首页 > 最新文献

2012 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

英文 中文
Optimality of beamforming for secrecy capacity of MIMO wiretap channels MIMO窃听信道保密性波束形成的最优性
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412662
Jiangyuan Li, A. Petropulu
A Gaussian multiple-input multiple-output (MIMO) wiretap channel model is considered, where there exists a transmitter, a legitimate receiver and an eavesdropper each equipped with multiple antennas. The optimality of beamforming for secrecy capacity subject to sum power constraint is studied, and two sufficient conditions for beamforming to be globally optimal are given. The first sufficient condition states that when the difference between the Gram matrices of legitimate and eavesdropper channel matrices has exactly one positive eigenvalue, then beamforming is globally optimal. An alternative sufficient condition, which involves convex optimization, is also provided. For the case in which beamforming is globally optimal, the secrecy capacity is obtained. Otherwise, an upper bound of the difference between the secrecy capacity and beamforming secrecy rate is provided.
考虑了一个高斯多输入多输出(MIMO)窃听信道模型,其中存在一个发射器,一个合法的接收器和一个窃听者,每个都配备了多个天线。研究了总功率约束下波束形成的全局最优性,给出了波束形成全局最优的两个充分条件。第一个充分条件表明,当合法信道矩阵和窃听信道矩阵的Gram矩阵之差恰好有一个正特征值时,波束形成是全局最优的。还提供了一个涉及凸优化的替代充分条件。在波束形成全局最优的情况下,得到了系统的保密能力。另外,给出了保密容量与波束形成保密率之差的上界。
{"title":"Optimality of beamforming for secrecy capacity of MIMO wiretap channels","authors":"Jiangyuan Li, A. Petropulu","doi":"10.1109/WIFS.2012.6412662","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412662","url":null,"abstract":"A Gaussian multiple-input multiple-output (MIMO) wiretap channel model is considered, where there exists a transmitter, a legitimate receiver and an eavesdropper each equipped with multiple antennas. The optimality of beamforming for secrecy capacity subject to sum power constraint is studied, and two sufficient conditions for beamforming to be globally optimal are given. The first sufficient condition states that when the difference between the Gram matrices of legitimate and eavesdropper channel matrices has exactly one positive eigenvalue, then beamforming is globally optimal. An alternative sufficient condition, which involves convex optimization, is also provided. For the case in which beamforming is globally optimal, the secrecy capacity is obtained. Otherwise, an upper bound of the difference between the secrecy capacity and beamforming secrecy rate is provided.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comparison of different attack classes in arbitrarily varying wiretap channels 在任意不同的窃听通道中比较不同的攻击类别
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412661
H. Boche, R. F. Wyrembelski
For communication over arbitrarily varying channels (AVC), common randomness is an important resource to establish reliable communication, especially if the AVC is symmetrizable. In this paper the arbitrarily varying wiretap channel (AVWC) with active wiretapper is studied. Here the wiretapper is active in the sense that it can exploit the knowledge about the common randomness to control the channel conditions of the legitimate users. The common randomness assisted secrecy capacity of the AVWC with active wiretapper is analyzed and is related to the corresponding secrecy capacity of the AVWC with passive wiretapper. If the active secrecy capacity is positive, it equals the corresponding passive secrecy capacity. The case of zero active capacity is also studied.
对于任意变信道(AVC)通信,共同随机性是建立可靠通信的重要资源,特别是在任意变信道是对称的情况下。本文研究了带有源窃听器的任意变化窃听信道。在这里,窃听者是活跃的,因为它可以利用对常见随机性的了解来控制合法用户的信道条件。分析了带有主动窃听器的AVWC常见的随机辅助保密能力,并与带有被动窃听器的AVWC相应的保密能力相关联。如果主动保密容量为正,则等于对应的被动保密容量。研究了无功容量的情况。
{"title":"Comparison of different attack classes in arbitrarily varying wiretap channels","authors":"H. Boche, R. F. Wyrembelski","doi":"10.1109/WIFS.2012.6412661","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412661","url":null,"abstract":"For communication over arbitrarily varying channels (AVC), common randomness is an important resource to establish reliable communication, especially if the AVC is symmetrizable. In this paper the arbitrarily varying wiretap channel (AVWC) with active wiretapper is studied. Here the wiretapper is active in the sense that it can exploit the knowledge about the common randomness to control the channel conditions of the legitimate users. The common randomness assisted secrecy capacity of the AVWC with active wiretapper is analyzed and is related to the corresponding secrecy capacity of the AVWC with passive wiretapper. If the active secrecy capacity is positive, it equals the corresponding passive secrecy capacity. The case of zero active capacity is also studied.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122870319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling and analysis of Electric Network Frequency signal for timestamp verification 用于时间戳验证的电网频率信号建模与分析
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412627
Ravi Garg, Avinash L. Varna, Min Wu
Electric Network Frequency (ENF) fluctuations based forensic analysis is recently proposed for time-of-recording estimation, timestamp verification, and clip insertion/deletion forgery detection in multimedia recordings. Due to the load control mechanism of the electric grid, ENF fluctuations exhibit pseudo-periodic behavior and generally require a long duration of recording for forensic analysis. In this paper, a statistical study of the ENF signal is conducted to model it using an autoregressive process. The proposed model is used to understand the effect of the ENF signal duration and signal-to-noise ratio on the detection performance of a timestamp verification system under a hypothesis detection framework. Based on the proposed model, a decorrelation based approach is studied to match the ENF signals for timestamp verification. The proposed approach requires a shorter duration of the ENF signal to achieve the same detection performance as without decorrelation. Experiments are conducted on audio data to demonstrate an improvement in the detection performance of the proposed approach.
