SlideShare une entreprise Scribd logo
1  sur  10
Digital Fingerprinting for Multimedia Content Protection Avinash L. Varna Advisor: Prof. Min Wu Department of  Electrical and Computer Engineering  University of Maryland, College Park
Motivation Alice w1 w2 Embed Fingerprints Bob w3 Carl Alice,Bob, … Detect Fingerprints Identify Content ShutterIsland Internet Alice,Bob, … Alice Shutter Island Bob Carl Embedded Fingerprints Content Fingerprints Collusion-resistant Fingerprint Design for Compressed Multimedia Analysis of Fingerprints for Content Identification
Fingerprinting Compressed Multimedia Set Top Box Decrypt Decompress Pirated  Copy Compressed video Cable TV distribution system Embed Fingerprint Collude Challenges: Discrete nature of host makes embedded fingerprint vulnerable to multi-user collusion attack Traditional fingerprinting: averaging ~10 copies sufficient to remove fingerprints Fingerprint embedding should not significantly increase file size
Anti-Collusion Dither With Dither Without Dither Distribution of host signal at various stages of the embedding process Add a dither signal before embedding to make the host appear more continuous Δ= 6 ,[object Object],A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting Compressed Multimedia Signals",  IEEE Transactions on Information Forensics and Security, Sep. 2009, pp 330-345.
Anti-Collusion Dither Add a dither signal before embedding to make the host appear more continuous Collusion resistance increases to ~30 colluders (from ~7) Theoretical Analysis: More users can be accommodated under given attack Difficult for attacker to estimate host accurately Derived expressions for Probability of detection PD Simulations using images: Preserves visual quality File size does not increase significantly A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting Compressed Multimedia Signals",  IEEE Transactions on Information Forensics and Security, Sep. 2009, pp 330-345.
Multimedia Content Identification Content Filtering Metadata Services From Verizon Shazam for iPhone Developed framework for modeling and understanding Analyze the mapping from video to features to bits:how is processing on video translated to changes in fingerprint bits? Model performance at bit string level Quantization & Encoding Feature Extraction Matching Video
Theoretical Analysis and Results Simple model : i.i.d. equiprobable fingerprint bits and noise alters each bit independently with probability p ,[object Object],M = 230, ε = 2-50 ,[object Object],A. L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Fingerprinting",  submitted to the IEEE Transactions on Information Forensics and Security, Dec. 2009.
Theoretical Analysis and Results Simple model : i.i.d. equiprobable fingerprint bits and noise alters each bit independently with probability p Derived guideline for choosing fingerprint length Game-theoretic analysis to derive optimal strategies for attacker and detector Markov Random Field model to capture correlations Understand influence of correlation on detection Cannot estimate rare-event probability accurately using traditional Markov Chain Monte-Carlo (MCMC) simulations Use statistical physics inspired approachto compute probabilities Noise Original Fingerprint A. L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Fingerprinting",  submitted to the IEEE Transactions on Information Forensics and Security, Dec. 2009.
Contributions of the Dissertation Multimedia Content Protection Deterrence & Tracing Identification & Filtering Collusion-resistant Fingerprints Content Fingerprintsfor Identification
Selected Publications Journal Papers A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting Compressed Multimedia Signals", IEEE Transactions on Information Forensics and Security, Sep. 2009, pp 330-345. A. L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Fingerprinting",  submitted to the IEEE Transactions on Information Forensics and Security, Dec. 2009. Wenjun Lu, A.L. Varna, AshwinSwaminathan, and Min Wu, "Privacy Preserving Multimedia Retrieval", submitted to IEEE Transactions on Information Forensics and Security, Oct. 2009, under revision. A. L. Varna and M. Wu, “Game-theoretic Analysis of Content Fingerprinting”, under preparation. Selected Conference Papers A. L. Varna, Shan He, AshwinSwaminathan, Min Wu, Haiming Lu, and Zengxiang Lu, "Collusion-Resistant Fingerprinting for Compressed Multimedia Signals", IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, pp. 165 - 168, Apr. 2007. A. L. Varna, AshwinSwaminathan, and Min Wu, "A Decision Theoretic Framework for Analyzing Hash-based Content Identification Systems", ACM Digital Rights Management Workshop, pp. 67-76 Oct. 2008. A. L. Varna and Min Wu, "Modeling and Analysis of Content Identification", IEEE International Conference on Multimedia and Expo, pp. 1529-1531, Jun. 2009. A. L. Varna, Wei-Hong Chuang, and Min Wu, "A Framework for Theoretical Analysis of Content Fingerprinting", SPIE and IS&T Media Forensics and Security, Jan. 2010.

Contenu connexe

Tendances

Swing07 day1 buttyan
Swing07 day1 buttyanSwing07 day1 buttyan
Swing07 day1 buttyanrajrayala
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelMohit Goel
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Edureka!
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentationhlksd
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmIJARIIT
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 

Tendances (20)

Swing07 day1 buttyan
Swing07 day1 buttyanSwing07 day1 buttyan
Swing07 day1 buttyan
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Steganography
SteganographySteganography
Steganography
 
331 340
331 340331 340
331 340
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentation
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Steganography
SteganographySteganography
Steganography
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
Steganography
SteganographySteganography
Steganography
 

En vedette

Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprintingsanthu652
 
Digital image protection using adaptive watermarking techniques
Digital image protection using adaptive watermarking techniquesDigital image protection using adaptive watermarking techniques
Digital image protection using adaptive watermarking techniquesanandk10
 
Digital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking MethodsDigital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking MethodsHonza Pav
 
Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rulesKUL2700
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICKUL2700
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 

En vedette (13)

Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprinting
 
Digital image protection using adaptive watermarking techniques
Digital image protection using adaptive watermarking techniquesDigital image protection using adaptive watermarking techniques
Digital image protection using adaptive watermarking techniques
 
Digital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking MethodsDigital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking Methods
 
Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rules
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCIC
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 

Similaire à Research Overview

Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkRaja Shekhar
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Ijctt v17 p128-copy-copy
Ijctt v17 p128-copy-copyIjctt v17 p128-copy-copy
Ijctt v17 p128-copy-copySelva Raj
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 
MCAR_Presentation_Poster
MCAR_Presentation_PosterMCAR_Presentation_Poster
MCAR_Presentation_PosterKwame Martin
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and SteganographyPratik Poddar
 
Slides: Logging safely in public spaces using color PINs
Slides: Logging safely in public spaces using color PINsSlides: Logging safely in public spaces using color PINs
Slides: Logging safely in public spaces using color PINsFrank Nielsen
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
 
Enhanced jean Algorithm for Attacker Group Recognition
Enhanced jean Algorithm for Attacker Group RecognitionEnhanced jean Algorithm for Attacker Group Recognition
Enhanced jean Algorithm for Attacker Group RecognitionVivek Gnanavelu
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Raja Shekhar
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdfContent_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdfVignesh V Menon
 
Content-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive StreamingContent-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive StreamingAlpen-Adria-Universität
 

Similaire à Research Overview (20)

becan
becanbecan
becan
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
 
Fv3111451146
Fv3111451146Fv3111451146
Fv3111451146
 
Josep Domingo Jordi Castella
Josep Domingo   Jordi CastellaJosep Domingo   Jordi Castella
Josep Domingo Jordi Castella
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Ijctt v17 p128-copy-copy
Ijctt v17 p128-copy-copyIjctt v17 p128-copy-copy
Ijctt v17 p128-copy-copy
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
MCAR_Presentation_Poster
MCAR_Presentation_PosterMCAR_Presentation_Poster
MCAR_Presentation_Poster
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Slides: Logging safely in public spaces using color PINs
Slides: Logging safely in public spaces using color PINsSlides: Logging safely in public spaces using color PINs
Slides: Logging safely in public spaces using color PINs
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
 
Enhanced jean Algorithm for Attacker Group Recognition
Enhanced jean Algorithm for Attacker Group RecognitionEnhanced jean Algorithm for Attacker Group Recognition
Enhanced jean Algorithm for Attacker Group Recognition
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Linked Sensor Data 101 (FIS2011)
Linked Sensor Data 101 (FIS2011)Linked Sensor Data 101 (FIS2011)
Linked Sensor Data 101 (FIS2011)
 
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdfContent_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
 
Content-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive StreamingContent-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive Streaming
 

Dernier

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Dernier (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Research Overview

  • 1. Digital Fingerprinting for Multimedia Content Protection Avinash L. Varna Advisor: Prof. Min Wu Department of Electrical and Computer Engineering University of Maryland, College Park
  • 2. Motivation Alice w1 w2 Embed Fingerprints Bob w3 Carl Alice,Bob, … Detect Fingerprints Identify Content ShutterIsland Internet Alice,Bob, … Alice Shutter Island Bob Carl Embedded Fingerprints Content Fingerprints Collusion-resistant Fingerprint Design for Compressed Multimedia Analysis of Fingerprints for Content Identification
  • 3. Fingerprinting Compressed Multimedia Set Top Box Decrypt Decompress Pirated Copy Compressed video Cable TV distribution system Embed Fingerprint Collude Challenges: Discrete nature of host makes embedded fingerprint vulnerable to multi-user collusion attack Traditional fingerprinting: averaging ~10 copies sufficient to remove fingerprints Fingerprint embedding should not significantly increase file size
  • 4.
  • 5. Anti-Collusion Dither Add a dither signal before embedding to make the host appear more continuous Collusion resistance increases to ~30 colluders (from ~7) Theoretical Analysis: More users can be accommodated under given attack Difficult for attacker to estimate host accurately Derived expressions for Probability of detection PD Simulations using images: Preserves visual quality File size does not increase significantly A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting Compressed Multimedia Signals", IEEE Transactions on Information Forensics and Security, Sep. 2009, pp 330-345.
  • 6. Multimedia Content Identification Content Filtering Metadata Services From Verizon Shazam for iPhone Developed framework for modeling and understanding Analyze the mapping from video to features to bits:how is processing on video translated to changes in fingerprint bits? Model performance at bit string level Quantization & Encoding Feature Extraction Matching Video
  • 7.
  • 8. Theoretical Analysis and Results Simple model : i.i.d. equiprobable fingerprint bits and noise alters each bit independently with probability p Derived guideline for choosing fingerprint length Game-theoretic analysis to derive optimal strategies for attacker and detector Markov Random Field model to capture correlations Understand influence of correlation on detection Cannot estimate rare-event probability accurately using traditional Markov Chain Monte-Carlo (MCMC) simulations Use statistical physics inspired approachto compute probabilities Noise Original Fingerprint A. L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Fingerprinting", submitted to the IEEE Transactions on Information Forensics and Security, Dec. 2009.
  • 9. Contributions of the Dissertation Multimedia Content Protection Deterrence & Tracing Identification & Filtering Collusion-resistant Fingerprints Content Fingerprintsfor Identification
  • 10. Selected Publications Journal Papers A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting Compressed Multimedia Signals", IEEE Transactions on Information Forensics and Security, Sep. 2009, pp 330-345. A. L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Fingerprinting", submitted to the IEEE Transactions on Information Forensics and Security, Dec. 2009. Wenjun Lu, A.L. Varna, AshwinSwaminathan, and Min Wu, "Privacy Preserving Multimedia Retrieval", submitted to IEEE Transactions on Information Forensics and Security, Oct. 2009, under revision. A. L. Varna and M. Wu, “Game-theoretic Analysis of Content Fingerprinting”, under preparation. Selected Conference Papers A. L. Varna, Shan He, AshwinSwaminathan, Min Wu, Haiming Lu, and Zengxiang Lu, "Collusion-Resistant Fingerprinting for Compressed Multimedia Signals", IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, pp. 165 - 168, Apr. 2007. A. L. Varna, AshwinSwaminathan, and Min Wu, "A Decision Theoretic Framework for Analyzing Hash-based Content Identification Systems", ACM Digital Rights Management Workshop, pp. 67-76 Oct. 2008. A. L. Varna and Min Wu, "Modeling and Analysis of Content Identification", IEEE International Conference on Multimedia and Expo, pp. 1529-1531, Jun. 2009. A. L. Varna, Wei-Hong Chuang, and Min Wu, "A Framework for Theoretical Analysis of Content Fingerprinting", SPIE and IS&T Media Forensics and Security, Jan. 2010.
  • 11. Contributions of the Dissertation Collusion-resistant fingerprints for compressed multimedia Evaluated performance of Gaussian based sequences Introduced Anti-Collusion Dither that can approximately triplethe collusion resistance Analyzed performance of techniques from different viewpoints Analysis of multimedia content identification Developed a theoretical framework for analyzing content identification schemes Proposed models for binary fingerprints and derived fundamental bounds on performance Performed game-theoretic analysis of interaction between the system designer and attacker