91 research outputs found

    Improved Hybrid Fingerprint-Based P2P Media Distribution For Privacy Protection

    Get PDF
    It has been suggested that anonymous fingerprinting could be an easy way to ensure the lawful dissemination of copyright-protected multimedia content without compromising the privacy of customers, whose names would only be revealed in the event of illegal re-distribution of the content. This idea has been put forward as a potential solution to the problem. However, the majority of the currently available anonymous fingerprinting systems are not practical. This is due to the fact that they make use of complicated protocols that take up a lot of time, as well as homomorphic encryption of the data. Furthermore, they distribute the data using a unicast approach, which does not scale well for a large number of clients. The concept of recombined fingerprints serves as the foundation for this body of work, which also makes an effort to overcome some of these restrictions. On the other hand, recommended fingerprint approaches need a complex graph search for traitor monitoring, which in turn demands the participation of additional buyers and honest proxies in their P2P distribution scenario. Getting rid of these issues and developing a fingerprinting system that is not only efficient but also scalable, private, and makes use of P2P technology is the purpose of this research

    Flexible and Robust Privacy-Preserving Implicit Authentication

    Full text link
    Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.). While implicit authentication makes identity theft by third parties more difficult, it requires the server to learn and store the user's usage profile. Recently, the first privacy-preserving implicit authentication system was presented, in which the server does not learn the user's profile. It uses an ad hoc two-party computation protocol to compare the user's fresh sampled features against an encrypted stored user's profile. The protocol requires storing the usage profile and comparing against it using two different cryptosystems, one of them order-preserving; furthermore, features must be numerical. We present here a simpler protocol based on set intersection that has the advantages of: i) requiring only one cryptosystem; ii) not leaking the relative order of fresh feature samples; iii) being able to deal with any type of features (numerical or non-numerical). Keywords: Privacy-preserving implicit authentication, privacy-preserving set intersection, implicit authentication, active authentication, transparent authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May 26-28, 2015, IFIP AICT, Springer, to appea

    Lime: Data Lineage in the Malicious Environment

    Full text link
    Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. The threat now extends to our personal lives: a plethora of personal information is available to social networks and smartphone providers and is indirectly transferred to untrustworthy third party and fourth party applications. In this work, we present a generic data lineage framework LIME for data flow across multiple entities that take two characteristic, principal roles (i.e., owner and consumer). We define the exact security guarantees required by such a data lineage mechanism toward identification of a guilty entity, and identify the simplifying non repudiation and honesty assumptions. We then develop and analyze a novel accountable data transfer protocol between two entities within a malicious environment by building upon oblivious transfer, robust watermarking, and signature primitives. Finally, we perform an experimental evaluation to demonstrate the practicality of our protocol

    Are current ecological restoration practices capturing natural levels of genetic diversity? A New Zealand case study using AFLP and ISSR data from mahoe (Melicytus ramiflorus)

    Get PDF
    Sourcing plant species of local provenance (eco-sourcing) has become standard practice in plant community restoration projects. Along with established ecological restoration practices, knowledge of genetic variation in existing and restored forest fragments is important for ensuring the maintenance of natural levels of genetic variation and connectivity (gene flow) among populations. The application of restoration genetics often employs anonymous ‘fingerprinting’ markers in combination with limited sample sizes due to financial constraints. Here, we used two such marker systems, AFLPs and ISSRs, to estimate population-level genetic variation of a frequently used species in restoration projects in New Zealand, māhoe (Melicytus ramiflorus, Violaceae). We examined two rural and two urban forest fragments, as potential local source populations, to determine whether the māhoe population at the recently (re)constructed ecosystem at Waiwhakareke Natural Heritage Park (WNHP), Hamilton, New Zealand reflects the genetic variation observed in these four potential source populations. Both marker systems produced similar results and indicated, even with small population sizes, that levels of genetic variation at WNHP were comparable to in situ populations. However, the AFLPs did provide finer resolution of the population genetic structure than ISSRs. ISSRs, which are less expensive and technically less demanding to generate than AFLPs, may be sufficient for restoration projects where only a broad level of genotypic resolution is required. We recommend the use of AFLPs when species with a high conservation status are being used due to the greater resolution of this technique

    Recent Fingerprinting Techniques with Cryptographic Protocol

    Get PDF

    On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol

    Get PDF
    <p/> <p>Digital fingerprinting of multimedia contents involves the generation of a fingerprint, the embedding operation, and the realization of traceability from redistributed contents. Considering a buyer's right, the asymmetric property in the transaction between a buyer and a seller must be achieved using a cryptographic protocol. In the conventional schemes, the implementation of a watermarking algorithm into the cryptographic protocol is not deeply discussed. In this paper, we propose the method for implementing the spread spectrum watermarking technique in the fingerprinting protocol based on the homomorphic encryption scheme. We first develop a rounding operation which converts real values into integer and its compensation, and then explore the tradeoff between the robustness and communication overhead. Experimental results show that our system can simulate Cox's spread spectrum watermarking method into asymmetric fingerprinting protocol.</p

    Secure and Reliable Data Transfer across Multiple Entities by Using LIME

    Get PDF
    A data distributor has given precise data to a set of evidently trusted agents. Some of the data are leaked and found in an unjustified place. The distributor must assess the probability that the splitted data came from one or more agents, as opposed to having been individually collected by others. We suggest data allocation techniques which can enhance the chance of identifying split. These strategies do not build on changes of the outsourced data. While sending data through the network there is a lot of dishonest user looking to hack useful data. A proper security should be provided to data which is send to network. To avoid this data leakage, we used the data lineage mechanism. We develop and analyze novel accountable data transfer protocol between two entities within a malicious environment by building upon oblivious transfer and robust Watermarking

    Fingerprinting automático de contenidos digitales inspirado en las secuencias de ADN

    Get PDF
    Peer-reviewedLa distribución multicast de contenidos no es adecuada para el comercio electrónico, dado que produce exactamente la misma copia del contenido, de manera que los culpables de una distribución ilegal no pueden ser identificados. Por otro lado, la distribución unicast requiere una conexión para cada comprador, pero permite incrustar un número de serie diferente para cada usuario, lo que permite identificar a un distribuidor ilegal. La distribución por pares (P2P) proporciona una tercera opción que puede combinar algunas de las ventajas del multicast y el unicast: por un lado, el vendedor sólo necesita establecer conexiones unicast con unos pocos compradores-semilla, quienes se encargan de las futuras distribuciones del contenido; por otro lado, si se utiliza un mecanismo apropiado de fingerprinting, los distribuidores ilegales todavía pueden ser identificados. En este artículo se propone un esquema de fingerprinting inspirado en las secuencias de ADN que permite identificar a los redistribuidores, al mismo tiempo que se preserva el anonimato de la mayoría de los compradores honestos.This paper proposes a fingerprinting schema inspired in the AND sequences which allows to identify the redistributors of illegal contents, while the anonymity of the most of honest buyers is preserved.La distribució multicast de continguts no és adequada pel comerç electrònic, atès que produeix exactament la mateixa còpia del contingut, de manera que els culpables d'una distribució il·legal no poden ser identificats. D'altra banda, la distribució unicast requereix una connexió per cada comprador, però permet incrustar un número de sèrie diferent per cada usuari, el que permet identificar a un distribuïdor il·legal. La distribució per parells (P2P) proporciona una tercera opció que pot combinar alguns dels avantatges del multicast i l'unicast: d'una banda, el venedor només necessita establir connexions unicast amb uns pocs compradors, qui s'encarregaran de les futures distribucions del contingut, d'altra banda, si s'utilitza un mecanisme apropiat de fingerprinting, els distribuidors il·legals encara poden ser identificats. En aquest article es proposa un esquema de fingerprinting inspirat en les seqüències d'ADN que permet identificar als redistribuïdors, al mateix temps que es preserva l'anonimat de la majoria dels compradors honestos
    corecore