[ieee 2010 ieee 12th international workshop on multimedia signal processing (mmsp) - saint-malo,...

5
Content Identification Based on digital fingerprint: what can be done if ML decoding fails? Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy Koval Computer Science Department, University of Geneva 7, route de Drize, Geneva, Switzerland {farzad.farhadzadeh, svolos, oleksiy.koval}@unige.ch Abstract—In this paper, the performance of the content iden- tification based on digital fingerprinting and order statistic list decoding is analyzed by evaluating the probabilities of correct identification, false acceptance and the probability mass function of queried binary fingerprint position on the list of candidates. The particular attention is dedicated to the cases when traditional maximum likelihood decoder fails to produce the reliable content identification. The maximum likelihood decoding is shown to be a particular case of order statistic list decoding for the list size equals 1. We demonstrate the efficiency of the proposed content identification system performance by investigating the probability mass function behavior and imposing the constraint on the cardinality of list size. I. I NTRODUCTION The present work addresses a content identification problem based on digital fingerprints. In many applications, where the content modifications caused by watermark embedding are undesirable, content identification based on digital fingerprint- ing is the only possible solution. The content identification based on digital fingerprinting is an emerging thecnique in various multimedia security and management applications such as copyright protection, content filtering and automatic identification, authentication, broadcast monitoring, content tagging, etc. A digital fingerprint represents a short, robust and distinc- tive content description allowing fast and privacy-preserving operations. In this case, all operations are performed on the fingerprint instead of on the original large and privacysensitive data. Due to channel distortions, i.e., acquisition imperfection, compression etc., the content identification system should be able to cope with data variations. In classical content identi- fication setups the decoder estimate a unique index from the database of records for a given query that has the constraint on feasibility. Moreover, in the large scale database, the classical approach fails to act reliable. Another approach, which can be considered as a generalization of the above mentioned one, was proposed by Elias [2] and Forney [3] in information theory and is known as list decoding. The list decoder produces a fixed/varying list size of the most likely candidates rather than a single one. However, contrarily to digital communications, in MMSP’10, October 4-6, 2010, Saint-Malo, France. 978-1- 4244-8112-5/10/$26.00 2010 IEEE. the content identification setup the decoder should first of all determine whether a given query is related to some elements of database or not. Therefore, what we suggest is a list decoding with the ranked (or scored) list of possible candidates. The main contribution of this paper can be summarized as follows. We introduce the content identification setup based on an order statistic list decoder (OSLD) of a fixed maximum list size and analyze its performance by computing the probability of correct identification and false acceptance. Moreover, for the sake of deep investigation of the proposed approach, the PMF of the correct entry position behavior in different situations will be considered. In performance analysis, we show that the classical maximum likelihood (ML) decoding is a particular case of our proposed decoder. We use random projections and binarization for binary fingerprint generation and channel statistics conversion to a binary model [5]. Notations: We use capital letters X to denote scalar random variables and X to denote vector random variables. Corre- sponding small letters x and x denote the realizations of scalar and vector random variables. All vectors without sign tilde are assumed to be of the length N and with the sign tilde of length L. B(N,p) denotes the Binomial distribution with N trials and probability of success p. V (r:M) stands for the r-th order statistics of M i.i.d. random variables. II. I DENTIFICATION SETUP The identification setup under analysis shown in Fig. 1 consists of two main phases: enrollment and identification. In the enrollment phase, the digital fingerprints of biometrics or physical unclonable functions (PUFs) of items to be identi- fied x(m) ∈X N ,m =1,...,M are extrated and stored in the Database. The digital fingerprint extraction is accomplished in two steps. At the first step, by applying random projectors [5], which are a so-called approximate orthoprojector W R L×N with W ij ∼N (0, 1 N ), 1 i L and 1 j N , the dimensionality is reduced from N to L. We assume, that biometrics or PUFs are drawn independently from a common stationary distribution p X (x). At the second step, L-length binary data are derived from the projected data by taking the sign of the reduced data, i.e., B ˜ x = Q( ˜ X) ,where ˜ X = WX. In the identification phase; for a given query Y, which can be a noisy version of the biometrics or PUFs, the digital fingerprint is extracted the same way as in the enrollment phase, i.e., B ˜ y = Q( ˜ Y) ,where ˜ Y = WY. Afterwards, the 978-1-4244-8112-5/10/$26.00 ©2010 IEEE 64

