Sphere Packing Lower Bound on Fingerprinting Error Probability Negar Kiyavash

Pierre Moulin

Coordinated Science Laboratory

Beckman Institute

Dept. of Electrical and Computer Engineering

Dept. of Electrical and Computer Engineering

University of Illinois at Urbana-Champaign

University of Illinois at Urbana-Champaign

[email protected]

[email protected]

ABSTRACT We study the statistical performance of spherical fingerprints for a focused detector which decides whether a user of interest is among the colluders. The colluders create a noise-free forgery by preprocessing their individual copies, and then adding a white Gaussian noise sequence to form the actual forgery. Let N be the codelength, M the number of users, and K the number of colluders. We derive a sphere packing lower bound on the error probability, valid for any triple (N, M, K) and any spherical fingerprinting code.

1. INTRODUCTION Digital fingerprinting schemes are devised for traitor tracing. In applications such as copyright protection, the goal is to deter users from illegally redistributing the digital content. Each user is provided with his own individually marked copy of the content. Although this makes it possible to trace an illegal copy to a traitor, it also allows for users to collude and form a stronger attack. For instance, the colluders may choose some (possibly nonlinear) mapping to estimate the original digital content and then add noise to create a forgery. An example of such attacks is order statistic attacks.1–3 The averaging plus noise attack that has been studied in numerous works3–5 is a example of such attacks. In our problem setup, the fingerprinting scheme is additive, and the fingerprints are chosen from an arbitrary spherical code. A spherical code is one in which the fingerprints are equienergetic. The ideal spherical code is the simplex code when M ≤ N + 1;4 however, when M > N + 1, no simple solution exists. The detector has access to the host signal (non-blind detection) and aims to verify whether a user of interest is colluding. The cost function in this problem is the detector’s worst case probability of error, over all possible coalitions and all possible nonlinear mappings. The main contribution of this paper is to derive a lower bound on the worst case probability of error under the general class of attacks composed of a noiseless forgery satisfying fairness and location-invariant conditions and independent and identically distributed (i.i.d.) Gaussian noise. Our approach is inspired by Shannon’s derivation of the sphere packing bound for the Gaussian channel6 and provides a fundamental performance bound valid for any spherical fingerprinting code. Throughout this paper, we use uppercase letters to denote random variables, lowercase for their individual values, boldface for sequences and vectors, and calligraphic fonts for sets. Mathematical expectation is denoted by the symbol E. The symbols f (N )  g(N ) and f (N ) ∼ g(N ) (asymptotic equality) mean that (N ) f (N ) limN →∞ fg(N ) = 0 and limN →∞ g(N ) = 1, respectively.

2. PROBLEM STATEMENT In this section we describe the mathematical setup of the problem, which is also diagrammed in Fig. 1.

Security, Steganography, and Watermarking of Multimedia Contents IX, edited by Edward J. Delp III, Ping Wah Wong, Proc. of SPIE-IS&T Electronic Imaging, SPIE Vol. 6505, 65050K, © 2007 SPIE-IS&T · 0277-786X/07/$18 SPIE-IS&T/ Vol. 6505 65050K-1

Signal S

fingerprints Q 1 X1 + Q2 X2 +

Attack Channel e

QK XK +

+

f (.)

Forgery Y

QM XM + Figure 1. The fingerprinting process and the attack channel.

2.1. Fingerprint Embedding The host is a sequence S = (S(1), . . . , S(N )) ∈ RN of signal samples or scalar features, viewed as deterministic but unknown to the colluders. Fingerprints are added to S, and the marked copies of the signal are distributed to M users. Specifically, user m is assigned a marked copy Xm = S + Qm

m ∈ {1, . . . , M },

where Qm denotes the fingerprint assigned to user m. The M fingerprints form a constellation in RN . The fingerprints are equienergetic, i.e., they lie on the  N -dimensional sphere with radius N Df , where Df is the embedding distortion per sample. Therefore Xm − S2 = Qm 2 = N Df ,

∀m.

We do not make any other assumption on the fingerprint constellation.

