27
1 5/3/2006 | Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. © 2006 Columbia University EE 6886: Topics in Signal Processing -- Multimedia Security System Lecture 14: Key Managements, Standard, and Emerging Technology Ching-Yung Lin Department of Electrical Engineering Columbia University, New York, NY 10027 5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 2 E 6886 Topics in Signal Processing: Multimedia Security Systems Course Outline Multimedia Security : Multimedia Standards – Ubiquitous MM Encryption and Key Management – Confidential MM Watermarking – Uninfringible MM Authentication – Trustworthy MM Security Applications of Multimedia: Audio-Visual Person Identification – Access Control, Identifying Suspects Media Sensor Networks – Event Understanding, Information Aggregation Standard and Emerging Technologies

EE 6886: Topics in Signal Processing --Multimedia Security

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: EE 6886: Topics in Signal Processing --Multimedia Security

1

5/3/2006 | Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. © 2006 Columbia University

EE 6886: Topics in Signal Processing

-- Multimedia Security System

Lecture 14: Key Managements, Standard, and

Emerging Technology

Ching-Yung Lin

Department of Electrical Engineering

Columbia University, New York, NY 10027

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 2

E 6886 Topics in Signal Processing: Multimedia Security Systems

Course Outline

Multimedia Security :

Multimedia Standards – Ubiquitous MM

Encryption and Key Management – Confidential MM

Watermarking – Uninfringible MM

Authentication – Trustworthy MM

Security Applications of Multimedia:

Audio-Visual Person Identification – Access Control, Identifying Suspects

Media Sensor Networks – Event Understanding, Information Aggregation

Standard and Emerging Technologies

Page 2: EE 6886: Topics in Signal Processing --Multimedia Security

2

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 3

E 6886 Topics in Signal Processing: Multimedia Security Systems

Evolution of Digital Media Applications, Challenges, and Standards

Signals Features Semantics KnowledgeSignals Features Semantics Knowledge

NearFuture

RecentPast

MPEG - 1, - 2MPEG - 4

MPEG - 7MPEG - 21

MPEG - 1, - 2MPEG - 4

MPEG - 7MPEG - 21

Media mining

Decision support

Rights management

Modeling and classification

Personalization and

summarization

Similarity-based searching

Object-based coding

Compression

Coding

Communications

Problems and Innovations

MPEG-21

E-commerce of electronic

content

Flexible business models

Digital items

MPEG-7

Semantic-based analysis and

retrieval

Enterprise content

management

MPEG-4, -7

Content-based retrieval

Multimedia filtering

Content Adaptation

MPEG-1, -2, -4

Video storage

Broadband

Streaming video and delivery

Applications

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 4

E 6886 Topics in Signal Processing: Multimedia Security Systems

MPEG-21 Multimedia Framework: “Transactions of Digital Items”

Users and participants in the content value chain seamlessly exchange content in form of “digital items” across networks and devices

Framework supporting all forms of electronic content/intellectual property (video, music, learning objects, on-line reports, etc.)

Digital Item = bundling of: Essence (i.e., media resources)

Metadata

Rights expressions

Identifiers

Descriptor

Item

Item

Item

Music package

(one song plus

two photos)

music.mp3

photo1.jpg

photo2.jpg

text/plain

DescriptorMPEG-7

Creation

Informationtext/xml

Item

Example: Digital music package

Page 3: EE 6886: Topics in Signal Processing --Multimedia Security

3

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 5

E 6886 Topics in Signal Processing: Multimedia Security Systems

MPEG-21 Standard Framework

• “Interoperable Multimedia Framework”

• “E-Commerce for E-Content”

• “Digital Audio-Visual Framework”

• Vision: “To enable transparent and augmented use of multimedia resources across a wide range of networks and devices.”

• Goal: Integration of technologies for content identification and consumption

• Output: ISO technical report and technical specification (International Standard in 2003)

User A User B

Transaction/Use/Relationship

Digital Item

Authorization/Value Exchange

Terminals & Networks

Content Management and usage

Intellectual Property

management and

Protection

D i g i t a l I t e m I d e n t i f i c a t i o n a n d D e s c r i p t i o n

D i g i t a l I t e m

D e c l a r a t i o n

: • •

Examples Natural and Synthetic Scalability

C o n t e n t R e p r e s e n t a t i o n

Examples : • Storage Management • Content Personalisation

Examples : • Unique Identifiers • Content Descriptors

: • •

Examples Resource Abstraction Resource Mgt. (QoS)

Examples : • Encryption • Authentication • Watermarking

Event Reporting

Examples : • “Container” • “Item” • “Resource”

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 6

E 6886 Topics in Signal Processing: Multimedia Security Systems

Authorization using MPEG-21 Rights Expression Language

“Can Aliceplay the .mp3 file?”

