1 / 53

Anti-collusion fingerprinting for Multimedia

Anti-collusion fingerprinting for Multimedia. W. Trappe, M. Wu, J. Wang and K.J. R. Liu, IEEE Tran. Signal Processing, Vol. 51, No. 4, April 2003. Outline. Previous works on anti-collusion fingerprinting Traceability schemes Frameproof codes Combinatorial properties of c -TA and c -FPC

Download Presentation

Anti-collusion fingerprinting for Multimedia

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Anti-collusion fingerprinting for Multimedia W. Trappe, M. Wu, J. Wang and K.J. R. Liu, IEEE Tran. Signal Processing, Vol. 51, No. 4, April 2003

  2. Outline • Previous works on anti-collusion fingerprinting • Traceability schemes • Frameproof codes • Combinatorial properties of c-TA and c-FPC • Tree-structured detection strategy • Code-modulation embedding and anti-collusion codes • Experiments • Conclusion

  3. Previous works on anti-collusion fingerprinting- Traceability schemes • “Tracing Traitors”, B. Chor, A. Fiat, M. Naor, and B. Pinkas, 1994 (1998, 2000). • Traceability schemes<Definition 1.1> Traitor tracing schemes A traitor tracing scheme consists of three components:

  4. Previous works on anti-collusion fingerprinting- Traceability schemes (continue) • <Definition 1.2> fully (p,k)-resilient tracing scheme Let T be a coalition of at most k users. Let A be an adversary that has a subset F of the keys of the users in T, and that is able to decrypt the content sent in the tracing traitors scheme, in time t and with probability greater that q’. The scheme is called fully (p,k)-resilient if it satisfies the security assumption: one of the following two statements holds. • Given F the data supplier is able to trace with probability at least 1-p at least one of the users in T. • There exists an adversary A’ which uses A as a black box and whose input is only an enabling block and a cipher block of the tracing traitors scheme. A’ can reveal the content that is encrypted in the cipher block in time which is linear in the length of its input and in t, and with probability at least q’’=q’.

  5. Previous works on anti-collusion fingerprinting- Traceability schemes (continue) • <Definition 1.3> fully k-resilient tracing schemeA scheme is called fully k-resilient if it satisfies definition 1.2 and it further holds that p=0. • <Definition 1.4> q-threshold (p,k)-resilient tracing schemeA scheme is called q-threshold (p,k)-resilient if it satisfies definition 1 wither q’’=q’-q.

  6. Previous works on anti-collusion fingerprinting- Frameproof codes • Frameproof codes • “Collusion-secure fingerprinting for digital data”, Dan Boneh and James Shaw, 1995 (1998) • A fingerprint is a collection of marks • A fingerprint can be thought of as a word of length L over an alphabet Σ of size s • A distributor is the sole supplier of fingerprinted objects • A user is the registered owner of a fingerprinted objects • The process of fingerprinting an object involves assigning a unique codeword over ΣL to each user

  7. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • <Definition 2.1> (l,n)-code and codebook • <Definition 2.2> undetectable positions

  8. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • <Definition 2.3>feasible set e.g. A: 3 2 3 1 2 B: 1 2 2 1 2

  9. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • <Definition 2.4> Marking Assumptionany coalition of c users is only capable of creating an object whose fingerprint lies in the feasible set of the coalition • <Definition 2.5> c-frameproof

  10. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • Construction of c-frameproof codes(for binary alphabet) • <Claim 2.1> 0is a (n,n)-code which is n-frameproof • The length of 0 is linear in the number of users and is therefore impractical • Use 0 to construct shorter codes

  11. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • <Definition 2.6> A set C of N words of length L over an alphabet of p letters is said to be an (L,N,D)p-ECC, if the Hamming distance between every pair of words in C is at least D. • The idea of the construction of n-frameproof code is to compose the code 0 (n) with an error-correcting code. • Let ={w(1),…,w(p)} be an (l,p)-code and let C be an (L,N,D)p-ECC.We denote the composition of  and Cby ’.

  12. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) <Lemma 2.1> Let  be a c-frameproof (l,p)-code and C be an (L,N,D)-ECC. Let ’ be the composition of  and C. Then ’ is a c-frameproof code, provided D>L(1-(1/c)).<proof>

  13. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • <Lemma 2.2> For any positive integers p,n let L=8p log N. Then there exists a (L,N,D)2p-ECC where D>L(1-(1/p)). • <Theorem 2.1> For any integers n,c>0 let l=16c2log n.<proof>

  14. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • <Definition 2.7> totally c-secure code • <Lemma 2.3>

  15. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • <Theorem 2.2> For c≥2 and n≥3 there are no totally c-secure (l,n)-codes<proof> →Unfortunately, when c>1,totally c-secure codes do not exist. →There is a way out of this trap: use randomness.

  16. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • <Definition 2.8> c-secure with -errorThe tracing algorithm A on input x outputs a member of the coalition C that generated the word x with high probability.

  17. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • Construction of collusion-secure codes • Construct an (l,n)-code which is n-secure with -error for any >0 →length of this code is nO(1)→too large to be practical <Theorem 2.3> <Algorithm 2.1> • Use the code to constrct c-secure codes with -error for n users whose length is logO(1)(n) when c=O(log n).<Theorem 2.4> <Algorithm 2.2>

  18. Previous works on anti-collusion fingerprinting- Frameproof codes (continue) • A lower bound<Theorem 2.5> Let  be an (l,n) fingerprinting scheme over a binary alphabet. Suppose  is c-secure with -error. Then the code length is at least l≥1/2(c-3)log(1/c).<proof>

  19. Previous works on anti-collusion fingerprinting- Combinatorial properties • “Combinatorial properties and constructions of traceability schemes and frameproof codes”, D. R. Stinson, R. Wei, 1997 • Investigate combinatorial properties and constructions of two recent topics of cryptographic interest: • frameproof codes • traceability scheme

  20. Previous works on anti-collusion fingerprinting- Combinatorial properties (continue) • <Theorem 3.1>If there exists a c-TS(k,b,v), then there exists a c-FPC(v,b).<proof>

  21. Previous works on anti-collusion fingerprinting- Combinatorial properties (continue) • “Combinatorial properties of frameproof and traceability codes”, J. N. Staddon, D. R. Stinson, and R. Wei, 2001 • <Definition 3.1> c-TA (traceability) • <Definition 3.2> c-IPP (identifiable parent property)

  22. Previous works on anti-collusion fingerprinting- Combinatorial properties (continue) • <Lemma 3.1> Every c-TA code is a c-IPP code. <proof>

  23. Tree-structured detection strategy

  24. Tree-structured detection strategy (continue) • Tree-structured detection algorithm

  25. Tree-structured detection strategy (continue)

  26. Tree-structured detection strategy (continue)

  27. Tree-structured detection strategy (continue) • Experiments • Spread spectrum watermarking • A perceptually weighted watermark was added to DCT coefficients • 512x512 Lenn • Avg(PSNR): 41.2 dB • n=8 c=1 #(correlation)=6n=8 c=3 #(correlation)=8n=128 c=1 #(correlation)=14 (128 correlations needed in a simple detection)

  28. Tree-structured detection strategy (continue)

  29. derived code vector n derived code vector 1 Code-modulation embedding and anti-collusion codes • Orthogonal modulation • n orthogonal signals • Drawback: the large number of orthogonal signals-> high computational complexity • Code modulation • The derived code matrix B=(bij) • Code matrix C is used to derive B by using OOK or antipodal mapping

  30. Code-modulation embedding and anti-collusion codes (continue) • Anti-collusion codesdesign a family of codevectors {cj} whose overlap with each other can identify groups of colluding users • <Definition> AND-ACC Let G={0,1}. A code C={c1,…,cn} of vectors belonging to Gv is called a K-resilient AND anti-collusion code (AND-ACC) when any subset of K or fewer codevectors combined element-wise under AND is distinct from the element-wise AND of any other subset of K or fewer codevectors. e.g. a n-resilient AND-ACC -> Let C consist of all n-bit binary vectors that have only a single 0 bit. When n=4, C={1110,1101,1011,0111}

  31. Code-modulation embedding and anti-collusion codes (continue) • <Definition> BIBDA (v, k,λ) balanced incomplete block design (BIBD) is a pair (X,A), where A is a collection of k-element subsets (blocks) of a v-element set X, such that each pair of elements of X occur together in exactly λblocks. • <Theorem 4.1> Let (X,A) be a (v,k,1)-BIBD and M the corresponding incidence matrix. IF the codevectors are assigned as the bit comlement of the columns of M, then the resulting scheme is a (k-1)-resilient AND-ACC<proof>

  32. Code-modulation embedding and anti-collusion codes (continue) • e.g. (7,3,1)-BIBD provides 2-resiliencyw1=-u1-u2+u3-u4+u5+u6+u7w2=-u1+u2-u3+u4+u5-u6+u7

  33. Code-modulation embedding and anti-collusion codes (continue) • Comparison • (7,3,1)-BIBD AND-ACC:β=n/v=7/7=1 2-resiliencythe trivial AND-ACC:β=n/v=7/7=1 7-resiliency • (v, k,λ)-BIBD AND-ACC:β>=1β<<1 • (v, k,λ)-BIBD AND-ACC:codelength=O(kn1/2)k-1 resiliency Boneh & Shaw:codelength=O(log4nlog2(1/))  <1/ntrace 1 colluder K-resiliency with K<=log n

  34. Code-modulation embedding and anti-collusion codes (continue) • Detection strategies

  35. Code-modulation embedding and anti-collusion codes (continue) • Goal: estimate Φ efficiently • Detection algorithm1. hard detection2. adaptive sorting approach3. sequential algorithm

  36. Experiments • ACC simulations with Gaussian signals • (16,4,1)-BIBD n=20 K=4-1=3 • N=10000 • Randomly select 3 users as colluders and averaged their marked content to produce y • 放C=

  37. Experiments (continue) • Wnr圖

  38. Experiments (continue) • ACC experiments with images • Use spread spectrum watermarking • The perceptually weighted watermark is added to 8x8 DCT block coefficients • n=20 K=3 v=16 • 512x512 Lenna and Baboon images • Average PSNR of the fingerprinted images:Lenna: 41.2dB Baboon: 33.2dB

  39. Experiments (continue) • 圖

  40. Experiments (continue)

  41. Conclusion • The tree-based detection algorithm reduce the amount of correlations from linear to logarithmic • Code modulation fingerprint does not require as many basis signals as orthogonal modulation • ACCs have the property that the composition of any subset of K or fewer codevectors is unique • Sequential detection scheme provides the most promising balance between capturing colluders and placing innocents

  42. Previous works on anti-collusion fingerprinting- 0 • <Definition> 0 the (n,n)-code containing all n-bit binary words with exactly one 1 e.g. 0 (3)={100,010,001}

  43. Previous works on anti-collusion fingerprinting-Lemma 2.1

  44. Previous works on anti-collusion fingerprinting-Theorem 2.1 • By lemma 2.2 we know that there exists a (L,n,L(1-1/c))2c-ECC for L=8c log n. Combining this with the code 0(2c) and lemma 2.1 we get a c-frameproof code for n users whose length is 2cL=16c2 log n

  45. Previous works on anti-collusion fingerprinting-Theorem 2.2

  46. Previous works on anti-collusion fingerprinting-Theorem 2.3 • For n≥3 and >0 let d=2n2 log(2n/ ). The fingerprinting scheme 0(n,d) is n-secure with -error.

  47. Previous works on anti-collusion fingerprinting-Algorithm 2.1

  48. Previous works on anti-collusion fingerprinting-Theorem 2.4 • Given integers N, c, and >0 set n=2c,L= 2c log(2N/), and d=2n2log(4nL/ ). Then, ’(L,N,n,d) is a code which is c-secure with -error. The code contains N words and has length l=O(Ldn)=O(c4 log(N/) log(1/ ))

  49. Previous works on anti-collusion fingerprinting-Algorithm 2.2

  50. Code-modulation embedding and anti-collusion codes- Theorem 4.1

More Related