+ All Categories
Home > Documents > Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie...

Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie...

Date post: 16-Apr-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
64
Multimedia Forensics for Traitors Tracing Multimedia Forensics for Traitors Tracing K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland, College Park Acknowledgement: Wade Trappe, Z. Jane Wang, Min Wu, and Hong Zhao. Multimedia Forensics for Traitors Tracing
Transcript
Page 1: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Multimedia Forensics for Traitors TracingMultimedia Forensics for Traitors Tracing

K. J. Ray Liu

Department of Electrical and Computer EngineeringUniversity of Maryland, College Park

Acknowledgement: Wade Trappe, Z. Jane Wang, Min Wu, and Hong Zhao.

Multimedia Forensics for Traitors Tracing

Page 2: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Talk OverviewTalk Overview

Multimedia Forensics for Traitors Tracing 2

Digital Fingerprinting and Traitors Tracing– Motivation of digital fingerprinting– Background: e.g. additive spread spectrum embedding

– Collusion attacks: collusion schemes, analysis and comparison

Orthogonal Fingerprinting and variations– Capacity of tracing colluders by using orthogonal modulation– Group-oriented fingerprinting

Coded Fingerprinting– Anti-collusion codes and code modulated fingerprints– Colluder identification schemes

Traitors Behavior Dynamics in Collusion

Page 3: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Multimedia Forensics for Traitors Tracing 3

Digital Fingerprinting and Traitors TracingDigital Fingerprinting and Traitors Tracing

Page 4: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Multimedia Forensics for Traitors Tracing 4

Digital Fingerprinting and Tracing TraitorsDigital Fingerprinting and Tracing Traitors

Leak of information as well as alteration and repackaging poses serious threats to government operations and commercial markets – e.g., pirated content or

classified document

Promising countermeasure:robustly embed digital fingerprints– Insert ID or “fingerprint” (often through conventional watermarking)

to identify each user– Purpose: deter information leakage; digital rights management(DRM)– Challenge: imperceptibility, robustness, tracing capability

studio

The Lord ofthe Ring

Alice

Bob

Carl

w1

w2

w3

SellSell

Page 5: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Case Study: Tracing Movie Screening CopiesCase Study: Tracing Movie Screening Copies

Multimedia Forensics for Traitors Tracing 5

Potential civilian use for digital rights management (DRM)Copyright industry – $500+ Billion business ~ 5% U.S. GDP

Alleged Movie Pirate Arrested (23 January 2004)– A real case of a successful deployment of 'traitor-tracing'

mechanism in the digital realm– Use invisible fingerprints to protect screener copies of pre-release

movies

Carmine Caridi Russell friends … Internetw1Last Samurai

Hollywood studio traced pirated version

http://www.msnbc.msn.com/id/4037016/

Page 6: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Embedded Fingerprinting for MultimediaEmbedded Fingerprinting for Multimedia

Multimedia Forensics for Traitors Tracing 6

embedembedDigital Fingerprint

Multimedia Document

101101 …101101 …

Customer’s ID: Alice

Distribute to Alice

Fingerprinted CopyFingerprinted Copy

embedembedDigital Fingerprint

Multimedia Document

101101 …101101 …

Customer’s ID: Alice

Distribute to Alice

Fingerprinted CopyFingerprinted Copy

Collusion Attack Collusion Attack (to remove fingerprints)(to remove fingerprints)

AliceAlice

BobBob

Colluded CopyColluded Copy

Unauthorized Unauthorized rere--distributiondistribution

Fingerprinted docfor different users

Collusion Attack Collusion Attack (to remove fingerprints)(to remove fingerprints)

AliceAlice

BobBob

Colluded CopyColluded Copy

Unauthorized Unauthorized rere--distributiondistribution

Fingerprinted docfor different users

Extract Extract FingerprintsFingerprints

Suspicious Suspicious CopyCopy

101110 …101110 …

Codebook

Alice, Bob, …

Identify Identify TraitorsTraitors

Extract Extract FingerprintsFingerprints

Suspicious Suspicious CopyCopy

101110 …101110 …

Codebook

Alice, Bob, …

Identify Identify TraitorsTraitors

Embedded Finger-printing

Multi-user Attacks

Traitor Tracing

Page 7: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

ModelModel

Multimedia Forensics for Traitors Tracing 7

Original Image x

Embed

Embed

Embed

Embed

Embed

Watermarked Images

Additive

Noise

Attacked

Image

1s

Ks

1+Ks

ns

1y

2X

KX

1+KX

MX

d

Collusion

Detection

Detection

Detection

Detection

Detection

x

x

x

x

x

y

2s

1s

2s

Ks

1+Ks

ns

Page 8: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Multimedia Forensics for Traitors Tracing 8

Modulation Scheme for Embedded FingerprintingModulation Scheme for Embedded Fingerprinting

Typical watermark-to-noise (WNR) ratio: -20dB in blind detection, 0dB in non-blind detection.

Choice of modulation schemes:

Orthogonal modulation

(Binary) coded modulation

for or

jj us =

∑=

=v

iiijj b

1us

{ }1,0b ij ∈ { }1bij ±∈

# of fingerprints= # of ortho. bases

# of fingerprints >> # of ortho. bases

Page 9: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Performance CriteriaPerformance Criteria

Multimedia Forensics for Traitors Tracing 9

Capture one: The major concern is to identify at least one colluder with high confidence without accusing innocent users.

Capture more: The major concern is to catch more colluders, possibly at a cost of accusing more innocents. Tradeoff between the expected fraction of colluders that are successfully captured and the expected fraction of innocent users that are falsely placed under suspicion.

Capture all: The goal is to capture all colluders with a high probability. Tradeoff between the efficiency rate which describes the amount of expected innocents accused per colluder and the probability of capturing all colluders.

Page 10: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Collusion Attacks by Multiple UsersCollusion Attacks by Multiple Users

Multimedia Forensics for Traitors Tracing 10

. . .

Averaging Attack Interleaving Attack

Collusion: A cost-effective attack against multimedia fingerprintsResult of fair collusion: – Each colluder contributes equal share through averaging, interleaving,

and nonlinear combining– Energy of embedded fingerprints may decrease

Page 11: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Collusion Attacks (contCollusion Attacks (cont’’d)d)

Multimedia Forensics for Traitors Tracing 11

Though linear collusion is simple and effective, in fact, for each component, the colluders can output any value between the minimum and maximum values, and have high confidence that such spurious value is within the range of JND. Therefore,

We conduct studies on non-linear attacks

– Few previous works: H. Stone suggested several nonlinear collusion attacks

What is the best attack for collusions?

Page 12: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Nonlinear Collusion AttacksNonlinear Collusion Attacks

Multimedia Forensics for Traitors Tracing 12

Collusion AttacksCollusion Attacks

yyii11

yyiKiK

Colluded Copy Colluded Copy yy

Redistribute Redistribute ContentContent

( )min max

min max min max

mod min max

min

max

( ) ; ( ) ; ( ) ; ( )

( ) ( ) , ( )

( ) ( ) ( ) ( )

( ) w .p. ( )

( ) w .p. 1

ave median

neg med

randneg

V i V i V i V i

V i average V i V i

V i V i V i V i

V i pV i

V i p

=

= + −

⎧= ⎨

−⎩

Assumption– Colluders pick value in the range

of min and max of – FP embedding and collusion

attack are in the same domain

Order statistics based collusion: for each component i, i=1,…,N,

CSjj iy ∈)}({

p=0.5 in randomized negative attack and is indep. of {s(i)}

CSjj isgiJNDixiy ∈⋅⋅+= ))(()()()( α

Page 13: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Example: use Example: use TTnn StatisticStatistic

Multimedia Forensics for Traitors Tracing 13

– Assume the host signal has N=10,000 embeddable coefficients and there are a total of n=100 users. Pfp=10-3 is fixed and i.i.d. fingerprints ~N(0,1/9).

– Randomized negative attack is the most effective attack (without normalizing the distortion level introduced by different attacks).

– Minimum, maximum and randomized negative attacks introduce much larger distortion in the colluded copy

Page 14: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Averaging and Nonlinear Collusions (contAveraging and Nonlinear Collusions (cont’’d)d)

Multimedia Forensics for Traitors Tracing 14

Thresholding detector is robust to different types of attacks:averaging collusion; order-statistic based (min, max, …)

Rationale from detector’s view pointDetection statistics of averaging and many nonlinear collusions are (approx.) Gaussian distributions with same mean

=> Yield similar performance if the overall distortion is the same.