基于电子网络频率(ENF)波动的取证分析最近被提出用于多媒体记录的记录时间估计、时间戳验证和剪辑插入/删除伪造检测。由于电网的负荷控制机制,ENF波动表现出伪周期性,通常需要较长的记录时间进行取证分析。本文对ENF信号进行了统计研究,利用自回归过程对其进行建模。利用该模型研究了假设检测框架下ENF信号持续时间和信噪比对时间戳验证系统检测性能的影响。在此基础上,研究了一种基于去相关的ENF信号匹配时间戳验证方法。该方法需要更短的ENF信号持续时间,以达到与不去相关相同的检测性能。在音频数据上进行了实验,证明了该方法在检测性能上的改进。
{"title":"Modeling and analysis of Electric Network Frequency signal for timestamp verification","authors":"Ravi Garg, Avinash L. Varna, Min Wu","doi":"10.1109/WIFS.2012.6412627","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412627","url":null,"abstract":"Electric Network Frequency (ENF) fluctuations based forensic analysis is recently proposed for time-of-recording estimation, timestamp verification, and clip insertion/deletion forgery detection in multimedia recordings. Due to the load control mechanism of the electric grid, ENF fluctuations exhibit pseudo-periodic behavior and generally require a long duration of recording for forensic analysis. In this paper, a statistical study of the ENF signal is conducted to model it using an autoregressive process. The proposed model is used to understand the effect of the ENF signal duration and signal-to-noise ratio on the detection performance of a timestamp verification system under a hypothesis detection framework. Based on the proposed model, a decorrelation based approach is studied to match the ENF signals for timestamp verification. The proposed approach requires a shorter duration of the ENF signal to achieve the same detection performance as without decorrelation. Experiments are conducted on audio data to demonstrate an improvement in the detection performance of the proposed approach.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Biometric template protection using turbo codes and modulation constellations 使用turbo码和调制星座的生物识别模板保护
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412620
E. Maiorana, D. Blasi, P. Campisi
In this paper we propose a general biometric cryptosystem framework inspired by the code-offset sketch. Specifically, the properties of digital modulation and turbo codes with soft-decoding are exploited to design a template protection system able to guarantee high performance in terms of both verification rates and security, also when dealing with biometrics characterized by a high intra-class variability. The effectiveness of the presented approach is evaluated by its application as case study to on-line signature recognition.
在本文中,我们提出了一个受码差草图启发的通用生物识别密码系统框架。具体来说,利用数字调制和带有软解码的turbo码的特性来设计一个模板保护系统,该系统能够保证在验证率和安全性方面的高性能,也可以在处理具有高类内可变性的生物特征时使用。通过对在线签名识别的实例分析,验证了该方法的有效性。
{"title":"Biometric template protection using turbo codes and modulation constellations","authors":"E. Maiorana, D. Blasi, P. Campisi","doi":"10.1109/WIFS.2012.6412620","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412620","url":null,"abstract":"In this paper we propose a general biometric cryptosystem framework inspired by the code-offset sketch. Specifically, the properties of digital modulation and turbo codes with soft-decoding are exploited to design a template protection system able to guarantee high performance in terms of both verification rates and security, also when dealing with biometrics characterized by a high intra-class variability. The effectiveness of the presented approach is evaluated by its application as case study to on-line signature recognition.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131184397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
ML estimation of the resampling factor 重采样因子的ML估计
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412650
David Vázquez-Padín, Pedro Comesaña Alfaro
In this work, the problem of resampling factor estimation for tampering detection is addressed following the maximum likelihood criterion. By relying on the rounding operation applied after resampling, an approximation of the likelihood function of the quantized resampled signal is obtained. From the underlying statistical model, the maximum likelihood estimate is derived for one-dimensional signals and a piecewise linear interpolation. The performance of the obtained estimator is evaluated, showing that it outperforms state-of-the-art methods.