“Under what condition?”

“Accordingto whom?”

1

2

3

MPEG-21 User

Rights Expression Language (REL): Specifies a language for declaring rights and permissions associated with use of digital items.

The rights expressions use terms as defined in the Rights Data Dictionary.

Rights Data Dictionary (RDD): Specifies a model and dictionary for clearly and consistently defining terms for use in rights expressions.

Page 4: EE 6886: Topics in Signal Processing --Multimedia Security

4

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 7

E 6886 Topics in Signal Processing: Multimedia Security Systems

Rights Expression Language (XrML) (I)

Principal

Media

Resource

Right

Condition

Child Elements of a Grant

• XrML 2.0: • developed by Xerox

• adopted by MPEG-21

• Issuer(s) + Grant(s) = License

• Schemas:• Core Schema

• Stand Extension Schema

• Content Extension Schema

• Mandatory Elements in Core Schema:• Principal: all Principal, key holder

• Right: Issue, Revoke, Possess Property, Obtain

• Resource: Digital Resource

• Condition: all Conditions, validity Interval, revocation Freshness,

exist Right, pre-requisite Right

• Optional Elements in Standard Schema:• Grant: exercise limit, seek approval, track report, territory, valid time, etc.

• Fee: cash, payment per use, best price under, etc.

• Name Extensions: email, dns, common, x509 subject, etc.

• Revocation Extension: revocable

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 8

E 6886 Topics in Signal Processing: Multimedia Security Systems

Rights Expression Language (XrML) (II)

• Optional Elements in Standard Schema:• File Management Rights: access, backup, delete, execute, restore, etc.

• Transport Rights: copy, loan, transfer

• Derivative Works Rights: edit, embed, extract

• Render Rights: export, play, print

• Configuration Rights: install, uninstall

• Extension to Resources: digital Work, Metadata, security Level,

• Extension to Condition: destination, source, helper, renderer, watermark

<?xml version="1.0" encoding="UTF-8" ?>

<license xmlns=http://www.xrml.org/schema/2001/11/xrml2core …>

<grant>

<keyHolder>

<info>

<dsig:KeyValue>

<dsig:RSAKeyValue>

<dsig:Modulus>Fa7wo6NYfmvGqy4ACSWcNmuQfbejSZx</dsig:Modulus>

<dsig:Exponent>AQABAA==</dsig:Exponent>

</dsig:RSAKeyValue>

</dsig:KeyValue>

</info>

</keyHolder>

<possessProperty />

<sx:commonName>Alice Richardson</sx:commonName>

</grant>

</license>

A sample XrML Grant

Page 5: EE 6886: Topics in Signal Processing --Multimedia Security

5

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 9

E 6886 Topics in Signal Processing: Multimedia Security Systems

MPEG IPMP Extension

IPMP Tool List IPMP Tool ID

Alternate IPMP Tool ID

Parametric Tool Description

IPMP Tool Elementary

Stream

IPMP Information

Content

request

delivery

Terminal

Terminal-Tool Message Interchange Interface

IPMP Tool Manager

Missing

IPMP Tool

Obtain Missing IPMP Tool

IPMP

Tool 1

IPMP

Tool 2

IPMP

Tool n….Architecture Diagram

• Applied to any MPEG multimedia representation

• Objectives:

• Allow the same protected content to be consumed on different vendors’

Terminals.

• Allow the same content to be protected by different vendors’ IPMP Tools.

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 10

E 6886 Topics in Signal Processing: Multimedia Security Systems

DVD Content Scramble System Overview

DVD Player

Player Key

Secret Key

Region CodeTitle Key

Disk Keys

Disk Key Hash

Region CodeDVDBus

Key

Secret

Key

Bus

Key

Host

Content De-scrambling Process: • Mutual Authentication

• Decoding disk

• Send disk and title keys

• Send sectors

• Host decodes the title key using the disk key

• The host decodes the sector using the title key and the sector key

Page 6: EE 6886: Topics in Signal Processing --Multimedia Security

6

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 11

E 6886 Topics in Signal Processing: Multimedia Security Systems

DVD Content Scramble System

Linear Feedback Shift Register (LFSR):

• generating pseudo-random bit stream

• use this bit stream to XOR it with the original stream

• the decoder uses XOR again to get the original stream

Disk and Player Keys

• each player has a small number of keys

• each disk is encoded by a disk key.