Upload: oleksiy

Post on 28-Feb-2017

217 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: [IEEE 2010 IEEE 12th International Workshop on Multimedia Signal Processing (MMSP) - Saint-Malo, France (2010.10.4-2010.10.6)] 2010 IEEE International Workshop on Multimedia Signal

Content Identification Based on digital fingerprint:what can be done if ML decoding fails?

Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy Koval

Computer Science Department, University of Geneva7, route de Drize, Geneva, Switzerland

{farzad.farhadzadeh, svolos, oleksiy.koval}@unige.ch

Abstract—In this paper, the performance of the content iden-tification based on digital fingerprinting and order statistic listdecoding is analyzed by evaluating the probabilities of correctidentification, false acceptance and the probability mass functionof queried binary fingerprint position on the list of candidates.The particular attention is dedicated to the cases when traditionalmaximum likelihood decoder fails to produce the reliable contentidentification. The maximum likelihood decoding is shown tobe a particular case of order statistic list decoding for the listsize equals 1. We demonstrate the efficiency of the proposedcontent identification system performance by investigating theprobability mass function behavior and imposing the constrainton the cardinality of list size.

I. INTRODUCTION

The present work addresses a content identification problembased on digital fingerprints. In many applications, where thecontent modifications caused by watermark embedding areundesirable, content identification based on digital fingerprint-ing is the only possible solution. The content identificationbased on digital fingerprinting is an emerging thecnique invarious multimedia security and management applicationssuch as copyright protection, content filtering and automaticidentification, authentication, broadcast monitoring, contenttagging, etc.

A digital fingerprint represents a short, robust and distinc-tive content description allowing fast and privacy-preservingoperations. In this case, all operations are performed on thefingerprint instead of on the original large and privacysensitivedata.

Due to channel distortions, i.e., acquisition imperfection,compression etc., the content identification system should beable to cope with data variations. In classical content identi-fication setups the decoder estimate a unique index from thedatabase of records for a given query that has the constraint onfeasibility. Moreover, in the large scale database, the classicalapproach fails to act reliable. Another approach, which canbe considered as a generalization of the above mentioned one,was proposed by Elias [2] and Forney [3] in information theoryand is known as list decoding. The list decoder produces afixed/varying list size of the most likely candidates rather thana single one. However, contrarily to digital communications, in

MMSP’10, October 4-6, 2010, Saint-Malo, France. 978-1-4244-8112-5/10/$26.00 2010 IEEE.

the content identification setup the decoder should first of alldetermine whether a given query is related to some elements ofdatabase or not. Therefore, what we suggest is a list decodingwith the ranked (or scored) list of possible candidates.

The main contribution of this paper can be summarized asfollows. We introduce the content identification setup based onan order statistic list decoder (OSLD) of a fixed maximum listsize and analyze its performance by computing the probabilityof correct identification and false acceptance. Moreover, for thesake of deep investigation of the proposed approach, the PMFof the correct entry position behavior in different situationswill be considered. In performance analysis, we show that theclassical maximum likelihood (ML) decoding is a particularcase of our proposed decoder. We use random projectionsand binarization for binary fingerprint generation and channelstatistics conversion to a binary model [5].

Notations: We use capital letters X to denote scalar randomvariables and X to denote vector random variables. Corre-sponding small letters x and x denote the realizations of scalarand vector random variables. All vectors without sign tildeare assumed to be of the length N and with the sign tilde oflength L. B(N, p) denotes the Binomial distribution with Ntrials and probability of success p. V(r:M) stands for the r-thorder statistics of M i.i.d. random variables.

