The Holey Grail A special score function for non-binary traitor tracing Boris Škorić Jan-Jaap Oosterwijk Jeroen Doumen.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Coding & Crypto Bachelor Colloquium 2013.
1 An Asymmetric Fingerprinting Scheme based on Tardos Codes Ana Charpentier INRIA Rennes Caroline Fontaine CNRS Télécom Bretagne Teddy Furon INRIA Rennes.
Asymptotically false-positive- maximizing attack on non-binary Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology IH 2011,
MP3 Overview John Ehrhardt Elena Silenok CSE228 – Spring 03.
Digital rights management Audio watermark Jiamian.
Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics.
GUIDELINES FOR REPORT/ DISSERTATION/THESIS WRITING Dr. W. Z. Gandhare.
Plagiarism: What a postgrad needs to know Dr Richard Rowe Department of Psychology University of Sheffield.
Short 3-Secure Fingerprinting Codes for Copyright Protection Francesc Sebé and Josep Domingo-Ferrer Dept. of Computer Engineering and Mathematics Universitat.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov
N-Secure Fingerprinting for Copyright Protection of Multimedia
Open Access projects in Macedonia: The first steps Irina Shumadieva, Metamorphosis Foundation 1.
IS605/606: Information Systems Instructor: Dr. Boris Jukic
18/03/2007Obfuscation 1 Software protection Mariano Ceccato FBK - Fondazione Bruno Kessler
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Birthday Attack on Efficient and Anonymous Buyer-Seller Watermarking Protocol BY Qurat-ul-Ain M. Mahboob Yasin COMSATS Institute of Information Technology,
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Protection for Web Delivered Music Patcharinee Tientrakool EE 6886: Topics in Signal Processing - Multimedia Security System.
Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten and Boris Škorić presented by Jan-Jaap Oosterwijk.
Group AA-68 Levkivska Lena. PLEDGE is referred to as one of the securities of the discharge of one’s responsibilities.
Rimantas Ramanauskas Kazys Maksvytis Alvydas Janulevičius State Enterprise Centre of Registers INTEGRATED PROCESSING OF DIGITAL CADASTRAL DATA IN LITHUANIA.
Module 5 TED 356 Curriculum in Sec. Ed.. Module 5 Using the state’s standards, identify specific information knowledge (content) and procedural knowledge.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
Discrete Mathematics. - Coding Theory and Cryptology - Cryptographic Implementations eindhoven.cr.yp.to - Discrete Algebra and Geometry.
Watermarking Video Content What is video watermarking? November 2010 Rajaram Pejaver Note: The views presented here are solely those of.
Chapter 11: Comparing Two Populations or Treatments
Fingerprinting & Broadcast Encryption for Content Protection.
O NLINE G RADUATE A PPLICATION T UTORIAL. REMINDERS: Please review this tutorial prior to completing the online Graduate Application. –
Professor Norah Jones Dr. Esyin Chew Social Software for Learning – The Institutional Policy of the University of Glamorgan ICHL 2012, China
Anti-collusion fingerprinting for Multimedia W. Trappe, M. Wu, J. Wang and K.J. R. Liu, IEEE Tran. Signal Processing, Vol. 51, No. 4, April 2003.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology WISSec 2010, Nov 2010.
Information about essays The deadline for essays: April, 1. midnight Missing the deadline costs 2 point per day Send the essay to me. I try to confirm.
Hidden Markov Models for Software Piracy Detection Shabana Kazi Mark Stamp HMMs for Piracy Detection 1.
LWDRM (Lightweight Digital Rights Management) Information Science and Technology Master 1 st Yuuki Horita.
Resources Research – Group 7.  Foras  Journals and Newsletters  Associations  Courses and Seminars.
6th September 2012 PROPOSAL APPLICATION CORE 2012 CALL.
1 Simplification in France: A remodelled approach Brussels, 6th February 2009 Denis Besnainou, Direction générale de la modernisation de l’État.
Presentation of teaching materials on the topic of «Crime and Punishment»
MS Access: Database Concepts Instructor: Vicki Weidler Assistant: Joaquin Obieta.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Traitor Tracing. 2 Outline  Introduction  State of the art  Traceability scheme  Frameproof code  c-secure code  Combinatorial properties  Tracing.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology CWG, Dec 2010.
Computer Science Revocation and Tracing Schemes for Stateless Receivers Dalit Naor, Moni Naor, Jeff Lotspiech Presented by Attila Altay Yavuz CSC 774 In-Class.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Solve by Factoring Zero Product Property.
Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science/
The procedures for project under Measure 1.2 submission for SF financing Joint Seminar “Capacity building for designing projects dealing with sustainable.
Working Group Security and Incentives Robbert van Renesse Jeroen Doumen Gilles Tredan Harry Li Rachid Guerraoui Lorenzo Alvisi Boris Koldehofe.
Mirjana Boshnjak Skopje, 20 to 22 September 2017
2013 AIConnect Policy Framework for Sustainable Real Estate Markets
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
Antonino Simone and Boris Škorić Eindhoven University of Technology
دانشگاه شهیدرجایی تهران
تعهدات مشتری در کنوانسیون بیع بین المللی
The Arc-Node Data Model
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
Combating Drug Abuse in Montenegro
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
On a Traitor Tracing Scheme from ACISP 2003
Warm Up Objective: Scientists will describe DNA and its use as evidence by researching a case from The Innocence Project and creating a product choice.
Cheating and Prevention in Visual Secret Sharing
Presentation transcript:

The Holey Grail A special score function for non-binary traitor tracing Boris Škorić Jan-Jaap Oosterwijk Jeroen Doumen

Piracy Copy protection Illegal or unofficial copy Traitor tracing / Department of Mathematics & ComputerScience PAGE 1

Traitor Tracing / Department of Mathematics & ComputerScience PAGE 2 User ID...

Collusion Compare several watermarked copies Locate the differences Create new watermark / Department of Mathematics & ComputerScience PAGE 3 Ingrid... Pierre... Travis... New

Collusion-Resistant Traitor Tracing / Department of Mathematics & ComputerScience PAGE Ingrid... Pierre... Travis... New...

Collusion-Resistant Traitor Tracing (II) Compare the collusion watermark to all user watermarks Attribute a level of suspicion to each user Accuse users that are too suspicious / Department of Mathematics & ComputerScience PAGE 5

Level of suspicion / Department of Mathematics & ComputerScience PAGE 6 0 guilty innocent level of suspicion FNFP accusation threshold

Code length / Department of Mathematics & ComputerScience PAGE 7

Nice properties Level of suspicion of innocent users Zero mean (independent of collusion strategy) Unit variance (independent of collusion strategy) Level of suspicion of coalition Mean is independent of collusion strategy / Department of Mathematics & ComputerScience PAGE 8

Larger alphabets Using larger alphabets allows for better schemes. 2011, Boesten et al.: Fingerprinting capacity increases 2013, Oosterwijk et al.: Capacity-achieving scheme But... mean level of suspicion of coalition does depend on the collusion strategy / Department of Mathematics & ComputerScience PAGE 9

Traitor Tracing Scheme / Department of Mathematics & ComputerScience PAGE 10

The Grails / Department of Mathematics & ComputerScience PAGE 11

Holy Grail / Department of Mathematics & ComputerScience PAGE 12

Holey Grail / Department of Mathematics & ComputerScience PAGE 13

Conclusion Collusion-Resistant Traitor Tracing Scheme Level of suspicion of innocent users Zero mean (independent of collusion strategy) Unit variance (independent of collusion strategy) Level of suspicion of coalition Mean is independent of collusion strategy Possible for non-binary alphabets, but this construction performs worse than was hoped / Department of Mathematics & ComputerScience PAGE 14

Thanks for your attention! Questions?

EURASIP Journal on Information Security Topics are among others o Collusion Secure Fingerprinting codes o Transactional Watermarking and Traitor Tracing o Collusion Secure Watermarking o Transactional Watermarking and Fingerprinting for data sets / sets of files o Real World reports or experiences or insights regarding the legal perspective Guest-editors: Boris Škorić, Eindhoven Univ. of Tech. Jan-Jaap Oosterwijk, Eindhoven Univ. of Tech. Thijs Laarhoven, Eindhoven Univ. of Tech. Jeroen Doumen, Irdeto BV Waldemar Berchtold, Fraunhofer Institute SIT Martin Steinebach, Fraunhofer Institute SIT Marcel Schäfer, Fraunhofer Institute SIT Editor-in-Chief: Stefan Katzenbeisser, TU-Darmstadt CfP: Special Issue on Collusion Secure Fingerprinting and Transactional Watermarking Deadline for submissions, February 28, 2014