• each disk contains a hidden sector

• the hidden sector contains the disk key encrypted with all

409 possible player keys.

• it holds the disk key encrypted with the disk key.

• the player decrypts the appropriated entry and then verifies

that it has correctly decoding the disk key, by decoding the

decrypted disk key.

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 12

E 6886 Topics in Signal Processing: Multimedia Security Systems

Encryption and Key Managements

5C DTCP (Digital Transmission Content Protection):

Authentication and data encryption with a digital bus (primarily the IEEE 1394 Firewirebus).

Supported by Hitachi, Intel, Matsushita, Sony and Toshiba.

Cisco OCCAM (Open Conditional Content Access Management):

Public key infrastructure with a central authority

One-way protocols lead to more robust implementations

IBM xCP Cluster Protocol

Broadcast encryption

Derived from Content Protection for Recordable Media (supported by IBM, Matsushita, Intel and Toshiba).

Page 7: EE 6886: Topics in Signal Processing --Multimedia Security

7

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 13

E 6886 Topics in Signal Processing: Multimedia Security Systems

Broadcast Encryption

Algorithmic Lineage

Broadcast encryption - Fiat and Naor, Crypto ’93

Tracing traitors - Chor et al., Crypto ’94

Alternative to Public Key Encryption

2 or 3 orders of magnitude less overhead

One-way protocols lead to more robust implementations

Supports key revocation

Unlike global secret schemes in which a single hacking event breaks the whole system

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 14

E 6886 Topics in Signal Processing: Multimedia Security Systems

Cluster Model

mkbserver

authorizer

client

MKB

authTable

Content +usage rules

Content +usage rules

MKB

authTable

Page 8: EE 6886: Topics in Signal Processing --Multimedia Security

8

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 15

E 6886 Topics in Signal Processing: Multimedia Security Systems

Media Key Blocks

Scheme is large matrix of random keys

Each device assigned one key from each column

EKi,j(Km)

EKi,j(Km)

EKi,j(Km)

EKi,j(Km)

EKi,j(Km)

EKi,j(Km)

EKi,j(Km)

EKi,j(Km)

EKi,j(Km)

EKi,j(Km)

EKi,j(Km)

Device A

Device B

• MKB is data structure w/multiple ciphers of same media key under different device keys

