Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov. 2012.

Slides:



Advertisements
Similar presentations
Chapter 4. Elements of Statistics # brief introduction to some concepts of statistics # descriptive statistics inductive statistics(statistical inference)
Advertisements

Change-Point Detection Techniques for Piecewise Locally Stationary Time Series Michael Last National Institute of Statistical Sciences Talk for Midyear.
NORMAL OR GAUSSIAN DISTRIBUTION Chapter 5. General Normal Distribution Two parameter distribution with a pdf given by:
1 An Asymmetric Fingerprinting Scheme based on Tardos Codes Ana Charpentier INRIA Rennes Caroline Fontaine CNRS Télécom Bretagne Teddy Furon INRIA Rennes.
Asymptotically false-positive- maximizing attack on non-binary Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology IH 2011,
AP Statistics Chapter 7 – Random Variables. Random Variables Random Variable – A variable whose value is a numerical outcome of a random phenomenon. Discrete.
Sampling and Pulse Code Modulation
Evaluating Classifiers
Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics.
CSC321: 2011 Introduction to Neural Networks and Machine Learning Lecture 10: The Bayesian way to fit models Geoffrey Hinton.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Uncertainty Representation. Gaussian Distribution variance Standard deviation.
HMM-BASED PATTERN DETECTION. Outline  Markov Process  Hidden Markov Models Elements Basic Problems Evaluation Optimization Training Implementation 2-D.
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
A Data-Driven Approach to Quantifying Natural Human Motion SIGGRAPH ’ 05 Liu Ren, Alton Patrick, Alexei A. Efros, Jassica K. Hodgins, and James M. Rehg.
Tracking using the Kalman Filter. Point Tracking Estimate the location of a given point along a sequence of images. (x 0,y 0 ) (x n,y n )
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
K. Desch – Statistical methods of data analysis SS10
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Ka-fu Wong © 2004 ECON1003: Analysis of Economic Data Lesson6-1 Lesson 6: Sampling Methods and the Central Limit Theorem.
Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten and Boris Škorić presented by Jan-Jaap Oosterwijk.
Digital watermark in digital images and e-books. Why digital watermarking? What is digital watermark? Perceptible and unperceptible watermarks.
Linear Algebra and Image Processing
SVD(Singular Value Decomposition) and Its Applications
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Hypothesis Testing. Distribution of Estimator To see the impact of the sample on estimates, try different samples Plot histogram of answers –Is it “normal”
Diophantine Approximation and Basis Reduction
Copyright ©2011 Nelson Education Limited The Normal Probability Distribution CHAPTER 6.
The Holey Grail A special score function for non-binary traitor tracing Boris Škorić Jan-Jaap Oosterwijk Jeroen Doumen.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology WISSec 2010, Nov 2010.
EE 551/451, Fall, 2006 Communication Systems Zhu Han Department of Electrical and Computer Engineering Class 14 Oct. 5 th, 2006.
Course Outline (Tentative) Fundamental Concepts of Signals and Systems Signals Systems Linear Time-Invariant (LTI) Systems Convolution integral and sum.
Example: Bioassay experiment Problem statement –Observations: At each level of dose, 5 animals are tested, and number of death are observed.
The University of Texas at Austin, CS 395T, Spring 2008, Prof. William H. Press 1 Computational Statistics with Application to Bioinformatics Prof. William.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Ka-fu Wong © 2003 Chap 6- 1 Dr. Ka-fu Wong ECON1003 Analysis of Economic Data.
Topic 5 - Joint distributions and the CLT
Feature Point Detection and Curve Approximation for Early Processing of Free-Hand Sketches Tevfik Metin Sezgin and Randall Davis MIT AI Laboratory.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology CWG, Dec 2010.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Edge Based Segmentation Xinyu Chang. Outline Introduction Canny Edge detector Edge Relaxation Border Tracing.
1/18/2016Atomic Scale Simulation1 Definition of Simulation What is a simulation? –It has an internal state “S” In classical mechanics, the state = positions.
New Vocabulary VocabularyDefinitionUsing symbols reciprocalFor any nonzero number x, the reciprocal is The number 0 has no reciprocal; The reciprocal.
The Unscented Particle Filter 2000/09/29 이 시은. Introduction Filtering –estimate the states(parameters or hidden variable) as a set of observations becomes.
Geology 6600/7600 Signal Analysis 04 Sep 2014 © A.R. Lowry 2015 Last time: Signal Analysis is a set of tools used to extract information from sequences.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
6/11/2016Atomic Scale Simulation1 Definition of Simulation What is a simulation? –It has an internal state “S” In classical mechanics, the state = positions.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Introduction to Audio Watermarking Schemes N. Lazic and P
Review of DSP.
Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband.
2-4 The Distributive Property
Chapter 7: Sampling Distributions
Steganalysis of Block-Structured Stegotext
Distributions and Concepts in Probability Theory
Antonino Simone and Boris Škorić Eindhoven University of Technology
CS654: Digital Image Analysis
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
Fourier Transform of Boundaries
#10 The Central Limit Theorem
CS723 - Probability and Stochastic Processes
Information Theoretical Analysis of Digital Watermarking
Chapter 7 The Normal Distribution and Its Applications
Electrical Communications Systems ECE Spring 2019
Review of DSP.
Presentation transcript:

Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov. 2012

Outline Forensic watermarking ◦ collusion attacks q-ary Tardos scheme Density function of "scores" ◦ convolution ◦ series expansion ◦ numerics Open problems 2

Forensic Watermarking EmbedderDetector original content payload content with hidden payload WM secrets payload original content Payload = some secret code indentifying the recipient ATTACK 3

Collusion attacks ABAC CAAA ABAB ACAC ABAB AABCABC "Coalition of pirates" Symbols received by pirates Symbols allowed “Restricted Digit Model” 4

Aim Trace at least one pirate from detected watermark BUT Resist large coalition ⇒ longer code Low probability of innocent accusation (FP) (critical) ⇒ longer code Low probability of missing all pirates (FN) ⇒ longer code AND Limited bandwidth available for watermark 5

n users embedded symbols m content segments Symbols allowed Symbol biases drawn from distribution F watermark after attack ABCB ACBA BBAC BABA ABAC CAAA ABAB ACAC ABAB AABCABC p 1A p 1B p 1C p 2A p 2B p 2C p iA p iB p iC p mA p mB p mC c pirates q-ary Tardos scheme Arbitrary alphabet size q Dirichlet distribution F ABCB ACBA BBAC BABA ABAC CAAA ABAB 6

Tardos scheme (cont.) Tracing: Attackers output symbol y i in segment i: Every user gets a score Sum of scores per content segment User is "accused" if score exceeds threshold g 0 (p) p g 1 (p) p 7 For innocent user: E[score]=0 and E[score 2 ]=1

Accusation probabilities m = code length c = #pirates μ = E[coalition score per segment] Pirates want to minimize μ and make the innocent tail longer Curve shapes depend on:  alphabet size q  F, g 0, g 1  Code length  #pirates  Pirate strategy CLT: Big m  curves go to Gaussian Method to compute innocent curve [Simone+Škorić 2010] threshold total score (scaled) innocent guilty 8 S/√m

Finding the innocent score pdf 1.Find pdf of innocent score in one segment. φ (u) 2.Use convolution property of characteristic functions. 9

Innocent score pdf (2) Finding the single-segment pdf: attack strategy 10

Single-segment pdf 11

Innocent score pdf (3) The Fourier transform: hypergeometric 12

Innocent score pdf (4) Direct approach for finding False Positive prob: Prob[S>Z] = Z/√m Try numerical computation of the k-integral. Problem: numerical instability! 13

Innocent score pdf (5) Less direct approach for finding False Positive prob: Still use same starting point... but do Edgeworth-like expansion Gaussian tail Hermite function... and then pray for numerical stability 14

Numerical results on False Positive probs. Convergence not enough terms 15

Power law in the tails 16

Score pdf for one guilty user Same approach, minor differences: Nonzero mean (strategy dependent) Variance depends on attack strategy 17

Combine data for innocent and guilty 18

Open questions / future work Better understanding of the convergence Reduce the reliance on "prayer" Strategy-independent bounds avoid re-doing everything for each strategy Do the whole exercise for the coalition score or multiple scores simultaneously Avoid the series expansion altogether? 19