Skip to main content

Homomorphic Data Concealment Powered by Clifford Geometric Algebra

  • Conference paper
  • First Online:
Advances in Computer Graphics (CGI 2020)

Abstract

We propose general-purpose methods for data representation and data concealment via multivector decompositions and a small subset of functions in the three dimensional Clifford geometric algebra. We demonstrate mechanisms that can be explored for purposes from plain data manipulation to homomorphic data processing with multivectors. The wide variety of algebraic representations in Clifford geometric algebra allow us to explore concepts from integer, complex, vector and matrix arithmetic within a single, compact, flexible and yet powerful algebraic structure in order to propose novel homomorphisms. Our constructions can be incorporated into existing applications as add-ons as well as used to provide standalone data-centric algorithms. We implement our representation and concealment mechanisms in the Ruby programming language to demonstrate the ideas discussed in this work.

Originally with University of Colorado Colorado Springs and is now with Ford Motor Company.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Augello, A., Gentile, M., Pilato, G., Vassallo, G.: Geometric encoding of sentences based on Clifford algebra. In: KDIR, pp. 457–462 (2012)

    Google Scholar 

  2. Bakken, D.E., Rarameswaran, R., Blough, D.M., Franz, A.A., Palmer, T.J.: Data obfuscation: anonymity and desensitization of usable data sets. IEEE Secur. Priv. 2(6), 34–41 (2004)

    Article  Google Scholar 

  3. Bayro-Corrochano, E., Scheuermann, G.: Geometric Algebra Computing: In Engineering and Computer Science. Springer, London (2010). https://doi.org/10.1007/978-1-84996-108-0

    Book  MATH  Google Scholar 

  4. Bellinger, G., Castro, D., Mills, A.: Data, information, knowledge, and wisdom. ufmg.br (2004)

    Google Scholar 

  5. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996)

    Article  Google Scholar 

  6. Carré, P., Berthier, M.: Color representation and processes with Clifford algebra. In: Fernandez-Maloigne, C. (ed.) Advanced Color Image Processing and Analysis, pp. 147–179. Springer, New York (2013). https://doi.org/10.1007/978-1-4419-6190-7_6

    Chapter  Google Scholar 

  7. Chappell, J.M., Iqbal, A., Gunn, L.J., Abbott, D.: Functions of multivector variables. PloS One 10(3), e0116943 (2015)

    Article  Google Scholar 

  8. Cooper, P.: Data, information, knowledge and wisdom. Anaesth. Intensive Care Med. 15(1), 44–45 (2014)

    Article  Google Scholar 

  9. Dorst, L., Fontijne, D., Mann, S.: Geometric Algebra for Computer Science: An Object-Oriented Approach to Geometry. Elsevier, Amsterdam (2010)

    MATH  Google Scholar 

  10. Gebken, C., Perwass, C., Sommer, G.: Parameter estimation from uncertain data in geometric algebra. Adv. Appl. Clifford Algebras 18(3–4), 647–664 (2008)

    Article  MathSciNet  Google Scholar 

  11. Hildenbrand, D.: Foundations of geometric algebra computing. In: AIP Conference Proceedings, vol. 1479, no. 1, pp. 27–30. American Institute of Physics (2012)

    Google Scholar 

  12. Hildenbrand, D., Albert, J., Charrier, P., Steinmetz, C.: Geometric algebra computing for heterogeneous systems. Adv. Appl. Clifford Algebras 27(1), 599–620 (2017). https://doi.org/10.1007/s00006-016-0694-6

    Article  MathSciNet  MATH  Google Scholar 

  13. Hitzer, E.: General steerable two-sided Clifford Fourier transform, convolution and mustard convolution. Adv. Appl. Clifford Algebras 27(3), 2215–2234 (2017). https://doi.org/10.1007/s00006-016-0687-5

    Article  MathSciNet  MATH  Google Scholar 

  14. Hitzer, E., Nitta, T., Kuroe, Y.: Applications of Clifford’s geometric algebra. Adv. Appl. Clifford Algebras 23(2), 377–404 (2013). https://doi.org/10.1007/s00006-013-0378-4

    Article  MathSciNet  MATH  Google Scholar 

  15. Janovská, D., Opfer, G.: Linear equations in quaternionic variables. Mitt. Math. Ges. Hamburg 27, 223–234 (2008)

    MathSciNet  MATH  Google Scholar 

  16. Jianhong, Z., Hua, C.: Secuirty storage in the cloud computing: a RSA-based assumption data integrity check without original data. In: 2010 International Conference on Educational and Information Technology, vol. 2, pp. V2–143. IEEE (2010)

    Google Scholar 

  17. Johnson, H.J., Chow, S.T., Gu, Y.X.: Tamper resistant software-mass data encoding. US Patent 7,350,085, 25 March 2008

