2,024 research outputs found
Multimedia Protection using Content and Embedded Fingerprints
Improved digital connectivity has made the Internet an important medium for multimedia distribution and consumption in recent years. At the same time, this increased proliferation of multimedia has raised significant challenges in secure multimedia distribution and intellectual property protection. This dissertation examines two complementary aspects of the multimedia protection problem that utilize content fingerprints and embedded collusion-resistant fingerprints.
The first aspect considered is the automated identification of multimedia using content fingerprints, which is emerging as an important tool for detecting copyright violations on user generated content websites. A content fingerprint is a compact identifier that captures robust and distinctive properties of multimedia content, which can be used for uniquely identifying the multimedia object. In this dissertation, we describe a modular framework for theoretical modeling and analysis of content fingerprinting techniques. Based on this framework, we analyze the impact of distortions in the features on the corresponding fingerprints and also consider the problem of designing a suitable quantizer for encoding the features in order to improve the identification accuracy. The interaction between the fingerprint designer and a malicious adversary seeking to evade detection is studied under a game-theoretic framework and optimal strategies for both parties are derived. We then focus on analyzing and understanding the matching process at the fingerprint level. Models for fingerprints with different types of correlations are developed and the identification accuracy under each model is examined. Through this analysis we obtain useful guidelines for designing practical systems and also uncover connections to other areas of research.
A complementary problem considered in this dissertation concerns tracing the users responsible for unauthorized redistribution of multimedia. Collusion-resistant fingerprints, which are signals that uniquely identify the recipient, are proactively embedded in the multimedia before redistribution and can be used for identifying the malicious users. We study the problem of designing collusion resistant fingerprints for embedding in compressed multimedia. Our study indicates that directly adapting traditional fingerprinting techniques to this new setting of compressed multimedia results in low collusion resistance. To withstand attacks, we propose an anti-collusion dithering technique for embedding fingerprints that significantly improves the collusion resistance compared to traditional fingerprints
On Multiple Hypothesis Testing with Rejection Option
We study the problem of multiple hypothesis testing (HT) in view of a
rejection option. That model of HT has many different applications. Errors in
testing of M hypotheses regarding the source distribution with an option of
rejecting all those hypotheses are considered. The source is discrete and
arbitrarily varying (AVS). The tradeoffs among error probability
exponents/reliabilities associated with false acceptance of rejection decision
and false rejection of true distribution are investigated and the optimal
decision strategies are outlined. The main result is specialized for discrete
memoryless sources (DMS) and studied further. An interesting insight that the
analysis implies is the phenomenon (comprehensible in terms of
supervised/unsupervised learning) that in optimal discrimination within M
hypothetical distributions one permits always lower error than in deciding to
decline the set of hypotheses. Geometric interpretations of the optimal
decision schemes are given for the current and known bounds in multi-HT for
AVS's.Comment: 5 pages, 3 figures, submitted to IEEE Information Theory Workshop
201
Information Forensics and Security: A quarter-century-long journey
Information forensics and security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering of solid evidence to hold perpetrators accountable. For over a quarter century, since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information era. The IEEE Signal Processing Society (SPS) has emerged as an important hub and leader in this area, and this article celebrates some landmark technical contributions. In particular, we highlight the major technological advances by the research community in some selected focus areas in the field during the past 25 years and present future trends
Interest-Based Self-Organizing Peer-to-Peer Networks: A Club Economics Approach
Improving the information retrieval (IR) performance of peer-to-peer
networks is an important and challenging problem. Recently, the computer
science literature has attempted to address this problem by improving IR
search algorithms. However, in peer-to-peer networks, IR performance is
determined by both technology and user behavior, and very little
attention has been paid in the literature to improving IR performance
through incentives to change user behavior. We address this gap by
combining the club goods economics literature and the IR literature to
propose a next generation file sharing architecture. Using the popular
Gnutella 0.6 architecture as context, we conceptualize a Gnutella
ultrapeer and its local network of leaf nodes as a "club" (in
economic terms). We specify an information retrieval-based utility model
for a peer to determine which clubs to join, for a club to manage its
membership, and for a club to determine to which other clubs they should
connect. We simulate the performance of our model using a unique
real-world dataset collected from the Gnutella 0.6 network. These
simulations show that our club model accomplishes both performance
goals. First, peers are self-organized into communities of interest - in
our club model peers are 85% more likely to be able to obtain content
from their local club than they are in the current Gnutella 0.6
architecture. Second, peers have increased incentives to share content -
our model shows that peers who share can increase their recall
performance by nearly five times over the performance offered to
free-riders. We also show that the benefits provided by our club model
outweigh the added protocol overhead imposed on the network for the most
valuable peers
A Framework for Uncertain Cloud Data Security and Recovery Based on Hybrid Multi-User Medical Decision Learning Patterns
Machine learning has been supporting real-time cloud based medical computing systems. However, most of the computing servers are independent of data security and recovery scheme in multiple virtual machines due to high computing cost and time. Also, this cloud based medical applications require static security parameters for cloud data security. Cloud based medical applications require multiple servers to store medical records or machine learning patterns for decision making. Due to high Uncertain computational memory and time, these cloud systems require an efficient data security framework to provide strong data access control among the multiple users. In this work, a hybrid cloud data security framework is developed to improve the data security on the large machine learning patterns in real-time cloud computing environment. This work is implemented in two phases’ i.e. data replication phase and multi-user data access security phase. Initially, machine decision patterns are replicated among the multiple servers for Uncertain data recovering phase. In the multi-access cloud data security framework, a hybrid multi-access key based data encryption and decryption model is implemented on the large machine learning medical patterns for data recovery and security process. Experimental results proved that the present two-phase data recovering, and security framework has better computational efficiency than the conventional approaches on large medical decision patterns
- …