2 research outputs found

    Contribution to the construction of fingerprinting and watermarking schemes to protect mobile agents and multimedia content

    Get PDF
    The main characteristic of fingerprinting codes is the need of high error-correction capacity due to the fact that they are designed to avoid collusion attacks which will damage many symbols from the codewords. Moreover, the use of fingerprinting schemes depends on the watermarking system that is used to embed the codeword into the content and how it honors the marking assumption. In this sense, even though fingerprinting codes were mainly used to protect multimedia content, using them on software protection systems seems an option to be considered. This thesis, studies how to use codes which have iterative-decoding algorithms, mainly turbo-codes, to solve the fingerprinting problem. Initially, it studies the effectiveness of current approaches based on concatenating tradicioanal fingerprinting schemes with convolutional codes and turbo-codes. It is shown that these kind of constructions ends up generating a high number of false positives. Even though this thesis contains some proposals to improve these schemes, the direct use of turbo-codes without using any concatenation with a fingerprinting code as inner code has also been considered. It is shown that the performance of turbo-codes using the appropiate constituent codes is a valid alternative for environments with hundreds of users and 2 or 3 traitors. As constituent codes, we have chosen low-rate convolutional codes with maximum free distance. As for how to use fingerprinting codes with watermarking schemes, we have studied the option of using watermarking systems based on informed coding and informed embedding. It has been discovered that, due to different encodings available for the same symbol, its applicability to embed fingerprints is very limited. On this sense, some modifications to these systems have been proposed in order to properly adapt them to fingerprinting applications. Moreover the behavior and impact over a video produced as a collusion of 2 users by the YouTube鈥檚 s ervice has been s tudied. We have also studied the optimal parameters for viable tracking of users who have used YouTube and conspired to redistribute copies generated by a collusion attack. Finally, we have studied how to implement fingerprinting schemes and software watermarking to fix the problem of malicious hosts on mobile agents platforms. In this regard, four different alternatives have been proposed to protect the agent depending on whether you want only detect the attack or avoid it in real time. Two of these proposals are focused on the protection of intrusion detection systems based on mobile agents. Moreover, each of these solutions has several implications in terms of infrastructure and complexity.Els codis fingerprinting es caracteritzen per proveir una alta capacitat correctora ja que han de fer front a atacs de confabulaci贸 que malmetran una part important dels s铆mbols de la paraula codi. D'atra banda, la utilitzaci贸 de codis de fingerprinting en entorns reals est脿 subjecta a que l'esquema de watermarking que gestiona la incrustaci贸 sigui respectuosa amb la marking assumption. De la mateixa manera, tot i que el fingerprinting neix de la protecci贸 de contingut multim猫dia, utilitzar-lo en la protecci贸 de software comen莽a a ser una aplicaci贸 a avaluar. En aquesta tesi s'ha estudiat com aplicar codis amb des codificaci贸 iterativa, concretament turbo-codis, al problema del rastreig de tra茂dors en el context del fingerprinting digital. Inicialment s'ha q眉estionat l'efic脿cia dels enfocaments actuals en la utilitzaci贸 de codis convolucionals i turbo-codis que plantegen concatenacions amb esquemes habituals de fingerprinting. S'ha demostrat que aquest tipus de concatenacions portaven, de forma impl铆cita, a una elevada probabilitat d'inculpar un usuari innocent. Tot i que s'han proposat algunes millores sobre aquests esquemes , finalment s'ha plantejat l'煤s de turbocodis directament, evitant aix铆 la concatenaci贸 amb altres esquemes de fingerprinting. S'ha demostrat que, si s'utilitzen els codis constituents apropiats, el rendiment del turbo-descodificador 茅s suficient per a ser una alternativa aplicable en entorns amb varis centenars d'usuaris i 2 o 3 confabuladors . Com a codis constituents s'ha optat pels codis convolucionals de baix r脿tio amb dist脿ncia lliure m脿xima. Pel que fa a com utilitzar els codis de fingerprinting amb esquemes de watermarking, s'ha estudiat l'opci贸 d'utilitzar sistemes de watermarking basats en la codificaci贸 i la incrustaci贸 informada. S'ha comprovat que, degut a la m煤ltiple codificaci贸 del mateix s铆mbol, la seva aplicabilitat per incrustar fingerprints 茅s molt limitada. En aquest sentit s'ha plantejat algunes modificacions d'aquests sistemes per tal d'adaptar-los correctament a aplicacions de fingerprinting. D'altra banda s'ha avaluat el comportament i l'impacte que el servei de YouTube produeix sobre un v铆deo amb un fingerprint incrustat. A m茅s , s'ha estudiat els par脿metres 貌ptims per a fer viable el rastreig d'usuaris que han confabulat i han utilitzat YouTube per a redistribuir la copia fru茂t de la seva confabulaci贸. Finalment, s'ha estudiat com aplicar els esquemes de fingerprinting i watermarking de software per solucionar el problema de l'amfitri贸 malici贸s en agents m貌bils . En aquest sentit s'han proposat quatre alternatives diferents per a protegir l'agent en funci贸 de si 茅s vol nom茅s detectar l'atac o evitar-lo en temps real. Dues d'aquestes propostes es centren en la protecci贸 de sistemes de detecci贸 d'intrusions basats en agents m貌bils. Cadascuna de les solucions t茅 diverses implicacions a nivell d'infrastructura i de complexitat.Postprint (published version
    corecore