II. IDENTIFICATION SETUP

The identification setup under analysis shown in Fig. 1consists of two main phases: enrollment and identification.

In the enrollment phase, the digital fingerprints of biometricsor physical unclonable functions (PUFs) of items to be identi-fied x(m) ∈ XN , m = 1, . . . , M are extrated and stored in theDatabase. The digital fingerprint extraction is accomplished intwo steps. At the first step, by applying random projectors [5],which are a so-called approximate orthoprojector W ∈ R

L×N

with Wij ∼ N (0, 1N ), 1 ≤ i ≤ L and 1 ≤ j ≤ N , the

dimensionality is reduced from N to L. We assume, thatbiometrics or PUFs are drawn independently from a commonstationary distribution pX(x). At the second step, L-lengthbinary data are derived from the projected data by taking thesign of the reduced data, i.e., Bx = Q(X) ,where X = WX.

In the identification phase; for a given query Y, which canbe a noisy version of the biometrics or PUFs, the digitalfingerprint is extracted the same way as in the enrollmentphase, i.e., By = Q(Y) ,where Y = WY. Afterwards, the

978-1-4244-8112-5/10/$26.00 ©2010 IEEE 64

Page 2: [IEEE 2010 IEEE 12th International Workshop on Multimedia Signal Processing (MMSP) - Saint-Malo, France (2010.10.4-2010.10.6)] 2010 IEEE International Workshop on Multimedia Signal

010 010

011 101

Database

Identifier

X

Y

xB

yB

Hash Generation

|PY X

W Q

W Q

bP1 bP−1 bP−

xB

yB

Pr

l′

Ranked indices

PositionHash GenerationY

1 2 3 lN

{ } { } { }1, , , 1, , ,1ll N j l li i i M j N N′′ ′= ∈ ∅ ≤ ≤ ≤… … ∪

Fig. 1. Identification problem based on binary templates.

decoder detects that the query is related to some entries of thedatabase, and if so, identifies which ones.

The decoding process in the identification setup is accom-plished in two steps. At the first step, the primary candidatesare chosen by the OSLD. At the second step, a threshold isapplied to the chosen candidates, and the candidates whichsatisfy the constraint remain. The OSLD procedure is accom-plished as follows1:

1) The likelihood functions, p(y|x(m)), 1 ≤ m ≤ M , forall database entries are computed.

2) The computed likelihood functions are sorted in ascend-ing order.

3) The Nl indices with the largest likelihood functions arechosen, which form a primary list Nl. The parameter Nl

is referred as a primary list size.4) The final output set of the decoder is defined as N ′

l ={m ∈ Nl : p(y|x(m)) ≥ eNγ} , where the parameter γcontrols the number of final candidates.

The identification problem is considered as an M + 1-aryhypothesis testing. The probability of correct identification isPc = Pr{m ∈ N ′

l |Hm}, 1 ≤ m ≤ M , and the probability offalse acceptance is Pf = Pr{N ′

l �= ∅|H0}.In this paper, we analyze the performance of the OSLD and

investigate the distribution of decoded indices on the rankedlist of candidates.

III. ORDER STATITICS

Before considering error events, we will review funda-mentals of the Order Statistics which will be used in thecomputation of the probabilities of errors. We suppose thatV (1), V (2), . . . , V (M) are M i.i.d. random variables, eachwith a cumulative distribution function (CDF) F (v). LetF(r:M)(v) denote the CDF of the r-th order statistics V(r:M),which corresponds to the r-th position of v(1:M) ≤ v(2:M) ≤. . . ≤ v(r:M) ≤ . . . ≤ v(M :M) for a specific outcome. Then

1The low-complexity identification based on the OSLD decoding and theconcept of bit reliability is given in [6].

