Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics.

Slides:



Advertisements
Similar presentations
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Advertisements

Asymptotically false-positive- maximizing attack on non-binary Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology IH 2011,
Introduction Copyright © Software Carpentry 2010 This work is licensed under the Creative Commons Attribution License See
Rob Farraher Ken Pickering Lim Vu
Powerpoint: A Different Whiteboard Dr. Thomas Douglas St. John Fisher College 01/09/2008.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
1 A Functional Taxonomy for Software Watermarking Jas Nagra, Clark Thomborson University of Auckland Christian Collberg University of Arizona.
Short 3-Secure Fingerprinting Codes for Copyright Protection Francesc Sebé and Josep Domingo-Ferrer Dept. of Computer Engineering and Mathematics Universitat.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov
N-Secure Fingerprinting for Copyright Protection of Multimedia
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
The Downside to DRM. What is DRM? “Digital Rights Management” Software used to control access to copyrighted material Protect company from piracy.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten and Boris Škorić presented by Jan-Jaap Oosterwijk.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Watermarking Video Content What is video watermarking? November 2010 Rajaram Pejaver Note: The views presented here are solely those of.
AVCE ICT Unit 7 - Programming Session 9 – Using pseudocode and structured English.
The Holey Grail A special score function for non-binary traitor tracing Boris Škorić Jan-Jaap Oosterwijk Jeroen Doumen.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology WISSec 2010, Nov 2010.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Buffer Overflow Defenses. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle. Buffer Overflow Defenses Author:
Visual Basic Programming Chapter Six Notes Repetition and the Do Statement ADDING ICONS TO YOUR FORM –It is possible to add an ______________ to your title.
Digital Watermarking
Content Protection Platform Shih-Kun Huang Chung-Po Lin Wei-Nan Hung Institute of Information Science Academia Sinica.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
By: Maisha Loveday 8C Maths Reflection: Binomial Expansion.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology CWG, Dec 2010.
Finding a PersonBOS Finding a Person! Building an algorithm to search for existing people in a system Rahn Lieberman Manager Emdeon Corp (Emdeon.com)
Securing and Sharing Workbooks Lesson 11. The Review Tab Microsoft Excel provides several layers of security and protection that enable you to control.
Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.
COMP091 – Operating Systems 1 Memory Management. Memory Management Terms Physical address –Actual address as seen by memory unit Logical address –Address.
A Partial Survey of the Perfect Digital Watermark Problem.
Did you just get used to using QR codes? Technology Has changed again. There is a new invention called digital watermarks now. What does a digital watermark.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Metadata is simply, data about data. Several types of data and personal information can be saved in a Word document. This information might not be immediately.
+ The Learning Registry: A How To Primer for Digital Content Publishers and Aggregators December 20, 2011.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Buffer Overflow Defenses
Managing a Project User Documentation.
E-voting …and why it’s good..
Chapter 5 Conclusion CIS 61.
DONE BY S.MURALIRAJAN M.NIRMAL
Ivanov Sergey.
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
Antonino Simone and Boris Škorić Eindhoven University of Technology
O.S Lecture 13 Virtual Memory.
Software Watermarking Deterring Software Piracy
X-STANDARD MATHEMATICS ONE MARK QUESTIONS
Clickable Buttons in Powerpoint
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
Fun Stuff: Digital Media
Presentation transcript:

Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics

©2012 Irdeto, All Rights Reserved. About myself  BSc & MSc in Mathematical Sciences at Utrecht University, NL  Internship (July – December 2012) at Irdeto Research Eindhoven, NL  PhD ( ) in Collusion-Resistant Traitor Tracing at Eindhoven University of Technology, NL 2

©2012 Irdeto, All Rights Reserved. Copyright Protection Don’t try to prevent, but trace, accuse and deter.  Prevention is impossible.  Trace who distributed an illegal copy.  Accuse such traitors to deter others. How? Mark and hide  Insert a unique code in each official copy of the digital document.  Place it in the same locations for all users, for easy retrieval  Make it imperceptible (watermark) to prevent the user from changing or removing it. 3

©2012 Irdeto, All Rights Reserved. Colluding traitors What’s imperceptible to one, might be visible for many.  Users can compare their copies bit by bit.  Where a bit differs, part of the watermark is located.  To prevent the traitors to locate the entire watermark, it should be made such that for each (small) group of users bits should often coincide. Codelength Add a little, gain a lot  The larger the coalition of traitors, the longer the code needs to be to trace them.  Content should be protected by adding as small a fingerprint as possible 4

©2012 Irdeto, All Rights Reserved. Accusation errors Two types:  Falsely accuse an innocent user  Not accuse any guilty user Allow some mistakes, but aim for perfection  Accusing an innocent user should be an extremely rare event  Sometimes not accusing any guilty user isn’t so bad: repeated offenders will be caught in the long run  Allows for much shorter codelength 5

©2012 Irdeto, All Rights Reserved. Research focus 6 Dynamic Static Watermark insertion Traitor attack Generic Specific known

Thank you!