Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models

Publikation: Beiträge in SammelwerkenAufsätze in KonferenzbändenForschungbegutachtet

Authors

Collusion attacks on watermarked media copies are commonly countered by probabilistically generated fingerprinting codes and appropriate tracing algorithms. The latter calculates accusation scores representing the suspiciousness of the fingerprints. In a 'detect many' scenario a threshold decides which scores are associated to the colluders. This work proposes a universal method to calculate thresholds for different decoders solely with knowledge of the accusation scores from the actual attack. Applying mixture models on the scores, the threshold is set up satisfying the selected error probabilities. It is independent from the fingerprint generation and can be applied at any decoder. Also no knowledge about the number of attackers or their strategy is needed.
OriginalspracheEnglisch
TitelProceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security
Anzahl der Seiten6
VerlagAssociation for Computing Machinery, Inc
Erscheinungsdatum17.06.2015
Seiten109-114
ISBN (Print)978-1-4503-3587-4
ISBN (elektronisch)978-1-4503-3587-4
DOIs
PublikationsstatusErschienen - 17.06.2015
VeranstaltungACM Workshop on Information Hiding and Multimedia Security - 2015 - Portland, USA / Vereinigte Staaten
Dauer: 17.06.201519.06.2015
Konferenznummer: 3
http://sigmm.org/events/acm-workshop-information-hiding-and-multimedia-security-2015

DOI

Zuletzt angesehen

Publikationen

  1. Analyzing math teacher students' sensitivity for aspects of the complexity of problem oriented mathematics instruction
  2. FaST: A linear time stack trace alignment heuristic for crash report deduplication
  3. Towards a Bayesian Student Model for Detecting Decimal Misconceptions
  4. Real-time RDF extraction from unstructured data streams
  5. What does it mean to be sensitive for the complexity of (problem oriented) teaching?
  6. Combining a PI Controller with an Adaptive Feedforward Control in PMSM
  7. Improving students’ science text comprehension through metacognitive self-regulation when applying learning strategies
  8. “Ideation is Fine, but Execution is Key”
  9. Age effects on controlling tools with sensorimotor transformations
  10. A new way of assessing the interaction of a metallic phase precursor with a modified oxide support substrate as a source of information for predicting metal dispersion
  11. Computing regression statistics from grouped data
  12. Performance analysis for loss systems with many subscribers and concurrent services
  13. Stimulating Computing
  14. Explaining and controlling for the psychometric properties of computer-generated figural matrix items
  15. Scaffolding argumentation in mathematics with CSCL scripts
  16. Foundations and applications of computer based material flow networks for einvironmental management
  17. A localized boundary element method for the floating body problem
  18. Robust feedback linearization control of a throttle plate by using an approximated pd regulator
  19. TARGET SETTING FOR OPERATIONAL PERFORMANCE IMPROVEMENTS - STUDY CASE -
  20. Integration of laser scanning and projection speckle pattern for advanced pipeline monitoring
  21. Partitioned beta diversity patterns of plants across sharp and distinct boundaries of quartz habitat islands
  22. Computer als Medium
  23. OKBQA framework towards an open collaboration for development of natural language question-answering systems over knowledge bases
  24. Learning from Erroneous Examples: When and How do Students Benefit from them?
  25. Analysis of PI controllers with anti-windup techniques on level systems
  26. An Adaptive and Optimized Switching Observer for Sensorless Control of an Electromagnetic Valve Actuator in Camless Internal Combustion Engines
  27. Gaussian processes for dispatching rule selection in production scheduling
  28. Learning Analytics with Matlab Grader in Undergraduate Engineering Courses
  29. TRY plant trait database – enhanced coverage and open access
  30. An evaluation of BPR methodologies adopting NIMSAD: A systematic framework for understanding and evaluating methodologies
  31. An expert-based reference list of variables for characterizing and monitoring social-ecological systems
  32. Practical guide to SAP Netweaver PI-development
  33. Two models for gradient inelasticity based on non-convex energy
  34. Modelling and implementation of an Order2Cash Process in distributed systems
  35. Preventive Diagnostics for cardiovascular diseases based on probabilistic methods and description logic
  36. An Orthogonal Wavelet Denoising Algorithm for Surface Images of Atomic Force Microscopy