2.2. Attack Model Throughout this paper, we assume that the colluders know that the fingerprints are drawn from a spherical code but do not know their individual fingerprints. There are K colluders, forming a coalition K ⊆ {1, 2, . . . , M }. The attacks take the form Y = fN (XK ) + E

(1)

where XK is a shorthand for {Xk , k ∈ K}. The noise E represents an actual degradation of the signal. It is modeled as a length-N vector drawn from an i.i.d. Gaussian distribution with mean zero and variance σ 2 and is independent of the fingerprints {Qk }. The mean-squared distortion of the forgery Y relative to the host signal S is given by (2) EY − S2 = N Dc , where Dc is the average distortion per sample introduced by the coalition. As we shall see, our sphere packing bound is a function of N , the length of the host signal, M , the number of the fingerprints, and

SPIE-IS&T/ Vol. 6505 65050K-2

K, the number of colluders. We allow K to depend on N . Special cases of interest include a fixed number of colluders, and a number of colluders that grows with N according to a power law: K = N β . For the dependency of M on N , we assume that M grows subexponentially in N , i.e., the rate of the fingerprinting code tends to zero as N → ∞: ln M = 0. (3) lim N →∞ N We focus on the zero-rate regime because it encompasses practical parameter values of interest. In particular, M is upper bounded by the number of humans, so ln M < 23. The mapping fN : RN |K| → RN of (1) is symmetric in its arguments, i.e., any permutation of the index set K does not change the value of fN . We view f as a “noise-free forgery” (to which noise E is added to form the actual forgery, Y). This requirement represents a fairness condition: all members of the coalition incur equal risk. Another requirement of the mapping fN is that it satisfies the following location-invariance condition: (4) fN (XK ) = fN (QK ) + S. The order statistic attacks considered in1–3 satisfy both the above requirements. In this paper, we consider memoryless mappings only: fN (XK ) = {f (XK (1)), · · · , f (XK (N ))}, where f : RK → R. The detector aims at determining whether a certain user’s mark is present in the forgery Y. We shall call this detector focused, because it decides whether a particular user of interest is a colluder. It does not aim at identifying all colluders. The focused detector performs a binary hypothesis test which returns a guilty or not guilty verdict for the user it is focused on. Assume the detector is focused on user m and applies the detection rule δm : RN → {0, 1} to the centered data Y − S. Let H0 (m) denote the hypothesis that user m is innocent (m ∈ / K) and H1 (m) the hypothesis that he is guilty (m ∈ K). The possible error events are a false positive (falsely accusing m when he is innocent) and a false negative (declaring m innocent when he is guilty). The probability of these two events generally depends on the user m, detection rule δm , and the attack. We denote the false positive and false negative probabilities by PI (C, f, K, m) PII (C, f, K, m)

= P r[declare m is guilty|H0 (m)] (m ∈ / K) = P r[declare m is not guilty|H1 (m)] (m ∈ K).

(5) (6)

Our approach is to offer a guarantee of performance no matter which coalition was in effect. Therefore, we define the type I and type II error probabilities by PI (C, f )

 max max PI (C, f, K, m)

(7)

PII (C, f )

 max max PII (C, f, K, m).

(8)

K K

m∈K /

m∈K

Assuming equal priors on the guilt of user m, we define the overall error as Pe (C, f ) =

1 1 PI (C, f ) + PII (C, f ). 2 2

(9)

3. SPHERE PACKING BOUND We would like to derive a lower bound on the worst case probability of error for attacks of Section 2.2 for a coalition of size at most equal to K. To do so, it suffices to fix f . We choose the uniform averaging mapping, f (XK ) =

1  Xk , K k∈K

SPIE-IS&T/ Vol. 6505 65050K-3

which is the most damaging mapping in terms of the random-coding error exponent.7 ∞ Denote by Q(x) = x (2π)−1/2 exp{−u2 /2} du the tail probability of a normal random variable. Theorem 3.1. For any code C and any value of N, M, K, the error probability Pe (C, f ) is at least equal to ⎞ ⎛  M N Df M −1 ⎠ (10) Pe (N, M, K)  Q ⎝  2σ K(K − 1) We refer to this quantity as the sphere packing lower bound on error probability for the Gaussian fingerprinting problem. For M √



N , K(K−1)

we have the asymptotic equality Pe (N, M, K) ∼ Q

 N Df  2σ K(K − 1)

as N → ∞,

which holds no matter how large M is. A key element in the proof of Theorem 3.1 is a technique used by Shannon [6, Sec. 12] to derive the sphere-packing bound for the AWGN channel at low transmission rates. Shannon derived an upper bound 2 d2ub on the average squared distance d between codewords, from which he concluded there is at least one pair of codewords whose squared distance is less than or equal to d2ub . The error probability can then be lower bounded by Q(dub /(2σ)). In the fingerprinting problem, we may think of a supercodebook C ∗ whose elements are of the form k∈K Qk . The number of elements of the supercodebook is equal to the number of possible coalitions of size i = 2, 3, · · · , K, i.e.,

