Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten and Boris Škorić presented by Jan-Jaap Oosterwijk.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

Another question consider a message (sequence of characters) from {a, b, c, d} encoded using the code shown what is the probability that a randomly chosen.
Asymptotically false-positive- maximizing attack on non-binary Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology IH 2011,
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Mixed Strategies CMPT 882 Computational Game Theory Simon Fraser University Spring 2010 Instructor: Oliver Schulte.
Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics.
Fast Bayesian Matching Pursuit Presenter: Changchun Zhang ECE / CMR Tennessee Technological University November 12, 2010 Reading Group (Authors: Philip.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Information Theory Introduction to Channel Coding Jalal Al Roumy.
VLDB’2007 review Denis Mindolin. VLDB’07 program.
Statistical properties of Tardos codes Boris Škorić and Antonino Simone Eindhoven University of Technology Stochastics Seminar, 28 Nov
N-Secure Fingerprinting for Copyright Protection of Multimedia
ECE Department Rice University dsp.rice.edu/cs Measurements and Bits: Compressed Sensing meets Information Theory Shriram Sarvotham Dror Baron Richard.
Dynamic Index Coding Broadcast Station N N Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University of Southern California Paper available.
Dynamic Index Coding User set N Packet set P Broadcast Station N N p p p Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University.
Fundamental limits in Information Theory Chapter 10 :
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
Duality Lecture 10: Feb 9. Min-Max theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum Cut Both.
Bandwidth sharing: objectives and algorithms Jim Roberts France Télécom - CNET Laurent Massoulié Microsoft Research.
The Goldreich-Levin Theorem: List-decoding the Hadamard code
Information Theory Eighteenth Meeting. A Communication Model Messages are produced by a source transmitted over a channel to the destination. encoded.
Incomplete Contracts Renegotiation, Communications and Theory December 10, 2007.
Theta Function Lecture 24: Apr 18. Error Detection Code Given a noisy channel, and a finite alphabet V, and certain pairs that can be confounded, the.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
1 Chapter 1 Introduction. 2 Outline 1.1 A Very Abstract Summary 1.2 History 1.3 Model of the Signaling System 1.4 Information Source 1.5 Encoding a Source.
©2003/04 Alessandro Bogliolo Background Information theory Probability theory Algorithms.
Binary Variables (1) Coin flipping: heads=1, tails=0 Bernoulli Distribution.
01/16/2002 Reliable Query Reporting Project Participants: Rajgopal Kannan S. S. Iyengar Sudipta Sarangi Y. Rachakonda (Graduate Student) Sensor Networking.
Some Notes on the Binary GV Bound for Linear Codes Sixth International Workshop on Optimal Codes and Related Topics June , 2009, Varna, BULGARIA.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Decentralised load balancing in closed and open systems A. J. Ganesh University of Bristol Joint work with S. Lilienthal, D. Manjunath, A. Proutiere and.
ENTROPIC CHARACTERISTICS OF QUANTUM CHANNELS AND THE ADDITIVITY PROBLEM A. S. Holevo Steklov Mathematical Institute, Moscow.
The Multiplicative Weights Update Method Based on Arora, Hazan & Kale (2005) Mashor Housh Oded Cats Advanced simulation methods Prof. Rubinstein.
Template attacks Suresh Chari, Josyula R. Rao, Pankaj Rohatgi IBM Research.
The Holey Grail A special score function for non-binary traitor tracing Boris Škorić Jan-Jaap Oosterwijk Jeroen Doumen.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Anti-collusion fingerprinting for Multimedia W. Trappe, M. Wu, J. Wang and K.J. R. Liu, IEEE Tran. Signal Processing, Vol. 51, No. 4, April 2003.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology WISSec 2010, Nov 2010.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Channel Capacity.
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
Tarun Bansal, Bo Chen and Prasun Sinha
CHAPTER 2 Statistical Inference, Exploratory Data Analysis and Data Science Process cse4/587-Sprint
. The Relative Entropy Rate of Two Hidden Markov Processes Or Zuk Dept. of Phys. Of Comp. Systems Weizmann Inst. Of Science Rehovot, Israel.
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
The Restricted Matched Filter for Distributed Detection Charles Sestok and Alan Oppenheim MIT DARPA SensIT PI Meeting Jan. 16, 2002.
Lecture 2: Statistical learning primer for biologists
Some Computation Problems in Coding Theory
1 Traitor Tracing. 2 Outline  Introduction  State of the art  Traceability scheme  Frameproof code  c-secure code  Combinatorial properties  Tracing.
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology CWG, Dec 2010.
Feature Selction for SVMs J. Weston et al., NIPS 2000 오장민 (2000/01/04) Second reference : Mark A. Holl, Correlation-based Feature Selection for Machine.
Active Learning and the Importance of Feedback in Sampling Rui Castro Rebecca Willett and Robert Nowak.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
UNIT I. Entropy and Uncertainty Entropy is the irreducible complexity below which a signal cannot be compressed. Entropy is the irreducible complexity.
Communication Complexity as a Lower Bound for Learning in Games
Antonino Simone and Boris Škorić Eindhoven University of Technology
Image recognition: Defense adversarial attacks
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
Sampling Theorems- Nyquist Theorem and Shannon-Hartley Theorem
Information Theoretical Analysis of Digital Watermarking
Normal Form (Matrix) Games
Presentation transcript:

Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten and Boris Škorić presented by Jan-Jaap Oosterwijk

Outline forensic watermarking collusion attack models: Restricted Digit Model and Combined Digit Model bias-based codes fingerprinting capacity large coalition asymptotics Previous results: Restricted Digit Model New contribution: Combined Digit Model

Forensic watermarking EmbedderDetector original content unique watermark watermarked content unique watermark original content Attack

Collusion attacks ABCB ACBA BBAC BABA ABAC CAAA ABAB n users ABAC CAAA ABAB Simplifying assumption: segments into which q-ary symbols can be embedded collusion attack: c attackers pool their resources m content segments

Attack models: Restricted Digit Model (RDM) "Marking assumption": can't produce unseen symbol Restricted Digit Model: choose from available symbols ABCB ACBA BBAC BABA ABAC CAAA ABAB ABAC CAAA ABAB m content segments allowed symbols ACAC ABAB AABCABC c attackers

Attack models: Combined Digit Model (CDM) [BŠ et al. 2009] More realistic Allows for signal processing attacks mixing noise alphabet Q received Ω ⊆ Q mixed: Ψ ⊆ Ω detected: W attack symbol detection probability: r 1-r 1-t |ψ| t Noise parameter r. Mixing parameters t 1 ≥ t 2 ≥ t 3...

Bias-based codes [Tardos 2003] ABCB ACBA BBAC BABA ABAC CAAA ABAB symbol biases ABAC CAAA ABAB Code generation Biases drawn from distribution F Code entries generated per segment j using the bias: Pr[X ij = α] = p jα. Attack Coalition size c. Same strategy in each segment In Combined Digit Model: strategy = choice of subset Ψ ⊆ Ω, possibly nondeterministic. Accusation algorithm for finding at least one attacker, based on distributed and observed symbols. Ω={A,B} Allowed Ψ: {A}, {B}, {A,B}

Collusion attack viewed as malicious noise Noisy communication channel From symbol embedding to detection Coalition attack causes "noise" Channel capacity Apply information theory Rate of a tracing code: R = (log q n)/m Capacity C = max. achievable rate. Fundamental upper bound. Results for Restricted Digit Model, and #attackers → ∞ Huang&Moulin 2010 Binary codes (q=2): Boesten&Škorić 2011 Arbitrary alphabet size: n = #users m = #segments q = alphabet size

Capacity for the Combined Digit Model The math Look at one segment Define counters Σ α = #attackers who receive α Parametrization of the attack strategy: Capacity: p = bias vector F = prob. density for p W = set of detected symbols H(Σ) H(W) I(W;Σ) +- F θ

CDM capacity: further steps Apply Sion's theorem "Value" of max-min and min-max game is the same! Limit c → ∞: Σ very close to cp Taylor expansion in Σ/c – p Re-paramerization γ: mapping from q-dim. hypersphere to (2 q -1)-dim. hypersphere. Jacobian J Pay-off function Tr(J T J)

CDM capacity: constraints Looks like beautiful math, but... nasty constraint on the mapping γ We did not dare to try q>2 Binary case: Constrained geodesics

CDM capacity: numerical results for q=2 Part of the graphs we understand intuitively Stronger attack options => lower capacity Near (r=0, t 1 =1) RDM-like behaviour; weak dependence on t 2 Away from RDM we have little intuition

Summary Asymptotic capacity for the Combined Digit Model Partly the same exercise as in Restricted Digit Model Find optimal hypersphere → hypersphere mapping But... higher-dimensional space nasty constraint on the mapping Numerics for binary alphabet constrained geodesics in 2 dimensions graphs show how attack parameters (r, t 1, t 2 ) affect capacity useful for code design Future work (perhaps...) change attack model to get analytic results

Questions?