Presentation is loading. Please wait.

Presentation is loading. Please wait.

Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov. 2012.

Similar presentations


Presentation on theme: "Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov. 2012."— Presentation transcript:

1 Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov. 2012

2 Outline Forensic watermarking ◦ collusion attacks q-ary Tardos scheme Density function of "scores" ◦ convolution ◦ series expansion ◦ numerics Open problems 2

3 Forensic Watermarking EmbedderDetector original content payload content with hidden payload WM secrets payload original content Payload = some secret code indentifying the recipient ATTACK 3

4 Collusion attacks ABAC CAAA ABAB ACAC ABAB AABCABC "Coalition of pirates" Symbols received by pirates Symbols allowed “Restricted Digit Model” 4

5 Aim Trace at least one pirate from detected watermark BUT Resist large coalition ⇒ longer code Low probability of innocent accusation (FP) (critical) ⇒ longer code Low probability of missing all pirates (FN) ⇒ longer code AND Limited bandwidth available for watermark 5

6 n users embedded symbols m content segments Symbols allowed Symbol biases drawn from distribution F watermark after attack ABCB ACBA BBAC BABA ABAC CAAA ABAB ACAC ABAB AABCABC p 1A p 1B p 1C p 2A p 2B p 2C p iA p iB p iC p mA p mB p mC c pirates q-ary Tardos scheme Arbitrary alphabet size q Dirichlet distribution F ABCB ACBA BBAC BABA ABAC CAAA ABAB 6

7 Tardos scheme (cont.) Tracing: Attackers output symbol y i in segment i: Every user gets a score Sum of scores per content segment User is "accused" if score exceeds threshold g 0 (p) p g 1 (p) p 7 For innocent user: E[score]=0 and E[score 2 ]=1

8 Accusation probabilities m = code length c = #pirates μ = E[coalition score per segment] Pirates want to minimize μ and make the innocent tail longer Curve shapes depend on:  alphabet size q  F, g 0, g 1  Code length  #pirates  Pirate strategy CLT: Big m  curves go to Gaussian Method to compute innocent curve [Simone+Škorić 2010] threshold total score (scaled) innocent guilty 8 S/√m

9 Finding the innocent score pdf 1.Find pdf of innocent score in one segment. φ (u) 2.Use convolution property of characteristic functions. 9

10 Innocent score pdf (2) Finding the single-segment pdf: attack strategy 10

11 Single-segment pdf 11

12 Innocent score pdf (3) The Fourier transform: hypergeometric 12

13 Innocent score pdf (4) Direct approach for finding False Positive prob: Prob[S>Z] = Z/√m Try numerical computation of the k-integral. Problem: numerical instability! 13

14 Innocent score pdf (5) Less direct approach for finding False Positive prob: Still use same starting point... but do Edgeworth-like expansion Gaussian tail Hermite function... and then pray for numerical stability 14

15 Numerical results on False Positive probs. Convergence not enough terms 15

16 Power law in the tails 16

17 Score pdf for one guilty user Same approach, minor differences: Nonzero mean (strategy dependent) Variance depends on attack strategy 17

18 Combine data for innocent and guilty 18

19 Open questions / future work Better understanding of the convergence Reduce the reliance on "prayer" Strategy-independent bounds avoid re-doing everything for each strategy Do the whole exercise for the coalition score or multiple scores simultaneously Avoid the series expansion altogether? 19


Download ppt "Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov. 2012."

Similar presentations


Ads by Google