Collusion-resistant fingerprinting for multimedia Wade Trappe, Min Wu, K.J. Ray Liu.

Slides:



Advertisements
Similar presentations
Mahdi Barhoush Mohammad Hanaysheh
Advertisements

The Function Concept DEFINITION: A function consists of two nonempty sets X and Y and a rule f that associates each element x in X with one.
5.4 Basis And Dimension.
5.1 Real Vector Spaces.
8.3 Representing Relations Connection Matrices Let R be a relation from A = {a 1, a 2,..., a m } to B = {b 1, b 2,..., b n }. Definition: A n m  n connection.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Section 4.6 (Rank).
New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.
II. Linear Block Codes. © Tallal Elshabrawy 2 Last Lecture H Matrix and Calculation of d min Error Detection Capability Error Correction Capability Error.
C++ Programming: Program Design Including Data Structures, Third Edition Chapter 21: Graphs.
Contents Balanced Incomplete Block Design (BIBD) & Projective Plane Generalized Quadrangle (GQ) Mapping and Construction Analysis.
Eigenvalues and Eigenvectors
Symmetric Matrices and Quadratic Forms
Combinatorial Designs and related Discrete Combinatorial Structures Discrete Mathematics Olin College Sarah Spence Adams Fall 2007.
Combinatorial Designs and Related Discrete Combinatorial Structures Sarah Spence Adams Fall 2008.
Image (and Video) Coding and Processing Lecture: DCT Compression and JPEG Wade Trappe Again: Thanks to Min Wu for allowing me to borrow many of her slides.
Orthogonality and Least Squares
exercise in the previous class (1)
5.1 Orthogonality.
Linear codes 1 CHAPTER 2: Linear codes ABSTRACT Most of the important codes are special types of so-called linear codes. Linear codes are of importance.
Applied Discrete Mathematics Week 10: Equivalence Relations
Chapter 4 Systems of Linear Equations; Matrices
Huffman Coding Vida Movahedi October Contents A simple example Definitions Huffman Coding Algorithm Image Compression.
Linear Codes.
ECE738 Advanced Image Processing Data Hiding (3 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park.
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Juris Viksna, 2015.
Fingerprinting & Broadcast Encryption for Content Protection.
April 10, 2002Applied Discrete Mathematics Week 10: Relations 1 Counting Relations Example: How many different reflexive relations can be defined on a.
A matrix equation has the same solution set as the vector equation which has the same solution set as the linear system whose augmented matrix is Therefore:
Section 5.3. Section Summary Recursively Defined Functions Recursively Defined Sets and Structures Structural Induction.
Information Coding in noisy channel error protection:-- improve tolerance of errors error detection: --- indicate occurrence of errors. Source.
Anti-collusion fingerprinting for Multimedia W. Trappe, M. Wu, J. Wang and K.J. R. Liu, IEEE Tran. Signal Processing, Vol. 51, No. 4, April 2003.
Combinatorial Algorithms Reference Text: Kreher and Stinson.
Chapter 9. Section 9.1 Binary Relations Definition: A binary relation R from a set A to a set B is a subset R ⊆ A × B. Example: Let A = { 0, 1,2 } and.
PEDS: A PARALLEL ERROR DETECTION SCHEME FOR TCAM DEVICES Author: Anat Bremler-Barr, David Hay, Danny Hendler and Ron M. Roth Publisher/Conf.: IEEE INFOCOM.
David Luebke 1 10/25/2015 CS 332: Algorithms Skip Lists Hash Tables.
Great Theoretical Ideas in Computer Science.
4.6: Rank. Definition: Let A be an mxn matrix. Then each row of A has n entries and can therefore be associated with a vector in The set of all linear.
§6 Linear Codes § 6.1 Classification of error control system § 6.2 Channel coding conception § 6.3 The generator and parity-check matrices § 6.5 Hamming.
DIGITAL COMMUNICATIONS Linear Block Codes
Information Theory Linear Block Codes Jalal Al Roumy.
Word : Let F be a field then the expression of the form a 1, a 2, …, a n where a i  F  i is called a word of length n over the field F. We denote the.
Mathematical Preliminaries
Sixth lecture Concepts of Probabilities. Random Experiment Can be repeated (theoretically) an infinite number of times Has a well-defined set of possible.
Introduction – Sets of Numbers (9/4) Z - integers Z + - positive integers Q - rational numbersQ + - positive rationals R - real numbersR + - positive reals.
The task of compression consists of two components, an encoding algorithm that takes a file and generates a “compressed” representation (hopefully with.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
Some Computation Problems in Coding Theory
1 Traitor Tracing. 2 Outline  Introduction  State of the art  Traceability scheme  Frameproof code  c-secure code  Combinatorial properties  Tracing.
Nasrin Soltankhah Department of Mathematical SciencesDepartment of Mathematical Sciences Alzahra University Tehran, I.R. IranTehran, I.R. Iran.
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 9.
SECTION 2 BINARY OPERATIONS Definition: A binary operation  on a set S is a function mapping S X S into S. For each (a, b)  S X S, we will denote the.
Images. Audio. Cryptography - Steganography MultiMedia Compression } Movies.
Infinite Models for Propositional Calculi Zachary Ernst University of Missouri-Columbia
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
5 5.1 © 2016 Pearson Education, Ltd. Eigenvalues and Eigenvectors EIGENVECTORS AND EIGENVALUES.
Richard Cleve DC 2117 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Lecture (2011)
August 2003 CIS102/LECTURE 9/FKS 1 Mathematics for Computing Lecture 9 LOGIC Chapter 3.
Tamal Bose, Digital Signal and Image Processing © 2004 by John Wiley & Sons, Inc. All rights reserved. Figure 11-1 (p. 624) (a) Image coder; (b) image.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
HUFFMAN CODES.
Eigenvalues and Eigenvectors
Watermarking for Image Authentication ( Fragile Watermarking )
II. Linear Block Codes.
4.6: Rank.
Image Coding and Compression
Symmetric Matrices and Quadratic Forms
II. Linear Block Codes.
Eigenvalues and Eigenvectors
Presentation transcript:

Collusion-resistant fingerprinting for multimedia Wade Trappe, Min Wu, K.J. Ray Liu

Anti-collusion codes Anti-collusion codes (ACC) are designed to be resistant to averaging, and able to exactly identify groups of colluders.

ACC (1) We shall describe codes using the binary symbols {0,1} to {-1,1} via for use in CDMA-based watermarking. We assume that when a sequence of watermarks is averaged, the effect it has is that the resulting binary is the logical AND of the codewords For example,when the codes (1110) and (1101) are combined, the result is (1100).

ACC (2) Definition 1. A binary code such that the logical AND of any subset of k or fewer codevectors in non-zero and distinct from the logical AND of any other subset of k or fewer codevectors is a k-resilient anti-collusion code, or an ACC code. For example, when n=4,C={1110,1101,1011,0111}. It is easy to see when of these vectors are combined under AND, that this combination is unique.

ACC -BIBD (1) Definition 2: A balanced incomplete block design (BIBD) is a pair,where is a collection of k-element subsets (blocks) of a v-element set,such that each pair of elements of occur together in exactly blocks.

ACC – BIBD (2) A -(BIBD) has blocks. Corresponding to a block design is the incidence matrix defined by If we assign the codewords as the bit- complement of the column vectors of then we have a (k-1)-resilient ACC.

ACC – BIBD (3) Theorem 1. Let be a (v,k,1)-BIBD, and the corresponding incidence matrix. If the codevectors are assigned as the bit complement of the columns of,then the resulting scheme is a (k-1)-collusion resistant code.

ACC – BIBD (4) We now present an example. The following is the bit-complement of the incidence matrix for a (7,3,1)-BIBD:

ACC – BIBD (5) This code requires 7 bits for 7 users and provides 2-resiliency since any two column vectors share a unique pair of 1 bits. Each column vector c of is mapped to by. The CDMA watermark is then When two watermarks are averaged, the locations where the corresponding ACC codes agree and have a value of 1 identify the colluding users.

ACC – BIBD (6) For example, let be the watermarks for the first two columns of the above (7,3,1) code, then has coefficient vector (-1,0,0,0,1,0,1).

Restriction of BIBD In general, do not necessarily exist for an arbitrary choice of v, and k. The condition that b must be an integer restricts some possibilities for v, and k, and for a given triple there may not exist a. The Bose construction builds Steiner triple systems when,and the Skolem construction builds Steniner triple systems when. Additionally, can be constructed when p is of prime power.

Subgroup-based constructions In many application, a group of users will be suspected of likely colluding, but not with others. This could be due to geographical of social variables, or based upon a pervious precedent. Suppose the code matrix C is constructed as a block diagonal matrix, where the matrices on the diagonal correspond to matrices for smaller codes.

Simulation (1) In order to demonstrate the capabilities of using an ACC code with CDMA watermarking to fingerprint users and detect colluders, we used an additive spread spectrum watermarking scheme, where the perceptually weighted watermark was added to block DCT coefficients. The detection of the watermark is performed without the knowledge of the host image via the Z detection statistic. We used the 512*512 lenna as the host image for the fingerprints.

Simulation(2) We assigned the code vectors as the column vectors of the bit complement of the incidence matrix for a (15,3,1) – BIBD that was constructed using the Bose method with a symmetric idempotent quasigroup structure on given by the binary operation. Two example code vectors that were assigned to user 1 and 6 are User 1 : (-1,-1,-1, 1, 1,1,1,1,1,1, 1,1,1,1,1) User 6 : (-1,1, 1, -1, 1,1,1,1,1,1,-1,1,1,1,1) Average:(-1, 0, 0, 0, 1,1,1,1,1,1, 0,1,1,1,1)

Simulation (3) An example of the behavior of the Z statistic when two users collude is depicted in figure 1, where we depict the values of the Z statistic for the 15 different spreading sequences used when user 1 and user6 average their differently marked images and then compress using JPEG with quality factor 50%.

Simulation (4) We present a histogram containing the Z statistics form roughly 200 pairs of users in figure 2 when the watermarked images are compressed using JPEG with a quality factor of 50%.