Regular Simplex Fingerprints and Their Optimality Properties
This paper addresses the design of additive fingerprints that are maximally resilient against Gaussian averaging collusion attacks. The detector performs a binary hypothesis test in order to decide whether a user of interest is among the colluders. The encoder (fingerprint designer) is to imbed addi...
Saved in:
| Published in | Digital Watermarking pp. 97 - 109 |
|---|---|
| Main Authors | , |
| Format | Book Chapter |
| Language | English |
| Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
2005
|
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 354028768X 9783540287681 |
| ISSN | 0302-9743 1611-3349 |
| DOI | 10.1007/11551492_8 |
Cover
| Abstract | This paper addresses the design of additive fingerprints that are maximally resilient against Gaussian averaging collusion attacks. The detector performs a binary hypothesis test in order to decide whether a user of interest is among the colluders. The encoder (fingerprint designer) is to imbed additive fingerprints that minimize the probability of error of the test. Both the encoder and the attackers are subject to squared-error distortion constraints. We show that n-simplex fingerprints are optimal in sense of maximizing a geometric figure of merit for the detection test; these fingerprints outperform orthogonal fingerprints. They are also optimal in terms of maximizing the error exponent of the detection test, and maximizing the deflection criteria at the detector when the attacker’s noise is non-Gaussian. Reliable detection is guaranteed provided that the number of colluders $K \ll \sqrt{N}$ , where N is the length of the host vector. |
|---|---|
| AbstractList | This paper addresses the design of additive fingerprints that are maximally resilient against Gaussian averaging collusion attacks. The detector performs a binary hypothesis test in order to decide whether a user of interest is among the colluders. The encoder (fingerprint designer) is to imbed additive fingerprints that minimize the probability of error of the test. Both the encoder and the attackers are subject to squared-error distortion constraints. We show that n-simplex fingerprints are optimal in sense of maximizing a geometric figure of merit for the detection test; these fingerprints outperform orthogonal fingerprints. They are also optimal in terms of maximizing the error exponent of the detection test, and maximizing the deflection criteria at the detector when the attacker’s noise is non-Gaussian. Reliable detection is guaranteed provided that the number of colluders $K \ll \sqrt{N}$ , where N is the length of the host vector. |
| Author | Kiyavash, Negar Moulin, Pierre |
| Author_xml | – sequence: 1 givenname: Negar surname: Kiyavash fullname: Kiyavash, Negar email: kiyavash@uiuc.edu organization: Coordinated Science Laboratory, Dept. of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, – sequence: 2 givenname: Pierre surname: Moulin fullname: Moulin, Pierre email: moulin@ifp.uiuc.edu organization: Beckman Institute, Dept. of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, |
| BookMark | eNpFkEFLw0AUhFetYFt78Rfk6CX63r5Ndhe8SGlVKFS0B29hs7upq2kSshH039tSwbnMYWD4ZiZs1LSNZ-wK4QYB5C1ilqHQvFAnbEKZAOKQcThlY8wRUyKhz44BVzJXbyM2BgKeainogs1i_IC9CCXncszuXvz2qzZ98hp2Xe2_k2Votr7v-tAMMTGNSzbvPvTJuhvCztRh-Eme-7bz_RB8vGTnlamjn_35lG2Wi838MV2tH57m96s0IpBKS2e8tQhOCCOVq7wxpc21dRaczCtL5X5X7iunvdEGhQJnjSWvSEntiKbs-lgbD1h7uqJs289YIBSHR4r_R-gXkkVRjQ |
| ContentType | Book Chapter |
| Copyright | Springer-Verlag Berlin Heidelberg 2005 |
| Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2005 |
| DOI | 10.1007/11551492_8 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 3540320520 9783540320524 |
| EISSN | 1611-3349 |
| Editor | Barni, Mauro Kim, Hyoung-Joong Kalker, Ton Cox, Ingemar |
| Editor_xml | – sequence: 1 givenname: Mauro surname: Barni fullname: Barni, Mauro email: barni@dii.unisi.it – sequence: 2 givenname: Ingemar surname: Cox fullname: Cox, Ingemar email: i.cox@ee.ucl.ac.uk – sequence: 3 givenname: Ton surname: Kalker fullname: Kalker, Ton email: ton.kalker@hp.com – sequence: 4 givenname: Hyoung-Joong surname: Kim fullname: Kim, Hyoung-Joong email: khj@korea.ac.kr |
