Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.

Slides:



Advertisements
Similar presentations
Digital rights management Audio watermark Jiamian.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics.
Dynamic Self-Checking Techniques for Improved Tamper Resistance Bill Horne, Lesley Matheson, Casey Sheehan, Robert E. Tarjan STAR Lab, InterTrust Technologies.
Information Hiding: Watermarking and Steganography
SYSTEM PROGRAMMING & SYSTEM ADMINISTRATION
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
1 A Functional Taxonomy for Software Watermarking Jas Nagra, Clark Thomborson University of Auckland Christian Collberg University of Arizona.
Wmobf.1 1/5/00 Clark Thomborson Watermarking, Tamper-Proofing and Obfuscation – Tools for Software Protection Christian Collberg & Clark Thomborson Computer.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Linear Obfuscation to Combat Symbolic Execution Zhi Wang 1, Jiang Ming 2, Chunfu Jia 1 and Debin Gao 3 1 Nankai University 2 Pennsylvania State University.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
N-Secure Fingerprinting for Copyright Protection of Multimedia
18/03/2007Obfuscation 1 Software protection Mariano Ceccato FBK - Fondazione Bruno Kessler
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Buyer-Seller Watermarking (BSW) Protocols Geong Sen Poh 31 Oct 2006.
CSE331: Introduction to Networks and Security Lecture 21 Fall 2002.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Software Uniqueness: How and Why? Puneet Mishra Dr. Mark Stamp Department of Computer Science San José State University, San José, California.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Software Obfuscation from Crackers’ viewpoint Y, Hiroki; K, Yuichiro; M Akito, N Masahide; M Ken-ichi Proceedings of the IASTED International Conference.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Cryptography, Authentication and Digital Signatures
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
CDL-Flex Empirical Research
Copyright 2000, Odyssey Research Associates, Inc. SL Semantic Data Integrity DARPA Program Review Cornell Business & Technology Park 33 Thornwood.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
1 Dept of Information and Communication Technology Creating Objects in Flexible Authorization Framework ¹ Dep. of Information and Communication Technology,
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Planning an Applied Research Project Chapter 3 – Conducting a Literature Review © 2014 by John Wiley & Sons, Inc. All rights reserved.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Biometric Authentication in Infrastructure Security By: John Armington, Purdy Ho, Paul Koznek and Richard Martinez G. Davida, Y. Frankel and O. Rees (Eds.):
Information Security What is Information Security?
© 2006 ITT Educational Services Inc. SE350 System Analysis for Software Engineers: Unit 10 Slide 1 Chapter 13 Finalizing Design Specifications.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Protecting Software Code By Guards The George Washington University Cs297 YU-HAO HU.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Describing Early Security Requirements using Use Case Maps Jameleddine Hassine King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia
Presented by Sharan Dhanala
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Fingerprinting Text in Logical Markup Languages Author : Christian D. Jensen Department of Computer Science Trinity College Dublin ©Springer-Verlag Heidelberg.
Presented by: Dr. Munam Ali Shah
A New Semantic Fingerprint Synonym substitution is a new way to fingerprint a document in logical markup, without changing its semantics. —— Fingerprinting.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Code Obfuscation Tool for Software Protection. Outline  Why Code Obfuscation  Features of a code obfuscator Potency Resilience Cost  Classification.
Network Security Celia Li Computer Science and Engineering York University.
Hiding Intrusions : From the Abnormal to the Normal and Beyond Kymie Tan, John McHugh and Kevin Killourhy Presented in 5 th Information Hiding Workshop,
T EXT D IGITAL W ATERMARKING O F A M ALAYALAM T EXT D OCUMENT B ASED O N F RAGMENTS R EGROUPING S TRATEGY. Guide:Presented by: Mrs.Sreeja Sasinas Alias.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Efficient Multi-User Indexing for Secure Keyword Search
A review of audio fingerprinting (Cano et al. 2005)
Cryptographic Hash Function
DONE BY S.MURALIRAJAN M.NIRMAL
Information and Network Security
NET 311 Information Security
Software Watermarking Deterring Software Piracy
Towards Automatic Model Synchronization from Model Transformation
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Presentation transcript:

Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture Notes in Computer Science, Vol. 2200, pp. 433–445, © Springer-Verlag Berlin Heidelberg 2001 Presented by Sasank Jampana

Summary This paper shows Semantic Fingerprinting as the only viable fingerprinting technique for documents in logical markup languages and a working model is demonstrated using Synonym Substitution and the results are evaluated with a prototype developed for Traitor Tracing.

Appreciative Comments Provides a convincing argument that Semantic Fingerprinting is the only viable technique for fingerprinting text in Logical Markup Languages. –Open space fingerprinting: Vulnerable to OCR attacks. –Syntactic fingerprinting: Resist OCR attacks. Easily noticeable and can be circumvented. –Semantic fingerprinting: Limited in scope. Resist OCR attacks. Very Robust compared to other techniques.

Security Analysis Performs a security analysis on the credible threat models specified in the literature. –Additive Attacks: Inserting one or more fingerprints in the document, in order to mask the identity of the source of the leak. –Distortive Attacks: Modifying the text in order to distort the fingerprint. The attack is effective if the document retains value to the attacker. –Collusive Attacks: Detect fingerprints by comparing more than one copy of the document and eliminate the identified fingerprints.

Collusion Attack Source: Collberg and Thomborson, 2000, Watermarking, Tamper-proofing, and Obfuscation – Tools for software Protection. An effective collusive attack Alice: Author of the documentBob: Traitor (s) P: Original Document P 1 : Fingerprinted Doc. 1P 2 : Fingerprinted Doc. 2 K 1 : Key for user 1K 2 : Key for user 2. F 1 : Fingerprint 1F 2 : Fingerprint 2 Alice fingerprints the document P, using various keys. Bob detects those keys by comparing copies of the document. Once Bob detects the fingerprints he can remove them.

Critical Comments Hash function proposed for Synonym Substitution. H(T+Δ) = H(T) + δ H – Hash functionT – Text input Δ – Change in textδ – Change in hash value. Conditions required to be met by the hash function for an effective traitor tracing algorithm, as specified by Chor et al., are not mentioned. –Traitor tracing algorithm needs to identify at least one traitor and reduce possibilities of a false positives. –For a k-resilient open user scheme the hash function needs to satisfy. s > 4k 2 log(n) s – Set of Hash Functions Chosen. k – Maximum number of traitors colluding. n – Total number of users using the document.

Critical Comments In Sec. 1 Par. 7, “Traitor tracing has unique properties that makes it simpler than fingerprinting for detection of copyright violators.” –Isn’t Traitor Tracing accomplished by fingerprinting?

Interesting Aspects This technique can be extended to documents in other formats and languages as well. One key for one user is very practical in organizations where a few people are repeatedly sent confidential documents.

Question In what category of documents is “Confidentiality” more desirable than “Integrity”? Considering there has to be some tradeoff between “Integrity” and “Confidentiality” while performing semantic fingerprinting. Is it possible to add redundant information into the document, to give more possibilities for safe transformations, to completely automate the process of fingerprinting? Safe transformations are those semantic preserving text transformations that can be applied without considering the context. e.g.: Dates: December 2002  last month of the year 2002 Numbers: 15  fifteen