[4]:

F(r:M)(v)=Pr{V(r:M) ≤ v

}=Pr {at least r of Vi are less than or equal to v}

=M∑i=r

(M

i

)F i(v)[1 − F (v)]M−i, (1)

since the term in the summand is the binomial probability thatexactly i of V (1), V (2), . . . , V (M) are less than or equal tov.

IV. PROBABILITY OF CORRECT IDENTIFICATION

Once the list of primary candidates is selected by theOSLD, the final candidates are extracted by thresholding theirlikelihoods. A correct identification event occurs, when thequery related to the database entry is on the list of finalcandidates. The probability of correct identification, Pc, isgiven by:

Pc=M∑

m=1

Pr{(m ∈ Nl)⋂

(p(y|x(m)) ≥ eNγ)|Hm}

×Pr{Hm}, (2)

where Nl is the primary list of candidates. As the entries ofthe database are identically distributed and equally likely to bequeried, the overall probability of correct identification doesnot depend on the particular index and hence:

Pc = Pr{(1 ∈ Nl)⋂

(p(y|x(1)) ≥ eNγ)|H1}. (3)

After dimensionality reduction and binarization, we have bi-nary data of the length L, where L < N . In order to evaluatePc, we consider the BSC with a crossover probability Pb. Forany bx(m),by ∈ {0, 1}L, the likelihood function

p(by|bx(m)) = PdH(by,bx(m))b (1 − Pb)L−dH(by,bx(m)) (4)

is a decreasing function of the Hamming distance d(m) �dH(by,bx(m)) for 0 ≤ Pb ≤ 0.5. In the following, wewill consider the above Hamming distance as a realizationof a random variable D(m), where m refers to the index ofbx(m). Given a query related to the mth entry of the database,the event m ∈ Nl occurs, if d(m) is among the Nl smallest{d(1), d(2), . . . , d(M)}. Fig. 2 illustrates this event given thequery is related to the first entry of the database.

The dimensionality reduction and binarization modify thestatistics of the database generated by pX(x) to the Binomialdistribution, i.e., Bx ∼ B(L, 1/2) for any pX(x) with adiagonal covariance matrix.

Conditioned on H1, the sufficient statistics can be expressedas follows:

D(m) ∼{B(L, Pb), for m = 1,

B(L, 12 ), for m �= 1.

(5)

From (1), the complement of the cumulative distributionfunction, F c

(Nl:M−1)(d), of N thl order statistics of the i.i.d

65

Page 3: [IEEE 2010 IEEE 12th International Workshop on Multimedia Signal Processing (MMSP) - Saint-Malo, France (2010.10.4-2010.10.6)] 2010 IEEE International Workshop on Multimedia Signal

<>

1M −

(1) lD ∈

(1) lD ∉

(1)D ( : 1)lN MD −

(1: 1)MD − ( 1: 1)lN MD − − ( : 1)lN MD − ( 1: 1)M MD − −

Fig. 2. The illustration of the event that the first entry of database relatedto the query is not on the primary list.

random variables D(m), m �= 1, is given by:

F c(Nl:M−1)(d)=Pr{D(Nl:M−1) > d}

=Nl−1∑p=0

(M − 1

p

)s(d)ps(d)(M−1)−p, (6)

where s(d) �∑d

x=0

(Lx

) (12

)L. From (5) and (6), The

probability of correct identification (3) over the BSC can beexpressed by:

Pc(a)= Pr{(D(Nl:M−1) > D(1)) ∩ (D(1) ≤ η)|H1}

=η∑

d=0

Pr{D(Nl:M−1) > d|H1, D(1) = d}pD(1)(d)

=

{η∑

d=0

(L

d

)P d

b (1 − Pb)L−d

×Nl−1∑p=0

(M − 1

p

)s(d)p(1 − s(d))(M−1)−p

}

(7)

where from (3) and (4) η = L γ−ln(1−Pb)ln(Pb/(1−Pb))

, (a) follows from(3) and the fact that the likelihood function is a decreasingfunction of the Hamming distance, and pD(1)(d) denotes thePMF of D(1).