K  M ∗ |C | = i 1 K

i=2

There are two hypotheses when testing a user m: either m is part of the coalition or it is not. Recalling from (8) that error probability is defined in terms of worst-case coalitions, we seek the coalitions that are most easily confused. Let L be a coalition of size L that includes m and J a coalition of size J that does not include m. Denote by ν ≤ min(L, J) the size of the intersection of L and J . Moreover, since L and J differ by at least one element (m), we must have ν ≤ L − 1 if L = J. Forgeries created by coalitions L and J take the form ⎡ ⎤   1 ⎣ Qk = Qk + Qk ⎦ F1m = L1 L k∈L k∈L∩J k∈L\J ⎡ ⎤   1 ⎣ F0m = J1 Qk = Qk + Qk ⎦ L k∈J k∈L∩J

m∈L

m∈ / J.

(11)

k∈J \L

We consider all possible pairs of coalitions parameterized by L, J, ν and seek the average squared distance 2 d (L, J, ν) between forgeries created by such pairs of coalitions. We establish the following upper bound: 2

d (L, J, ν) ≤

(J + L − 2ν)N Df M . JL M −1

SPIE-IS&T/ Vol. 6505 65050K-4

(12)

Observe that J + L − 2ν ≥ 1, with equality when L = K and J = ν = K − 1. These turn out to be the parameter values that minimize the upper bound in (12). We have 2

min d (L, J, ν) ≤ d2ub 

L,J,ν

M N Df . K(K − 1) M − 1

(13)

That is, confusion is maximized when L has maximal size K and J includes all elements of L except for user m. At this point, we invoke a variation of Shannon’s argument in [6, p. 647]. If the average squared distance over all such pairs of forgeries is upper bounded by d2ub , there must exist some forgery pair (F1m , F0m ) for which the upper bound holds. The best detection rule for this pair would be a hyperplane normal to the straight line segment joining the pair. Given the noise distribution is Gaussian, the error probability for this forgery pair is at least Q (dub /(2σ)). Therefore, we can lower bound the overall error probability Pe (C) by (10):

dub Pe (N, M, K) = Q , 2σ and Pe (C) only vanishes in the regime where K(K − 1)  N , i.e., β < 12 . We now derive the inequality (12). To this end, we use the following lemma, whose proof follows from Lemma 1 in.4 N Lemma 3.2. Let {Qm }M with energy m=1 denote the M equienergetic codewords from a constellation in R N Df . Then  1 −N Df , QTj Q ≥ M (M − 1) j M −1 =j

with equality if M ≤ N + 1 and the constellation is a simplex. The distance between the two forgeries of (11) is given by    1   1   F1m − F0m  =  Qk − Qk   L J k∈L k∈J    

  1   1 1 1  =  − Q + Q − Q k k k L  L J J  k∈L\J  k∈L∩J k∈J \L

(14)

where |L \ J | = L − ν,

|L ∩ J | = ν,

|J \ L| = J − ν.

Denote by Avg(v(L, J )) the average of a quantity v(L, J ) over all possible pairs of coalitions (L, J ) with

SPIE-IS&T/ Vol. 6505 65050K-5

parameters L, J, ν. We obtain 2

d (L, J, ν)

  = Avg F1m − F0m 2 ⎞ ⎛    1 J −L 1 = Avg ⎝ Qk + Qk − Qk 2 ⎠ L JL J k∈L∩J k∈L\J k∈J \L ⎞ ⎞ ⎛ ⎛



