首页 > 最新文献

2014 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

英文 中文
Malicious attacks on state estimation in multi-sensor dynamic systems 多传感器动态系统状态估计的恶意攻击
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084309
Jingyang Lu, R. Niu
In this paper, the problem of false information injection attack on the Kalman filter in dynamic systems is investigated. It is assumed that the Kalman filter system has no knowledge of the existence of the attacks. To be concrete, a target tracking system is used as an example in the paper. From the adversary's point of view, the best attack strategies are obtained under different scenarios, including a single-sensor system with both position and velocity measurements, and a multi-sensor system with position and velocity measurements. The optimal solutions are solved by maximizing the determinant of the mean squared estimation error matrix, under a constraint on the total power of the injected bias noises. Numerical results are also provided in order to illustrate the effectiveness of the proposed attack strategies.
研究了动态系统中卡尔曼滤波器的假信息注入攻击问题。假设卡尔曼滤波系统不知道攻击的存在。具体以某目标跟踪系统为例。从对手的角度出发,得到了不同场景下的最佳攻击策略,包括具有位置和速度测量的单传感器系统和具有位置和速度测量的多传感器系统。在给定注入偏置噪声的总功率约束下,通过最大均方估计误差矩阵的行列式来求解最优解。数值结果说明了所提攻击策略的有效性。
{"title":"Malicious attacks on state estimation in multi-sensor dynamic systems","authors":"Jingyang Lu, R. Niu","doi":"10.1109/WIFS.2014.7084309","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084309","url":null,"abstract":"In this paper, the problem of false information injection attack on the Kalman filter in dynamic systems is investigated. It is assumed that the Kalman filter system has no knowledge of the existence of the attacks. To be concrete, a target tracking system is used as an example in the paper. From the adversary's point of view, the best attack strategies are obtained under different scenarios, including a single-sensor system with both position and velocity measurements, and a multi-sensor system with position and velocity measurements. The optimal solutions are solved by maximizing the determinant of the mean squared estimation error matrix, under a constraint on the total power of the injected bias noises. Numerical results are also provided in order to illustrate the effectiveness of the proposed attack strategies.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127837536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Multiple JPEG compression detection by means of Benford-Fourier coefficients 利用本福德-傅立叶系数进行多重JPEG压缩检测
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084313
Cecilia Pasquini, G. Boato, F. Pérez-González
The analysis of JPEG compressed images is one of the most studied problems in image forensics, because of the extensive use and the characteristic traces left by such coding operation. In this paper, we propose a novel statistical framework for the identification of previous multiple aligned compressions in JPEG images and the estimation of the quality factors applied. The method has been tested on different datasets and forensic scenarios, where up to three JPEG compressions are considered. Moreover, both in the case of double and triple JPEG encoding with different quality factors, the compression history of each image is estimated. The experiments show good performance and, in most cases, higher accuracies with respect to state-of-the-art methods.