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 16

E 6886 Topics in Signal Processing: Multimedia Security Systems

Digital Item Adaptation using MPEG-7 and MPEG-21

Usage

Environment

MPEG-21

Digital Item Declaration

MPEG-21

Usage

Environment

Media Resource

Adaptability

Rights

Expression

Adaptation

Rights

MPEG-7

MPEG-7

Adaptability MPEG-7

User

Preference

MPEG-7

Controlled Term List /

Classification Scheme

User

Query

ADAPTATION

ENGINE

MPEG-21 DIA

MPEG-7

LEGEND

Content

Sources

Media Description

- MPEG-7 Description Schemes

Usage Environment

- MPEG-7 User Preferences

- MPEG-21 Usage Environment

Content Adaptability

- MPEG-7 Media Resource Requirement

- MPEG-21 Media Resource Adaptability

Page 9: EE 6886: Topics in Signal Processing --Multimedia Security

9

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 17

E 6886 Topics in Signal Processing: Multimedia Security Systems

A Personalization and Summarization System Architecture

Server Middleware

Content

Sources

Adaptation

Engine

Media

Descriptions

Rights

Expressions

Personalization

Engine

Client

Usage

Environment

Display

Client

MPEG-21RE

MPEG-21UE

MPEG-2 MPEG-4

MPEG-1

Content

Adaptability

MPEG-21MRA

User

Query

VideoEd

VideoAnn

VideoSue

MPEG-7

MPEG-7UP

MPEG-7MRR

Database Server

- Content Sources

- MPEG-7 Media Descriptions

- MPEG-21 Rights Expression

- Content Adaptability

Media Middleware

- Select Personalized Contents in Personalization Engine

- Retrieve and Adapt Contents in Adaptation Engine

User Client

- Request for Personalized Content

- Communicate Usage Environment

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 18

E 6886 Topics in Signal Processing: Multimedia Security Systems

Database Server

Media Descriptions

- MPEG-7 DS

Rights Expression

- MPEG-21 RE

Content Adaptability

- MPEG-7 Media Resource Requirement

- MPEG-21 Media Resource Adaptability

Content

Sources

Media

Descriptions

Rights

ExpressionsVideoAnnEx

MPEG-7

Annotation

ToolMPEG-21RE

MPEG-7

MPEG-2 MPEG-4MPEG-1

Content

Adaptability

MPEG-21MRA

MPEG-7MRR

Server Middleware

Content

Sources

Adaptation

Engine

Media

Descriptions Personalization

Engine

Client

Usage

Environment

Display

Client

User

Request

Rights

Expression

Content

Adaptability

Page 10: EE 6886: Topics in Signal Processing --Multimedia Security

10

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 19

E 6886 Topics in Signal Processing: Multimedia Security Systems

Pervasiveaccess

Personalization Engine

MPEG-7MetadataCatalog

Rich media

Content

Repository

ContentSelection

Video selections

Scene selections

Usage

Environment

FormatSelection

Format, frame rate

display size, colorUser

Query

Content Adaptation Engine

T

E

X

T

FormatTranscoder

Video, Image

Audio, Text

PresentationComposer

Spatial composition

Temporal ordering

ScaleTranscoder

Frame rate,

display size, color

Media Middleware

Server Middleware

Content

Sources

Adaptation

Engine

Media

Descriptions Personalization

Engine

Client

Usage

Environment

Display

Client

User

Request

Rights

Expression

Content

Adaptability

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 20

E 6886 Topics in Signal Processing: Multimedia Security Systems

User Client

Usage Environment

User Profile

Device Profile

Transmission Profile

Display ClientPCs (Browser, Application)

PDAs (Palm, WinCE)

Phones/Watches (WAP, Jini)

User Query

Topic Preference

Query Keywords

Time Constraints

Middleware

Adaptation

Engine

Personalization

Engine

Processing

Engine

Summarization

Semantic Query

Feature-Based Query

Content Selection

Format Decision

Request

Parser

DID

Parser

User Client

HTTP REQUEST

•MPEG-21 DIA

(user environment)

•MPEG-7

(user preference)

•W3C CC/PP

Content

Usage Environment

- Persistent Data

- User Profile

English speaker, NYC resident

- Device Profile

color display, audio capability

- Transmission Profile

56K modem, ethernet

User Query

- User Specific Preferences

keyword search, CBR

Server Middleware

Content

Sources

Adaptation

Engine

Media

Descriptions Personalization

Engine

Client

Usage

Environment

Display

Client

User

Request

Rights

Expression

Content

Adaptability

Page 11: EE 6886: Topics in Signal Processing --Multimedia Security

11

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 21

E 6886 Topics in Signal Processing: Multimedia Security Systems

P = user preference vector, where pi denotes the preference weighting for concept i.

A = attribute matrix, where score ai,j is defined as the relevance of concept i in shot j.

W = weighted importance vector, where wi is the weighted concept for shot i.

=

=

NNMM

ji

N

M p

p

p

aa

a

a

aaa

w

w

w

W...

*

......

.........

.........

...

...