| EndPage | 109 |
| GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-s1038-bdaecc10d44a78dfeaabc69cdc0d76fc3b0076efd9ea9a1480dcac3e83879d33 |
| ISBN | 354028768X 9783540287681 |
| ISSN | 0302-9743 |
| IngestDate | Wed Sep 17 03:57:07 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-s1038-bdaecc10d44a78dfeaabc69cdc0d76fc3b0076efd9ea9a1480dcac3e83879d33 |
| Notes | This work was supported by NSF grant CCR03-25924. Original Abstract: This paper addresses the design of additive fingerprints that are maximally resilient against Gaussian averaging collusion attacks. The detector performs a binary hypothesis test in order to decide whether a user of interest is among the colluders. The encoder (fingerprint designer) is to imbed additive fingerprints that minimize the probability of error of the test. Both the encoder and the attackers are subject to squared-error distortion constraints. We show that n-simplex fingerprints are optimal in sense of maximizing a geometric figure of merit for the detection test; these fingerprints outperform orthogonal fingerprints. They are also optimal in terms of maximizing the error exponent of the detection test, and maximizing the deflection criteria at the detector when the attacker’s noise is non-Gaussian. Reliable detection is guaranteed provided that the number of colluders \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$K \ll \sqrt{N}$\end{document}, where N is the length of the host vector. |
| PageCount | 13 |
| ParticipantIDs | springer_books_10_1007_11551492_8 |
| PublicationCentury | 2000 |
| PublicationDate | 2005 |
| PublicationDateYYYYMMDD | 2005-01-01 |
| PublicationDate_xml | – year: 2005 text: 2005 |
| PublicationDecade | 2000 |
| PublicationPlace | Berlin, Heidelberg |
| PublicationPlace_xml | – name: Berlin, Heidelberg |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSubtitle | 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings |
| PublicationTitle | Digital Watermarking |
| PublicationYear | 2005 |
| Publisher | Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin Heidelberg |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Tygar, Dough Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, CA, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, MA, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: New York University, NY, USA – sequence: 13 givenname: Dough surname: Tygar fullname: Tygar, Dough organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany |
| SSID | ssj0000317227 ssj0002792 |
| Score | 1.3053391 |
| Snippet | This paper addresses the design of additive fingerprints that are maximally resilient against Gaussian averaging collusion attacks. The detector performs a... |
| SourceID | springer |
| SourceType | Publisher |
| StartPage | 97 |
| SubjectTerms | Error exponents Fingerprinting Simplex codes |
| Title | Regular Simplex Fingerprints and Their Optimality Properties |
| URI | http://link.springer.com/10.1007/11551492_8 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwGA1uvogP3vFOBN9KpV3atAF9ENkQ2abo1L2NNEnFBydsVdRf75dLV6ci6ksZpaxpTnqa73w3hPaDGFauiEKfMCL9iCjm80AKP2ZZlggSZNS0b-t06el1dNaP-1WbO5NdUmQH4u3bvJL_oArnAFedJfsHZCd_CifgN-ALR0AYjp82v9Myq4tludMNP7xbbtjVaN6VR_2VP_OxkUy66o5PInA7ugG6IZoL-B6OplbMpWlLP_Ku7nXF4BevZRQ_LfwVtpBzzzgVzoFkHuzu_UIr-aOijEPUz6zGR23nlug-Fibayys7R5REMqU0xJ-UhlJp9H4oxOWEJDDDqO3EUuZmAe-C5WKpTFmqpbqAIrEFSx192lBd9yEOTd2ErxxvwzpCs9djjUFaQzW4ax3NHjfP2jcTgQ3YKmk0JtZ3oCslWpeSHYpL9DFDdaWYqqF_KGRb3eiLs9zsQXqLaF7npWCdMAJzuYRm1HAZLZRzi93crqBDhyN2OOKPOGLAERsccYUjrnBcRb1Ws3dy6rseGf5Yl7b3M8nhJQwDGUU8SWWuOM8EZUKKQCY0FyTTvlaVS6Y442D7wovIBVEpSRMmCVlD9eHjUK0jHOcKuDqklOeNiCowZGnOqJBJGsuE5OEG2iuffqAX_XhQVryuZmjzF9dsoblqcW2jejF6UjuwsSuyXQfhOzKMSdQ |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Digital+Watermarking&rft.au=Kiyavash%2C+Negar&rft.au=Moulin%2C+Pierre&rft.atitle=Regular+Simplex+Fingerprints+and+Their+Optimality+Properties&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2005-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540287681&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=97&rft.epage=109&rft_id=info:doi/10.1007%2F11551492_8 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |