Fingerprinting and Broadcast Encryption Multimedia Security.

Slides:



Advertisements
Similar presentations
Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.
Advertisements

Pseudo-Relevance Feedback For Multimedia Retrieval By Rong Yan, Alexander G. and Rong Jin Mwangi S. Kariuki
Data Compression CS 147 Minh Nguyen.
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Computer Networking Error Control Coding
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Short 3-Secure Fingerprinting Codes for Copyright Protection Francesc Sebé and Josep Domingo-Ferrer Dept. of Computer Engineering and Mathematics Universitat.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
Broadcast Encryption and Traitor Tracing Jin Kim.
VIPER DSPS 1998 Slide 1 A DSP Solution to Error Concealment in Digital Video Eduardo Asbun and Edward J. Delp Video and Image Processing Laboratory (VIPER)
N-Secure Fingerprinting for Copyright Protection of Multimedia
Collusion-resistant fingerprinting for multimedia Wade Trappe, Min Wu, K.J. Ray Liu.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Fifth International Conference on Information
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
Buyer-Seller Watermarking (BSW) Protocols Geong Sen Poh 31 Oct 2006.
2001/10/25Sheng-Feng Ho1 Efficient and Scalable On- Demand Data Streaming Using UEP Codes Lihao Xu Washington University in St. Louis ACM Multimedia 2001.
Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Information Theory Eighteenth Meeting. A Communication Model Messages are produced by a source transmitted over a channel to the destination. encoded.
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Variable-Length Codes: Huffman Codes
Statistical Multiplexer of VBR video streams By Ofer Hadar Statistical Multiplexer of VBR video streams By Ofer Hadar.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Watermarking Relational Databases CSC 574/474 Information System Security.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
Audio Compression Usha Sree CMSC 691M 10/12/04. Motivation Efficient Storage Streaming Interactive Multimedia Applications.
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
Computer Networks: Multimedia Applications Ivan Marsic Rutgers University Chapter 3 – Multimedia & Real-time Applications.
Fingerprinting & Broadcast Encryption for Content Protection.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Anti-collusion fingerprinting for Multimedia W. Trappe, M. Wu, J. Wang and K.J. R. Liu, IEEE Tran. Signal Processing, Vol. 51, No. 4, April 2003.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology WISSec 2010, Nov 2010.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Multicast Security: A Taxonomy and Some Efficient Constructions By Cannetti et al, appeared in INFOCOMM 99. Presenter: Ankur Gupta.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
Information Theory Linear Block Codes Jalal Al Roumy.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
1 Traitor Tracing. 2 Outline  Introduction  State of the art  Traceability scheme  Frameproof code  c-secure code  Combinatorial properties  Tracing.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology CWG, Dec 2010.
Computer Science Revocation and Tracing Schemes for Stateless Receivers Dalit Naor, Moni Naor, Jeff Lotspiech Presented by Attila Altay Yavuz CSC 774 In-Class.
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 9.
Copyright 2012, Toshiba Corporation. A Survey on the Algebraic Surface Cryptosystems Koichiro Akiyama ( TOSHIBA Corporation ) Joint work with Prof. Yasuhiro.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
Error Control Coding. Purpose To detect and correct error(s) that is introduced during transmission of digital signal.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
RS – Reed Solomon Error correcting code. Error-correcting codes are clever ways of representing data so that one can recover the original information.
Pouya Ostovari and Jie Wu Computer & Information Sciences
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Watermarking with Side Information
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
Presentation transcript:

Fingerprinting and Broadcast Encryption Multimedia Security

2 Outline Introduction Collusion attack Traitor tracing for broadcast encryption Collusion-resilient fingerprinting Conclusions

3 Introduction Two types of fingerprinting –Type I: Embed fingerprints to contents –Type II: Extract fingerprints from contents … … EmbedExtract

4 Introduction - Type I Fingerprinting What –The process of assigning a unique key for each user' s content Why –To identify the person who acquired a particular copy –To prevent users from destroying the identification information –To trace the traitors How –Watermarking the contents with the unique keys

5 Introduction - Type II Fingerprinting What –Extract unique and robust image descriptors from contents Why –For the detection of replicas –For content-based image retrieval How –Select the features that best describe a given content

6 Introduction Talk focus –Type I fingerprinting Some related terms –Collusion attack –Traitor tracing

7 Introduction Collusion attack –A coalition of traitors collude to destroy the identification information and leak the content (keys) Extraction …. Collusion attack Pirate code

8 Introduction Traitor tracing –Find at least one of the colluders {,,,…, } –Can not frame innocent users {,…..} –Related researches: From Broadcast Encryption to Fingerprinting

9 Collusion attack Broadcast encryption –e.g. u 1 : {k 1,k 3,k 7 } u 2 :{k 3,k 5,k 7 }  pirate decoder box: {k 1,k 5,k 7 } Digital fingerprinting –Linear & non-linear collusion attacks Copy-and-paste attack

10 Collusion attack P d of the T N statistics under different attacks –Z. J. Wang, M. Wu, H. Zhao, W. Trappe, & K. J. R. Liu, 2003

