Asymptotically false-positive- maximizing attack on non-binary Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology IH 2011,

Slides:



Advertisements
Similar presentations
1 KCipher-2 KDDI R&D Laboratories Inc.. ©KDDI R&D Laboratories Inc. All rights Reserved. 2 Introduction LFSR-based stream ciphers Linear recurrence between.
Advertisements

Pattern Recognition and Machine Learning
FINITE WORD LENGTH EFFECTS
Zentralanstalt für Meteorologie und Geodynamik Calibrating the ECMWF EPS 2m Temperature and 10m Wind Speed for Austrian Stations Sabine Radanovics.
Slide 1 Insert your own content. Slide 2 Insert your own content.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 3.1 Chapter 3.
Decision Analysis and Its Applications to Systems Engineering The Hampton Roads Area International Council on Systems Engineering (HRA INCOSE) chapter.
Dynamic View Selection for Time-Varying Volumes Guangfeng Ji* and Han-Wei Shen The Ohio State University *Now at Vital Images.
Change-Point Detection Techniques for Piecewise Locally Stationary Time Series Michael Last National Institute of Statistical Sciences Talk for Midyear.
Copyright © 2010 Pearson Education, Inc. Slide The number of sweatshirts a vendor sells daily has the following probability distribution. Num of.
0 - 0.
Teacher Name Class / Subject Date A:B: Write an answer here #1 Write your question Here C:D: Write an answer here.
Addition Facts
CS4026 Formal Models of Computation Running Haskell Programs – power.
Feedback Reliability Calculation for an Iterative Block Decision Feedback Equalizer (IB-DFE) Gillian Huang, Andrew Nix and Simon Armour Centre for Communications.
Colour From Grey by Optimized Colour Ordering Arash VahdatMark S. Drew School of Computing Science Simon Fraser University.
Chapter 3: PCM Noise and Companding
VARUN GUPTA Carnegie Mellon University 1 With: Mor Harchol-Balter (CMU)
Detection Chia-Hsin Cheng. Wireless Access Tech. Lab. CCU Wireless Access Tech. Lab. 2 Outlines Detection Theory Simple Binary Hypothesis Tests Bayes.
Compressing Forwarding Tables Ori Rottenstreich (Technion, Israel) Joint work with Marat Radan, Yuval Cassuto, Isaac Keslassy (Technion, Israel) Carmi.
Chapter3: Gate-Level Minimization Part 2
Outline Transmitters (Chapters 3 and 4, Source Coding and Modulation) (week 1 and 2) Receivers (Chapter 5) (week 3 and 4) Received Signal Synchronization.
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
5.9 + = 10 a)3.6 b)4.1 c)5.3 Question 1: Good Answer!! Well Done!! = 10 Question 1:
THE CENTRAL LIMIT THEOREM
1 An Asymmetric Fingerprinting Scheme based on Tardos Codes Ana Charpentier INRIA Rennes Caroline Fontaine CNRS Télécom Bretagne Teddy Furon INRIA Rennes.
AP Statistics Chapter 2 review “Are you feeling normal today?”
©2005, The Aerospace Corporation, All Rights Reserved 1 Satellite TT&C Denial, Electronic Counter Measure and Mitigation.
Addition 1’s to 20.
Test B, 100 Subtraction Facts
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Bottoms Up Factoring. Start with the X-box 3-9 Product Sum
K-MEANS ALGORITHM Jelena Vukovic 53/07
Basics of Statistical Estimation
Commonly Used Distributions
Sampling and Pulse Code Modulation
Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics.
Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov
N-Secure Fingerprinting for Copyright Protection of Multimedia
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
Santa Clara, CA USA August An Information Theory Approach for Flash Memory Eitan Yaakobi, Paul H. Siegel, Jack K. Wolf University of California,
Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten and Boris Škorić presented by Jan-Jaap Oosterwijk.
The Holey Grail A special score function for non-binary traitor tracing Boris Škorić Jan-Jaap Oosterwijk Jeroen Doumen.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology WISSec 2010, Nov 2010.
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Huffman coding Content 1 Encoding and decoding messages Fixed-length coding Variable-length coding 2 Huffman coding.
Recent Results in Combined Coding for Word-Based PPM Radu Rădescu George Liculescu Polytechnic University of Bucharest Faculty of Electronics, Telecommunications.
Abdullah Aldahami ( ) April 6,  Huffman Coding is a simple algorithm that generates a set of variable sized codes with the minimum average.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology CWG, Dec 2010.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
Digital Image Processing Lecture 17: Segmentation: Canny Edge Detector & Hough Transform Prof. Charlene Tsai.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
Enlargement Simple scale factors. Find the scale factor and the missing length ?
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
Introduction to Audio Watermarking Schemes N. Lazic and P
Review and Preview and Basics of Hypothesis Testing
Detection of discontinuity using
Advisor: Chin-Chen Chang1, 2
Antonino Simone and Boris Škorić Eindhoven University of Technology
NORMAL PROBABILITY DISTRIBUTIONS
Elementary Statistics
Where did we stop? The Bayes decision rule guarantees an optimal classification… … But it requires the knowledge of P(ci|x) (or p(x|ci) and P(ci)) We.
Chapter 11: Introduction to Hypothesis Testing Lecture 5a
Chapter 6 Confidence Intervals.
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
Reasoning in Psychology Using Statistics
Information Theoretical Analysis of Digital Watermarking
Detecting Digital Forgeries using Blind Noise Estimation
Presentation transcript:

Asymptotically false-positive- maximizing attack on non-binary Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology IH 2011, May 2011

Outline Forensic watermarking ◦ Collusion attacks q-ary Tardos scheme New parameterization of attack strategy Accusation-minimizing attack Performance of the Tardos scheme ◦ False accusation probability Results & Summary 2

Forensic Watermarking EmbedderDetector original content payload content with hidden payload WM secrets payload original content Payload = some secret code indentifying the recipient ATTACK 3

Collusion attacks ABAC CAAA ABAB ACAC ABAB AABCABC "Coalition of pirates" Symbols received by pirates Symbols allowed “Restricted Digit Model” 4

Aim Trace at least one pirate from detected watermark BUT Resist large coalition  longer code Low probability of innocent accusation (FP) (critical!)  longer code Low probability of missing all pirates (FN) (not critical)  longer code AND Limited bandwidth available for watermarking code 5

n users embedded symbols m content segments Symbols allowed Symbol biases drawn from distribution F watermark after attack ABCB ACBA BBAC BABA ABAC CAAA ABAB biases ACAC ABAB AABCABC p 1A p 1B p 1C p 2A p 2B p 2C p iA p iB p iC p mA p mB p mC c pirates q-ary Tardos scheme (2008) Arbitrary alphabet size q Dirichlet distribution F Symbol-symmetric ABCB ACBA BBAC BABA ABAC CAAA ABAB 6

Tardos scheme (cont.) Accusation: Every user gets a score User is accused if score > threshold Sum of scores per content segment Given that pirates create y in segment i: Symbol-symmetric g 0 (p) g 1 (p) p p 7

Accusation probabilities m = code length c = #pirates μ ̃ = expected coalition score per segment Pirates want to minimize μ ̃ and make the innocent tail longer Curve shapes depend on:  F, g 0, g 1 (fixed ‘a priori’)  Code length  # pirates  Pirate strategy Method to compute innocent curve [Simone+Škorić 2010] Big m  innocent curve goes to Gaussian threshold total score (scaled) innocent guilty 8

New parameterization of attack strategy Symbol-symmetric  only symbol occurrences matter Notation:  α = # α in segment c pirates   α  α = c For every segment: New attack parameterization that does not refer to symbols: 9

New parameterization of attack strategy (cont.) Due to the marking assumption, K 0 =0 and K c =1 K b can be pre-computed  faster computation Thanks to the new parameterization, we can write Which strategy minimizes μ ̃ ? 10

μ ̃ -minimizing attack For each , the attack outputs the symbol y s. t. its occurrence value  y minimizes T(b) (i. e. T(  y )  T(   ) for each  ) 11

T(b) analysis Strong influence of  parameter More interesting case: Majority voting Minority voting 12

Results Gaussian approximation  13

Results (cont.) Gaussian approximation  14

Summary Results: simple decoder accusation method in the Restricted Digit Model new parameterization of the attack strategy μ ̃ -minimizing attack is the strongest attack in asymptotic regime ◦ not optimal attack for small coalitions  parameter has a strong effect For q>2 code length becomes better than for q=2, but only if c is large enough! The larger q is, the larger c must be to obtain a code shorter than the case q=2 Thank you for your attention! 15