SlideShare a Scribd company logo
1 of 10
Digital Fingerprinting for Multimedia Content Protection Avinash L. Varna Advisor: Prof. Min Wu Department of  Electrical and Computer Engineering  University of Maryland, College Park
Motivation Alice w1 w2 Embed Fingerprints Bob w3 Carl Alice,Bob, … Detect Fingerprints Identify Content ShutterIsland Internet Alice,Bob, … Alice Shutter Island Bob Carl Embedded Fingerprints Content Fingerprints Collusion-resistant Fingerprint Design for Compressed Multimedia Analysis of Fingerprints for Content Identification
Fingerprinting Compressed Multimedia Set Top Box Decrypt Decompress Pirated  Copy Compressed video Cable TV distribution system Embed Fingerprint Collude Challenges: Discrete nature of host makes embedded fingerprint vulnerable to multi-user collusion attack Traditional fingerprinting: averaging ~10 copies sufficient to remove fingerprints Fingerprint embedding should not significantly increase file size
Anti-Collusion Dither With Dither Without Dither Distribution of host signal at various stages of the embedding process Add a dither signal before embedding to make the host appear more continuous Δ= 6 ,[object Object],A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting Compressed Multimedia Signals",  IEEE Transactions on Information Forensics and Security, Sep. 2009, pp 330-345.
Anti-Collusion Dither Add a dither signal before embedding to make the host appear more continuous Collusion resistance increases to ~30 colluders (from ~7) Theoretical Analysis: More users can be accommodated under given attack Difficult for attacker to estimate host accurately Derived expressions for Probability of detection PD Simulations using images: Preserves visual quality File size does not increase significantly A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting Compressed Multimedia Signals",  IEEE Transactions on Information Forensics and Security, Sep. 2009, pp 330-345.
Multimedia Content Identification Content Filtering Metadata Services From Verizon Shazam for iPhone Developed framework for modeling and understanding Analyze the mapping from video to features to bits:how is processing on video translated to changes in fingerprint bits? Model performance at bit string level Quantization & Encoding Feature Extraction Matching Video
Theoretical Analysis and Results Simple model : i.i.d. equiprobable fingerprint bits and noise alters each bit independently with probability p ,[object Object],M = 230, ε = 2-50 ,[object Object],A. L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Fingerprinting",  submitted to the IEEE Transactions on Information Forensics and Security, Dec. 2009.
Theoretical Analysis and Results Simple model : i.i.d. equiprobable fingerprint bits and noise alters each bit independently with probability p Derived guideline for choosing fingerprint length Game-theoretic analysis to derive optimal strategies for attacker and detector Markov Random Field model to capture correlations Understand influence of correlation on detection Cannot estimate rare-event probability accurately using traditional Markov Chain Monte-Carlo (MCMC) simulations Use statistical physics inspired approachto compute probabilities Noise Original Fingerprint A. L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Fingerprinting",  submitted to the IEEE Transactions on Information Forensics and Security, Dec. 2009.
Contributions of the Dissertation Multimedia Content Protection Deterrence & Tracing Identification & Filtering Collusion-resistant Fingerprints Content Fingerprintsfor Identification
Selected Publications Journal Papers A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting Compressed Multimedia Signals", IEEE Transactions on Information Forensics and Security, Sep. 2009, pp 330-345. A. L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Fingerprinting",  submitted to the IEEE Transactions on Information Forensics and Security, Dec. 2009. Wenjun Lu, A.L. Varna, AshwinSwaminathan, and Min Wu, "Privacy Preserving Multimedia Retrieval", submitted to IEEE Transactions on Information Forensics and Security, Oct. 2009, under revision. A. L. Varna and M. Wu, “Game-theoretic Analysis of Content Fingerprinting”, under preparation. Selected Conference Papers A. L. Varna, Shan He, AshwinSwaminathan, Min Wu, Haiming Lu, and Zengxiang Lu, "Collusion-Resistant Fingerprinting for Compressed Multimedia Signals", IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, pp. 165 - 168, Apr. 2007. A. L. Varna, AshwinSwaminathan, and Min Wu, "A Decision Theoretic Framework for Analyzing Hash-based Content Identification Systems", ACM Digital Rights Management Workshop, pp. 67-76 Oct. 2008. A. L. Varna and Min Wu, "Modeling and Analysis of Content Identification", IEEE International Conference on Multimedia and Expo, pp. 1529-1531, Jun. 2009. A. L. Varna, Wei-Hong Chuang, and Min Wu, "A Framework for Theoretical Analysis of Content Fingerprinting", SPIE and IS&T Media Forensics and Security, Jan. 2010.

More Related Content

What's hot

Swing07 day1 buttyan
Swing07 day1 buttyanSwing07 day1 buttyan
Swing07 day1 buttyan
rajrayala
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentation
hlksd
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
ekta sharma
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
Joseph Emmanuel
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
elango30
 

What's hot (20)

Swing07 day1 buttyan
Swing07 day1 buttyanSwing07 day1 buttyan
Swing07 day1 buttyan
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Steganography
SteganographySteganography
Steganography
 
331 340
331 340331 340
331 340
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentation
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Steganography
SteganographySteganography
Steganography
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
Steganography
SteganographySteganography
Steganography
 

Viewers also liked

Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rules
KUL2700
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
guest8cbcb02
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCIC
KUL2700
 

Viewers also liked (13)

Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprinting
 
Digital image protection using adaptive watermarking techniques
Digital image protection using adaptive watermarking techniquesDigital image protection using adaptive watermarking techniques
Digital image protection using adaptive watermarking techniques
 
Digital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking MethodsDigital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking Methods
 
Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rules
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCIC
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 

Similar to Research Overview

MCAR_Presentation_Poster
MCAR_Presentation_PosterMCAR_Presentation_Poster
MCAR_Presentation_Poster
Kwame Martin
 
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdfContent_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Vignesh V Menon
 
Content-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive StreamingContent-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive Streaming
Alpen-Adria-Universität
 

Similar to Research Overview (20)

becan
becanbecan
becan
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
 
Fv3111451146
Fv3111451146Fv3111451146
Fv3111451146
 
Josep Domingo Jordi Castella
Josep Domingo   Jordi CastellaJosep Domingo   Jordi Castella
Josep Domingo Jordi Castella
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Ijctt v17 p128-copy-copy
Ijctt v17 p128-copy-copyIjctt v17 p128-copy-copy
Ijctt v17 p128-copy-copy
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
MCAR_Presentation_Poster
MCAR_Presentation_PosterMCAR_Presentation_Poster
MCAR_Presentation_Poster
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Slides: Logging safely in public spaces using color PINs
Slides: Logging safely in public spaces using color PINsSlides: Logging safely in public spaces using color PINs
Slides: Logging safely in public spaces using color PINs
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
 
Enhanced jean Algorithm for Attacker Group Recognition
Enhanced jean Algorithm for Attacker Group RecognitionEnhanced jean Algorithm for Attacker Group Recognition
Enhanced jean Algorithm for Attacker Group Recognition
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Linked Sensor Data 101 (FIS2011)
Linked Sensor Data 101 (FIS2011)Linked Sensor Data 101 (FIS2011)
Linked Sensor Data 101 (FIS2011)
 
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdfContent_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
 
Content-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive StreamingContent-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive Streaming
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Research Overview

  • 1. Digital Fingerprinting for Multimedia Content Protection Avinash L. Varna Advisor: Prof. Min Wu Department of Electrical and Computer Engineering University of Maryland, College Park
  • 2. Motivation Alice w1 w2 Embed Fingerprints Bob w3 Carl Alice,Bob, … Detect Fingerprints Identify Content ShutterIsland Internet Alice,Bob, … Alice Shutter Island Bob Carl Embedded Fingerprints Content Fingerprints Collusion-resistant Fingerprint Design for Compressed Multimedia Analysis of Fingerprints for Content Identification
  • 3. Fingerprinting Compressed Multimedia Set Top Box Decrypt Decompress Pirated Copy Compressed video Cable TV distribution system Embed Fingerprint Collude Challenges: Discrete nature of host makes embedded fingerprint vulnerable to multi-user collusion attack Traditional fingerprinting: averaging ~10 copies sufficient to remove fingerprints Fingerprint embedding should not significantly increase file size
  • 4.
  • 5. Anti-Collusion Dither Add a dither signal before embedding to make the host appear more continuous Collusion resistance increases to ~30 colluders (from ~7) Theoretical Analysis: More users can be accommodated under given attack Difficult for attacker to estimate host accurately Derived expressions for Probability of detection PD Simulations using images: Preserves visual quality File size does not increase significantly A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting Compressed Multimedia Signals", IEEE Transactions on Information Forensics and Security, Sep. 2009, pp 330-345.
  • 6. Multimedia Content Identification Content Filtering Metadata Services From Verizon Shazam for iPhone Developed framework for modeling and understanding Analyze the mapping from video to features to bits:how is processing on video translated to changes in fingerprint bits? Model performance at bit string level Quantization & Encoding Feature Extraction Matching Video
  • 7.
  • 8. Theoretical Analysis and Results Simple model : i.i.d. equiprobable fingerprint bits and noise alters each bit independently with probability p Derived guideline for choosing fingerprint length Game-theoretic analysis to derive optimal strategies for attacker and detector Markov Random Field model to capture correlations Understand influence of correlation on detection Cannot estimate rare-event probability accurately using traditional Markov Chain Monte-Carlo (MCMC) simulations Use statistical physics inspired approachto compute probabilities Noise Original Fingerprint A. L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Fingerprinting", submitted to the IEEE Transactions on Information Forensics and Security, Dec. 2009.
  • 9. Contributions of the Dissertation Multimedia Content Protection Deterrence & Tracing Identification & Filtering Collusion-resistant Fingerprints Content Fingerprintsfor Identification
  • 10. Selected Publications Journal Papers A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting Compressed Multimedia Signals", IEEE Transactions on Information Forensics and Security, Sep. 2009, pp 330-345. A. L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Fingerprinting", submitted to the IEEE Transactions on Information Forensics and Security, Dec. 2009. Wenjun Lu, A.L. Varna, AshwinSwaminathan, and Min Wu, "Privacy Preserving Multimedia Retrieval", submitted to IEEE Transactions on Information Forensics and Security, Oct. 2009, under revision. A. L. Varna and M. Wu, “Game-theoretic Analysis of Content Fingerprinting”, under preparation. Selected Conference Papers A. L. Varna, Shan He, AshwinSwaminathan, Min Wu, Haiming Lu, and Zengxiang Lu, "Collusion-Resistant Fingerprinting for Compressed Multimedia Signals", IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, pp. 165 - 168, Apr. 2007. A. L. Varna, AshwinSwaminathan, and Min Wu, "A Decision Theoretic Framework for Analyzing Hash-based Content Identification Systems", ACM Digital Rights Management Workshop, pp. 67-76 Oct. 2008. A. L. Varna and Min Wu, "Modeling and Analysis of Content Identification", IEEE International Conference on Multimedia and Expo, pp. 1529-1531, Jun. 2009. A. L. Varna, Wei-Hong Chuang, and Min Wu, "A Framework for Theoretical Analysis of Content Fingerprinting", SPIE and IS&T Media Forensics and Security, Jan. 2010.
  • 11. Contributions of the Dissertation Collusion-resistant fingerprints for compressed multimedia Evaluated performance of Gaussian based sequences Introduced Anti-Collusion Dither that can approximately triplethe collusion resistance Analyzed performance of techniques from different viewpoints Analysis of multimedia content identification Developed a theoretical framework for analyzing content identification schemes Proposed models for binary fingerprints and derived fundamental bounds on performance Performed game-theoretic analysis of interaction between the system designer and attacker