V. PROBABILITY OF FALSE ACCEPTANCE

The main reason to consider the probability of false ac-ceptance is to show the reliability of the decoding processwith respect to various attacking strategies. There are differ-ent scenarios to investigate the reliability of the decoder inidentification setups:

• The PDF of database generation is known.• The PDF of database generation is not known.• The database entries are partially known.• The database entries are totally known.

In this paper, we consider the scenario in which the PDFis fully known by the attacker. In the following, the falseacceptance event is considered over the BSC.

For this purpose, we define the following events:

ED(i:M) = {D(i:M) ≤ η|H0}, (8)

where 1 ≤ i ≤ Nl, D(m) ∼ B(L, 12 ), 1 ≤ m ≤ M , and

ED(i:M) is the event that the ith ascendingly ranked Hamming

()m

Dr

(1:

1)M

D−

(1:

1)k

MD

−−

(:

1)kM

D−

(2:

1)M

MD

−−

(1:

1)M

MD

−−

1r 1jr − jr 1jr + 1Mr − Mr

(1)

D

mrFig. 3. The illustration of the event that the first entry of database relatedto the query falls on the rth

j position.

distance between the query and an entry of the database issmaller than the threshold. The probability of false acceptanceis found as:

Pf =Pr{ Nl⋃

i=1

ED(i:M) |H0

}

=1 − Pr{ Nl⋂

i=1

EcD(i:M)

|H0

}(a)=1 − Pr

{Ec

D(1:M)|H0

}= Pr

{ED(1:M) |H0

}, (9)

where (a) follows from the fact that as the event EcD(1:M)

occurs the rest events occur. From (1), the probability of falseacceptance can be computed by:

Pf=Pr{

min1≤m≤M

D(m) ≤ η|H0

}

=1 −[1 −

η∑x=0

(L

x

) (12

)L]M

. (10)

The interesting point to note is that probability of falseacceptance is independent of the primary list size.

VI. PROBABILISTIC ANALYSIS OF LIST CONTENT

In this section, we consider the effect of list size on theidentification system performance by evaluating the PMF ofthe correct entry position. Conditioned on H1, the probabilityof D(1) to fall in the r th

j position of the ranked sufficientstatistics which satisfies the threshold is given by P (rj). From(5), all D(m), m ∈ {2, 3, . . . , M} are i.i.d. random variables,and as illustrated in Fig. 3, P (rj) can be expressed by:

P (rj) = Pr{(D(k:M−1) > D(1)) ∩ D(k−1:M−1) < D(1)∩(D(1) ≤ η)|H1}

(a)=

η∑d=0

Pr{D(k:M−1) > d|H1, D(1) = d}

×Pr{D(k−1:M−1) < d|H1, D(1) = d}pD(1)(d),(11)

where k ≡ rj+1, k − 1 ≡ rj−1 and (a) follows from the factthat the first two events are independent. From (1), P (rj) is

66

Page 4: [IEEE 2010 IEEE 12th International Workshop on Multimedia Signal Processing (MMSP) - Saint-Malo, France (2010.10.4-2010.10.6)] 2010 IEEE International Workshop on Multimedia Signal

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

ROC, L=1024, M=230

Pf

Pc

SNR=−5dB, Nl=1

SNR=−5dB, Nl=64

SNR=−8dB, Nl=1

SNR=−8dB, Nl=64

SNR=−10dB, Nl=1

SNR=−10dB, Nl=64

η increasing

Fig. 4. The OSLD performance improvement for the database with binaryentries.

given by:

P (rj) =η∑

d=0

(L

d

)P d

b (1 − Pb)L−d

×[ rj−1∑

p=0

(M − 1

p

)(1 − s(d))ps(d)(M−1)−p

]

×[

M−1∑q=rj−1

(M − 1

q

)(1 − s(d))ps(d)(M−1)−p

]. (12)

VII. SIMULATION RESULTS

The input to the identification system is obtained at theoutput of the BSC with a crossover probability Pb =1π arccosρXY [5], where ρXY is the cross-correlation coef-ficient between X and Y .