2

1

,1,

,

1,2

,12,11,1

2

1

t

w

+ Summarized video

A is generated manually, semi-

automatically, or automaticallyDynamic

Threshold

user

preference

vector

attribute

relevance

matrixvideo

segment

weighting

Media MiddlewareVideo Summarization on Usage Environment

Server Middleware

Content

Sources

Adaptation

Engine

Media

Descriptions Personalization

Engine

Client

Usage

Environment

Display

Client

User

Request

Rights

Expression

Content

Adaptability

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 22

E 6886 Topics in Signal Processing: Multimedia Security Systems

Media MiddlewareCompressed-Domain MPEG Editing Tool

Run-time user selection of video shots

Fast creation of personalized summaries

On-line preview of editing results

Compatible with MPEG-1 and MPEG-2

Demo http://sapphire.watson.ibm.com/VideoEd

Server Middleware

Content

Sources

Adaptation

Engine

Media

Descriptions Personalization

Engine

Client

Usage

Environment

Display

Client

User

Request

Rights

Expression

Content

Adaptability

Page 12: EE 6886: Topics in Signal Processing --Multimedia Security

12

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 23

E 6886 Topics in Signal Processing: Multimedia Security Systems

User ClientPDA Devices

Browsing

- Channels

- Links

Preferences

- Video Source

- Preferences

- Time Constraint

Queries

- Topics

- Keyword Search

- Time Constraints

Server Middleware

Content

Sources

Adaptation

Engine

Media

Descriptions Personalization

Engine

Client

Usage

Environment

Display

Client

User

Request

Rights

Expression

Content

Adaptability

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 24

E 6886 Topics in Signal Processing: Multimedia Security Systems

User ClientIBM Websphere Portal Server

Usage Environment

- User Preference Topics

[news, entertainment, education]

- Device [terminal, PDA]

- Network Constraint

User Query

- Topic Preferences

- Keyword Search

- Time Constraint

Server Middleware

Content

Sources

Adaptation

Engine

Media

Descriptions Personalization

Engine

Client

Usage

Environment

Display

Client

User

Request

Rights

Expression

Content

Adaptability

Page 13: EE 6886: Topics in Signal Processing --Multimedia Security

13

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 25

E 6886 Topics in Signal Processing: Multimedia Security Systems

Interoperable Multimedia Content Management:Relevant Standards – MPEG-7 and MPEG-21

Metadata is critical for describing essential aspects of content:Main topics, author, language, publication, etc.

Events, scenes, objects, times, places, etc.

Rights, packaging, access control, content adaptation, etc.

Conformity with open metadata standards will be a vital:Allows faster design and implementation

Interoperability with broad field of competitive standards-based tools and systems

Leveraging of rich set of standards-based technologies for critical functions such as content

extraction, advanced search, and personalization

Relevant critical standards for interoperable multimedia CM:MPEG 7 Multimedia Content Description Interface

ISO/IEC standard for multimedia metadata (XML-Schema based)

MPEG 21 Multimedia Framework

ISO/IEC standard for transactions of digital items, rights management, and content adaptation

Summary of benefits:MPEG-7 allows interoperability of systems and tools for multimedia content analysis, annotation,

indexing, searching, and filtering

MPEG-21 allows interoperable transactions of digital multimedia content

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 26

E 6886 Topics in Signal Processing: Multimedia Security Systems

Video Personalization and Summarization System allows universal access and

personalized content of rich media to any user environment at anytime and anywhere

Innovations

Standards-based (MPEG-7 & MPEG-21) interoperable solution

Off-line semi-automatic MPEG-7 XML content annotation

Digital item adaptation and transactions using MPEG-21

Optimized content adaptation to user query and user environment

Real-time compressed domain video composer for MPEG contents

Applications

Enterprise rich media (i.e., e-Learning, video conferencing, news, communications)

Wireless (i.e., personalized video clips, image slide shows)

Conclusion

Methods for automatic rich media annotation, indexing, retrieval, and optimized

personalization and presentation

Rich MediaContent

Repository

Rich Media

Personalization

Engine

Content

Adaptation

Engine

Personalized

Rich Media

Content

Summary of Video Personalization and Summarization

Page 14: EE 6886: Topics in Signal Processing --Multimedia Security

14

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 27

E 6886 Topics in Signal Processing: Multimedia Security Systems

Emerging Technologies

Complex Network Analysis

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 28

E 6886 Topics in Signal Processing: Multimedia Security Systems

An example of complex network: Power-Law Network

A. Barbasi and E. Bonabeau, “Scale-free Networks”, Scientific American 288:

p.50-59, 2003.

/kkp C k eτ κ− −= ⋅

Newman, Strogatz and Watts, 2001!

km

k

mp e

k

−= ⋅

Page 15: EE 6886: Topics in Signal Processing --Multimedia Security

15

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 29

E 6886 Topics in Signal Processing: Multimedia Security Systems

Another example of complex network: Small-World Network

Six Degree Separation:

adding long range link, a regular graph can be transformed into a

small-world network, in which the average number of degrees between

two nodes become small.

from Watts and Strogatz, 1998

C: Clustering Coefficient, L: path length,

(C(0), L(0) ): (C, L) as in a regular graph;

(C(p), L(p)): (C,L) in a Small-world graph with randomness p.

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 30

E 6886 Topics in Signal Processing: Multimedia Security Systems

What is a complex network?