本文根据最大似然准则解决了篡改检测中重采样因子估计的问题。依靠重采样后施加的舍入运算,获得了量化重采样信号的似然函数的近似值。从基础统计模型,最大似然估计是一维信号和分段线性插值。评估了所获得的估计器的性能,表明它优于最先进的方法。
{"title":"ML estimation of the resampling factor","authors":"David Vázquez-Padín, Pedro Comesaña Alfaro","doi":"10.1109/WIFS.2012.6412650","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412650","url":null,"abstract":"In this work, the problem of resampling factor estimation for tampering detection is addressed following the maximum likelihood criterion. By relying on the rounding operation applied after resampling, an approximation of the likelihood function of the quantized resampled signal is obtained. From the underlying statistical model, the maximum likelihood estimate is derived for one-dimensional signals and a piecewise linear interpolation. The performance of the obtained estimator is evaluated, showing that it outperforms state-of-the-art methods.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132817573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
General function evaluation in a STPC setting via piecewise linear approximation 通过分段线性逼近的STPC设置中的一般函数评估
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412625
Tommaso Pignata, R. Lazzeretti, M. Barni
While in theory any computable functions can be evaluated in a Secure Two Party Computation (STPC) framework, practical applications are often limited for complexity reasons and by the kind of operations that the available cryptographic tools permit. In this paper we propose an algorithm that, given a function f() and an interval belonging to its domain, produces a piecewise linear approximation f() that can be easily implemented in a STPC setting. Two different implementations are proposed: the first one relies completely on Garbled Circuit (GC) theory, while the second one exploits a hybrid construction where GC and Homomorphic Encryption (HE) are used together. We show that from a communication complexity perspective the full-GC implementation is preferable when the input and output variables are represented with a small number of bits, otherwise the hybrid solution is preferable.
虽然理论上任何可计算的函数都可以在安全两方计算(STPC)框架中进行评估,但由于复杂性原因和可用加密工具允许的操作类型,实际应用通常受到限制。在本文中,我们提出了一种算法,给定函数f()和属于其定域的区间,产生一个分段线性逼近f(),可以很容易地在STPC设置中实现。提出了两种不同的实现:第一种完全依赖于乱码电路(GC)理论,而第二种利用GC和同态加密(HE)一起使用的混合结构。我们表明,从通信复杂性的角度来看,当输入和输出变量用少量比特表示时,全gc实现是可取的,否则混合解决方案是可取的。
{"title":"General function evaluation in a STPC setting via piecewise linear approximation","authors":"Tommaso Pignata, R. Lazzeretti, M. Barni","doi":"10.1109/WIFS.2012.6412625","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412625","url":null,"abstract":"While in theory any computable functions can be evaluated in a Secure Two Party Computation (STPC) framework, practical applications are often limited for complexity reasons and by the kind of operations that the available cryptographic tools permit. In this paper we propose an algorithm that, given a function f() and an interval belonging to its domain, produces a piecewise linear approximation f() that can be easily implemented in a STPC setting. Two different implementations are proposed: the first one relies completely on Garbled Circuit (GC) theory, while the second one exploits a hybrid construction where GC and Homomorphic Encryption (HE) are used together. We show that from a communication complexity perspective the full-GC implementation is preferable when the input and output variables are represented with a small number of bits, otherwise the hybrid solution is preferable.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131808446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How to find relevant training data: A paired bootstrapping approach to blind steganalysis 如何找到相关的训练数据:一种成对引导的盲隐写分析方法
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412654
Pham Hai Dang Le, M. Franz
Today, support vector machines (SVMs) seem to be the classifier of choice in blind steganalysis. This approach needs two steps: first, a training phase determines a separating hyperplane that distinguishes between cover and stego images; second, in a test phase the class membership of an unknown input image is detected using this hyperplane. As in all statistical classifiers, the number of training images is a critical factor: the more images that are used in the training phase, the better the steganalysis performance will be in the test phase, however at the price of a greatly increased training time of the SVM algorithm. Interestingly, only a few training data, the support vectors, determine the separating hyperplane of the SVM. In this paper, we introduce a paired bootstrapping approach specifically developed for the steganalysis scenario that selects likely candidates for support vectors. The resulting training set is considerably smaller, without a significant loss of steganalysis performance.