From (7) and (10), the probability of correct identificationand false acceptance over the BSC are computed and a receiveroperating characteristic (ROC) curves are shown for differentSNRs, database sizes M and primary list sizes Nl (Fig. 4 andFig. 5).

Fig. 4 shows that the OSLD improves the performancein the low SNR scenarios, while the probability of correctidentification Pc is not close to one.

Fig. 5 shows that increasing the primary list size Nl im-proves the identifier performance but after a certain value of Nl

it does not change significantly. On the other hand, increasingthe database size M decreases the performance.

Fig. 6 shows the behaviour of the PMF of the correct indexposition on the list. Decreasing the SNR increases the chanceof falling the correct entry in the other position instead ofthe first one that proves the inefficiency of the unique ML-based decoding in low SNR regimes justifying application ofthe proposed OSLD with a fixed maximum list size for thesesituations.

Fig. 7 shows that almost all positions of the list of candidatesare equal likely in very noisy environments.

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

ROC, L=1024, SNR=−10dB

Pf

Pc

M=210, Nl=64

M=220, Nl=64

M=230, Nl=128

M=230, Nl=64

M=230, Nl=1

M

Nl

Fig. 5. The effect of primary list size and database size on the OSLDperformance.

0 10 20 30 40 50 60 700

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1PMF, L=1024, M=230

Position

Pr

SNR=−5dBSNR=−8dBSNR=−10dB

Fig. 6. The PMF of the correct entry posion in different SNRs.

0 5 10 15 20 25 30 350

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1x 10

−4 PMF, L=1024, M=230, SNR=−20

Position

Pr

Fig. 7. The unifrom behaviour of the PMF of the correct entry posion inlow SNR regim.

VIII. CONCLUSIONS

In this paper we investigated the performance of the maxi-mum fixed list size OSLD-based content identification systemin terms of the probability of correct identification, falseacceptance and the PMF of the correct entry position.

The obtained theoretical and simulation results show thaton the one hand, in low SNR regimes almost all position

67

Page 5: [IEEE 2010 IEEE 12th International Workshop on Multimedia Signal Processing (MMSP) - Saint-Malo, France (2010.10.4-2010.10.6)] 2010 IEEE International Workshop on Multimedia Signal

in the list of candidates equally likely catch the correctentry. On the other hand, the OSLD can only improve theidentifier performance in very low SNR scenarios while thisimprovement is restricted by a certain range of list sizes.

ACKNOWLEDGMENTS

This paper was partially supported by SNF project 200021-119770.

REFERENCES

[1] P. Tuyls, B. Skoric, and T. Kevenaar, Security with noisy data: On PrivateBiometrics, Secure Key Storage and Anti-Counterfeiting, Springer, 2007.

[2] P. Elias, List decodeing for noisy channels, Tech. Rept. 335, ResearchLabratoary of Electronics, M.I.T, 1955.

[3] G. D. Forney, Jr, Exponential error bounds for erasure, list and decisionfeedback schemes, IEEETrans Inf. Theory, vol. IT-14, no. 2, pp. 206-220,Mar. 1968.

[4] H. A. David, H. N. Nagaraja, Order Statistics, 3rd ed, pp. 9, Wiley-Interscience, 2003.

[5] S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, Conception andlimits of robust perceptual hashing: toward side information assisted hashfunctions, SPIE Photonics West, San Jose, USA, 2009.

[6] F. Beekhof, S. Voloshynovskiy, O. Koval, and T. Holotyak, Fast Identifica-tion Algorithms for Forensic Applications, IEEE International Workshopon Information Forensics and Security, London, 2009.

68