Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology WISSec 2010, Nov 2010.

Slides:



Advertisements
Similar presentations
Change-Point Detection Techniques for Piecewise Locally Stationary Time Series Michael Last National Institute of Statistical Sciences Talk for Midyear.
Advertisements

Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
NORMAL OR GAUSSIAN DISTRIBUTION Chapter 5. General Normal Distribution Two parameter distribution with a pdf given by:
1 An Asymmetric Fingerprinting Scheme based on Tardos Codes Ana Charpentier INRIA Rennes Caroline Fontaine CNRS Télécom Bretagne Teddy Furon INRIA Rennes.
Asymptotically false-positive- maximizing attack on non-binary Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology IH 2011,
1-Compressed sensing. 2-Partial Fourier. 3-My thesis.
Evaluating Classifiers
Pattern Recognition and Machine Learning
Face Recognition Ying Wu Electrical and Computer Engineering Northwestern University, Evanston, IL
Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics.
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov
Heap Shape Scalability Scalable Garbage Collection on Highly Parallel Platforms Kathy Barabash, Erez Petrank Computer Science Department Technion, Israel.
A Data-Driven Approach to Quantifying Natural Human Motion SIGGRAPH ’ 05 Liu Ren, Alton Patrick, Alexei A. Efros, Jassica K. Hodgins, and James M. Rehg.
1 An Asymptotically Optimal Algorithm for the Max k-Armed Bandit Problem Matthew Streeter & Stephen Smith Carnegie Mellon University NESCAI, April
Machine Learning CMPT 726 Simon Fraser University
Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten and Boris Škorić presented by Jan-Jaap Oosterwijk.
Principles of the Global Positioning System Lecture 10 Prof. Thomas Herring Room A;
The automation of generalized curves method presentation on the map at any scales Prof. Tadeusz Chrobak AGH University of Science and Technology Poland.
Gwangju Institute of Science and Technology Intelligent Design and Graphics Laboratory Multi-scale tensor voting for feature extraction from unstructured.
Confidence Intervals 1 Chapter 6. Chapter Outline Confidence Intervals for the Mean (Large Samples) 6.2 Confidence Intervals for the Mean (Small.
Statistics for Data Miners: Part I (continued) S.T. Balke.
Confidence Intervals for the Mean (Large Samples) Larson/Farber 4th ed 1 Section 6.1.
Confidence Intervals for the Mean (σ known) (Large Samples)
Sampling Distributions & Standard Error Lesson 7.
The Holey Grail A special score function for non-binary traitor tracing Boris Škorić Jan-Jaap Oosterwijk Jeroen Doumen.
Collusion-Resistance Misbehaving User Detection Schemes Speaker: Jing-Kai Lou 2015/10/131.
Hidden Markov Models Yves Moreau Katholieke Universiteit Leuven.
8 Sampling Distribution of the Mean Chapter8 p Sampling Distributions Population mean and standard deviation,  and   unknown Maximal Likelihood.
Huffman coding Content 1 Encoding and decoding messages Fixed-length coding Variable-length coding 2 Huffman coding.
CS654: Digital Image Analysis Lecture 25: Hough Transform Slide credits: Guillermo Sapiro, Mubarak Shah, Derek Hoiem.
Functions of random variables Sometimes what we can measure is not what we are interested in! Example: mass of binary-star system: We want M but can only.
Section 6.1 Confidence Intervals for the Mean (Large Samples) Larson/Farber 4th ed.
THE NORMAL APPROXIMATION TO THE BINOMIAL. Under certain conditions the Normal distribution can be used as an approximation to the Binomial, thus reducing.
FREE-VIEW WATERMARKING FOR FREE VIEW TELEVISION Alper Koz, Cevahir Çığla and A.Aydın Alatan.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
1 Traitor Tracing. 2 Outline  Introduction  State of the art  Traceability scheme  Frameproof code  c-secure code  Combinatorial properties  Tracing.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology CWG, Dec 2010.
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec ICU 2005:
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Hypothesis Testing. Outline of Today’s Discussion 1.Logic of Hypothesis Testing 2.Evaluating Hypotheses Please refrain from typing, surfing or printing.
Lecture 5 Introduction to Sampling Distributions.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
Recall on whiteboards What type of data is the normal distribution used to model? Discrete or continuous? About what percentage of the data values will.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
Copyright © 2015, 2012, and 2009 Pearson Education, Inc. 1 Chapter Confidence Intervals 6.
Chapter Confidence Intervals 1 of 31 6  2012 Pearson Education, Inc. All rights reserved.
Chapter 6 Confidence Intervals 1 Larson/Farber 4th ed.
Review Law of averages, expected value and standard error, normal approximation, surveys and sampling.
Grouping and Segmentation. Sometimes edge detectors find the boundary pretty well.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
Watermarking Scheme Capable of Resisting Sensitivity Attack
5.4 Inequalities in One Triangle
Lecture 1.31 Criteria for optimal reception of radio signals.
Chapter 7 Review.
Introduction to Audio Watermarking Schemes N. Lazic and P
The normal distribution
Probability Theory and Parameter Estimation I
Searching for pulsars using the Hough transform
ICS 280 Learning in Graphical Models
Antonino Simone and Boris Škorić Eindhoven University of Technology
Chapter 6 Confidence Intervals.
Triangle Inequalities
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
Spread Spectrum Watermarking
Information Theoretical Analysis of Digital Watermarking
Confidence Intervals for the Mean (Large Samples)
Chapter 6 Confidence Intervals.
Probabilistic Surrogate Models
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology WISSec 2010, Nov 2010