1

2

( , )

1

c

j c

jj S

g j S

K ∈

∈ +

= +∑

s d

s d

nonlinear attacks

average attacks

Page 15: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Linear vs. Nonlinear CollusionLinear vs. Nonlinear Collusion

Multimedia Forensics for Traitors Tracing 15

• Conditions: - distortion introduced to the host signal is equal• Observation: the underline model of attacks doesn’t matter much

from the detector point of view.• All types of attacks can be modeled as attacks by averaging: the

models

yield similar performance. The detector is robust to different types of attacks.

1 1

2 2

( , )

1

c

j c

jj S

g j S

K ∈

= ∈ +

= +∑

y s d

y s d

nonlinear attacks

average attacks

We shall focus on average attack for analysis simplicity

Page 16: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Average Attack

Multimedia Forensics for Traitors Tracing 16

1 1

c c

j jj S j SK K∈ ∈

= + = +∑ ∑y y z s d2

2 2

( ) ~ (0, ), for 1,..., .,

: || || / || ||

j j

d

j k

d i N i Nj k

WNR

σ

η

= +

=

⊥ ∀ ≠

=

y s x

s s

s d

Problem: determine the number of colluders K and the subset Sc

Page 17: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Talk OverviewTalk Overview

Multimedia Forensics for Traitors Tracing 17

Digital Fingerprinting and Traitor Tracing– Motivation of DF– Background introduction: e.g. additive spread spectrum embedding

– Collusion attacks: how to colluder, analysis and comparison

Orthogonal Fingerprinting and variations– Capacity of tracing colluders by using orthogonal modulation– Group-oriented fingerprinting

Coded Fingerprinting– Anti-collusion codes and code modulated fingerprints– Colluder identification schemes

Summary

Page 18: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Multimedia Forensics for Traitors Tracing 18

Orthogonal Modulation for FingerprintingOrthogonal Modulation for Fingerprinting

Page 19: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Orthogonal FingerprintingOrthogonal Fingerprinting

Multimedia Forensics for Traitors Tracing 19

Straightforward concept and easy to implement– Prior works by Cox et al., Stone, Killian et al.– Advantage in distinguishing individual fingerprints

Two issues limit the anti-collusion capability:– Orthogonal fingerprints get attenuated with more colluders

leads to reduced detection statistics corresponding to colluders

– Probability of false alarm increases as the total # of users increases

Tracing Capability: How many colluders out of how many users are sufficient to break down a fingerprinting system?To meet desired probability of detection (Pd) & false alarm (Pfp)– We can analyze the maximum allowable colluders

=> This provides design guidelines to fingerprinting systems forapplications with different protection requirements

Page 20: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Formulations for Max. Number of ColludersFormulations for Max. Number of Colluders

Multimedia Forensics for Traitors Tracing 20

Thresholding detector: (index of colluders)

Performance criteria:(Catch one: )

System requirement:

– The desired Pfp determines the threshold for the detector– The desired Pd determines the maximum # of colluders allowed by

the fingerprinting system

1,..,ˆ arg max{ ( ) }Nj n

T j h=

= ≥j

ˆ{ } 1 (1 ( / ))

|| || /ˆ{ } 1 (1 ( ))

n Kfp r c d

Kd r c

d

P P S Q h

h s KP P S Q

σ

σ

−= ∩ ≠ ∅ = − −

−= ∩ ≠ ∅ = − −

j

j

fp

d

P

P

ε

β

≥maxK

Page 21: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Bounds for Max. Number of ColludersBounds for Max. Number of Colluders

Multimedia Forensics for Traitors Tracing 21

Lower bound and Upper bound for Kmax

– Obtained by analytic approximations on Q-functions

– two auxiliary variables are defined as

max 2 2 2

max 1

min{ , }, where log( /(2 log(2 )))

min{ , }, where (1 1 )

L LH

H H KL

N NK n K Kh n n

NK n K K

h Q

η ηπε π

ηβ−

≥ = =

≤ =− − −

~log( )

Nn

η

2

1

log(2 )

(1 1 )

L

nL

h n

NK

h Q

π

ηβ−

=

=− − −

Page 22: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

ResultsResults

Multimedia Forensics for Traitors Tracing 22

– Stringent requirement: correct identification of at least one colluders without falsely accusing any

– The colluder tracing capabilities for a thousand-user system is limited to several dozens colluders

Page 23: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Different Performance CriteriaDifferent Performance Criteria

Multimedia Forensics for Traitors Tracing 23

Catch more

Catch all

Different sets of performance criteria were studied. It seems that an orthogonal fingerprinting system can resist to the collusion attacks based on a few dozen independent copies.