    Google Scholar 

  18. Josipović, M.: Geometric Multiplication of Vectors: An Introduction to Geometric Algebra in Physics. CTM. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-01756-9

    Book  MATH  Google Scholar 

  19. Kwok, Z.S.: Encryption integrity check with CRC encryption in memory using a word count-and address-derived nonce. US Patent 9,697,140, 4 July 2017

    Google Scholar 

  20. Kyrchei, I.: Determinantal representations of solutions to systems of quaternion matrix equations. Adv. Appl. Clifford Algebras 28(1), 23 (2018). https://doi.org/10.1007/s00006-018-0843-1

    Article  MathSciNet  MATH  Google Scholar 

  21. Majumdar, A.: Weighted subsymbolic data encoding. US Patent 10,120,933, 6 November 2018

    Google Scholar 

  22. Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  23. Perwass, C., Edelsbrunner, H., Kobbelt, L., Polthier, K.: Geometric Algebra with Applications in Engineering. GC, vol. 4. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-540-89068-3

    Book  Google Scholar 

  24. Pozo, J.M., Parra, J.M.: Tensors, spinors and multivectors in the petrov classification. Adv. Appl. Clifford Algebras 17(4), 663–678 (2007). https://doi.org/10.1007/s00006-007-0049-4

    Article  MathSciNet  MATH  Google Scholar 

  25. Radhakrishnan, R., Kharrazi, M., Memon, N.: Data masking: a new approach for steganography? J. VLSI Sign. Process. Syst. Sign. Image Video Technol. 41(3), 293–303 (2005). https://doi.org/10.1007/s11265-005-4153-1

    Article  Google Scholar 

  26. Rockwood, A., Li, H., Hestenes, D.: System for encoding and manipulating models of objects. US Patent 6,853,964, 8 February 2005

    Google Scholar 

  27. Sangwine, S.J., Hitzer, E.: Clifford multivector toolbox (for MATLAB). Adv. Appl. Clifford Algebras 27(1), 539–558 (2017). https://doi.org/10.1007/s00006-016-0666-x

    Article  MathSciNet  MATH  Google Scholar 

  28. Shen, S.T., Lin, H.Y., Tzeng, W.G.: An effective integrity check scheme for secure erasure code-based storage systems. IEEE Trans. Reliab. 64(3), 840–851 (2015)

    Article  Google Scholar 

  29. da Silva, D.W., de Araujo, C.P., Chow, E.: Fully homomorphic key update and key exchange over exterior product spaces for cloud computing applications. In: 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 25–251. IEEE (2019)

    Google Scholar 

  30. da Silva, D.W., de Araujo, C.P., Chow, E., Barillas, B.S.: A new approach towards fully homomorphic encryption over geometric algebra. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0241–0249. IEEE (2019)

    Google Scholar 

  31. da Silva, D.W.H.A., de Oliveira, H.B.M., Chow, E., Barillas, B.S., de Araujo, C.P.: Homomorphic image processing over geometric product spaces and finite p-adic arithmetic. In: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 27–36. IEEE (2019)

    Google Scholar 

  32. Snygg, J.: A New Approach to Differential Geometry Using Clifford’s Geometric Algebra. Springer, Boston (2011). https://doi.org/10.1007/978-0-8176-8283-5

    Book  MATH  Google Scholar 

  33. Song, Y., Lee, D.: Matrix representations of the low order real Clifford algebras. Adv. Appl. Clifford Algebras 23(4), 965–980 (2013). https://doi.org/10.1007/s00006-013-0407-3

    Article  MathSciNet  MATH  Google Scholar 

  34. Tingelstad, L., Egeland, O.: Automatic multivector differentiation and optimization. Adv. Appl. Clifford Algebras 27(1), 707–731 (2016). https://doi.org/10.1007/s00006-016-0722-6

    Article  MathSciNet  MATH  Google Scholar 

  35. Vince, J.: Geometric Algebra for Computer Graphics. Springer, London (2008). https://doi.org/10.1007/978-1-84628-997-2

    Book  MATH  Google Scholar 

  36. Yule, H.P.: Data convolution and peak location, peak area, and peak energy measurements in scintillation counting. Anal. Chem. 38(1), 103–105 (1966)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David W. H. A. da Silva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

da Silva, D.W.H.A., Xavier, M.A., Brown, P.N., Chow, E., de Araujo, C.P. (2020). Homomorphic Data Concealment Powered by Clifford Geometric Algebra. In: Magnenat-Thalmann, N., et al. Advances in Computer Graphics. CGI 2020. Lecture Notes in Computer Science(), vol 12221. Springer, Cham. https://doi.org/10.1007/978-3-030-61864-3_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-61864-3_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-61863-6

  • Online ISBN: 978-3-030-61864-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics