The Holey Grail A special score function for non-binary traitor tracing Boris Škorić Jan-Jaap Oosterwijk Jeroen Doumen
Piracy Copy protection Illegal or unofficial copy Traitor tracing / Department of Mathematics & ComputerScience PAGE 1
Traitor Tracing / Department of Mathematics & ComputerScience PAGE 2 User ID...
Collusion Compare several watermarked copies Locate the differences Create new watermark / Department of Mathematics & ComputerScience PAGE 3 Ingrid... Pierre... Travis... New
Collusion-Resistant Traitor Tracing / Department of Mathematics & ComputerScience PAGE Ingrid... Pierre... Travis... New...
Collusion-Resistant Traitor Tracing (II) Compare the collusion watermark to all user watermarks Attribute a level of suspicion to each user Accuse users that are too suspicious / Department of Mathematics & ComputerScience PAGE 5
Level of suspicion / Department of Mathematics & ComputerScience PAGE 6 0 guilty innocent level of suspicion FNFP accusation threshold
Code length / Department of Mathematics & ComputerScience PAGE 7
Nice properties Level of suspicion of innocent users Zero mean (independent of collusion strategy) Unit variance (independent of collusion strategy) Level of suspicion of coalition Mean is independent of collusion strategy / Department of Mathematics & ComputerScience PAGE 8
Larger alphabets Using larger alphabets allows for better schemes. 2011, Boesten et al.: Fingerprinting capacity increases 2013, Oosterwijk et al.: Capacity-achieving scheme But... mean level of suspicion of coalition does depend on the collusion strategy / Department of Mathematics & ComputerScience PAGE 9
Traitor Tracing Scheme / Department of Mathematics & ComputerScience PAGE 10
The Grails / Department of Mathematics & ComputerScience PAGE 11
Holy Grail / Department of Mathematics & ComputerScience PAGE 12
Holey Grail / Department of Mathematics & ComputerScience PAGE 13
Conclusion Collusion-Resistant Traitor Tracing Scheme Level of suspicion of innocent users Zero mean (independent of collusion strategy) Unit variance (independent of collusion strategy) Level of suspicion of coalition Mean is independent of collusion strategy Possible for non-binary alphabets, but this construction performs worse than was hoped / Department of Mathematics & ComputerScience PAGE 14
Thanks for your attention! Questions?
EURASIP Journal on Information Security Topics are among others o Collusion Secure Fingerprinting codes o Transactional Watermarking and Traitor Tracing o Collusion Secure Watermarking o Transactional Watermarking and Fingerprinting for data sets / sets of files o Real World reports or experiences or insights regarding the legal perspective Guest-editors: Boris Škorić, Eindhoven Univ. of Tech. Jan-Jaap Oosterwijk, Eindhoven Univ. of Tech. Thijs Laarhoven, Eindhoven Univ. of Tech. Jeroen Doumen, Irdeto BV Waldemar Berchtold, Fraunhofer Institute SIT Martin Steinebach, Fraunhofer Institute SIT Marcel Schäfer, Fraunhofer Institute SIT Editor-in-Chief: Stefan Katzenbeisser, TU-Darmstadt CfP: Special Issue on Collusion Secure Fingerprinting and Transactional Watermarking Deadline for submissions, February 28, 2014