目前,支持向量机(svm)似乎是盲隐写分析的首选分类器。该方法需要两个步骤:首先,在训练阶段确定一个分离超平面来区分覆盖和隐写图像;其次,在测试阶段,使用该超平面检测未知输入图像的类隶属度。与所有统计分类器一样,训练图像的数量是一个关键因素:在训练阶段使用的图像越多,在测试阶段的隐写分析性能越好,但代价是SVM算法的训练时间大大增加。有趣的是,只有少量的训练数据和支持向量决定了支持向量机的分离超平面。在本文中,我们介绍了一种专门为隐写分析场景开发的配对自举方法,该方法可以选择可能的候选支持向量。得到的训练集要小得多,但没有显著的隐写分析性能损失。
{"title":"How to find relevant training data: A paired bootstrapping approach to blind steganalysis","authors":"Pham Hai Dang Le, M. Franz","doi":"10.1109/WIFS.2012.6412654","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412654","url":null,"abstract":"Today, support vector machines (SVMs) seem to be the classifier of choice in blind steganalysis. This approach needs two steps: first, a training phase determines a separating hyperplane that distinguishes between cover and stego images; second, in a test phase the class membership of an unknown input image is detected using this hyperplane. As in all statistical classifiers, the number of training images is a critical factor: the more images that are used in the training phase, the better the steganalysis performance will be in the test phase, however at the price of a greatly increased training time of the SVM algorithm. Interestingly, only a few training data, the support vectors, determine the separating hyperplane of the SVM. In this paper, we introduce a paired bootstrapping approach specifically developed for the steganalysis scenario that selects likely candidates for support vectors. The resulting training set is considerably smaller, without a significant loss of steganalysis performance.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134031003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPTV streaming source classification IPTV流媒体源分类
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412642
Miguel Masciopinto, Pedro Comesaña Alfaro
In the last years video streaming over IP networks has changed the entertainment habits of society. Video on demand and multicast services have proliferated, bringing new challenges. Although the majority of the new service providers are compliant with copyright protection policies, some services are streamed without the proper rights, leading to a new kind of content piracy. Therefore, content right owners are interested in finding out the distribution channel followed by these unauthorized contents, in order to learn about illegal distributor sources. We present the first approach to this problem, in which we deal with the classification of IPTV streamed contents on satellital (DVB-S) or terrestrial (DVB-T) sources, both for live and delayed streaming. Our proposal is based on analyzing the time distribution of IP packet dispatches, extracting high-order statistics, and performing the source classification using a SVM. The reported results show the goodness of the proposed approach.
在过去的几年里,IP网络上的视频流已经改变了社会的娱乐习惯。视频点播和多播服务激增,带来了新的挑战。尽管大多数新的服务提供商都遵守版权保护政策,但有些服务在没有适当权利的情况下流式传输,导致了一种新的内容盗版。因此,内容权利人有兴趣找出这些未经授权的内容所遵循的分销渠道,以了解非法分销来源。我们提出了解决这个问题的第一种方法,其中我们处理卫星(DVB-S)或地面(DVB-T)源上的IPTV流媒体内容的分类,包括直播和延迟流媒体。我们的建议是基于分析IP数据包调度的时间分布,提取高阶统计信息,并使用支持向量机进行源分类。已报道的结果表明了所提方法的优越性。
{"title":"IPTV streaming source classification","authors":"Miguel Masciopinto, Pedro Comesaña Alfaro","doi":"10.1109/WIFS.2012.6412642","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412642","url":null,"abstract":"In the last years video streaming over IP networks has changed the entertainment habits of society. Video on demand and multicast services have proliferated, bringing new challenges. Although the majority of the new service providers are compliant with copyright protection policies, some services are streamed without the proper rights, leading to a new kind of content piracy. Therefore, content right owners are interested in finding out the distribution channel followed by these unauthorized contents, in order to learn about illegal distributor sources. We present the first approach to this problem, in which we deal with the classification of IPTV streamed contents on satellital (DVB-S) or terrestrial (DVB-T) sources, both for live and delayed streaming. Our proposal is based on analyzing the time distribution of IP packet dispatches, extracting high-order statistics, and performing the source classification using a SVM. The reported results show the goodness of the proposed approach.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133646188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decoding fingerprints using the Markov Chain Monte Carlo method 解码指纹使用马尔可夫链蒙特卡罗方法
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412647
T. Furon, A. Guyader, F. Cérou
This paper proposes a new fingerprinting decoder based on the Markov Chain Monte Carlo (MCMC) method. A Gibbs sampler generates groups of users according to the posterior probability that these users could have forged the sequence extracted from the pirated content. The marginal probability that a given user pertains to the collusion is then estimated by a Monte Carlo method. The users having the biggest empirical marginal probabilities are accused. This MCMC method can decode any type of fingerprinting codes. This paper is in the spirit of the `Learn and Match' decoding strategy: it assumes that the collusion attack belongs to a family of models. The Expectation-Maximization algorithm estimates the parameters of the collusion model from the extracted sequence. This part of the algorithm is described for the binary Tardos code and with the exploitation of the soft outputs of the watermarking decoder. The experimental body considers some extreme setups where the fingerprinting code lengths are very small. It reveals that the weak link of our approach is the estimation part. This is a clear warning to the `Learn and Match' decoding strategy.
提出了一种基于马尔可夫链蒙特卡罗(MCMC)方法的指纹解码器。Gibbs采样器根据这些用户可能伪造从盗版内容中提取的序列的后验概率生成用户组。然后用蒙特卡罗方法估计给定用户属于串通的边际概率。具有最大经验边际概率的用户受到指责。这种MCMC方法可以解码任何类型的指纹码。本文本着“学习和匹配”解码策略的精神:它假设共谋攻击属于一类模型。期望最大化算法从提取的序列中估计合谋模型的参数。该部分描述了针对二进制Tardos码的算法,并利用了水印解码器的软输出。实验机构考虑了一些极端的设置,其中指纹码长度非常小。这表明我们的方法的薄弱环节是估计部分。这是对“学习和匹配”解码策略的一个明确警告。
{"title":"Decoding fingerprints using the Markov Chain Monte Carlo method","authors":"T. Furon, A. Guyader, F. Cérou","doi":"10.1109/WIFS.2012.6412647","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412647","url":null,"abstract":"This paper proposes a new fingerprinting decoder based on the Markov Chain Monte Carlo (MCMC) method. A Gibbs sampler generates groups of users according to the posterior probability that these users could have forged the sequence extracted from the pirated content. The marginal probability that a given user pertains to the collusion is then estimated by a Monte Carlo method. The users having the biggest empirical marginal probabilities are accused. This MCMC method can decode any type of fingerprinting codes. This paper is in the spirit of the `Learn and Match' decoding strategy: it assumes that the collusion attack belongs to a family of models. The Expectation-Maximization algorithm estimates the parameters of the collusion model from the extracted sequence. This part of the algorithm is described for the binary Tardos code and with the exploitation of the soft outputs of the watermarking decoder. The experimental body considers some extreme setups where the fingerprinting code lengths are very small. It reveals that the weak link of our approach is the estimation part. This is a clear warning to the `Learn and Match' decoding strategy.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116879688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Designing steganographic distortion using directional filters 利用方向滤波器设计隐写失真
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412655
Vojtech Holub, J. Fridrich
This paper presents a new approach to defining additive steganographic distortion in the spatial domain. The change in the output of directional high-pass filters after changing one pixel is weighted and then aggregated using the reciprocal Hölder norm to define the individual pixel costs. In contrast to other adaptive embedding schemes, the aggregation rule is designed to force the embedding changes to highly textured or noisy regions and to avoid clean edges. Consequently, the new embedding scheme appears markedly more resistant to steganalysis using rich models. The actual embedding algorithm is realized using syndrome-trellis codes to minimize the expected distortion for a given payload.
提出了一种在空间域中定义加性隐写失真的新方法。改变一个像素后,定向高通滤波器输出的变化是加权的,然后使用倒数Hölder范数进行聚合,以定义单个像素的代价。与其他自适应嵌入方案相比,聚合规则被设计成强制嵌入到高度纹理化或有噪声的区域,并避免干净的边缘。因此,新的嵌入方案显然更能抵抗使用富模型的隐写分析。实际的嵌入算法是使用综合征-网格编码来实现的,以最小化给定负载的预期畸变。
{"title":"Designing steganographic distortion using directional filters","authors":"Vojtech Holub, J. Fridrich","doi":"10.1109/WIFS.2012.6412655","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412655","url":null,"abstract":"This paper presents a new approach to defining additive steganographic distortion in the spatial domain. The change in the output of directional high-pass filters after changing one pixel is weighted and then aggregated using the reciprocal Hölder norm to define the individual pixel costs. In contrast to other adaptive embedding schemes, the aggregation rule is designed to force the embedding changes to highly textured or noisy regions and to avoid clean edges. Consequently, the new embedding scheme appears markedly more resistant to steganalysis using rich models. The actual embedding algorithm is realized using syndrome-trellis codes to minimize the expected distortion for a given payload.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115468412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 660
期刊
2012 IEEE International Workshop on Information Forensics and Security (WIFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1