2    J −L 1 1 = Avg ⎝ Qk 2 ⎠ + Avg  Qk 2 + 2 Avg ⎝ Qk 2 ⎠ L2 JL J k∈L∩J k∈L\J k∈J \L ⎛⎛ ⎛⎛ ⎞ ⎞T ⎞T ⎛ ⎞⎞

  J −L 2 ⎜  ⎜  ⎟ ⎟ +2 2 Avg ⎝⎝ Avg ⎝⎝ Qk ⎠ Qk ⎠ − Qk ⎠ ⎝ Qk ⎠⎠ L J JL ⎛

k∈L\J

k∈L∩J

T ⎛

⎞⎞

k∈L\J

k∈J \L

  J −L ⎝ ⎝ Avg Q Qk ⎠⎠ k LJ 2 k∈L∩J k∈J \L ⎞ ⎞ ⎛ ⎛



2    J − L 1 1 Avg ⎝ Qk 2 ⎠ + Avg Qk 2 + 2 Avg ⎝ Qk 2 ⎠ L2 JL J k∈L∩J k∈L\J k∈J \L  

2   J −L (L − ν)(L − ν − 1) (J − ν)(J − ν − 1) + + ν(ν − 1) + Avgk=l QTk Ql 2 2 L LJ J     (J − L)(L − ν)ν (L − ν)(J − ν) (J − L)ν(J − ν) +2 − − Avgk=l QTk Ql L2 J JL LJ 2 J 2 (L − ν) + (J − L)2 ν + L2 (J − ν) N Df J 2 L2   J(J − L)(L − ν)ν − JL(L − ν)(J − ν) − L(J − L)ν(J − ν) − Avgk=l QTk Ql 2 2 J L   J + L − 2ν J + L − 2ν N Df − Avgk=l QTk Ql JL JL

J + L − 2ν 1 (15) 1+ N Df , JL M −1 −2

=

=

= ≤

where we obtain the inequality by first noting that J + L − 2ν > 0 and then by application of Lemma 3.2. This establishes (12) and therefore concludes the proof. 

4. ACKNOWLEDGEMENTS This work was supported by NSF under grants CCR 03-25924 and CCF 06-35137.

5. DISCUSSION We have derived a sphere packing lower bound on error probability for spherical fingerprints and identified a regime, namely N K(K − 1), where this lower bound on the error probability vanishes. When the number of fingerprints M ≤ N + 1, simplex fingerprints achieve the sphere packing lower bound.4

SPIE-IS&T/ Vol. 6505 65050K-6

REFERENCES 1. H. S. Stone, “Analysis of attacks on image watermarks with randomized coefficients,” Tech. Rep. 96-045, NEC Research Institute , 1996. 2. N. Kiyavash and P. Moulin, “A framework for optimizing nonlinear collusion attacks on fingerprinting systems,” Conference on Information Sciences and Systems, CISS’06 , March 2006. 3. Z. Wang, M. Wu, H. Zhao, W. Trappe, and K. Liu, “Collusion resistance of multimedia fingerprinting using orthogonal modulation,” IEEE Trans. on Image Proc. 14(6), pp. 804–821, 2005. 4. N. Kiyavash and P. Moulin, “Regular simplex fingerprints and their optimality properties.,” in International Workshop on Digital Watermarking, IWDW, pp. 97–109, (Siena, Italy), Sep. 2005. 5. N. Kiyavash and P. Moulin, “On optimal collusion strategies for fingerprinting.,” in IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP), (Toulouse, France), 2006. 6. C. Shannon, “Probability of error for optimal codes in a Gaussian channel,” Bell System Technical Journal 38(3), pp. 611–657, 1959. 7. P. Moulin and N. Kiyavash, “Performance of random fingerprinting codes under arbitrary nonlinear attacks,” to appear in IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP), (Honolulu, Hawaii, USA) , 2007.

SPIE-IS&T/ Vol. 6505 65050K-7

Sphere Packing Lower Bound on Fingerprinting Error ...

Dept. of Electrical and Computer Engineering. Dept. of Electrical and .... coalition of size at most equal to K. To do so, it suffices to fix f. We choose the uniform ...

153KB Sizes 1 Downloads 229 Views

Recommend Documents

Improved Tangential Sphere Bound on the ML ...
[2] in 1993, Repeat-Accumulate (RA) codes of. Divsalar et al. [3], and Low ... to be used with Binary Phase-Shift Keying (BPSK) modula- tion. The resulting signal ...

Synchronized Blitz: A Lower Bound on the Forwarding ...
synchronization and its effect on the forwarding rate of a switch. We then present the ... Illustration of the Synchronized Blitz: (a) When the test starts, packet from port i is ... At the beginning of the mesh test, a packet. Synchronized Blitz: A

A tight unconditional lower bound on distributed ...
To the best of our ... †Supported in part by the following grants: Nanyang Tech- nological University ..... follow from the construction of G(Γ, κ, Λ) described in Sec-.

The Expansionary Lower Bound: Contractionary ...
t = Gt = 0, and we also rule out balance-sheet policies by the central bank, Rt = Xt = NCB t. = 0. The role of fiscal policy and balance-sheet operations will be analyzed in section []. Finally, we set the price levels, the time-2 money supply, and t

Nonlinear Adventures at the Zero Lower Bound
May 18, 2015 - JEL classification numbers: E30, E50, E60. ∗We thank Klaus ... Instead, nonlinearities make their effect grow exponentially. This is important,.

Endogenous volatility at the zero lower bound
Framework. Small non-linear business cycle model with price adjustment costs and ..... Speech at the Federal Reserve Conference on Key Developments in.