Outline Introduction to forensic watermarking ◦ Collusion attacks ◦ Aim Tardos scheme ◦ q-ary version ◦ Properties Performance of the Tardos scheme ◦ False accusation probability Results & Summary

Forensic Watermarking EmbedderDetector original content payload content with hidden payload WM secrets payload original content Payload = some secret code indentifying the recipient ATTACK

Collusion attacks "Coalition of pirates" 1 pirate #1 Attacked Content / #2 #3 #4 = "detectable positions"

Aim Trace at least one pirate from detected watermark BUT Resist large coalition  longer code Low probability of innocent accusation (FP) (critical!)  longer code Low probability of missing all pirates (FN) (not critical)  longer code AND Limited bandwidth available for watermarking code

n users embedded symbols m content segments Symbols allowed Symbol biases drawn from distribution F watermark after attack ABCB ACBA BBAC BABA ABAC CAAA ABAB biases ACAC ABAB AABCABC p 1A p 1B p 1C p 2A p 2B p 2C p iA p iB p iC p mA p mB p mC c pirates q-ary Tardos scheme (2008) Arbitrary alphabet size q Dirichlet distribution F =y ABCB ACBA BBAC BABA ABAC CAAA ABAB

Tardos scheme continued Accusation: Every user gets a score User is accused if score > threshold Sum of scores per content segment Given that pirates have y in segment i: Symbol-symmetric

Properties of the Tardos scheme Asymptotically optimal ◦ m  c 2 for large coalitions, for every q ◦ Previously best m  c 4 ◦ Proven: power ≥ 2 Random code book No framing ◦ No risk to accuse innocent users if coalition is larger than anticipated F, g 0 and g 1 chosen ‘ad hoc’ (can still be improved)

Accusation probabilities m = code length c = #pirates u = avg guilty score Pirates want to minimize u and make longer the innocent tail Curve shapes depend on:  F, g 0, g 1 (fixed ‘a priori’)  Code length  # pirates  Pirate strategy Central Limit Theorem  asymptotically Gaussian shape (how fast?) 2003  2010: innocent accusation curve shape unknown… till now! threshold total score (scaled) u Result: majority voting minimizes u innocent guilty

Approach Fourier transform property: Steps: 1.S =  i S i Si Si   = pdf of total score S S   = InverseFourier[ ] 2. 3.Compute Depends on strategy New parameterization for attack strategy 4.Compute 5. Taylor

Main result: false accusation probability curve Example: majority voting attack threshold/√m exact FP Result from Gaussian FP is  70 times less than Gaussian approx in this example But  Code 2-5% shorter than predicted by Gaussian approx log 10 FP

Summary Results: introduced a new parameterization of the attack strategy majority voting minimizes u first to compute the innocent score pdf ◦ quantified how close FP probability is to Gaussian ◦ sometimes better then Gaussian! ◦ safe to use Gaussian approx Future work: study more general attacks different parameter choices Thank you for your attention!