Most real-world networks have complex topological features:

Heavy-tail in the degree distribution

High clustering coefficient

Assortativity or Disassortativity among vertices

Community structure at many scales

Self-similar hierarchical structure

Simple networks:

Typically represented by graphs such as a lattice or a random graph.

Topology structure roughly the same in any part of network.

Does not posses the above features

Examples:

Social Networks – studied in sociology, public health, commerce, communication.

Computer Networks – WWW, security,…

Biological Networks – neurons, genes, protein, animals,…

Others: sensor network, river network, power lines, …

Page 16: EE 6886: Topics in Signal Processing --Multimedia Security

16

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 31

E 6886 Topics in Signal Processing: Multimedia Security Systems

Relationships are multi-dimensional and uncovered through network questions

Communication

How often do you

communicate with this

person?

Innovation

How often do you turn

to this person for new

ideas

Advice

How often do you seek advice

from this person before making

an important decision?

Awareness

I am aware of this

person’s knowledge and

skills

Learning

How likely are you to

rely on this person for

advice on new methods

and processes

Valued Expertise

How likely are you to

turn to this person for

specialized expertise

Trust

I believe there is a high

personal cost in seeking

advice or support from

this person

Access

I believe this person will respond to my request in a reasonable and timely manner

Energy

I generally feel energized when I interact with this person

Actions Awareness Emotional

This slide is excerpted from SNA Theory, Concepts and Practice

by Dr. T. Mobbs, BCS and Dr. K. Ehrlick, Research

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 32

E 6886 Topics in Signal Processing: Multimedia Security Systems

Group and Roles

Marketing

Finance

Manufacturing

Andy

Bob

Carl

Darren

Earl

Frank Indojit

Gerry Harry Jeff

Sam

Karen

Leo

Ming

Neo

Central people Sam. Could be bottleneck or

holding group together

Peripheral people Earl. Goes to others but no-

one goes to him for

information. At risk for

leaving. Potentially unrealized

expertise

Sub-groups Group split by function. Very

little information shared

across groups

This slide is excerpted from SNA Theory, Concepts and Practice

by Dr. T. Mobbs, BCS and Dr. K. Ehrlick, Research

Page 17: EE 6886: Topics in Signal Processing --Multimedia Security

17

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 33

E 6886 Topics in Signal Processing: Multimedia Security Systems

Some Roles are especially critical

Marketing

Finance

Manufacturing

Andy

Bob

Carl

Darren

Earl

Frank Indojit

Gerry Harry Jeff

Karen

Leo

Ming

Neo

What happens if Sam leaves

the group through layoffs, job

reassignment, attrition,

merger, retirement?

This slide is excerpted from SNA Theory, Concepts and Practice

by Dr. T. Mobbs, BCS and Dr. K. Ehrlick, Research

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 34

E 6886 Topics in Signal Processing: Multimedia Security Systems

Attributes can create barriers to collaboration

Country

= Angola

= Brazil

= Canada

= Nigeria

= Saudi Arabia

= UK

= USA

The connections show that very little communication occurs between countries.

“How often do the people listed provide you with information you use to accomplish your work?

This slide is excerpted from SNA Theory, Concepts and Practice

by Dr. T. Mobbs, BCS and Dr. K. Ehrlick, Research

Page 18: EE 6886: Topics in Signal Processing --Multimedia Security

18

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 35

E 6886 Topics in Signal Processing: Multimedia Security Systems

Country

= Angola

= Brazil

= Canada

= Nigeria

= Saudi Arabia

= UK

= USA

Revealing problems can provoke solutions

“How often do the people listed provide you with information you use to accomplish your work?

A follow-up SNA 14 months later showed great improvement

This slide is excerpted from SNA Theory, Concepts and Practice

by Dr. T. Mobbs, BCS and Dr. K. Ehrlick, Research

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 36

E 6886 Topics in Signal Processing: Multimedia Security Systems

Some examples of Degree Distribution

(a) scientist collaboration: biologists (circle) physicists (square), (b)

collaboration of move actors, (d) network of directors of Fortune

1000 companies

Page 19: EE 6886: Topics in Signal Processing --Multimedia Security

19

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 37

E 6886 Topics in Signal Processing: Multimedia Security Systems

Social Network of Switchboard-2 Subset

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 38

E 6886 Topics in Signal Processing: Multimedia Security Systems

Social Network of Switchboard-2 Dataset679 nodes edges = 4472

Page 20: EE 6886: Topics in Signal Processing --Multimedia Security

20

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 39

E 6886 Topics in Signal Processing: Multimedia Security Systems

Switchboard-2 Network Degree Distribution

679 nodes (actors)

Out degrees Normal. In degrees Abnormal.

