Short 3-Secure Fingerprinting Codes for Copyright Protection Francesc Sebé and Josep Domingo-Ferrer Dept. of Computer Engineering and Mathematics Universitat.

Slides:



Advertisements
Similar presentations
1 An Asymmetric Fingerprinting Scheme based on Tardos Codes Ana Charpentier INRIA Rennes Caroline Fontaine CNRS Télécom Bretagne Teddy Furon INRIA Rennes.
Advertisements

Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
Cyclic Code.
Applied Algorithmics - week7
Error Control Code.
Computer Networking Error Control Coding
Presented by Xinyu Chang
Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics.
Anonymous Fingerprinting Paper by: Birgit Pfitzmann, and Michael Waidner Presentation by: James Campbell.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Strong Error Detection for Control Units Against Advanced Attackers Kahraman Daglar Akdemir Advisor: Berk Sunar Electrical and Computer Engineering MOTIVATION.
Buyer-Seller Watermarking (BSW) Protocols Geong Sen Poh 31 Oct 2006.
DIGITAL COMMUNICATION Coding
Luddite: An Information Theoretic Library Design Tool Jennifer L. Miller, Erin K. Bradley, and Steven L. Teig July 18, 2002.
EEE377 Lecture Notes1 EEE436 DIGITAL COMMUNICATION Coding En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK) Room 2.14.
Quantum Computing Lecture 22 Michele Mosca. Correcting Phase Errors l Suppose the environment effects error on our quantum computer, where This is a description.
Variable-Length Codes: Huffman Codes
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Error Detection and Correction Rizwan Rehman Centre for Computer Studies Dibrugarh University.
Hamming Code Rachel Ah Chuen. Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted.
exercise in the previous class (1)
MAT 1000 Mathematics in Today's World Winter 2015.
USING THE MATLAB COMMUNICATIONS TOOLBOX TO LOOK AT CYCLIC CODING Wm. Hugh Blanton East Tennessee State University
CY2G2 Information Theory 5
Information Coding in noisy channel error protection:-- improve tolerance of errors error detection: --- indicate occurrence of errors. Source.
CODING/DECODING CONCEPTS AND BLOCK CODING. ERROR DETECTION CORRECTION Increase signal power Decrease signal power Reduce Diversity Retransmission Forward.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
1 SNS COLLEGE OF ENGINEERING Department of Electronics and Communication Engineering Subject: Digital communication Sem: V Cyclic Codes.
ERROR CONTROL CODING Basic concepts Classes of codes: Block Codes
ENEE244-02xx Digital Logic Design Lecture 3. Announcements Homework 1 due next class (Thursday, September 11) First recitation quiz will be next Monday,
Riyadh Philanthropic Society For Science Prince Sultan College For Woman Dept. of Computer & Information Sciences CS 251 Introduction to Computer Organization.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
Outline Transmitters (Chapters 3 and 4, Source Coding and Modulation) (week 1 and 2) Receivers (Chapter 5) (week 3 and 4) Received Signal Synchronization.
DIGITAL COMMUNICATIONS Linear Block Codes
Hamming codes. Golay codes.
Linear codes of good error control performance Tsonka Baicheva Institute of Mathematics and Informatics Bulgarian Academy of Sciences Bulgaria.
Doc.: IEEE /133r0 Submission March 2003 Michael Park, Samsung Electronics co., LtdSlide 1 Project: IEEE P Working Group for Wireless Personal.
Recent Results in Combined Coding for Word-Based PPM Radu Rădescu George Liculescu Polytechnic University of Bucharest Faculty of Electronics, Telecommunications.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Detection (§3.2.2)
Information Theory Linear Block Codes Jalal Al Roumy.
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
ERROR DETECTING AND CORRECTING CODES -BY R.W. HAMMING PRESENTED BY- BALAKRISHNA DHARMANA.
An Algorithm for Construction of Error-Correcting Symmetrical Reversible Variable Length Codes Chia-Wei Lin, Ja-Ling Wu, Jun-Cheng Chen Presented by Jun-Cheng.
Some Computation Problems in Coding Theory
1 Traitor Tracing. 2 Outline  Introduction  State of the art  Traceability scheme  Frameproof code  c-secure code  Combinatorial properties  Tracing.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Coding Overview (§3.2)
Data Communications and Networking
1 Digital Design Debdeep Mukhopadhyay Associate Professor Dept of Computer Science and Engineering NYU Shanghai and IIT Kharagpur.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
NATO ARW, 6-9 October, 2008, Veliko Tarnovo, Bulgaria Error Correcting Cryptcodes Based on Quasigroups SMILE MARKOVSKI “Ss Cyril and Methodius” University.
1 Product Codes An extension of the concept of parity to a large number of words of data 0110… … … … … … …101.
Richard Cleve DC 2117 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Lecture (2011)
Error Detecting and Error Correcting Codes
Doc.: IEEE /0520r1 Submission November 2007 Soo-Young Chang, Huawei TechnologiesSlide 1 New Code for RTS/ANP for Lower Probability of Collision.
MAT199: Math Alive Error corretcing and compression Ian Griffiths Mathematical Institute, University of Oxford, Department of Mathematics, Princeton University.
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
Hamming codes. Golay codes.
Render Sequence Encoding for Document Protection
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
CSc4730/6730 Scientific Visualization
Dr. Zhijie Huang and Prof. Hong Jiang University of Texas at Arlington
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
Distributed Compression For Binary Symetric Channels
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Data hiding based Hamming code
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
New Code for RTS/ANP for Lower Probability of Collision
Lecture 15 The Minimum Distance of a Code (Section 4.4)
Theory of Information Lecture 13
Clustering Algorithms for Perceptual Image Hashing
Presentation transcript:

Short 3-Secure Fingerprinting Codes for Copyright Protection Francesc Sebé and Josep Domingo-Ferrer Dept. of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona, Spain

Fingerprinting Before selling a product A mark identifying the buyer is embedded Later mark recovery from illegal copies allows the dishonest buyer to be identified As every copy is different, buyers can collude By comparing their copies We focus on collusions of size c=3

Co-orthogonal codes and Fingerprinting We realized that co-orthogonal codes had not been designed to have a suitable structure to build codewords needed by collusion-secure fingerprinting. A high error-correcting capacity is needed and co-orthogonal codes are not meant for error correction. As an alternative, we used dual binary Hamming codes and a new class of codes called scattering codes to obtain collusion- secure codes shorter than Boneh-Shaw’s for collusions of size 3.

The marking assumption Colluders can identify and change marks in detectable positions ?0? ? 0

Collusion strategy In a 3-collusion p-majority strategy 11 0 p 1-p

Our proposal Each buyer is assigned a Binary Dual Hamming, DH(n), Codeword The accused buyer will be the one whose codeword is the nearest to the recovered one

Colluders aim By collusion, generate a codeword that accuses another buyer nearest

DH(n) properties for 3-collusions Any set of three codewords can be divided into four zones a1a1 a2a2 a3a3 invariant minor(a 3 ) minor(a 2 ) minor(a 1 )

DH(n) properties for 3-collusions With respect to the rest of codewords* (*) There is an exception. For simplicity, it is not mentioned a1a1 a2a2 a3a aiai

Collusions in DH(n) After a p-majority 3-collusion a1a1 a2a2 a3a3 0b(t,2 n-2,1-p) b(t,2 n-2,p) d(a 1,a coll ) a coll

3-Collusions in DH(n) a1a1 a2a2 a3a a a coll d(a coll,a)

Distance distribution d 2 =minimum distance to colluding codewords d 6 =minimum distance to non-colluding codeword

Successful collusion Probability of a successful collusion The nearest codeword is not a colluder’s Colluders can choose p=0 !!! p DH(7) · · · · DH(8) · · · ·

Scattering Codes Scattering codes are a new kind of code Construction and decoding rules described in the paper Used to control collusion strategy

Scattering Code Example of SC(4,3) Decoding rules are detailed in the paper Encodes ‘1’ ‘0’

Collusions over SC(d,t) If 3 codewords, all of them encoding a value v collude, the collusion-generated codeword will decode as v with probability 1. If 3 codewords, two encoding value v and one value collude with p-majoritary strategy, the collusion- generated codeword will decode as v with high probability

Collusions over SC(d,t) p-majoritary strategy Probability of majoritary decoding

3-secure fingerprinting codes Each buyer is assigned a Binary Dual Hamming, DH(n), Codeword We choose appropiate parameters d, t and construct SC(d,t). We compose SC(d,t) with DH(n). We permute the bits of the resulting sequence With a secret key

3-secure fingerprinting codes Permutation DH(n) SC(d,t) p-majoritary p’-majoritary, p’  1

Comparison vs Boneh-Shaw For not too large number of buyers, our proposal (with SC(5,5)) generates shorter codes nºbuyersOur lengthBS length 512 1, ,768 65, ,072 28,105 56, ,802,185 3,604,425 7,208,905 5,148,000 5,269, ,883,888 6,006,780 6,129,816

Conclusion A construction for 3-secure fingerprinting codes has been presented For not too large number of buyers, shorter codewords are obtained

Scientific dissemination Article in IEEE Transactions on Systems, Man and Cybernetics, 2003 (to appear). Article in Electronics Letters, Article in Lecture Notes in Computer Science, vol (ACISP’2002), Acceptance rate 36/94. Other papers (CARDIS’2002, Upgrade Journal, etc.). See Final Report

Research Prize 20 February J.Domingo-Ferrer and F.Sebé were awarded the “Salvà i Campillo” Prize for Outstanding Research, a European-wide prize sponsored by the Association of Telecom Engineers of Catalonia. The prize was delivered by the Spanish Minister for Science and Technology. See for more information on that prize.

Future Research (1) New short codes secure against larger collusions should be found (follow-up of project CO-ORTHOGONAL?) Try to use recent results on q-ary traceability codes to build shorter collusion-secure binary fingerprinting codes for collusions of size c. M.Fernandez “A contribution to the design and efficient decoding of traceability codes”, PhD. Thesis, UPC, Barcelona. Co-advised by J.Domingo- Ferrer. March 2003.

Future research (2) Design of collusion secure fingerprinting codes is in line with 6th FP priority “Cross-media content for leisure and entertainment”. URV is involved in 6th FP NoE proposal “Digiright” and is preparing an IP proposal together with Spain’s SDAE, the digital arm of the world’s 3rd largest rights collecting society SGAE.