We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byZoey Gunn
Modified about 1 year ago
Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics
©2012 Irdeto, All Rights Reserved. About myself BSc & MSc in Mathematical Sciences at Utrecht University, NL Internship (July – December 2012) at Irdeto Research Eindhoven, NL PhD ( ) in Collusion-Resistant Traitor Tracing at Eindhoven University of Technology, NL 2
©2012 Irdeto, All Rights Reserved. Copyright Protection Don’t try to prevent, but trace, accuse and deter. Prevention is impossible. Trace who distributed an illegal copy. Accuse such traitors to deter others. How? Mark and hide Insert a unique code in each official copy of the digital document. Place it in the same locations for all users, for easy retrieval Make it imperceptible (watermark) to prevent the user from changing or removing it. 3
©2012 Irdeto, All Rights Reserved. Colluding traitors What’s imperceptible to one, might be visible for many. Users can compare their copies bit by bit. Where a bit differs, part of the watermark is located. To prevent the traitors to locate the entire watermark, it should be made such that for each (small) group of users bits should often coincide. Codelength Add a little, gain a lot The larger the coalition of traitors, the longer the code needs to be to trace them. Content should be protected by adding as small a fingerprint as possible 4
©2012 Irdeto, All Rights Reserved. Accusation errors Two types: Falsely accuse an innocent user Not accuse any guilty user Allow some mistakes, but aim for perfection Accusing an innocent user should be an extremely rare event Sometimes not accusing any guilty user isn’t so bad: repeated offenders will be caught in the long run Allows for much shorter codelength 5
©2012 Irdeto, All Rights Reserved. Research focus 6 Dynamic Static Watermark insertion Traitor attack Generic Specific known
The. of and a to in is you that it he for.
Of. and a to the in is you that it at be.
The. of and a to in is you that it he was.
High Frequency Words List A Group 1. the of and.
Microsoft ® Office Excel ® 2007 Training Get started with PivotTable ® reports Sweetwater ISD presents:
Is it? Evaluating the risk Eating bacon sandwiches is bad for you!
Simultaneous display of photos (usually 6) Lineup created and presented by investigator who knows who suspect is.
Writers Companion was designed as the ONE program you will need for the entire writing process: Brainstorm, Organize, Edit and Publish in one program.
Are YOU Part of the Phenomenon?. What you can do with facebook: What you can do with facebook: You can see where old You can see where old faces wound.
A sample of DNA from a crime scene matches a sample from the suspect. How strong is this evidence? The data: An evidence sample from the crime scene is.
Repetition everywhere – comparing while in a method and as an event Susan Rodger Duke University July 2010 modified July 2011.
Create and use your own Electronic Business Card Create and send a simple business card Traditional paper business cards have been around for a long time.
The Relational Model and Normalization (3) IS 240 – Database Management Lecture # Prof. M. E. Kabay, PhD, CISSP Norwich University
Chapter 5 Errors Bjarne Stroustrup
Database Connections with ASP.Net A large number of computer applicationsboth desktop and web applicationsare data-driven. These applications are largely.
File Concept A file is a named collection of related information that is recorded on secondary storage. A file has a define structure, which we must know.
1 Copyright © 2007 M. E. Kabay. All rights reserved. Using the TRACK CHANGES Features in MS-Word M. E. Kabay, PhD, CISSP-ISSMP CTO & Program Director,
IT203 Unit 2: Gather Information and Define Requirements Gathering Information Copyright © 2012 Pearson Education, Inc. Publishing as Prentice HallChapter2.1.
PowerPoint 2007 © : The Power of Presentations How can Microsoft PowerPoint 2007 help you share information?
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Copyright © 2011 by Pearson Education, Inc. All rights reserved Statistics for the Behavioral and Social Sciences: A Brief Course Fifth Edition Arthur.
What You See Is What You Get Document Preparation Choices at the University of Tennessee by Jennifer W. Spirko UT Graduate School.
Using Commtap Communication Targets and Activities Project.
Microsoft ® Office Training Get up to speed with the 2007 system Cecil County Government IT Department presents:
Sight Word Phrases Group 1. the little boy a good boy.
Includes a practice DBQ!. Many DBQs have two, three, or four part questions. It is imperative that you address all the parts. Common two part questions:
Looking At Other Digipacks/CDs Emily Batts. Pop Artists CD Covers.
Chapters 7 & 8 Memory Management Operating Systems: Internals and Design Principles, 6/E William Stallings Patricia Roy Manatee Community College, Venice,
A container class is a data type that is capable of holding a collection of items. In C++, container classes can be implemented as a class, along with.
© 2016 SlidePlayer.com Inc. All rights reserved.