SWB-2

1

10

100

1000

1 10 100

degrees

counts

Outdegrees

Indegrees

NodeDegrees

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 40

E 6886 Topics in Signal Processing: Multimedia Security Systems

The Most Difficult Challenge: State-of-the-Arts?

Social Networks in sociological and statistic fields: focus on (1) overall network characteristics, (2) dynamic random graphs, (3) binary edges, etc. Not consider probabilistic nodes/edges or individual nodes/edges.

Epidemic Networks & Computer Virus Network: focus on (1) overall network characteristics – when will an outbreak occurs, (2) regular / random graphs. Not focus on individual nodes/edges.

(Computer) Communication Networks: focus on (1) packet transmission –information is not duplicated, or (2) broadcasting – not considering individual nodes/edges or complex network topology.

WWW: focus on (1) topology description, (2) binary edges and ranked nodes (e.g., Google PageRank) Not consider probabilistic edges

Our Objectives: Find important people, community structures, or

information flow in a network, which is dynamic, probabilistic and

complex, in order allocate resources in a large-scale mining system.

Page 21: EE 6886: Topics in Signal Processing --Multimedia Security

21

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 41

E 6886 Topics in Signal Processing: Multimedia Security Systems

What is a Dynamic Probabilistic Complex Network?Example: http://alishan.watson.ibm.com/NetDIG/

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 42

E 6886 Topics in Signal Processing: Multimedia Security Systems

Modeling a Dynamic Probabilistic Complex Network [Assumption] A DPCN can be represented by a Dynamic Transition Matrix P(t), a

Dynamic Vertex Status Random Vector Q(t), and two dependency functions fM and gM.

, 1

, 2

,

Pr( ( ) )

Pr( ( ) )( ) ,

Pr( ( ) )E

i j

i j

i j

y t SE

y t SEt

y t SEΩ

= = =

i,jp ≜⋮

where

( )ix t : the status value of vertex i at time t. and

1

2

Pr( ( ) )

Pr( ( ) )( ) ,

Pr( ( ) )V

i

i

i

x t SV

x t SVt

x t SVΩ

= = =

iq ≜⋮

Pr( ( ) ) 1,

V

ix t SVωω∈Ω

= =∑

, ( )i jy t : the status value of edge i →j at time t.

,Pr( ( ) ) 1,

E

i jy t SEωω∈Ω

= =∑

where

( ) ( ) ( )

( ) ( ) ( )

( ) ,

( ) ( ) ( )

t t t

t t t

t

t t t

1,1 2,1 N,1

1,2 2,2 N,2

1,N 2,N N,N

p p p

p p p

P

p p p

⋯ ⋯

⋮ ⋮ ⋱ ⋮≜

⋮ ⋮ ⋱ ⋮

⋯ ⋯

( )

( )

( ) ,

( )

t

t

t

t

1

2

N

q

q

Q

q

≜ ⋮

( ) ( ( ), ( )),Mt t f t tδ+P Q P≜

( )

( ( ), ( ), ( )),M

t t

g t t t t

δ

δ

+

+

Q

P Q P≜

and

Page 22: EE 6886: Topics in Signal Processing --Multimedia Security

22

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 43

E 6886 Topics in Signal Processing: Multimedia Security Systems

Modeling a Dynamic Probabilistic Complex Network – cont’d

Also the Network Topology should follow the characteristics of complex network:

Network topology follows power-law:

,,

1, ,Pr( ( ) ) 0u( )

0,

i ji j

if t y t nullp

else

∃ ≠ >=

,Pr( u( ) ) di j

ip l S l−= ⋅∑ ∼

and the clustering coefficient C is typically > 0.2.

where

d is typically in the range of 2 ~ 2.5.

, , ,Pr(u( ) 1 | u( ) 1,u( ) 1)j k i j i kC p p p= = = =

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 44

E 6886 Topics in Signal Processing: Multimedia Security Systems

Edges are Markov State Machines, Nodes are not

State transitions of edges: S-D-A-R model. (Susceptible, Dormant,

Active, and Removed) This indicates the time-aspect changes of the

state of edges.