the expected fraction of innocents falsely suspected: ( / )|| || /the expected fraction of colluders successfully captured: ( )

i d

cd

r Q hh Kr Q

σ

σ

=−

=s

the expected number of innocents captured the expected number of colluders captured

ˆ( )d r c

R

P P S

=

= ⊆ j

Page 24: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

GroupGroup--Oriented ForensicsOriented Forensics

Multimedia Forensics for Traitors Tracing 24

Overcome the limitations of orthogonal fingerprinting– Recall: orthogonal FP treats everybody equally

Colluders often come together in some foreseeable groups– Due to their geographic, social, or other connections

Our approach: design users’ FP in a correlated way– Cluster users into groups based on prior knowledge

Intra-group collusion is more likely than inter-group

Design of collusion-resistant fingerprinting systems: – Design of anti-collusion fingerprints to trace traitors and colluders– Design of detection schemes

Page 25: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Proposed Group FingerprintingProposed Group Fingerprinting

Multimedia Forensics for Traitors Tracing 25

Design of collusion-resistant fingerprinting systems: Design of anti-collusion fingerprints to trace traitors and colludersDesign of detection schemes

Solution: construct intra-group FP in two parts, and use threshold detector (at desired intra-group false alarm) to avoid estimating ki

||||energy equal ;,,...,1for ),,0(~)( 2

sss

xsy

liNiNid

lmij

d

ijij

≠∀⊥=

+=

σ

Page 26: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Group Fingerprint DesignGroup Fingerprint Design

Multimedia Forensics for Traitors Tracing 26

Orthogonal modulation between groups– Design L orthogonal sub-systems to represent independent groups– M users per group => Total: n = M x L users

Assumption: users in the same group are equally likely to collude with each other.Real-valued code modulation within a group– Introduce equal correlation within a group

– Each fingerprint consists of common one and individual one:

1, 2

,

[ ,..., ]the correlation matrix of { } is

i i iM

i j s

=S s s ss R

11

1

s

ρ ρρ

ρρ ρ

⎡ ⎤⎢ ⎥⎢ ⎥=⎢ ⎥⎢ ⎥⎣ ⎦

R

),0( ~},,...,{ where,1 21 NuiiMiiijij Niid Iaeeaes σρρ +−=

Page 27: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

TwoTwo--Stage Detection SchemeStage Detection Scheme

Multimedia Forensics for Traitors Tracing 27

Basic idea: first identify groups containing colluders, then identify colluders with each possible guilty group

Stage-1: group detection

})({argi 1 GGLi hiT ≥= =

(the indices of groups)

MMr

rsKkN

kNkKiTp

LiMMM

iT

di

id

diG

iMiiT

G

/])1(1[

o.w.),,||||(

0 if),,0()},{,|)((

,...,1for ,)([||||

)...()()( correlator the

2

2

2

2221

ρ

σ

σσ

ρ

−+=

⎪⎩

⎪⎨⎧ =

=

=−+

+++−=

ssssxy

Page 28: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

TwoTwo--Stage Detection Scheme (contStage Detection Scheme (cont’’d)d)

Multimedia Forensics for Traitors Tracing 28

Stage-2: Identify colluders within each group

1 ( )Define the correlator: ( ) , for 1,...,

|| ||

Tij

eiT j i Lρ− −

= =y x es

(the indices of colluders within group i )})({argj 1i hjTei

Mj ≥= =

h does not depend on i

⎪⎩

⎪⎨⎧ ∈−

=

=

o.w.,0

S if||,||1)(with

),,(),,|(

ci

22

jKj

NSKp

ei

Mdeidciei

s

IµTρ

µ

σσ

Tei(j)’s are independent

Page 29: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Example:Example:

Multimedia Forensics for Traitors Tracing 29

ROC Curves Pd vs. Pfp under different collusion settingsConstraint: equal energy 22

02 ||||}||{||}||{|| syy ≡= EE c

Page 30: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Collusion Resistance of Group FP: Collusion Resistance of Group FP: Kmax vs. n

Multimedia Forensics for Traitors Tracing 30

Kmax of the proposed scheme is larger than that of the orthogonal scheme (the solid line), when n is large. Difference between the lower bound and upper bound is due to the fact that ki=K/| i| in our simulations (symmetric collusion pattern). The smaller the number of guilty groups, the better chance performance.

