Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models

Publikation: Beiträge in SammelwerkenAufsätze in KonferenzbändenForschungbegutachtet

Authors

Collusion attacks on watermarked media copies are commonly countered by probabilistically generated fingerprinting codes and appropriate tracing algorithms. The latter calculates accusation scores representing the suspiciousness of the fingerprints. In a 'detect many' scenario a threshold decides which scores are associated to the colluders. This work proposes a universal method to calculate thresholds for different decoders solely with knowledge of the accusation scores from the actual attack. Applying mixture models on the scores, the threshold is set up satisfying the selected error probabilities. It is independent from the fingerprint generation and can be applied at any decoder. Also no knowledge about the number of attackers or their strategy is needed.
OriginalspracheEnglisch
TitelProceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security
Anzahl der Seiten6
VerlagAssociation for Computing Machinery, Inc
Erscheinungsdatum17.06.2015
Seiten109-114
ISBN (Print)978-1-4503-3587-4
ISBN (elektronisch)978-1-4503-3587-4
DOIs
PublikationsstatusErschienen - 17.06.2015
VeranstaltungACM Workshop on Information Hiding and Multimedia Security - 2015 - Portland, USA / Vereinigte Staaten
Dauer: 17.06.201519.06.2015
Konferenznummer: 3
http://sigmm.org/events/acm-workshop-information-hiding-and-multimedia-security-2015

DOI

Zuletzt angesehen

Publikationen

  1. Analyzing math teacher students' sensitivity for aspects of the complexity of problem oriented mathematics instruction
  2. FaST: A linear time stack trace alignment heuristic for crash report deduplication
  3. Towards a Bayesian Student Model for Detecting Decimal Misconceptions
  4. Real-time RDF extraction from unstructured data streams
  5. What does it mean to be sensitive for the complexity of (problem oriented) teaching?
  6. Combining a PI Controller with an Adaptive Feedforward Control in PMSM
  7. An analytical approach to evaluating bivariate functions of fuzzy numbers with one local extremum
  8. Explaining and controlling for the psychometric properties of computer-generated figural matrix items
  9. Scaffolding argumentation in mathematics with CSCL scripts
  10. Foundations and applications of computer based material flow networks for einvironmental management
  11. A localized boundary element method for the floating body problem
  12. On the Decoupling and Output Functional Controllability of Robotic Manipulation
  13. TARGET SETTING FOR OPERATIONAL PERFORMANCE IMPROVEMENTS - STUDY CASE -
  14. Integration of laser scanning and projection speckle pattern for advanced pipeline monitoring
  15. Partitioned beta diversity patterns of plants across sharp and distinct boundaries of quartz habitat islands
  16. Computer als Medium
  17. OKBQA framework towards an open collaboration for development of natural language question-answering systems over knowledge bases
  18. From Knowledge to Application
  19. Learning from Erroneous Examples: When and How do Students Benefit from them?
  20. Analysis of PI controllers with anti-windup techniques on level systems
  21. An Adaptive and Optimized Switching Observer for Sensorless Control of an Electromagnetic Valve Actuator in Camless Internal Combustion Engines
  22. Exploring the limits of graph invariant- and spectrum-based discrimination of (sub)structures.
  23. Learning Analytics with Matlab Grader in Undergraduate Engineering Courses
  24. TRY plant trait database – enhanced coverage and open access
  25. An evaluation of BPR methodologies adopting NIMSAD: A systematic framework for understanding and evaluating methodologies
  26. On finding nonisomorphic connected subgraphs and distinct molecular substructures.
  27. 7th open challenge on question answering over linked data (QALD-7)
  28. A Review of Latent Variable Modeling Using R - A Step-by-Step-Guide
  29. Switching from a Managing to a Monitoring Function on the Board
  30. Practical guide to SAP Netweaver PI-development
  31. Two models for gradient inelasticity based on non-convex energy
  32. Knowledge-Enhanced Language Models Are Not Bias-Proof
  33. An Orthogonal Wavelet Denoising Algorithm for Surface Images of Atomic Force Microscopy