad-hoc signatures and hashes, and a less efficient construction that works according to signatures and hashes included in the C2PA specifications. Experimental results confirm the viability of our approach, allowing to compute an authentic transformation of a high-resolution image on a common computer. Prior results instead either require expensive computing resources or provide unsatisfying confidentiality.
2025
IEEE Symposium on Security and Privacy
Privacy; Computer Security; Confidentiality
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop / Della Monica, Pierpaolo; Visconti, Ivan; Vitaletti, Andrea; Zecchini, Marco. - (2025), pp. 4624-4642. ( IEEE Symposium on Security and Privacy San Francisco ) [10.1109/sp61157.2025.00014].
File allegati a questo prodotto
File Dimensione Formato  
DellaMonica_Trust Nobody_2025.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 602.33 kB
Formato Adobe PDF
602.33 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1741983
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? 0
social impact