310

0.8fp

d

P

P

−≤

Orth.

Group: upper bound

Page 31: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Extension: TreeExtension: Tree--based Fingerprint Designbased Fingerprint Design

Multimedia Forensics for Traitors Tracing 31

Use tree structure to construct fingerprints combining shared and distinct componentsUnified view of fingerprint construction using code modulation– With hierarchically organized basis vectors – Allow for real-valued codes

a1 a2

a11a12 a21 a22

a111 a112 a113a121 a122 a123 a211 a212 a213 a221 a222 a223

s111 s112 s113s121 s122 s123 s211 s212 s213 s221 s222 s223

i1i2 i3 i4

Page 32: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Talk OverviewTalk Overview

Multimedia Forensics for Traitors Tracing 32

Digital Fingerprinting and Traitor Tracing– Motivation of DF– Background introduction: e.g. additive spread spectrum embedding

– Collusion attacks: how to colluder, analysis and comparison

Orthogonal Fingerprinting and variations– Capacity of tracing colluders by using orthogonal modulation– Group-oriented fingerprinting

Coded Fingerprinting– Anti-collusion codes (ACC) and code modulated fingerprints– Colluder identification schemes

Summary

Page 33: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Multimedia Forensics for Traitors Tracing 33

Coded Modulation for FingerprintingCoded Modulation for Fingerprinting

Page 34: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Coded Fingerprinting: Prior Work and New IssuesCoded Fingerprinting: Prior Work and New Issues

Multimedia Forensics for Traitors Tracing 34

Collusion-secure codes by Boneh and Shaw ’98– Targeted at generic data with “Marking assumptions”

~ an abstraction of collusion model

– Codes are too long to be reliably embedded & extracted (Su et al.) ~ millions bits for 1000 users

– Focus on tracing one of the colluders

New issues with multimedia– “Marking assumptions” may no longer hold …– Some code bits may become erroneously decoded due to strong

noise and/or inappropriate embedding– Can choose appropriate embedding to prevent colluders from

arbitrarily changing the embedded fingerprint bits

Want to trace as many colluders as possible

Page 35: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Spreading + Combinatorial Coded FingerprintingSpreading + Combinatorial Coded Fingerprinting

Multimedia Forensics for Traitors Tracing 35

Overall idea of embedded combinatorial fingerprinting– Explore unique issues associated with multimedia in fingerprint

encoding, embedding & detection– Use appropriate embedding to prevent arbitrary change on code

Build correlated fingerprints in two steps– Binary Anti-collusion fingerprint codes resist up to K colluders

any subset of up to K users share a unique set of code bits

– Use antipodal coded modulation to embed fingerprint codesvia orthogonal spread spectrum sequencesshared bits get sustained and used to identify colluders

1st bit1st bit 2nd bit2nd bit

......∑=

=B

iiijj b

1uw { }1±∈ijb

Page 36: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

1616--bit ACC for Detecting bit ACC for Detecting ≤≤ 3 Colluders Out of 203 Colluders Out of 20

Multimedia Forensics for Traitors Tracing 36

User-1 ( -1,-1, -1, -1, 1, 1, 1, 1, …, 1 ) ( -1, 1, 1, 1, 1, 1, …, -1, 1, 1, 1 ) User-4

Extracted fingerprint code ( -1, 0, 0, 0, 1, …, 0, 0, 0, 1, 1, 1 )

Collude by AveragingUniquely Identify User 1 & 4

Embed fingerprint via HVS-based spread spectrum embedding in block-DCT domain

Page 37: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

ACC Codes Under Averaging CollusionACC Codes Under Averaging Collusion

Multimedia Forensics for Traitors Tracing 37

User-1 User-4 User-8

Averaging of multimedia domain leads to averaging in code-domain, and corresponds to AND operation after thresholdingCan distinguish colluded bits from sustained bits statistically with appropriate modulation and embedding, and the sustained bits are unique with respect to colluder set

Page 38: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

AntiAnti--Collusion Codes (ACC)Collusion Codes (ACC)

Multimedia Forensics for Traitors Tracing 38

ACC code via combinatorial design– Balanced Incomplete Block Design (BIBD)

(v,k,λ)-BIBD is an (k-1)-resilient AND ACC– Defined as a pair (X,A)

X is a set of v pointsA is a collection of blocks of X, each with k pointsevery pair of distinct points is in exactly λ blocks