JPEG压缩图像的分析是图像取证中研究最多的问题之一,因为这种编码操作的广泛使用和特征痕迹。在本文中,我们提出了一种新的统计框架,用于识别JPEG图像中的先前多次对齐压缩并估计所应用的质量因子。该方法已经在不同的数据集和取证场景上进行了测试,其中考虑了多达三种JPEG压缩。此外,在不同质量因子的双重和三重JPEG编码情况下,对每张图像的压缩历史进行了估计。实验显示了良好的性能,在大多数情况下,相对于最先进的方法,精度更高。
{"title":"Multiple JPEG compression detection by means of Benford-Fourier coefficients","authors":"Cecilia Pasquini, G. Boato, F. Pérez-González","doi":"10.1109/WIFS.2014.7084313","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084313","url":null,"abstract":"The analysis of JPEG compressed images is one of the most studied problems in image forensics, because of the extensive use and the characteristic traces left by such coding operation. In this paper, we propose a novel statistical framework for the identification of previous multiple aligned compressions in JPEG images and the estimation of the quality factors applied. The method has been tested on different datasets and forensic scenarios, where up to three JPEG compressions are considered. Moreover, both in the case of double and triple JPEG encoding with different quality factors, the compression history of each image is estimated. The experiments show good performance and, in most cases, higher accuracies with respect to state-of-the-art methods.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126619543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Theoretical model of the FLD ensemble classifier based on hypothesis testing theory 基于假设检验理论的FLD集成分类器理论模型
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084322
R. Cogranne, Tomáš Denemark, J. Fridrich
The FLD ensemble classifier is a widely used machine learning tool for steganalysis of digital media due to its efficiency when working with high dimensional feature sets. This paper explains how this classifier can be formulated within the framework of optimal detection by using an accurate statistical model of base learners' projections and the hypothesis testing theory. A substantial advantage of this formulation is the ability to theoretically establish the test properties, including the probability of false alarm and the test power, and the flexibility to use other criteria of optimality than the conventional total probability of error. Numerical results on real images show the sharpness of the theoretically established results and the relevance of the proposed methodology.
FLD集成分类器是一种广泛应用于数字媒体隐写分析的机器学习工具,因为它在处理高维特征集时效率很高。本文解释了该分类器如何在最优检测的框架内通过使用基础学习者预测的精确统计模型和假设检验理论来制定。该公式的一个重要优点是能够从理论上建立测试属性,包括虚警概率和测试功率,以及灵活地使用比传统的总误差概率更优的其他标准。实际图像上的数值结果表明了理论建立结果的清晰度和所提出方法的相关性。
{"title":"Theoretical model of the FLD ensemble classifier based on hypothesis testing theory","authors":"R. Cogranne, Tomáš Denemark, J. Fridrich","doi":"10.1109/WIFS.2014.7084322","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084322","url":null,"abstract":"The FLD ensemble classifier is a widely used machine learning tool for steganalysis of digital media due to its efficiency when working with high dimensional feature sets. This paper explains how this classifier can be formulated within the framework of optimal detection by using an accurate statistical model of base learners' projections and the hypothesis testing theory. A substantial advantage of this formulation is the ability to theoretically establish the test properties, including the probability of false alarm and the test power, and the flexibility to use other criteria of optimality than the conventional total probability of error. Numerical results on real images show the sharpness of the theoretically established results and the relevance of the proposed methodology.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125156349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Metadata-based understanding of impostor pair score variations 基于元数据的冒名顶替者对分数变化的理解
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084295
A. Sgroi, K. Bowyer, P. Flynn
Metadata about a given face image can include information such as the subject's year of birth, subject gender, and date of acquisition. By determining the degree of metadata matches between the gallery and probe images (such as two subjects having the same gender) we hypothesize that more metadata values that match for an impostor image pair increases the likelihood of a false match. In this work, we explore year of birth, gender, date of acquisition, and expression in an attempt to understand variations in match scores produced by impostor image pairs. Impostor pairs that fall in the weak partition as identified by the previously developed SNoW technique have a slightly larger number of matching metadata values. However, there is little to no statistically significant difference in the scores produced by image pairs with more matching metadata between strong and weak impostor pairs.
关于给定人脸图像的元数据可以包括诸如受试者的出生年份、受试者性别和采集日期等信息。通过确定图库和探测图像之间的元数据匹配程度(例如两个具有相同性别的主题),我们假设与冒名顶替图像对匹配的元数据值越多,就会增加错误匹配的可能性。在这项工作中,我们探讨了出生年份、性别、获得日期和表达,试图理解由冒充者图像对产生的匹配分数的变化。以前开发的SNoW技术所识别的弱分区中的冒名顶替者对具有略多的匹配元数据值。然而,具有更多匹配元数据的图像对在强和弱冒充者对之间产生的分数几乎没有统计学上的显著差异。
{"title":"Metadata-based understanding of impostor pair score variations","authors":"A. Sgroi, K. Bowyer, P. Flynn","doi":"10.1109/WIFS.2014.7084295","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084295","url":null,"abstract":"Metadata about a given face image can include information such as the subject's year of birth, subject gender, and date of acquisition. By determining the degree of metadata matches between the gallery and probe images (such as two subjects having the same gender) we hypothesize that more metadata values that match for an impostor image pair increases the likelihood of a false match. In this work, we explore year of birth, gender, date of acquisition, and expression in an attempt to understand variations in match scores produced by impostor image pairs. Impostor pairs that fall in the weak partition as identified by the previously developed SNoW technique have a slightly larger number of matching metadata values. However, there is little to no statistically significant difference in the scores produced by image pairs with more matching metadata between strong and weak impostor pairs.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly traceback using software defined networking 使用软件定义的网络进行异常追溯
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084328
J. François, O. Festor
While the threats in Internet are still increasing and evolving (like intra multi-tenant data center attacks), protection and detection mechanisms are not fully accurate. Therefore, forensics is vital for recovering from an attack but also to identify the responsible entities. Therefore, this paper focuses on tracing back to the sources of an anomaly in the network. In this paper, we propose a method leveraging the Software Defined Networking (SDN) paradigm to passively identify switches composing the network path of an anomaly. As SDN technologies tend to be deployed in the next generation of networks including in data centers, they provide a helpful framework to implement our proposal without developing dedicated routers like usual IP traceback techniques. We evaluated our scheme with different network topologies (Internet and data centers) by considering distributed attacks with numerous hosts.
虽然互联网中的威胁仍在增加和发展(如多租户数据中心内部攻击),但保护和检测机制并不完全准确。因此,取证对于从攻击中恢复至关重要,而且对于识别负责任的实体也至关重要。因此,本文的重点是追溯网络中异常的来源。在本文中,我们提出了一种利用软件定义网络(SDN)范式来被动识别构成异常网络路径的交换机的方法。由于SDN技术倾向于在下一代网络(包括数据中心)中部署,因此它们提供了一个有用的框架来实现我们的建议,而无需像通常的IP回溯技术那样开发专用路由器。我们用不同的网络拓扑(Internet和数据中心)评估了我们的方案,并考虑了具有众多主机的分布式攻击。
{"title":"Anomaly traceback using software defined networking","authors":"J. François, O. Festor","doi":"10.1109/WIFS.2014.7084328","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084328","url":null,"abstract":"While the threats in Internet are still increasing and evolving (like intra multi-tenant data center attacks), protection and detection mechanisms are not fully accurate. Therefore, forensics is vital for recovering from an attack but also to identify the responsible entities. Therefore, this paper focuses on tracing back to the sources of an anomaly in the network. In this paper, we propose a method leveraging the Software Defined Networking (SDN) paradigm to passively identify switches composing the network path of an anomaly. As SDN technologies tend to be deployed in the next generation of networks including in data centers, they provide a helpful framework to implement our proposal without developing dedicated routers like usual IP traceback techniques. We evaluated our scheme with different network topologies (Internet and data centers) by considering distributed attacks with numerous hosts.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132694331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Iterative filtering for semi-fragile self-recovery 半脆弱自恢复的迭代滤波
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084300
Pawel Korus, Jaroslaw Bialas, A. Dziech
In this paper we propose a novel scheme for semifragile self-recovery based on iterative filtering of randomly sampled image sections. The scheme exhibits very good robustness against both malicious tampering and lossy JPEG compression with only slight deterioration of the reconstruction quality with attack strength. We describe the operation of the proposed scheme and present the results of its experimental evaluation. We also compare our approach with two state-of-the-art alternatives described in the literature.
本文提出了一种基于随机采样图像分段迭代滤波的半脆弱自恢复算法。该方案对恶意篡改和有损JPEG压缩都有很好的鲁棒性,且重构质量随攻击强度的变化略有下降。我们描述了所提出的方案的操作,并给出了其实验评估的结果。我们还将我们的方法与文献中描述的两种最先进的替代方法进行比较。
{"title":"Iterative filtering for semi-fragile self-recovery","authors":"Pawel Korus, Jaroslaw Bialas, A. Dziech","doi":"10.1109/WIFS.2014.7084300","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084300","url":null,"abstract":"In this paper we propose a novel scheme for semifragile self-recovery based on iterative filtering of randomly sampled image sections. The scheme exhibits very good robustness against both malicious tampering and lossy JPEG compression with only slight deterioration of the reconstruction quality with attack strength. We describe the operation of the proposed scheme and present the results of its experimental evaluation. We also compare our approach with two state-of-the-art alternatives described in the literature.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116486865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Source distinguishability under corrupted training 损坏训练下的源可分辨性
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084327
M. Barni, B. Tondi
We study a new variant of the source identification game with training data in which part of the training data is corrupted by an adversary. In such a scenario, the defender wants to decide whether a test sequence ξn has been drawn from the same source which generated a training sequence tN, part of which has been corrupted by the adversary. By adopting a game theoretical formulation, we derive the unique rationalizable equilibrium of the game in the asymptotic setup. Moreover, by mimicking Stein's lemma, we derive the best achievable performance for the defender, permitting us to analyze the ultimate distinguishability of the two sources.We conclude the paper by comparing the performance of the test with corrupted training to the simpler case in which the adversary can not modify the training sequence, and by deriving the percentage of samples that the adversary needs to modify to make source identification impossible.
我们研究了一种基于训练数据的源识别博弈的新变体,其中部分训练数据被对手破坏。在这种情况下,防御者想要确定是否从生成训练序列tN的相同来源提取了测试序列ξn,其中一部分已被对手破坏。采用博弈论公式,导出了该博弈在渐近设置下的唯一可合理化均衡。此外,通过模仿斯坦引理,我们得出了防守者的最佳可实现性能,使我们能够分析两种来源的最终可区别性。我们通过比较带有损坏训练的测试的性能与对手无法修改训练序列的简单情况的性能,并通过推导对手需要修改以使源识别不可能的样本的百分比来总结本文。
{"title":"Source distinguishability under corrupted training","authors":"M. Barni, B. Tondi","doi":"10.1109/WIFS.2014.7084327","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084327","url":null,"abstract":"We study a new variant of the source identification game with training data in which part of the training data is corrupted by an adversary. In such a scenario, the defender wants to decide whether a test sequence ξn has been drawn from the same source which generated a training sequence tN, part of which has been corrupted by the adversary. By adopting a game theoretical formulation, we derive the unique rationalizable equilibrium of the game in the asymptotic setup. Moreover, by mimicking Stein's lemma, we derive the best achievable performance for the defender, permitting us to analyze the ultimate distinguishability of the two sources.We conclude the paper by comparing the performance of the test with corrupted training to the simpler case in which the adversary can not modify the training sequence, and by deriving the percentage of samples that the adversary needs to modify to make source identification impossible.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125186932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of the security of compressed sensing with circulant matrices 循环矩阵压缩感知的安全性分析
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084323
T. Bianchi, E. Magli
Recent results have shown that the compressed sensing (CS) framework can provide a form of data confidentiality when the signals are sensed by a fully random matrix. In this paper, we extend those results by considering the security achievable by partially circulant sensing matrices generated from a vector of random variables. Circulant matrices, having similar CS recovery performance as fully random matrices and admitting a fast implementation by means of a fast Fourier transform, are more suitable for practical CS systems. Compared to fully random Gaussian matrices, which leak only the energy of the sensed signal, we show that circulant matrices leak also some information on the autocorrelation of the sensed signal. In order to characterize the above information leakage, we propose an operational definition of security linked to the difficulty of distinguishing equal energy signals and we propose practical attacks to test this definition. The results provide interesting insights on the security of such matrices, showing that a properly randomized partially circulant matrix can provide a weak encryption layer if the signal is sparse in the sensing domain.
最近的研究结果表明,当信号被完全随机矩阵感知时,压缩感知(CS)框架可以提供一种形式的数据机密性。在本文中,我们通过考虑由随机变量向量生成的部分循环传感矩阵可实现的安全性来扩展这些结果。循环矩阵具有与全随机矩阵相似的CS恢复性能,并且可以通过快速傅里叶变换实现,因此更适合于实际的CS系统。与只泄漏被测信号能量的全随机高斯矩阵相比,循环矩阵还泄漏了一些被测信号的自相关信息。为了描述上述信息泄漏的特征,我们提出了与区分等能量信号的难度相关的安全的操作定义,并提出了实际攻击来测试这一定义。结果提供了关于这种矩阵安全性的有趣见解,表明如果信号在传感域中是稀疏的,则适当随机化的部分循环矩阵可以提供弱加密层。
{"title":"Analysis of the security of compressed sensing with circulant matrices","authors":"T. Bianchi, E. Magli","doi":"10.1109/WIFS.2014.7084323","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084323","url":null,"abstract":"Recent results have shown that the compressed sensing (CS) framework can provide a form of data confidentiality when the signals are sensed by a fully random matrix. In this paper, we extend those results by considering the security achievable by partially circulant sensing matrices generated from a vector of random variables. Circulant matrices, having similar CS recovery performance as fully random matrices and admitting a fast implementation by means of a fast Fourier transform, are more suitable for practical CS systems. Compared to fully random Gaussian matrices, which leak only the energy of the sensed signal, we show that circulant matrices leak also some information on the autocorrelation of the sensed signal. In order to characterize the above information leakage, we propose an operational definition of security linked to the difficulty of distinguishing equal energy signals and we propose practical attacks to test this definition. The results provide interesting insights on the security of such matrices, showing that a properly randomized partially circulant matrix can provide a weak encryption layer if the signal is sparse in the sensing domain.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130539959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Tardos codes for real 塔多斯代码是真的
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084298
T. Furon, Mathieu Desoubeaux
This paper deals with active fingerprinting a.k.a. traitor tracing where a collusion of dishonest users merges their individual versions of a content to yield a pirated copy. The Tardos codes are one of the most powerful tools to fight against such collusion process by identifying the colluders. Instead of studying as usual the necessary and sufficient code length in a theoretical setup, we adopt the point of view of the practitioner. We call this the operational mode, i.e. a practical setup where a Tardos code has already been deployed and a pirated copy has been found. This new paradigm shows that the known bounds on the probability of accusing an innocent in the theoretical setup are way too pessimistic. Indeed the practitioner can resort to much tighter bounds because the problem is fundamentally much simpler under the operational mode. In the end, we benchmark under the operational mode several single decoders recently proposed in the literature. We believe this is a fair comparison reflecting what matters in reality.
这篇论文讨论的是主动指纹识别,也就是叛徒追踪,在这种情况下,不诚实的用户串通起来,将他们各自的内容版本合并在一起,产生一个盗版副本。塔尔多斯代码是通过识别串通者来对抗这种串通过程的最有力工具之一。与通常在理论设置中研究必要和足够的代码长度不同,我们采用实践者的观点。我们称之为操作模式,即一个实际的设置,其中Tardos代码已经部署,并发现了一个盗版副本。这个新范式表明,在理论设置中,指控无辜者的概率的已知界限过于悲观。实际上,执行者可以采用更严格的界限,因为在操作模式下,问题基本上要简单得多。最后,我们在工作模式下对最近文献中提出的几种单解码器进行了测试。我们认为这是一个公平的比较,反映了现实中的问题。
{"title":"Tardos codes for real","authors":"T. Furon, Mathieu Desoubeaux","doi":"10.1109/WIFS.2014.7084298","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084298","url":null,"abstract":"This paper deals with active fingerprinting a.k.a. traitor tracing where a collusion of dishonest users merges their individual versions of a content to yield a pirated copy. The Tardos codes are one of the most powerful tools to fight against such collusion process by identifying the colluders. Instead of studying as usual the necessary and sufficient code length in a theoretical setup, we adopt the point of view of the practitioner. We call this the operational mode, i.e. a practical setup where a Tardos code has already been deployed and a pirated copy has been found. This new paradigm shows that the known bounds on the probability of accusing an innocent in the theoretical setup are way too pessimistic. Indeed the practitioner can resort to much tighter bounds because the problem is fundamentally much simpler under the operational mode. In the end, we benchmark under the operational mode several single decoders recently proposed in the literature. We believe this is a fair comparison reflecting what matters in reality.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131770810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Modeling the flicker effect in camcorded videos to improve watermark robustness 对摄像机视频中的闪烁效果进行建模以提高水印鲁棒性
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084301
Séverine Baudry, B. Chupeau, Mario de Vito, G. Doërr
Camcording a screen is a common and easy way for a pirate to capture a protected video and circumvent any cryptography-based protection system like DRM. Therefore, antipiracy methods like watermarking should be robust to this type of attack. One effect very often encountered is the flicker effect: image luminance varies periodically along the video, and scrolling stripes may also be observed. Such an effect is due to aliasing, because the higher frequency backlight of the screen is sampled at a lower rate by the camcorder. The stripe effect appears because each line of the image is captured with a small delay with CMOS sensors. We show that the amplitude of the flicker depends on the luminance of the displayed image, as well as on the luminosity of the screen and on the exposure setting of the camcorder. We propose a method to blindly estimate the flicker parameters by studying the spectrum of the camcorded video; then we show how the flicker can be selectively removed without impairing other frequential components of the video. Experiments on camcorded videos show that removing the flicker enable significant improvement in the watermarking detection performances.
对盗版者来说,拍摄屏幕是一种常见而简单的方法,可以捕获受保护的视频,并绕过任何基于加密的保护系统,如DRM。因此,像水印这样的反盗版方法应该对这种类型的攻击具有鲁棒性。经常遇到的一种效应是闪烁效应:图像亮度在视频中周期性变化,还可能观察到滚动条纹。这样的效果是由于混叠,因为高频率的屏幕背光采样率较低的摄像机。条纹效应的出现是因为图像的每一行都是用CMOS传感器以很小的延迟捕获的。我们表明,闪烁的幅度取决于所显示图像的亮度,以及屏幕的亮度和摄像机的曝光设置。提出了一种通过研究摄像机视频的频谱来盲估计闪烁参数的方法;然后我们展示了如何有选择地去除闪烁而不损害视频的其他频率成分。在摄像机视频上的实验表明,去除闪烁可以显著提高水印检测性能。
{"title":"Modeling the flicker effect in camcorded videos to improve watermark robustness","authors":"Séverine Baudry, B. Chupeau, Mario de Vito, G. Doërr","doi":"10.1109/WIFS.2014.7084301","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084301","url":null,"abstract":"Camcording a screen is a common and easy way for a pirate to capture a protected video and circumvent any cryptography-based protection system like DRM. Therefore, antipiracy methods like watermarking should be robust to this type of attack. One effect very often encountered is the flicker effect: image luminance varies periodically along the video, and scrolling stripes may also be observed. Such an effect is due to aliasing, because the higher frequency backlight of the screen is sampled at a lower rate by the camcorder. The stripe effect appears because each line of the image is captured with a small delay with CMOS sensors. We show that the amplitude of the flicker depends on the luminance of the displayed image, as well as on the luminosity of the screen and on the exposure setting of the camcorder. We propose a method to blindly estimate the flicker parameters by studying the spectrum of the camcorded video; then we show how the flicker can be selectively removed without impairing other frequential components of the video. Experiments on camcorded videos show that removing the flicker enable significant improvement in the watermarking detection performances.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114453368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2014 IEEE International Workshop on Information Forensics and Security (WIFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1