An Optimal Lower Bound for Anonymous Scheduling Mechanisms
Mu'alem and Schapira [12] ...... each job independently using some non-affine-maximizer mechanism for single-dimensional domains. (those are abundant).

Zero Lower Bound Government Spending Multipliers ...
Jan 10, 2018 - change in the fiscal experiment that accounts for the large changes in government spending multipliers. 1 ... Firms face quadratic price adjustment cost following Rotemberg (1982). Their optimal pricing behavior yields ... The model ca

Nonlinear adventures at the zero lower bound - Semantic Scholar
Jun 11, 2015 - consumption, inflation, and the one auxiliary variable. The Smolyak .... t has a recursive structure in two auxiliary variables x1;t and x2;t that satisfy εx1;t ¼ рεА1Юx2;t and have laws of ...... We start at the unconditional me

Market Reforms at the Zero Lower Bound - Giuseppe Fiori
Aug 3, 2017 - Reforms Conference, the European Central Bank, the European Commission, the International ...... With an open capital account, increased.

On the Lower Bound of Local Optimums in K-Means ...
Then R(M, ∆) is a maximum region if f(∆) > 0. ... Theorem 3 Given a positive ∆ satisfying f(∆) > 0, if k- ..... grams were compiled with gcc 3.4.3 in Linux system.

An Optimal Lower Bound for Anonymous Scheduling Mechanisms
scheduling algorithms are anonymous, and all state-of-the-art mechanisms ..... Figure 1: An illustration of an instance that is a ({1, ..., j},i)-projection of t, as in Def.

Nonlinear adventures at the zero lower bound - University of ...
Ms. р6Ю for Ms >0. When Ms is 0, we say c. PrрfRt ¼ 1gjRt А1;sЮ ¼ 0. Table 1 reports the values of Eq. (6) for s from 1 to 10. The probability of being at the ZLB for at least one extra period increases from 44 percent conditional on having be

Market Reforms at the Zero Lower Bound - Giuseppe Fiori
Aug 3, 2017 - URL: http://www.hec.ca/en/profs/matteo.cacciatore.html. ..... monopolistically competitive firms purchase intermediate inputs and produce ...

Slow recoveries, worker heterogeneity, and the zero lower bound
This compositional effect lowers the expected surplus for firms of creating new jobs. Compared to a ...... in logs relative to cyclical peak. Source: Haver analytics.

Exchange Rate Policies at the Zero Lower Bound
rates, deviations from interest rate parity, capital inflows, and welfare costs associated with the accumulation of .... of capital inflows, it faces a trade-off between reducing the losses associated to foreign exchange interventions and ...... gold

Imperfect Credibility and the Zero Lower Bound on the ...
This illustration of the time-inconsistency problem should not be confused with a .... draw connections to credibility and forecast targeting at different times. .... in 2009, the Riksbank argued in April 2009 that 50 basis point would be the lowest 

An Optimal Lower Bound for Anonymous Scheduling Mechanisms
An easy observation made by [13] is that the well-known VCG mechanism ... of at most m times the optimal makespan, while making it the dominant strategy ..... Figure 1: An illustration of an instance that is a ({1, ..., j},i)-projection of t, as in D

Supply-Side Policies and the Zero Lower Bound
Mar 10, 2014 - Since the ZLB correlates in the data with low inflation, we study .... to incorporate an explicit ZLB to measure how big the potential impact from ... Licensing Requirements: Analyzing Wages and Prices for a Medical Service.

Government Debt, the Zero Lower Bound and Monetary ...
Sep 4, 2012 - mon nominal wage is denoted by Wt. Further, j t are the share of profits of intermediate goods producers that go to generation j. Moreover, t-1.

Generalized discrepancies on the sphere
2 Department of Quantitative Methods, School of Economics and Business Management, Universidad de Navarra, Pamplona,. Spain. Generalized discrepancies ...

Julio A. Carrillo, Céline Poilly Investigating the Zero Lower Bound on ...
Oct 5, 2010 - and the representative financial intermediary (lender): the lender pays a monitoring cost to observe the individual defaulted entrepreneurOs realized return, while borrowers observe it for free. This results in an increasing relationshi

Julio A. Carrillo, Céline Poilly Investigating the Zero Lower Bound on ...
Oct 5, 2010 - preference shock which follows an autorregressive process of the form. %'"t e %'"t e,t where e. , and e,t iid e . The first order conditions with respect to $t ..... of the whole system and is solved using the AIM implementation (see An