S A RD

1 α−

trigger

α β γ

1 β− 1 γ−1

States of nodes: S-A-I model. (Susceptible, Active, and Informed)

Trigger occurs when the start node of the edge changes from state

S to state I :

Node view Network view

Edge view

S Itrigger

A

Page 23: EE 6886: Topics in Signal Processing --Multimedia Security

23

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 45

E 6886 Topics in Signal Processing: Multimedia Security Systems

Advanced Modeling -- Dynamic Probabilistic Social Network [Lin 2006]

Social networks are usually evolving -- that the relationships and actions of

actors are dynamic and probabilistic

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 46

E 6886 Topics in Signal Processing: Multimedia Security Systems

Dynamic Probabilistic Social Network AnalysisPredict Information Flow based on DPSN analysis – e.g. Phone calls

of 679 Midwest universities students.

Red: Informed

People

Blue: Activated

Communications

Yellow: Not-

Informed people

Page 24: EE 6886: Topics in Signal Processing --Multimedia Security

24

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 47

E 6886 Topics in Signal Processing: Multimedia Security Systems

Predicting behavioral information flow based on DPSN

If information starts spreading from Actor 100, what are the probabilities

that the other people got informed?

The Probabilities of the Nodes Receives Information

0

0.05

0.1

0.15

0.2

0.25

0.3

1

28

55

82

109

136

163

190

217

244

271

298

325

352

379

406

433

460

487

514

541

568

595

622

649

676

SeedID100

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 48

E 6886 Topics in Signal Processing: Multimedia Security Systems

SmallBlue Ego-- Who does a person know and collaborate?

Page 25: EE 6886: Topics in Signal Processing --Multimedia Security

25

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 49

E 6886 Topics in Signal Processing: Multimedia Security Systems

SmallBlue Find-- find an expert with *useful* knowledge in corporate

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 50

E 6886 Topics in Signal Processing: Multimedia Security Systems

SmallBlue Connect – Link people’s knowledge, expertise and social connections

Page 26: EE 6886: Topics in Signal Processing --Multimedia Security

26

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 51

E 6886 Topics in Signal Processing: Multimedia Security Systems

References

K. Hill, “Imprimatur Business Model,” MCPS 2nd Consensus Forum, Stockholm, May 1997.

“XrML 2.0 Technical Overview,” Content Guard, March 2002 http://www.xrml.org/Reference/XrMLTechnicalOverviewV1.pdf,

ISO/IEC JTC 1/SC 29/WG 11 N4269, “Information Technology – Multimedia Framework (MPEG-21) – Part 4: Intellectual Property Management and Protection,” July 2001.

G. Kesden, “Introduction on Content Scrambling System,” Lecture on Operating Systems: Design and Implementation, CMU, Dec. 2000.

J. Lotspiech S. Nusser and F. Pestoni, “Broadcast Encryption’s Bright Future,” IEEE Computer Magazine, Aug. 2002.

Belle L. Tseng, Ching-Yung Lin and John R. Smith, "Video Personalization and Summarization System based on MPEG-7 and MPEG-21," IEEE Multimedia Magazine, Jan.-Mar., 2004.

C.-Y. Lin, X. Song, M.-T. Sun and B. L. Tseng, "Automatic Modeling of Social Networks through Content Analysis of Communications ," Sunbelt 26th Social Network Conference, Vancouver, Canada, April 2006.

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 52

E 6886 Topics in Signal Processing: Multimedia Security Systems

Review of Course

Multimedia Security :

Multimedia Standards – Ubiquitous MM

Encryption and Key Management – Confidential MM

Watermarking – Uninfringible MM

Authentication – Trustworthy MM

Security Applications of Multimedia:

Audio-Visual Person Identification – Access Control, Identifying Suspects

Media Sensor Networks – Event Understanding, Information Aggregation

Standard and Emerging Technologies

Page 27: EE 6886: Topics in Signal Processing --Multimedia Security

27

5/3/06: Lecture 14 – Applications and Case Study © 2006 Ching-Yung Lin, Dept. of Electrical Engineering,

Columbia Univ. 53

E 6886 Topics in Signal Processing: Multimedia Security Systems

Final Project

Due on May 12 (Friday).

If you are a graduating student, please submit your final project to

TA and me by noon May 12.

Presentation on May 10. Format is similar to the project proposal.

Demo or online webpages will be welcome.