– # blocks

Code length for n=1000 users: O( n0.5 ) ~ dozens-to-hundreds bits– Shorter than prior art by Boneh-Shaw O( (log n)6) ~ millions bits

⎟⎟⎟⎟⎟⎟⎟⎟⎟

⎜⎜⎜⎜⎜⎜⎜⎜⎜

=

1000111011001100111011101001010111010110101110100

CSimple ExampleACC code via (7,3,1) BIBD for handling up to 2 colluders among 7 users

( )kkvvn 2

2

−−λ

=

Page 39: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Colluder DetectorsColluder Detectors

Multimedia Forensics for Traitors Tracing 39

Hard Detection:– Detect the bit values and then estimate colluders from these values– Uses the fact that the combination of codevectors uniquely identifies

colluders– Everyone is suspected as guilty and each ‘1’ bit narrows down set

Soft Detection:– Possible candidates for soft detection:

Sorting: Use the largest detection statistics to optimize likelihood function to first determine bit values, then estimate colluder set.

Sequential: Iteratively update the likelihood function and directly identify the colluder set.

Page 40: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

ACC Experiment with Gaussian SignalsACC Experiment with Gaussian Signals

Multimedia Forensics for Traitors Tracing 40

– Higher threshold captures more colluders, but suspects more innocents – Soft decoding gives more accurate colluder identification than hard

decoding– Joint decoding and colluder identification gives better performance than

separating the two steps

Page 41: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

SummarySummary

Multimedia Forensics for Traitors Tracing 41

Important to design anti-collusion fingerprint for multimedia– Collusion is a cost-effective attack against fingerprinting– Anti-collusion fingerprint can allow us to trace traitor and

deter unauthorized information leakage

Good news– We can tolerate about a few dozens colluders– We can accommodate more users through the ACC

Challenge– One can find enough colluders to circumvent the system

Page 42: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Conclusions (contConclusions (cont’’d)d)

Multimedia Forensics for Traitors Tracing 42

# of colluders

# of total usersCorr.

Orth. Corr.

• Narrowdown the suspicion size;

• Monitor the behavior pattern;

• Work in concert with other operations

small

Orth. small

So we have more work do… tomorrow will be better!

Page 43: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Traitors Behavior Dynamics in Traitors Behavior Dynamics in CollusionCollusion

Multimedia Forensics for Traitors Tracing

Page 44: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Fairness Issue in CollusionFairness Issue in Collusion

Multimedia Forensics for Traitors Tracing 44

Multi-user collusion– Colluders share the profit as well as the risk of being caught

Fairness issue in collusion– All colluders have the same probability of being detected

Each colluder ensures that he/she is not taking higher risk of being detected than the others

Fair-play during collusion

Page 45: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Achieving the Fairness of CollusionAchieving the Fairness of Collusion

Multimedia Forensics for Traitors Tracing 45

Prior work: all users receive copies of the same quality– Examples of fair collusion: averaging, cut-and-paste– Reduces the energy of each contributing fingerprint by an equal

ratio

Colluded copy

Collusion byaveraging

Originally fingerprintedcopies

1/3

Alice CarlBob

Colluded copy

Originally fingerprintedcopies

Alice Carl

Cut-and-paste attack

Page 46: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Achieving the Fairness of Collusion (contAchieving the Fairness of Collusion (cont’’d)d)

Multimedia Forensics for Traitors Tracing 46

Scalable multimedia coding: network and device heterogeneity– Users receive copies of different quality– Temporal scalability: multiple versions of the same video with

different frame rates– Layered coding: decompose the video into non-overlapping bit

streams of different priorities

Original Video 1 52 63 74 8

1 5Base layer

3-1 7-5Enh. layer 1

2-1 6-54-3 8-7Enh. layer 2

Page 47: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Achieving the Fairness of Collusion (contAchieving the Fairness of Collusion (cont’’d)d)

Multimedia Forensics for Traitors Tracing 47

Alice

Bob

Carl

Base layer Enh. layer 1 Enh. layer 2

Colluded copy

Problem: how to achieve the fairness of collusion in scalable fingerprinting systems?