11 Collusion attack Analyze the statistical features to improve the detection performance –H. V. Zhao, M. Wu, Z. J. Wang, & K. J. R. Liu, 2004 –e.g. Observe the histograms of sample means of extracted fingerprints under the average, minimum and randomized negative attacks, respectively

12 Traitor tracing for broadcast encryption Broadcast encryption –Amos Fiat & Moni Naor, CRYPTO’93 –Scenario of broadcast scheme A center and a set of users U The center provides the users with prearranged keys when they join the system The center wishes to broadcast a message (e.g. a key) to a dynamically changing privileged subset T in such a way that non-members cannot learn the message –Goal Securely transmit a message to all members of the privileged subset

13 Traitor tracing for broadcast encryption Key management –How to assign and store the keys –How to save the key storage for both the server and clients –A comprehensive survey A. Wool, 2000 A simple scheme –The extended-header scheme Suppose that a program p belongs to t packages for t users Broadcast ENC Kp (p) to users Header: IDKey 1E s1 (K p ) ….… tE st (K p )

14 Resiliency –A broadcast scheme is called resilient to set S if for every subset T (T∩S=Φ), no eavesdropper that has all secrets associated with members of S, can obtain knowledge of the secret common to T –k-resilient The scheme is resilient to any set S  U of size k Traitor tracing for broadcast encryption TSk U

15 The basic scheme –For every set B  U, 0  |B|  k, define a key K B and give K B to every user x  U-B –The common key to the privileged set T is the exclusive or of all keys K B, B  U-T –Every coalition S with less than k users will all be missing key K S and will therefore be unable to compute the common key for any privileged set T (T∩S=Φ) Traitor tracing for broadcast encryption B1B1 K B1 B2B2 BjBj K Bj K B2 T S

16 Tracing traitors –B. Chor, A. Fiat, M. Naor, & B. Pinkas, CRYPTO’94 & 98 –Confiscate a pirate decoder to determine the identity of a traitor –Randomly assign the decryption keys to users –Make the probability of exposing an innocent user negligible Traitor tracing for broadcast encryption

17 Traitor tracing for broadcast encryption A simple scheme –Keys –l hash functions h 1, h 2, …, h l h i : {1,…,n}  {1,…,2k 2 } h i (u) the ith key for user u … … ……… … … l 2k22k2

18 Traitor tracing for broadcast encryption –Personal key of user u –2k 2 l encrypted keys –Decrypt s i and compute secret s … … ……… … … Cipher block s Decrypt Enabling block

19 Traitor tracing for broadcast encryption Tracing {user 1, user 5}, {user 2, user 3, user 5}, {user5, user 6}, …,{user 2, user 7, user 9}, ….,{…} user 1 x x user 2 x …. user 5 x x x x x … user n x x

20 Tracing algorithm –Static tracing –Dynamic tracing –Sequential tracing Traitor tracing for broadcast encryption

21 Traitor tracing for broadcast encryption Static tracing –Confiscate a pirate decoder to determine the identity of a traitor –Ineffective if the pirate were simply to rebroadcast the original content –Use watermarking methods to allow the broadcaster to generate different versions of the original content –Use the watermarks found in the pirate copy to trace its supporting traitors –Drawback: requires one copy of content for each user and so requires very high bandwidth

22 Traitor tracing for broadcast encryption Dynamic tracing (Fiat & Tassa, 2001 ) –The content is divided into consecutive segments –Embed one of the q marks in each segment ( q versions of the segment ) Need the watermarking scheme –In each interval, the user group is divided into q subsets and each subset receives on version of the segment –The subsets are varied in each interval using the rebroadcasted content –Trace all colluders with lower bandwidth –Drawback: Vulnerable to a delayed rebroadcast attack High real-time computation for regrouping the users and allocating marks to subsets Impractical in many scenarios

23 Traitor tracing for broadcast encryption Sequential tracing ( Reihaneh, 2003) –The channel feedback is only used for tracing and not for allocation of marks to users –The mark allocation table is predefined and there is no need for real-time computation to determine the mark allocation of the next interval The need for real-time computation will be minimized Protects against the delayed reboradcast attack –The traitors are identified sequentially

24 Collusion-resilient fingerprinting Boneh-Shaw scheme –D. Boneh & J. Shaw, “Collusion-secure fingerprinting for digital data”, CRYPTO’95 –Watermarking the digital data (e.g. software, documents, music, and videos) with fingerprints –Based on Marking Assumption –Too long (too many keys) B. Chor et al. claimed: “It is much less efficient than our schemes”

25 Collusion-resilient fingerprinting Marking Assumption –Any coalition of c users is only capable of creating an object whose fingerprint lies in the feasible set of the coalition –Feasible set (  is the code, C is the collusion coalition, R is the set of undetectable positions, and w is the pirate code) –e.g. A: B: F=  ’2  ’ 1 2

26 Collusion-resilient fingerprinting c-Frame Proof Codes (c-FPC(l,n)) Totally c-secure code C cc x C cc Ux A x UCUC

27 Collusion-resilient fingerprinting Boneh & Shaw: “ There are no totally c-secure codes ” Lemma

28 Collusion-resilient fingerprinting n-secure code with  -error –  0 (n,d): l=d(n-1)=O(n 3 log(n/  ))  too long! –e.g.  0 (4,3) A: B: C: D: Random permutation

