Top Banner
Accusation probabilities in Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology WISSec 2010, Nov 2010
12

Accusation probabilities in Tardos codes

Feb 14, 2016

Download

Documents

bridie

Accusation probabilities in Tardos codes. Antonino Simone and Boris Š kori ć Eindhoven University of Technology WISSec 2010, Nov 2010. Outline. Introduction to forensic watermarking Collusion attacks Aim Tardos scheme q- ary version Properties Performance of the Tardos scheme - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Accusation probabilities in  Tardos  codes

Accusation probabilities in Tardos codes

Antonino Simone and Boris Škorić

Eindhoven University of Technology

WISSec 2010, Nov 2010

Page 2: Accusation probabilities in  Tardos  codes

OutlineIntroduction to forensic

watermarking◦Collusion attacks◦Aim

Tardos scheme◦q-ary version◦Properties

Performance of the Tardos scheme◦False accusation probability

Results & Summary

Page 3: Accusation probabilities in  Tardos  codes

Forensic Watermarking

Embedder Detector

originalcontent

payload

content withhidden payload

WM secrets

WM secrets

payload

originalcontent

Payload = some secret code indentifying the recipient

ATTACK

Page 4: Accusation probabilities in  Tardos  codes

Collusion attacks"Coalition of pirates"

1pirate #1

AttackedContent

1

1

0

0

0

0

1

1

1

10

0

0

0

0

1

1

1

1

1

0

0

1

1

1

1

1

0

0

0

1

0

1

0

0

0

0

0

0

1

1

1

1

0

1

1

0

1 0/1 1 0 0/1 0 1 0/1 0/1 0 0/1 1

#2

#3

#4

= "detectable positions"

Page 5: Accusation probabilities in  Tardos  codes

AimTrace at least one pirate from detected watermark

BUTResist large coalition

longer codeLow probability of innocent accusation (FP) (critical!)

longer codeLow probability of missing all pirates (FN) (not critical) longer codeANDLimited bandwidth available for watermarking code

Page 6: Accusation probabilities in  Tardos  codes

n users

embeddedsymbols

m content segments

Symbols allowed

Symbol biases

drawn from distribution

F

watermarkafter attack

A B C BA C B AB B A CB A B AA B A CC A A AA B A B

biases

AC

AB

A ABC

p1Ap1Bp1C

p2Ap2Bp2C

piApiBpiC

pm

Apm

Bpm

C

c pirates

q-ary Tardos scheme (2008)

• Arbitrary alphabet size q

• Dirichlet distribution F

=y

A B C BA C B AB B A CB A B AA B A CC A A AA B A B

Page 7: Accusation probabilities in  Tardos  codes

Tardos scheme continuedAccusation:• Every user gets a score

• User is accused if score > threshold

• Sum of scores per content segment

• Given that pirates have y in segment i:

• Symbol-symmetric

Page 8: Accusation probabilities in  Tardos  codes

Properties of the Tardos schemeAsymptotically optimal

◦m c2 for large coalitions, for every q◦Previously best m c4

◦Proven: power ≥ 2Random code bookNo framing

◦No risk to accuse innocent users if coalition is larger than anticipated

F, g0 and g1 chosen ‘ad hoc’ (can still be improved)

Page 9: Accusation probabilities in  Tardos  codes

Accusation probabilitiesm = code lengthc = #piratesu = avg guilty score

Pirates want to minimize u and make longer the innocent tail

Curve shapes depend on: F, g0, g1 (fixed ‘a

priori’) Code length # pirates Pirate strategy

Central Limit Theorem asymptotically Gaussian shape (how fast?)2003 2010: innocent accusation curve shape unknown… till now!

threshold

total score (scaled)

u

Result: majority voting minimizes u

innocent guilty

Page 10: Accusation probabilities in  Tardos  codes

ApproachFourier transform property:

Steps:1. S = i Si

Si = pdf of total score SS = InverseFourier[ ]

2.

3. Compute • Depends on strategy• New parameterization for attack strategy

4. Compute5.

• Taylor • Taylor• Taylor

Page 11: Accusation probabilities in  Tardos  codes

Main result: false accusation probability curve

Example:

majority voting attack

threshold/√m

exact FP

Result from Gaussian

FP is 70 times less than Gaussian approx in this example

But

Code 2-5% shorter than predicted by Gaussian approx

log10FP

Page 12: Accusation probabilities in  Tardos  codes

SummaryResults: introduced a new parameterization of the attack strategy majority voting minimizes u first to compute the innocent score pdf

◦ quantified how close FP probability is to Gaussian◦ sometimes better then Gaussian!◦ safe to use Gaussian approx

Future work: study more general attacks different parameter choices

Thank you for your attention!