Page 48: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Achieving the Fairness of Collusion (contAchieving the Fairness of Collusion (cont’’d)d)

Multimedia Forensics for Traitors Tracing 48

Alice

Bob

Carl

Base layer Enh. layer 1 Enh. layer 2

Colluded copy

1/3

1/3

1/3

1/2

1/2

Quality of the colluded copy

Probability of being detected

High

PCarl>PBob>PAlice

Page 49: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Achieving the Fairness of Collusion (contAchieving the Fairness of Collusion (cont’’d)d)

Multimedia Forensics for Traitors Tracing 49

Alice

Bob

Carl

Base layer Enh. layer 1 Enh. layer 2

Colluded copy

1/3

1/3

1/3

Quality of the colluded copy

Probability of being detected

Low

PCarl=PBob=PAlice

Page 50: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Achieving the Fairness of Collusion (contAchieving the Fairness of Collusion (cont’’d)d)

Multimedia Forensics for Traitors Tracing 50

Alice

Bob

Carl

Base layer Enh. layer 1 Enh. layer 2

Quality of the colluded copy

Probability of being detected

High

PCarl=PBob=PAlice

Colluded copy

Choose {α,β} to guarantee the equal risk of all colluders

Page 51: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Analysis of Each ColluderAnalysis of Each Colluder’’s Risks Risk

Multimedia Forensics for Traitors Tracing 51

Consider a simple detector that uses fingerprints extracted fromall layers collectively to identify colluder.

The correlation based detection statistics: – For different users, TN

(i) have the same variance σn2 but different

means µ(i)

To achieve the fairness of collusion, seek {βk} and {αl} such that µ(i) are the same for all colluders.

( )2)()( ,~ nii

N NT σµ

1,1,0 1,1,,0 ..

2121

321321

)()()(

=+≤≤=++≤≤

==

ααααββββββ

µµµts

CarlBobAlice

Page 52: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Fairness Issue During CollusionFairness Issue During Collusion

Multimedia Forensics for Traitors Tracing 52

Number of colluders in different subgroups

Length of fingerprints embedded in different layers

A copy of higher resolution more severe constraints on collusion

Page 53: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Effectiveness of CollusionEffectiveness of Collusion

Multimedia Forensics for Traitors Tracing 53

High resolution

Medium resolution

Low resolution

Perceptual quality of the colluded copy Effectiveness of fair collusion

A colluded copy of higher resolution larger risk to be detected

Page 54: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Traitors within Traitors in Traitors within Traitors in Multimedia Forensic SystemsMultimedia Forensic Systems

Multimedia Forensics for Traitors Tracing

Page 55: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Assumptions in Prior WorkAssumptions in Prior Work

Multimedia Forensics for Traitors Tracing 55

Assumptions of fair-play during collusion in prior work– All colluders keep their agreement of fair collusion– Everyone tells the truth of his fingerprinted copy during collusion

)( 1iX

)( 2iX

)( 3iX

Alice

Bob

Carl

Received copy

Multi-userCollusionAttack g(.)

)( 1iX

)( 2iX

)( 3iX

Copy used during collusion

Page 56: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Traitors within TraitorsTraitors within Traitors

Multimedia Forensics for Traitors Tracing 56

The assumption of fair-play during collusion may not always hold

Dynamics among attackers during collusion– Selfish colluders : wish to minimize their own risk of being caught

– Other colluders : wish to protect their own interests

Formulation and analysis of the dynamics among colluders:– Understand the attackers’ behavior– Build a complete model of multi-user collusion

Page 57: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Risk Minimization by Selfish ColludersRisk Minimization by Selfish Colluders

Multimedia Forensics for Traitors Tracing 57

Selfish colluders:– Alice processes her fingerprinted copy before multi-user collusion

to further reduce her probability of being detected

Multi-userCollusionAttack g(.)

)( 1iX

)( 2iX

)( 3iX

Alice

Bob

Carl

Received copy)( 1

~ iX

)( 2iX

)( 3iX

Pre-collusion processing

Copy used during collusionPerceptually similar

Page 58: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Temporal Filtering of Fingerprinted FramesTemporal Filtering of Fingerprinted Frames

Multimedia Forensics for Traitors Tracing 58

1( )1

ijX −

1( )ijX 1( )

1i

jX +

2/)1( jλ−jλ

2/)1( jλ−

1( )ijX

Received frames

Pre-collusion processing using temporal filtering

1( )1

ijX −

1( )1

ijX +

Generated frames

Goal: attenuate the energies of the embedded fingerprints– Replace each segment of the fingerprinted copy with another,

seemingly similar segment from different regions of the content

Temporal filtering of the received fingerprinted frames

10 ,2

12

1~ )(1

)()(1

)( 1111 ≤≤−

++−

= +− ji

jji

jji

jji

j XXXX λλ

λλ

Page 59: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Performance AnalysisPerformance Analysis

Multimedia Forensics for Traitors Tracing 59

Perceptual quality of the newly generated frames:

– φj is a constant of λj

– A larger λj is preferred to minimize the perceptual distortion

The selfish colluder’s probability of being detected:

– θ1 and θ2(j) are constants of λj, θ2(j) ≥ 0– A smaller λj is preferred to minimize the probability of being

detected

( ) 4/1~ 22)()( 11jj

ij

ijj XXMSE φλ−=−=

( ) )( where,, 21)(2)()( 111 jNT

j ji

nii

N θλθµσµ ∑+==

Page 60: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Selection of the Optimum FilterSelection of the Optimum Filter

Multimedia Forensics for Traitors Tracing 60

Selfish colluders: – tradeoff between the probability of being detected and the

perceptual quality of the newly generated copy

Selection of the optimum filter coefficients[ ]

,...1,~ ..

min

2)()(

)()(

}{

11

11

=≤−=

>=

jXXMSEts

hTPP

ij

ijj

iN

id

j

α

λ

Alice’s probability of being detected

Quality constraints

dBPSNRj 40≥

Page 61: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Simulation ResultsSimulation Results

Multimedia Forensics for Traitors Tracing 61

Without pre-collusion

processing

With pre-collusion

processing

Perceptual quality of the newly generated copy

The selfish colluder’s probabilityof being detected

Temporal filtering can further reduce the selfish colluder’s riskSmaller prob. of being detected worse perceptual quality

Page 62: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Summary on Analysis of Dynamics Among Summary on Analysis of Dynamics Among ColludersColluders

Multimedia Forensics for Traitors Tracing 62

Important to analyze the dynamics among colluders– Helps to understand the attackers’ behavior during collusion– Enables to build a complete model of multi-user collusion

What we have known:– How the colluders achieve the fairness during collusion – How a single selfish colluder can further reduce his/her risk

There are still a lot that we need to learn:– How several selfish colluders work together to minimize their risk– How other colluders can detect and prevent such selfish behavior

during collusion– …

So we have more work to do…

Page 63: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Related Publications Related Publications

Multimedia Forensics for Traitors Tracing 63

W. Trappe, M. Wu, Z.J. Wang, K.J.R. Liu, “Anti-Collusion Fingerprinting for Multimedia”, IEEE Trans. on Signal Processing, special issue on Signal Processing for Data Hiding in Digital Media & Secure Content Delivery, vol. 51, no. 4, pp.1069-1087, April 2003.Z.J. Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu: “Collusion Resistance of Multimedia Fingerprinting Using Orthogonal Modulation”, IEEE Trans. on Image Proc., vol 14, no 6, pp. 804-821, June 2005.H. Zhao, M. Wu, Z.J. Wang, and K.J.R. Liu: “Nonlinear Collusion Attacks on Independent Multimedia Fingerprints”, IEEE Trans. on Image Proc., vol 14, no 5, pp.646-661, May 2005.Z.J. Wang, M. Wu, W. Trappe, and K.J.R. Liu: “Group-Oriented Fingerprinting for Multimedia Forensics”, EURASIP Journal on Applied Signal Processing, special issue on multimedia security and rights management, 2004:14, pp. 2142-2162, Nov 2004.M. Wu, W. Trappe, Z.J. Wang, and K.J.R. Liu, ”Collusion-Resistant Fingerprinting for Multimedia”, IEEE Signal Processing Magazine, Special Issue on Digital Rights: Management, Protection, Standardization, vol 21, no 2, pp.15-27, March 2004. H.V. Zhao and K.J.R. Liu, ”Risk Minimization in Traitors within Traitors in Multimedia Forensics”, Proc. IEEE Int’l Conf. on Image Processing (ICIP), Genoa, Sep. 2005.H.V. Zhao and K.J.R. Liu, ”Resistance Analysis of Scalable Video Fingerprinting under Fair Collusion Attacks”, Proc. IEEE Int’l Conf. on Image Processing (ICIP), Genoa, Sep. 2005.

Page 64: Multimedia Forensics for Traitors Tracinggray/birs/slides/liu.pdf · 2005-07-31 · zAlleged Movie Pirate Arrested (23 January 2004) – A real case of a successful deployment of

Multimedia Forensics for Traitors Tracing 64


Recommended