29 Collusion-resilient fingerprinting c-secure code with  -error of log length –  ’(L,N,n,d) –Compose  0 (n,d) with an (L,N)-code C x=(  (1) ||  (2) || … ||  (L))  (i)  0 |  0 |=alphabet size of C –l=O(c 4 log(N/  )log(1/  ))

30 Collusion-resilient fingerprinting Combinatorial designs –D. R. Stinson & R. Wei, “Combinatorial properties and constructions of traceability schemes and frameproof codes”, 1997 –Give combinational descriptions of the following two objects in terms of set systems Traceability schemes for broadcast encryption Frameproof codes for digital fingerprinting

31 Collusion-resilient fingerprinting –t-design (t-(v,k, )) 2-design : BIBD (Balanced incomplete block design) (9,3,1)-BIBD {0,1,6},{0,2,5},{0,3,4},{1,2,4},{3,5,6},{1,5,7}, {5,4,8},{4,6,7},{6,2,8},{2,3,7},{3,1,8},{0,7,8} e.g. J. Dittmann, P. Schmitt, E. Saar and J. Ueberberg, “Combining Digital Watermarks and Collusion Secure Fingerprints for Digital Images”, detecting code

32 Collusion-resilient fingerprinting c-Traceability Scheme (c-TS(l,n,q)) C cc U F

33 Collusion-resilient fingerprinting It needs tricks to construct a suitable code

34 Collusion-resilient fingerprinting Error correcting code (ECC) –Has systematic encoding and decoding algorithms –Distance-based decoding criterion Resilient to attacks for multimedia data  Robust than the t-design codes

35 Collusion-resilient fingerprinting c-TA codes (c-traceability codes) Larger minimum distances imply higher tracing ability CiCi cc xw z

36 Collusion-resilient fingerprinting –e.g. 2-TA: (15,3,11) 4 -BCH (120,2,96) 4 -code –It’s not easy to find practical ECCs with so large minimum distances –Reed-Solomon code (l,k,d)-RS over GF(q m ) : d=l-k+1=q m -1-k+1=q m -k –A code for sequential traitor tracing R. Safavi-Naini & Y. Wang, 2003

37 Collusion-resilient fingerprinting Assign one of the q versions for each movie segment (q-ary code) –H. Jin, J. Lotspiech, & S. Nusser (IBM Almaden research), 2004

38 Collusion-resilient fingerprinting Orthogonal signals –W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, “Anti- collusion fingerprinting for multimedia”, 2003 –Orthogonal fingerprint Orthogonal modulation w j =u j # of fingerprints=# of ortho. bases Modulate the code based on BIBD by noise-like signals # of fingerprints>># of orthogonal bases (7,3,1)-BIBD {{0,1,3},{0,2,5},{0,4,6},{1,2,4},{1,5,6},{2,3,6},{3,4,5}}

39 Collusion-resilient fingerprinting The bit-complement of the incidence matrix for a (7,3,1)-BIBD Modulate the codewords by 7 orthogonal bases

40 Collusion-resilient fingerprinting If user 1 and user 2 are colluders –Average attack: the pirate code is (w 1 +w 2 )/2 –The coefficient vector is (-1,0,0,0,1,0,1) –1 occurs in the fifth and seventh location uniquely identifies users 1 and 2 as colluders Experiments –(16,4,1)-BIBD –20 users –c=3

41 Collusion-resilient fingerprinting –Tree-structured detection

42 Collusion-resilient fingerprinting Orthogonal signals –Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. Liu, 2003 ~ –Gaussian signals (suitable for multimedia content) –Performance is limited if the number of Gaussian signals is larger

43 Collusion-resilient fingerprinting Joint fingerprint embedding and decryption based on coefficient set scrambling –D. Kundur & K. Karthik, 2004

44 Collusion-resilient fingerprinting Original, encrypted, and fingerprinted images PSNR=22dB PSNR=34dB

45 Collusion-resilient fingerprinting Make the colluded copy useless –U. Celik, G. Sharma, & A. M. Tekalp, “Collusion- resilient fingerprinting by random pre-warping”, 2004 –The host signal is warped randomly prior to watermarking

46 Collusion-resilient fingerprinting

47 Collusion-resilient fingerprinting Fingerprint multicast in secure video streaming –H. V. Zhao & K. J. R. Liu, 2006 –Tree-structure-based fingerprint scheme

48 Collusion-resilient fingerprinting MPEG-2-based joint fingerprint design and distribution scheme for video on demand applications The fingerprint embedding and distribution process at the server’s side

49 Possible future research Collusion-resilient fingerprint scheme –Robust against collusion attacks Fingerprint - Hard to be removed by collusion attacks Content - Useless after being attacked –Traceability code Short l Large n Large c –Tracing algorithm & detection strategy High hit ratio Low false alarm rate  Fast Low computational overhead

50 Dynamic tracing q versions for every segment