We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byZoey Gunn
Modified over 2 years ago
Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics
©2012 Irdeto, All Rights Reserved. www.irdeto.com About myself BSc & MSc in Mathematical Sciences at Utrecht University, NL Internship (July – December 2012) at Irdeto Research Eindhoven, NL PhD (2010 - 2013) in Collusion-Resistant Traitor Tracing at Eindhoven University of Technology, NL 2
©2012 Irdeto, All Rights Reserved. www.irdeto.com Copyright Protection Don’t try to prevent, but trace, accuse and deter. Prevention is impossible. Trace who distributed an illegal copy. Accuse such traitors to deter others. How? Mark and hide Insert a unique code in each official copy of the digital document. Place it in the same locations for all users, for easy retrieval Make it imperceptible (watermark) to prevent the user from changing or removing it. 3
©2012 Irdeto, All Rights Reserved. www.irdeto.com Colluding traitors What’s imperceptible to one, might be visible for many. Users can compare their copies bit by bit. Where a bit differs, part of the watermark is located. To prevent the traitors to locate the entire watermark, it should be made such that for each (small) group of users bits should often coincide. Codelength Add a little, gain a lot The larger the coalition of traitors, the longer the code needs to be to trace them. Content should be protected by adding as small a fingerprint as possible 4
©2012 Irdeto, All Rights Reserved. www.irdeto.com Accusation errors Two types: Falsely accuse an innocent user Not accuse any guilty user Allow some mistakes, but aim for perfection Accusing an innocent user should be an extremely rare event Sometimes not accusing any guilty user isn’t so bad: repeated offenders will be caught in the long run Allows for much shorter codelength 5
©2012 Irdeto, All Rights Reserved. www.irdeto.com Research focus 6 Dynamic Static Watermark insertion Traitor attack Generic Specific known
The Holey Grail A special score function for non-binary traitor tracing Boris Škorić Jan-Jaap Oosterwijk Jeroen Doumen.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology WISSec 2010, Nov 2010.
Asymptotically false-positive- maximizing attack on non-binary Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology IH 2011,
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.
Digital Watermarking https://store.theartofservice.com/the-digital-watermarking-toolkit.html.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
A Partial Survey of the Perfect Digital Watermark Problem.
Watermarking Video Content What is video watermarking? November 2010 Rajaram Pejaver Note: The views presented here are solely those of.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology CWG, Dec 2010.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
Securing and Sharing Workbooks Lesson 11. The Review Tab Microsoft Excel provides several layers of security and protection that enable you to control.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Did you just get used to using QR codes? Technology Has changed again. There is a new invention called digital watermarks now. What does a digital watermark.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy All kinds of digital content (music, software, movies) Huge economic repercussions.
By: Maisha Loveday 8C Maths Reflection: Binomial Expansion.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Buffer Overflow Defenses. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle. Buffer Overflow Defenses Author:
Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
The Downside to DRM. What is DRM? “Digital Rights Management” Software used to control access to copyrighted material Protect company from piracy.
Teacher’s notes included in the Notes Page. For more detailed instructions, see the Getting Started presentation. Icons key: Flash activity. These activities.
Unit 1 – Improving Productivity Tyler Dunn Instructions ~ 100 words per box.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten and Boris Škorić presented by Jan-Jaap Oosterwijk.
Rob Farraher Ken Pickering Lim Vu
Short 3-Secure Fingerprinting Codes for Copyright Protection Francesc Sebé and Josep Domingo-Ferrer Dept. of Computer Engineering and Mathematics Universitat.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
AVCE ICT Unit 7 - Programming Session 9 – Using pseudocode and structured English.
Introduction Copyright © Software Carpentry 2010 This work is licensed under the Creative Commons Attribution License See
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
COMP091 – Operating Systems 1 Memory Management. Memory Management Terms Physical address –Actual address as seen by memory unit Logical address –Address.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
1 A Functional Taxonomy for Software Watermarking Jas Nagra, Clark Thomborson University of Auckland Christian Collberg University of Arizona.
Finding a PersonBOS Finding a Person! Building an algorithm to search for existing people in a system Rahn Lieberman Manager Emdeon Corp (Emdeon.com)
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Metadata is simply, data about data. Several types of data and personal information can be saved in a Word document. This information might not be immediately.
Content Protection Platform Shih-Kun Huang Chung-Po Lin Wei-Nan Hung Institute of Information Science Academia Sinica.
© 2017 SlidePlayer.com Inc. All rights reserved.