IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009

293

Performance of Orthogonal Fingerprinting Codes Under Worst-Case Noise Negar Kiyavash, Member, IEEE, and Pierre Moulin, Fellow, IEEE

Abstract—We study the effect of the noise distribution on the error probability of the detection test when a class of randomly rotated spherical fingerprints is used. The detection test is performed by a focused correlation detector, and the spherical codes studied here form a randomized orthogonal constellation. The colluders create a noise-free forgery by uniform averaging of their individual copies, and then add a noise sequence to form the actual forgery. We derive the noise distribution that maximizes the error probability of the detector under average and almost-sure distortion constraints. Moreover, we characterize the noise distribution that minimizes the decoder’s error exponent under a large-deviations distortion constraint. Index Terms—Collusion attacks, fingerprinting, noise.

I. INTRODUCTION

T

HE Internet has drastically changed our daily lives—specifically in terms of convenient access, storage, and transmission of digital data. At the same time, this ease of access has resulted in an increase in unauthorized use. As a result, music and film industries lose millions of dollars per year. Digital fingerprinting is one of the digital rights management techniques developed to combat copyright infringement. Digital fingerprints deter illegal redistribution of digital content by providing each user with his own individually marked copy of the content. While these unique marks make it possible to trace an illegal copy to a traitor, they also enable a host of nefarious attacks, called collusion attacks. A collusion attack refers to a strategy under which a group of users forge an illegal copy from their individualized legitimate copies. Furthermore, the colluders may corrupt their forged copy by adding noise, which makes the task of the fingerprint detector harder. A problem of great theoretical and practical interest is to know what is the worst collusion attack, subject to a maximum distortion constraint on the illegal copy. This question has been addressed in capacity and error-exponent analysis [1]–[5] for fingerprints defined over finite alphabets. Depending on the Manuscript received May 12, 2008; revised June 11, 2009. First published July 07, 2009; current version published August 14, 2009. This work was supported by the National Science Foundation under Grant CCR03-25924 and Grant CCF 0729061. This work was presented in part at ICASSP’06 and SSP’07. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Gaurav Sharma. N. Kiyavash is with the Coordinated Science Laboratory and the Department of Industrial and Enterprise Systems Engineering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 USA (e-mail: [email protected]). P. Moulin is with the Beckman Institute, the Coordinated Science Laboratory, and the Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 USA (e-mail: moulin@ifp. uiuc.edu). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TIFS.2009.2026462

problem setup, the worst collusion channel is either a memoryless or a “nearly memoryless” multiple-access channel that can be identified as the solution to a communication game. For fingerprints and signals defined over Euclidean spaces, the worst collusion channel subject to mean-squared distortion constraints was identified in the capacity analysis of [6] and [7]. The worst channel was the uniform linear averaging attack followed by scaling and addition of additive white Gaussian noise. However, the orthogonal fingerprinting codes considered in this paper have extremely low rate, and thus capacity is not the appropriate performance metric. It would be useful to know what is the collusion channel that maximizes error probability for these codes, and this is the subject of this paper. In the fingerprinting literature, the usual assumption has been that the colluders add white Gaussian noise to a noiseless forgery which they create by combining (“averaging”) their signals in a linear or nonlinear fashion [8]–[11]. Under the assumption of a fixed correlation detector, we showed in [12] and [13] that the uniform linear averaging strategy is the most damaging one in an error-probability sense. This paper examines a different—and potentially lethal—collusion strategy, namely, choosing the noise sequence according to an optimized distribution as an alternative to the usual white Gaussian noise assumption. Our fingerprints form a randomized orthogonal code, where the randomization parameter is a rotation. (The analysis for randomized simplex codes is similar, as discussed at the end of this paper.) The noiseless forgery is obtained by uniform linear averaging of the colluders’ copies. The detector has access to the host signal (nonblind detection) and performs a binary hypothesis test to verify whether a user of interest is colluding. The cost function in this problem is the detector’s error probability. Three types of constraints are considered for the attacker’s noise: 1) average-distortion constraint; 2) almost-sure (a.s.) distortion constraint; 3) large-deviations constraint. of the noise sequence . All three constrain the energy The first (average-distortion) constraint is the weakest one. It allows the colluders to choose impulsive-noise attacks, which produce very large distortion with a small (but not negligible) probability. We show these attacks are far more effective than the usual Gaussian attacks. The second (a.s.) constraint is the strongest one. The energy of the noise sequence satisfies a given upper bound with probability one, which precludes the use of both Gaussian attacks and impulsive-noise attacks. The third (large-deviations) constraint is parameterized by an exponent . Under this constraint, the probability that exceeds a given upper bound is at most . The first two constraints

1556-6013/$26.00 © 2009 IEEE

294

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009

are obtained as special cases when and , respectively. Hence the large-deviation constraint provides a gradual transition between these two opposite regimes. For all three versions of the problem, we derive the worst noise and obtain a tight asymptotic expression for the worst-case detection error probability. A discussion of the appropriateness of the three models for practical applications is given at the end of the paper. We use uppercase letters to denote random variables, lowercase for their individual values, boldface for sequences and vectors, and calligraphic fonts for sets. We to denote mathematical expectation, the use the symbol to indicate asymptotic equality notation that , the “asymptotic equality to indicate that on the log scale” notation , the “equality in the leading order” noto indicate that , where tation is a nonzero, finite constant. The notation is as denotes . We also write to indicate that We denote by the group of rotations on the and by the uniform probability measure over

. -sphere, .

Fig. 1. Fingerprinting process, attack channel, and detector focused on user

m.

B. Attack Model The attack channel is modeled as the uniform average of the colluders’ marked signals, followed by addition of a noise sequence

II. PROBLEM STATEMENT This section defines the mathematical setup of the problem. A. Fingerprint Embedding The host signal is a sequence in , viewed as deterministic but unknown to the colluders. Fingerprints are added to , and marked copies of the signal are distributed among users. Specifically, user is assigned a marked copy

where the fingerprint . Fig. 1 depicts the fingerprint embedding and the attack channel. length- fingerprints form an fingerprinting The code . All codes considered in this paper are randomly rotated spherical fingerprints which are created as follows. First a deterministic prototype spherical code is designed. In this work, we consider the prototype to be either an orthogonal, or a regular simplex code [14]. For a unit-energy size- simplex fingerprint constellation, we have [15]

(2) , the coalition, is the index set of the colwhere luding users. We denote the size of coalition by . The noise sequence is drawn independently of from a probability distribution function (pdf) with zero mean. Therefore, the attack is completely defined by the pair . The mean-squared distortion of the forgery relative to the host signal is given by (3) In this work, we fix a noise strength parameter and consider three types of constraints on the attackers noise: 1) average-distortion constraint: ; 2) almost-sure distortion constraint: ; 3) large-deviations constraint: for some . We ask what is the distribution of the worst-case noise under each constraint and study the corresponding asymptotic performance of the detector, as . C. Focused Correlation Detector

as opposed to an unit-energy orthogonal constellation where when . Then, and , respectively. The fingerprint embedder draws a random variable uniformly distributed over and rotates the prototype constellation by . While is publicly known, is a secret shared with the detector. Therefore, even though the attackers know , they do not know their individual fingerprints. This is a randomized fingerprinting code. The fingerprints are obtained as and so (1) where

is the energy per sample for each

.

The detector knows neither the number of colluders nor the noise pdf . It has access to the host signal (nonblind detection) and subtracts it from the forgery to form the centered data . Ideally the detector must return the list of all colluders. However, this task proves to be too hard. Instead we introduce a detector structure that aims at determining whether a certain user’s mark is present in the forgery . We shall call this detector focused, because it decides whether a particular user of interest is a colluder. It does not aim at identifying all colluders. Given that fingerprinting schemes are used as deterrents against illegal redistribution, catching one member of the coalition is often sufficient for this purpose.

KIYAVASH AND MOULIN: PERFORMANCE OF ORTHOGONAL FINGERPRINTING CODES UNDER WORST-CASE NOISE

The focused detector performs a binary hypothesis test that returns a guilty or not guilty verdict for the user it is focused and applies the on. Assume the detector is focused on user to the centered data . detection rule Let denote the hypothesis that user is innocent and the hypothesis that he is guilty . The possible error events are a false positive (falsely accusing when he is innocent) and a false negative (declaring innocent when he is guilty). The probability of these two events generally depends on the user , detection rule , and the attack . We denote the false positive and false negative probabilities by

(4) In this work, we consider a focused correlation detector that with a threshold . This compares a correlation statistic is the correlation detector of [11] (5)

295

Moreover, since the secret is uniformly distributed over , the performance of focused correlation detector of (5) does not depend on . Another simplification that arises for is that the influence of the priors vanishes. Thus, for large convenience, we consider equal priors. The Bayesian cost function (9) for the focused detector is then expressed as (10) where and denote the type-I and type-II error probabilities for the focused detector of (5) with threshold given by (7). Next we determine the distribution of the worst-case noise under average-distortion, almost-sure, and large-deviations constraints, and study the corresponding asymptotic performance of the detector in each case. The corresponding error probability is denoted by (11) where the feasible set for depends on the constraint used. For fixed and a sequence of orthogonal fingerprints and noise distributions indexed by , we also define the error exponent corresponding to the worst-case noise distribution as

The decision boundary for this test is a hyperplane normal to the vector

(12)

(6) III. RADIAL NOISE and the threshold is (7) This threshold is optimal when the priors for equal, and orthogonal fingerprints are used.

and

are

D. Bayesian Error Probability ,a For a given coalition , attack , and detection rule natural cost function for the detector focused on user is the error probability

As described in Section II-A, we assume a randomly rotated spherical fingerprint constellation and the averaging attack of (2) for the coalition. The error probability and the worst-case error exponent are expressed by (10) and (12), respectively. We shall prove the best strategy for the fingerprint embedder is to rotate the fingerprint constellation uniformly on the -sphere. For the colluders, the best strategy is to choose an (i.e., spherically symmetric noise: depends isotropic on only via ). To see this, consider the following problem. Fix any prototype fingerprint constellation and a prototype noise pdf (not necessarily isotropic) which satisfies a constraint of the form (13)

(8) where . Note that trades off the type I and II errors of (4). The expression (8) corresponds to a Bayes risk, where and represent the priors for the hypotheses and . Moreover, minmax and Neyman–Pearson hypothesis testing correspond to a Bayes hypothesis testing for a certain choice of [16]. Given that the detector and the attack model are fixed throughout this paper but the noise distribution is not, we view the error probability as a function of the number of colluders and the noise distribution . Hence, we simplify the notation and rewrite (8) as (9)

where is a function defined over and denotes the index set of the constraints. An example is the average distortion constraint (14)

and . Denote by the where error probability incurred for this choice of and . Consider the following strategies for the fingerprint embedder and the colluders: 1) The fingerprint embedder selects a probability measure on the rotation group . He then draws a random

296

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009

variable according to and rotates the prototype constellation by . The value of is a secret shared with the detector. . 2) The colluders select a probability measure on They draw from and from satisfying (13) and . Hence follows the let their noise vector be rotation-averaged distribution

almost-sure noise constraint (18) In Section IV-C, besides the average-distortion constraint of (17), the detector is also subject to the large-deviation constraint (19)

Since , the pdf still satisfies the constraint (13) for any choice of . Now consider the following game. Given and , what and is the optimal choice for the probability measures defined above? The payoff function is the probability of error

for some . The large deviation constraint allows us to gradually transition between the average distortion case of Section IV-A and the almost-sure distortion case of Section IV-B. IV. WORST-CASE NOISE

(15) The fingerprint embedder would like to choose such that the payoff function is minimized while the attackers seek that maximizes the payoff function. The following lemma shows that an optimal choice1 for both the fingerprint embedder and the col, the uniform probability measure on . Reluders is call that a saddlepoint strategy is one from which neither player has the interest to deviate. admits Lemma 1: The payoff function as a saddlepoint. Moreover, (16) Proof: The first equality in (16) holds because is isotropic when ; the orientation of the constellation does not matter in this case. The second equality holds because the randomization of the constellation orientation is uniform ; the value of selected by the colluders does when not affect error probability in this case. Note that Lemma 1 holds for any fingerprinting constellation . Moreover, it implies that without loss of optimality we may assume the attackers choose an isotropic pdf

A. Worst-Case Noise Under Average-Distortion Constraint In this section, we consider the linear averaging attack of that maximizes (2) and find the radial noise distribution . Denote the set of all noise pdfs satisfying the average-distortion constraint (17) by

Conditioned on and given the threshold , the decision boundary of (6) cuts a spherical cap away from the -dimensional sphere of radius . Fig. 2 shows the decision boundary and the corresponding spherical cap. The half angle corresponding to the spherical cap is denoted by , and (20) Owing to the isotropic nature of the noise, the type-I and type-II are given by [17] error probabilities conditioned on (21)

where denotes the magnitude of the vector , and is referred to as the radial noise pdf. The performance criterion is now denoted by , where the average is over the scalar random vari.2 The average-distortion criterion (14), exable pressed in terms of , takes the form (17) In Section IV-A, we identify that maximizes subject to the average-distortion constraint of (17). In Section IV-B, we maximize under the stronger

is the first component of a noise vector that is uniwhere formly distributed over the -dimensional sphere of radius ; is the area of the spherical cap in dimensions corresponding to the half angle , and (22) From (21), we obtain the error probability conditioned on as (23) Combining (20), (22), and (23), we have

1The

payoff function of (15) need not have a unique saddlepoint. Lemma 1, the orientation of C has no effect on error probability the noise pdf p is isotropic. 2Per

P

(24)

if

.

KIYAVASH AND MOULIN: PERFORMANCE OF ORTHOGONAL FINGERPRINTING CODES UNDER WORST-CASE NOISE

297

where the inequality is due to (28). Let us denote this upper bound by . Applying successively (22) and (30), we obtain

We now view maximize (31) over

as a function of . Note that

(31) . The attackers

E

Fig. 2. Decision threshold  and norm r of noise vector . The error probability, conditioned on R r , is the normalized volume of the shaded spherical cap.

=

The probability of error of the detector is obtained by integrating over (32)

(25) Setting the right-hand side of (32) to zero, we have Observe that (25) is a linear functional of . Proposition 1: For the orthogonal constellations, under the averaging attack of (2) with isotropic noise and average distorof the tion constraint of (17), the probability of error correlation detector of (5) is asymptotically maximized by an impulsive radial noise (26) where over,

and

(33) or maximum of threshold, we obtain

(34)

. MoreSubstituting (27)

Proof: The coalition’s program is to maximize the linear functional (25) over the radial pdf subject to the linear constraint (17). By the fundamental theorem of linear programming [18], the maximum is achieved by a mass distribution with support at two or fewer points. It is shown in Appendix A that the first point is at . Therefore, the optimal radial pdf for the coalition takes the form in (26), where the optimal values for and must be identified. Owing to the distortion constraint (17), we must have

. In Appendix B, we show that , i.e., yields a . Using the definition (7) of the

is

this

value into (28), we obtain . Since this upper bound is achievable, so . Combining (30), (31), and (34), we obtain

(35) which establishes (27) and concludes the proof. The rate of decay of with is very slow ; in contrast with the case of independent identically distributed (i.i.d.) Gaussian noise , for which probability of error decays exponentially with [14, eq. (67)] (36)

(28) Thus, the coalition can form a significantly stronger attack by choosing impulsive noise according to (26), while incurring the same average distortion.

Similarly, from (25) and (26), we have (29)

B. Worst-Case Noise Under Almost-Sure Distortion Constraint Letting (30)

Under the almost-sure distortion constraint of (18), the support of is given by (37)

, the maximum probability of error is upper where bounded using (23) and (29)

Denote the set of all noise pdfs with such support by Proposition 2: Under the averaging attack of (2) with isotropic noise and almost-sure distortion constraint of (18),

298

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009

for the orthogonal constellations, the probability of error of the correlation detector of (5) is asymptotically maximized by the impulsive radial noise

We analyze the error exponent of the detection test as dethat maximizes fined in (12). The attackers seek the noise pdf over the feasible set of (41), resulting in

(38)

(42)

Moreover,

The corresponding error exponent is obtained from (12) and (42) (43) (39)

Proof: The detector’s probability of error is given by (25), of (24) is the normalized volume of a spherical where cap and is increasing in . Hence,

and the supremum over is achieved by . Plugging the optimal value of and (24), we have

from (7) into

From (22), (23), and Shannon [17, p. 625], we have (44) Proposition 3: For the orthogonal constellations, under the averaging attack of (2) with isotropic noise, average-distortion constraint (17), and large-deviations constraint (19), the minimizer in (43) takes the form

where

and

. Moreover, (45)

(40)

The corresponding error exponent is obtained from (12) and (39) as

As was to be expected, the colluders can maximize the error probability of the detector by concentrating their noise power at the maximum radius allowed by the almost-sure constraint.

Proof: The coalition’s program is to maximize over the radial pdf subject to the two linear constraints of (41). By the fundamental theorem of linear programming, the with supremum of (42) is achieved by a mass distribution support at three or fewer points. Therefore, the optimal radial pdf for the coalition takes the form (46) . where The average-distortion constraint (17) and the large-deviations constraint (19), respectively, take the forms

C. Worst-Case Noise Under Large-Deviations Constraint We saw in Section IV-A that the colluders can launch a nefarious attack when they choose impulsive noise. This was allowed because the attackers are only limited by the average distortion constraint of (17). The probability of a large distortion vector is given by in (26) and is thus fairly significant. We now study the noise pdf design problem when the attackers are subject to the additional large-deviations constraint (19) on the magnitude of the noise vector. Let us denote the set of all noise pdfs satisfying the constraints (17) and (19) by ; then

(47) (48)

Similarly, the error probability (25) is given by (49) does not contribute to Note that any noise at radius probability of error as seen in (24) and only appears in the average-distortion constraint (17). From (24), nontrivial cases occur when . Rewrite (44) with as (50)

(41) • Case I:

for any

.

KIYAVASH AND MOULIN: PERFORMANCE OF ORTHOGONAL FINGERPRINTING CODES UNDER WORST-CASE NOISE

Since

, (48) implies that , we obtain from (49)

299

. Since (51)

• Case II: . Since , this implies . If , then does not contribute to the large deviation could potentially be as large as one. constraint (48), and , (48) implies that . But when Therefore, using (50) we obtain

(52)

(53) where

(54) . Substituting the bound

Fig. 3. Error exponent for 

= :02; :04 versus K , when 

= 1.

When , the error exponent is zero, which is in agree, the ment with (35). This is not surprising because as large-deviation constraint of (19) becomes inactive and the only remaining constraint is the average-noise constraint. It is also noteworthy that, for large , the exponent is asympwhich coincides with the exponent (36) for totic to we may thus say that Gaussian Gaussian noise. For any noise is essentially the worst noise, for large enough. V. DISCUSSION

into (54), we obtain

(55) Combining (49), (53), and (55), we obtain

(56) Finally, we show that the exponent is achievable. First, the choice , , and achieves the exponent . Second, the choice and achieves the exponent . Hence is achievable. Fig. 3 depicts the worst-case error exponent for and as a function of . It can be seen that when the number of colluders exceeds two and three, respectively, the worst-case exponent is equal to , and is achieved by the uniform distribution on the -sphere of . radius It is noteworthy that the exponent corresponds to the special case where (almost-sure distortion constraint): the colluders concentrate the noise at radius . For fixed , as stated in (45) and depicted in Fig. 3, the error exponent tends to as .

In this work, we assumed an averaging attack model followed by the addition of a noise vector independent of the input. We considered randomly rotated spherical fingerprints with an orthogonal prototype and a focused correlation detector. We first characterized the worst-case noise pdf under an average-noise power constraint. The worst noise is impulsive, and the performance of the detector is dramatically worse than that obtained under i.i.d. Gaussian noise. More precisely, instead of the exponential decay, the probability of error is proportional to as given by (27), where is the number of colluders. Second, we showed that under the almost-sure distortion constraint, the worst noise is uniformly distributed over a sphere whose radius is the maximum allowed by the constraint. Third, we derived the error exponents of the detection test when an average noise constraint and a large-deviation constraint are imposed on the noise distribution. Which of the three models is more relevant in practice? After all, a good mathematical model for attacks should reflect reality, be tractable, and allow comparisons of various code designs. At the same time, one cannot discount the possibility that the colluders will choose an attack that is outside the model. Our view is that, if the model is properly constructed, the colluders should include a significant cost for doing so. Here the cost is measured by mean-squared distortion. We now see that: 1) Under the average-distortion model, the colluders are able to dramatically affect detector performance—but at the expense of introducing a huge mean-squared distortion in their forgery. Such degradation may be unacceptable in

300

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009

practice, unless it can be done in a way that is perceptually tolerable (e.g., using cropping or geometric attacks on images). Here the colluders exploit a critical vulnerability of the system, that is, it was optimized relative to the mean-squared error criterion and not a perceptual criterion. Any countermeasure is likely to involve detectors that are far more complex than the simple correlation detector studied in this paper. 2) Under the almost-sure distortion model, the colluders are absolutely precluded from introducing any large mean-squared error distortion. Then our analysis reveals that strong detection performance is possible. For mod, the error erate-to-large values of , which is the probability behaves roughly as same behavior as under an i.i.d. white Gaussian noise . This is particularly attack with the same variance interesting because this attack has been widely assumed in multimedia fingerprinting practice, and so our results show that it is a good choice for the attackers in the moderate-to-large SNR regime. 3) The large-deviations model is a compromise between the two extremes given above. The tradeoff parameter controls the probability that the colluders will choose a very large distortion. The i.i.d. white Gaussian noise attack is feasible provided that . Finally, even though Propositions 1, 2, and 3 were proven for an orthogonal constellation, the same results hold when the fingerprints are drawn from a regular simplex prototype. Indeed, the only change in the derivations is that the optimal threshold for the detector is asymptotic to (7) instead of being equal to it for all . APPENDIX A IMPULSIVE RADIAL NOISE In the proof of Prop. 1, we claimed that the first impulsive component of the optimal radial pdf for the coalition is located . This claim is proved here. From the fundamental at theorem of linear programming [18] the radial pdf of the noise has support at two points (57) where

. Then (25) yields (58)

the coalition cannot improve We shall prove that when over in (27). We separately examine the cases and . • Case I: . From (24), and the only source of error is the noise at radius (assuming that ) and the probability of error is given by . The distortion constraint (17) takes the form (59) Therefore, when over the feasible set for

, the attackers maximize and subject to (59). For , in (59) is smaller than in the case

; hence the worst error probability over is achieved when . . • Case II: . — Case II.A: We shall consider two subcases where and subsequently. : In this case both and , and (50) implies that

Therefore, decays exponentially with , which is a worse choice for the colluders relative to (35). In this case, (50) implies that

Equation (59) implies that . Substituting and , we have . Therefore, and . Note that the first term on the right-hand side decays exponentially with . But as long as , the second term on the right-hand side decays as , which dominates . Therefore, the attackers would like to , which is independent of , maximize subject to (59). Similar to the case where , they can never do better than choosing . . — Case II.B: In this case, we have , which is not feasible because it violates the distortion constraint (59). APPENDIX B EXTREMUM OF PROBABILITY OF ERROR Lemma 2: The asymptotic upper bound on the error probaof (31) is maximized for . bility, is an exProof: As we saw in (33), tremum of . We have

KIYAVASH AND MOULIN: PERFORMANCE OF ORTHOGONAL FINGERPRINTING CODES UNDER WORST-CASE NOISE

(60) Note that in (60) is positive. Plugging in above we have

Therefore,

is a maximum of

in

.

REFERENCES [1] P. Moulin and J. O’Sullivan, “Information-theoretic analysis of information hiding,” IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563–593, Mar. 2003. [2] A. Somekh-Baruch and N. Merhav, “On the capacity game of private fingerprinting systems under collusion attacks,” IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 884–899, Mar. 2005. [3] A. Somekh-Baruch and N. Merhav, “Achievable error exponents for the private fingerprinting games,” IEEE Trans. Inf. Theory, vol. 53, no. 5, pp. 1827–1838, May 2007. [4] Y. Wang and P. Moulin, “Capacity and random-coding error exponent for public fingerprinting game,” in IEEE Int. Symp. Information Theory, Seattle, WA, Jul. 2006. [5] P. Moulin, “Universal fingerprinting: Capacity and random-coding exponents,” IEEE Trans. Inf. Theory, Available from arxiv:0801.3837v2 [cs.IT], submitted for publication. [6] Y. Wang and P. Moulin, “Capacity and optimal collusion attack channels for Gaussian fingerprinting games,” in Proc. IS&T/SPIE Sym. Electronic Imaging–Conf. Security, Steganography, and Watermarking Multimedia Content IX, San Jose, Jan. 2007. [7] P. Moulin, “Optimal Gaussian fingerprint decoders,” in IEEE Conf. Acoustics, Speech and Signal Processing (ICASSP), Taipei, Taiwan, 2009. [8] I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for images, audio, and video,” in IEEE Int. Conf. Image Processing (ICIP), 1996, pp. 243–246. [9] H. S. Stone, Analysis of Attacks on Image Watermarks With Randomized Coefficients NEC Research Institute, Tech. Rep. 96-045, 1996. [10] Z. Wang, M. Wu, H. Zhao, W. Trappe, and K. Liu, “Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation,” IEEE Trans. Image Process., vol. 14, no. 6, pp. 804–821, 2005. [11] N. Kiyavash and P. Moulin, “Regular simplex fingerprints and their optimality properties,” in Int. Workshop Digital Watermarking (IWDW), Siena, Italy, 2005, pp. 97–109.

301

[12] N. Kiyavash and P. Moulin, “A framework for optimizing nonlinear collusion attacks on fingerprinting systems,” in Conf. Information Sciences and Systems (CISS’06), Mar. 2006, pp. 1170–1175. [13] P. Moulin and N. Kiyavash, “Performance of random fingerprinting codes under arbitrary nonlinear attacks,” in IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 2007, vol. 2, pp. II-157–II-160. [14] N. Kiyavash, P. Moulin, and T. Kalker, “Regular simplex fingerprints and their optimality properties,” IEEE Trans. Inf. Forensics Security 10.1109/TIFS.2009.2025855. [15] J. M. Wozencraft and I. Jacobs, Principles of Communications Engineering. New York: Wiley, 1967. [16] H. Poor, An Introduction to Signal Detection and Estimation, 2nd ed. New York: Springer-Verlang, 1994. [17] C. Shannon, “Probability of error for optimal codes in a {G}aussian channel,” Bell Syst. Tech. J., vol. 38, no. 3, pp. 611–657, 1959. [18] D. L. Luenberger, Optimization by Vector Space Methods. New York: Wiley, 1969. Negar Kiyavash (S’06–M’06) received the Ph.D. degree in electrical and computer engineering from the University of Illinois at Urbana-Champaign, in 2006. From 2006 through 2008, she was a Research Faculty member with the Department of Computer Science and a Research Scientist at Information Trust Institute, both at the University of Illinois at UrbanaChampaign. Since 2009, she has been an Assistant Professor in the Department of Industrial and Enterprise Systems Engineering, a faculty member of the Coordinated Science Laboratory, and Affiliate Assistant Professor of the Department of Electrical and Computer Engineering at the University of Illinois at Urbana-Champaign. Her research interests are in information theory and statistical signal processing with applications to computer, communication, and multimedia security.

Pierre Moulin (S’89–M’90–SM’98–F’03) received the Ph.D. degree from Washington University, St. Louis, in 1990. In 1990, he joined Bell Communications Research, Morristown, NJ, as a Research Scientist. In 1996, he joined the University of Illinois at Urbana-Champaign, where he is currently Professor in the Department of Electrical and Computer Engineering, Research Professor at the Beckman Institute and the Coordinated Science Laboratory, Affiliate Professor in the Department of Statistics, and Sony Faculty Scholar. His fields of professional interest include image and video processing, compression, statistical signal processing and modeling, media security, decision theory, and information theory. Dr. Moulin has served on the editorial boards of the IEEE TRANSACTIONS ON INFORMATION THEORY and the IEEE TRANSACTIONS ON IMAGE PROCESSING. He currently serves on the editorial boards of the PROCEEDINGS OF IEEE and of Foundations and Trends in Signal Processing. He was cofounding Editor-inChief of the IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2005–2008), member of the IEEE Signal Processing Society Board of Governors (2005–2007), and has served IEEE in various other capacities. He received a 1997 Career award from the National Science Foundation and an IEEE Signal Processing Society 1997 Senior Best Paper award. He is also coauthor (with Juan Liu) of a paper that received an IEEE Signal Processing Society 2002 Young Author Best Paper award. He was 2003 Beckman Associate of UIUC’s Center for Advanced Study and plenary speaker for ICASSP 2006 and several other conferences.

