Right Protection via Watermarking with Provable Preservation of Distance-based Mining Spyros Zoumpoulis Joint work with Michalis Vlachos, Nick Freris and.

Slides:



Advertisements
Similar presentations
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Advertisements

O(N 1.5 ) divide-and-conquer technique for Minimum Spanning Tree problem Step 1: Divide the graph into  N sub-graph by clustering. Step 2: Solve each.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Da Yan, Zhou Zhao and Wilfred Ng The Hong Kong University of Science and Technology.
Constructing Popular Routes from Uncertain Trajectories Authors of Paper: Ling-Yin Wei (National Chiao Tung University, Hsinchu) Yu Zheng (Microsoft Research.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
An Optimization Approach to Improving Collections of Shape Maps Andy Nguyen, Mirela Ben-Chen, Katarzyna Welnicka, Yinyu Ye, Leonidas Guibas Computer Science.
Fifth International Conference on Information
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Robust Mesh Watermarking Emil Praun Hugues Hoppe Adam Finkelstein.
© University of Minnesota Data Mining CSCI 8980 (Fall 2002) 1 CSci 8980: Data Mining (Fall 2002) Vipin Kumar Army High Performance Computing Research Center.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Shape Modeling International 2007 – University of Utah, School of Computing Robust Smooth Feature Extraction from Point Clouds Joel Daniels ¹ Linh Ha ¹.
1 On the Benefits of Adaptivity in Property Testing of Dense Graphs Joint work with Mira Gonen Dana Ron Tel-Aviv University.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
Feature Subset Selection using Minimum Cost Spanning Trees Mike Farah Supervisor: Dr. Sid Ray.
Fast Isocontouring For Improved Interactivity Chandrajit L. Bajaj Valerio Pascucci Daniel R. Schikore.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Signal Processing Final Project Proposal R 資工碩一 馬智釗 Reference : “Rotation, scale, and translation resilient digital watermarking based.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Digital Audio Watermarking: Properties, characteristics of audio signals, and measuring the performance of a watermarking system نيما خادمي کلانتري
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Surface Simplification Using Quadric Error Metrics Michael Garland Paul S. Heckbert.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Copyright Protection of Images Based on Large-Scale Image Recognition Koichi Kise, Satoshi Yokota, Akira Shiozaki Osaka Prefecture University.
Mesh Watermarking based on 2D Transferred Domain Jongyun Jun Tae-Joon Kim CS548 Term Project Presentation 2010/05/13.
On Graph Query Optimization in Large Networks Alice Leung ICS 624 4/14/2011.
Multiplicative Data Perturbations. Outline  Introduction  Multiplicative data perturbations Rotation perturbation Geometric Data Perturbation Random.
Multiplicative Data Perturbations. Outline  Introduction  Multiplicative data perturbations Rotation perturbation Geometric Data Perturbation Random.
A Two-level Pose Estimation Framework Using Majority Voting of Gabor Wavelets and Bunch Graph Analysis J. Wu, J. M. Pedersen, D. Putthividhya, D. Norgaard,
Randomization in Privacy Preserving Data Mining Agrawal, R., and Srikant, R. Privacy-Preserving Data Mining, ACM SIGMOD’00 the following slides include.
Crypto Final Presentation B 林敬倫 B 李佳蓉 B 王姵瑾 B 周振平.
Zhuo Peng, Chaokun Wang, Lu Han, Jingchao Hao and Yiyuan Ba Proceedings of the Third International Conference on Emerging Databases, Incheon, Korea (August.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
© 2009 Ilya O. Ryzhov 1 © 2008 Warren B. Powell 1. Optimal Learning On A Graph INFORMS Annual Meeting October 11, 2009 Ilya O. Ryzhov Warren Powell Princeton.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
What Dynamic Programming (DP) is a fundamental problem solving technique that has been widely used for solving a broad range of search and optimization.
Outline Carrier design Embedding and extraction for single tile and Multi-tiles (improving the robustness) Parameter α selection and invisibility Moment.
Sampling in Graphs Alexandr Andoni (Microsoft Research)
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
CSCI 631 – Foundations of Computer Vision March 15, 2016 Ashwini Imran Image Stitching.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Data Driven Resource Allocation for Distributed Learning
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
DONE BY S.MURALIRAJAN M.NIRMAL
Mining Spatio-Temporal Reachable Regions over Massive Trajectory Data
Near-Optimal (Euclidean) Metric Compression
Parag Agarwal Digital Watermarking Parag Agarwal
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Spread Spectrum Watermarking
Multiplicative Data Perturbations (1)
GANG: Detecting Fraudulent Users in OSNs
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Topological Signatures For Fast Mobility Analysis
Efficient Processing of Top-k Spatial Preference Queries
Authors: J.J. Murillo-Fuentes
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Right Protection via Watermarking with Provable Preservation of Distance-based Mining Spyros Zoumpoulis Joint work with Michalis Vlachos, Nick Freris and Claudio Lucchese Mathematical & Computational Sciences August 18, 2011 IBM ZRL

Problem Want to distribute datasets, but maintain ownership rights Want to maintain ownership rights, but also maintain ability to distill useful knowledge out of data Transformations Rights Protection How can we guarantee that the results on the modified and the original datasets are the same? Spyros ZoumpoulisWatermarking with Preservation of Distance-based Mining2 Distance D Watermarking original distance graph new graph

Problem Want to distribute datasets, but maintain ownership rights Want to maintain ownership rights, but also maintain ability to distill useful knowledge out of data Spyros Zoumpoulis3 Distance D Watermarking original distance graph Change intensity of transformation new graph Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis4Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis5Watermarking with Preservation of Distance-based Mining

Trajectory Datasets Easily collected: smartphones, GPS-enabled devices, etc. Epidemiology Transportation Emergency situations … Spyros Zoumpoulis6Watermarking with Preservation of Distance-based Mining

Trajectory Datasets Spyros Zoumpoulis7 Images/ShapesMedicalMobility Financial Microsoft Yahoo Astronomical Motion/Video Handwriting Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis8Watermarking with Preservation of Distance-based Mining

Objective Watermark dataset strongly enough so as to right-protect it, weakly enough so that spatial relations between objects are not distorted: Maintain dataset’s mining utility via distance-based mining operations We focus on two topological properties: Nearest Neighbors and Minimum Spanning Tree Scheme should –Provide an ownership determination mechanism for dataset –Introduce imperceptible visual distortions on objects –Be robust to malicious data transformations –Allow for appropriate tuning of watermarking power, so that distance relations are preserved O1O1 O2O2 O3O3 O4O4 Spyros Zoumpoulis9Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis10Watermarking with Preservation of Distance-based Mining

+ watermark A + watermark B + watermark N … If the movie is leaked on the internet, by examining the movie one can deduce the source of the leak Oscars: Academy voting members get watermarked DVD’s months before official release Spyros Zoumpoulis11 Watermarking Scheme Watermarking with Preservation of Distance-based Mining

Watermarking Scheme Object, where, Multiplicative watermark embedding, Spyros Zoumpoulis12Watermarking with Preservation of Distance-based Mining

Watermarking Scheme Frequency Domain DFT IDFT watermarked magnitudes original trajectory watermarked trajectory watermark Magnitude Phase Magnitude Phase same modified Frequency Domain p (embedding power) By construction, mechanism provides resilience to geometric data transformations (rotation, translation, scaling) Spyros Zoumpoulis13Watermarking with Preservation of Distance-based Mining

Watermarking Scheme Spyros Zoumpoulis14Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis15Watermarking with Preservation of Distance-based Mining

Detection Process Given a watermarked dataset and a watermark W, need a measure of “how likely” it is that the dataset was watermarked with W (and not another watermark) Detection correlation: Correlation between watermark W’ and dataset watermarked with W is Threshold rule: decide was watermarked with W if Collect correlation statistics, approximate distributions with normals Spyros Zoumpoulis16Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis17Watermarking with Preservation of Distance-based Mining

Theoretical Guarantees on Distance Distortion Goal: preservation of spatial relations between objects Distance before watermark: Distance after watermark: Spyros Zoumpoulis18Watermarking with Preservation of Distance-based Mining

Theoretical Guarantees on Distance Distortion Theorem. Given, for any dataset S and objects,, we have uniformly, for all watermarks consistent with S and embedding powers Sketch of proof. LB: UB: subject to Spyros Zoumpoulis19Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis20Watermarking with Preservation of Distance-based Mining

Preservation of Nearest Neighbors and Minimum Spanning Tree is continuous in p, : for p sufficiently small, any topological property will be preserved We focus on Nearest Neighbors and Minimum Spanning Tree because of importance in data analysis Given dataset S and object with Nearest Neighbor, x preserves its NN after the watermarking if Given dataset S and objects s.t. (x, y) is an edge of an MST T, (x, y) is preserved in the MST after the watermarking if where are the connected components T is split into after edge (x, y) has been removed x NN(x) y z Spyros Zoumpoulis21Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis22Watermarking with Preservation of Distance-based Mining

NN-Preservation Algorithm NN-P Watermarking Problem. Given dataset D and watermark W, find the largest s.t. that at least a fraction 1-τ of the objects in D preserve their NN after the watermarking with W Spyros Zoumpoulis23Watermarking with Preservation of Distance-based Mining

MST-Preservation Algorithm MST-P Watermarking Problem. Given dataset D and watermark W, find the largest s.t. that at least a fraction 1-τ of the edges of an MST of D are preserved in the MST after the watermarking with W Spyros Zoumpoulis24Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis25Watermarking with Preservation of Distance-based Mining

Fast NN-Preservation Algorithm Corollary. Given, for any dataset D and objects D, if then y does not violate the NN of x after the watermarking, for all watermarks consistent with D and powers x NN(x) y1y1 y2y2 y3y3 ρ Spyros Zoumpoulis26Watermarking with Preservation of Distance-based Mining

Fast MST-Preservation Algorithm Corollary. Given, for any dataset D and edge e in an MST of D, objects, if then (u,v) does not violate the MST at edge e after the watermarking, for all watermarks consistent with D and powers Spyros Zoumpoulis27Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis28Watermarking with Preservation of Distance-based Mining

Experimental Results - Preservation Evaluate our technique using visualization. Example of MST preservation: MST on original data MST on watermarked data Spanning Tree After Rights Protection Spyros Zoumpoulis29Watermarking with Preservation of Distance-based Mining

Experimental Results – Speed-up of 2-3 orders of magnitude Compare number of operations and time for exhaustive vs. Fast algorithms Computations of coefficients of quadratics –Prune > % of operations for NN preservation –Prune > % of operations for MST preservation for datasets of ~1000 objects Quadratic inequalities solved –Prune > % of operations for NN preservation –Prune > % of operations for MST preservation for datasets of ~1000 objects Running time after pre-processing –NN Preservation: 0.5 s vs. 3.7 min –MST Preservation: 2.8 min vs. 1.4 hrs for datasets of ~1000 objects Spyros Zoumpoulis30Watermarking with Preservation of Distance-based Mining

Experimental Results – Resilience against Attacks Recipient of data may transform data to obfuscate ownership Attacks considered –Geometric transformations (global rotation, translation, scaling) –Gaussian noise addition (space domain and frequency domain) –Downsampling/Upsampling → Robustness Spyros Zoumpoulis31Watermarking with Preservation of Distance-based Mining

Roadmap Trajectory Datasets Objective Watermarking Scheme Detection Process Theoretical Guarantees on Distance Distortion Preservation of Nearest Neighbors and Minimum Spanning Tree Algorithms for NN and MST Preservation Fast algorithms for NN and MST Preservation Experiments – Preservation, Speed-up and Resilience against Attacks Conclusion Spyros Zoumpoulis32Watermarking with Preservation of Distance-based Mining

Conclusion Tradeoff: rights protection vs. preservation of mining utility Proved fundamental tight bounds on distance distortion due to watermarking Future work –Other data transformations –Provide a unified framework for preservation of general mining algorithms under general data transformations Leveraged analysis to propose efficient algorithms for NN and MST preservation Presented algorithms that identify the max embedding power that preserves NN and MST Technique preserves distance properties, is resilient to malicious attacks Spyros Zoumpoulis33 Transformations Rights Protection How can we guarantee that the results on the modified and the original datasets are the same? Anonymization Compression Watermarking with Preservation of Distance-based Mining

Preservation of Nearest Neighbors and Minimum Spanning Tree MST preservation does not imply NN preservation… …and vice versa Spyros Zoumpoulis34Watermarking with Preservation of Distance-based Mining