19
Asymptotic fingerprinting capacity for non-binary alphabets Dion Boesten, Boris Škorić

Asymptotic fingerprinting capacity for non-binary alphabets

  • Upload
    zhen

  • View
    28

  • Download
    0

Embed Size (px)

DESCRIPTION

Asymptotic fingerprinting capacity for non-binary alphabets. Dion Boesten, Boris Š kori ć. Outline. Introduction q-ary Tardos scheme Fingerprinting capacity Asymptotic solutions Proof of non-binary case Discussion. Forensic watermarking. - PowerPoint PPT Presentation

Citation preview

Page 1: Asymptotic fingerprinting capacity for non-binary alphabets

Asymptotic fingerprinting capacity for non-binary alphabets

Dion Boesten, Boris Škorić

Page 2: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023 PAGE 2

Outline

• Introduction• q-ary Tardos scheme• Fingerprinting capacity

• Asymptotic solutions• Proof of non-binary case• Discussion

Page 3: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Forensic watermarking

• Aim: discourage unauthorized distribution of digital content

• Watermark consists of two layers:• Coding layer: determines which messages to embed• WM layer: hides the messages in the content

• Coding layer history:• Pre Tardos (-2003): highly deterministic• Post-Tardos (2003-): fully probabilistic, optimal asymptotic

code length

PAGE 3

Page 4: Asymptotic fingerprinting capacity for non-binary alphabets

Forensic watermarking

Embedder Detector

originalcontent

unique watermark

watermarkedcontent unique

watermark

originalcontent

Attack

Page 5: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

q-ary Tardos scheme

A B C B

A C B A

B B A C

B A B A

A B A C

C A A A

A B A B

PAGE 5

symbol biases

content segments

n users

Code generation• Biases drawn from

distribution F• Code entries generated

per segment using bias

Coalition attack• Coalition size • Attack is limited by

Restricted Digit Model• Special case is Marking

Assumption pirates

A B A CC A A AA B A B

allowedattack

symbols

AC

AB

A ABC

Page 6: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Accusation

• Aim: Detect at least 1 of the pirates

• Accusation procedure• User code words are compared with pirated watermark• Each user receives a score • If exceeds a threshold then user is considered guilty

• Error probabilities• False positive: innocent user is accused• False negative: none of the pirates are accused

PAGE 6

Page 7: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Collusion channel

Attack strategy• Optimal attack is segment

independent• Count frequency of occurred

symbols • Choose output symbol

probabilistically:

• Example: Interleaving attack • Attack can be seen as noise

on a communication channel

PAGE 7

A B A CC A A AA B A B

AC

AB

A ABC

piratecodewords

allowedattacksymbols

𝚺=(120)Attack

strategy𝚺 𝑌

Page 8: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Fingerprinting capacity

PAGE 8

• Mutual Information• We know • We want to know (equivalent

with pirates’ identity)

• Fingerprinting game• Payoff function is • Content owner chooses bias

distribution • Pirates decide on a strategy • Fingerprinting capacity is

derived as:

𝐹𝜽

𝐻 (𝚺)𝐻 (𝑌 ) 𝐼 (𝑌 ;𝚺)

𝑰+-

Page 9: Asymptotic fingerprinting capacity for non-binary alphabets

/ name of department 22-04-2023

Importance of capacity

• Capacity provides a lower bound on required code lengths

• Rate of the code is:

• A reliable code should have :

PAGE 9

code length # of users

Page 10: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Asymptotic solutions

• Asymptotic limit # of pirates

• Binary alphabet ()• Solution found by Huang and Moulin (2010)

− (Arcsine distribution)− (Interleaving attack)

• Non-binary alphabet ()• We solved non-binary case

PAGE 10

Page 11: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Proof of non-binary case (1/4)

As we assume:• The random variable becomes continuous in

with expected value • The attack strategy can be approximated by

continuous functions :

PAGE 11

Page 12: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Proof of non-binary case (2/4)

• We have • Taylor expansion of strategy:

• Expand payoff function:

PAGE 12

Page 13: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Proof of non-binary case (3/4)

• Reversal of max-min game• By Sion’s minimax theorem:

• Max-min is equal to min-max only by optimal

value

PAGE 13

Page 14: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Proof of non-binary case (4/4)

• Solving has two parts:

• We prove for any attack strategy :

• The Interleaving attack has:

PAGE 14

min𝒈max𝒑

𝑇 (𝒑 )=𝑞−1

𝐶𝑞=𝑞−12𝑐2 ln𝑞

Page 15: Asymptotic fingerprinting capacity for non-binary alphabets

/ name of department 22-04-2023

More details of the proof

• How to prove ?• with the Jacobian matrix of the mapping

• Both p and g are probability vectors so

PAGE 15

Page 16: Asymptotic fingerprinting capacity for non-binary alphabets

/ name of department 22-04-2023

More details of the proof

• An infinitesimal surface element is related to the corresponding element by a factor of

• The total surface area is equal or larger to

PAGE 16

Page 17: Asymptotic fingerprinting capacity for non-binary alphabets

/ name of department 22-04-2023

More details of the proof

• If there must be a point where

• Theorem (AM-GM inequality): • If then

PAGE 17

Page 18: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Discussion

• is an increasing function of • Advantageous to use larger • Actual implementation and attack options

determine achievable • Future work:• Solve Max-min game to obtain optimal

asymptotic strategies• Find capacity for different attack models

PAGE 18

Page 19: Asymptotic fingerprinting capacity for non-binary alphabets

Department of Mathematics & Computer science 22-04-2023

Questions?

PAGE 19