Performance of Orthogonal Fingerprinting Codes Under ... - IEEE Xplore

Abstract—We study the effect of the noise distribution on the error probability of the detection test when a class of randomly ro- tated spherical fingerprints is used. The detection test is performed by a focused correlation detector, and the spherical codes studied here form a randomized orthogonal constellation. The colluders.

439KB Sizes 0 Downloads 287 Views

Recommend Documents

performance of random fingerprinting codes under ... - IEEE Xplore
University of Illinois at Urbana-Champaign, USA. ABSTRACT. This paper analyzes the performance of arbitrary nonlinear collu- sion attacks on random fingerprinting codes. We derive the error exponent of the fingerprinting system, which determines the

Fountain codes - IEEE Xplore
7 Richardson, T., Shokrollahi, M.A., and Urbanke, R.: 'Design of capacity-approaching irregular low-density parity check codes', IEEE. Trans. Inf. Theory, 2001 ...

Recovery of Sparse Signals Using Multiple Orthogonal ... - IEEE Xplore
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future ...

Providing Secrecy with Lattice Codes - IEEE Xplore
Wireless Communications and Networking Laboratory. Electrical Engineering Department. The Pennsylvania State University, University Park, PA 16802.

Support Recovery With Orthogonal Matching Pursuit in ... - IEEE Xplore
Nov 1, 2015 - Support Recovery With Orthogonal Matching Pursuit in the Presence of Noise. Jian Wang, Student Member, IEEE. Abstract—Support recovery ...

Implementation and performance evaluation of TeleMIP - IEEE Xplore
Implementation and Performance Evaluation of. TeleMIP. Kaushik Chakraborty, kauchaks @ glue.umd.edu. Department of Electrical and Computer Engineering,.

Optimizing Binary Fisher Codes for Visual Search - IEEE Xplore
The Institute of Digital Media, Peking University, Beijing, China. {zhew,lingyu,linjie,cjie,tjhuang,wgao}@pku.edu.cn. Fisher vectors (FV), a global representation obtained by aggregating local invari- ant features (e.g., SIFT), generates the state-of

Generalized quasi-cyclic low-density parity-check codes ... - IEEE Xplore
Email: {sd07501,hmatsui,smita}@toyota-ti.ac.jp. Abstract—In this study, we proved that several promising classes of codes based on finite geometries cannot be ...

overlapped quasi-arithmetic codes for distributed video ... - IEEE Xplore
The presence of correlated side information at the decoder is used to remove this ... Index Terms— Distributed video coding, Wyner-Ziv coding, coding with side ...

Delay-Optimal Burst Erasure Codes for Parallel Links - IEEE Xplore
Cisco Systems, 170 West Tasman Drive, San Jose, CA 95134, USA. Email: ∗{leeoz ... implications on the code design – erasure burst and link outage.

A Survey on Network Codes for Distributed Storage - IEEE Xplore
ABSTRACT | Distributed storage systems often introduce redundancy to increase reliability. When coding is used, the repair problem arises: if a node storing ...

Buffer-Aided Two-Way Relaying with Lattice Codes - IEEE Xplore
relaying with lattice codes to improve the sum-rate in asymmetric SNR two-way relay channels (TWRCs). Specifically, the relay can store some amount of data.

IEEE Photonics Technology - IEEE Xplore
Abstract—Due to the high beam divergence of standard laser diodes (LDs), these are not suitable for wavelength-selective feed- back without extra optical ...

wright layout - IEEE Xplore
tive specifications for voice over asynchronous transfer mode (VoATM) [2], voice over IP. (VoIP), and voice over frame relay (VoFR) [3]. Much has been written ...

Device Ensembles - IEEE Xplore
Dec 2, 2004 - time, the computer and consumer electronics indus- tries are defining ... tered on data synchronization between desktops and personal digital ...

wright layout - IEEE Xplore
ACCEPTED FROM OPEN CALL. INTRODUCTION. Two trends motivate this article: first, the growth of telecommunications industry interest in the implementation ...

Evolutionary Computation, IEEE Transactions on - IEEE Xplore
search strategy to a great number of habitats and prey distributions. We propose to synthesize a similar search strategy for the massively multimodal problems of ...

Improving the Packet Delivery Performance for ... - IEEE Xplore
Abstract—In this letter, we investigate the properties of packet collisions in IEEE 802.15.4-based wireless sensor networks when packets with the same content ...