The present invention is directed to watermarking of digital content and, in particular, to the construction of inner codes used to generate watermarks to resist collusion attacks mounted against watermarks embedded in digital content.
As used herein, the terms content or digital content may include, but are not limited to, audio, video or multimedia content. Content or digital content can be thought of as a digital signal. Watermarking is the process of modifying the content in order to embed information into the content and the corresponding process of recovering that information from the modified content. One example of such watermark information is a digital forensic code added to or embedded in content after production and before or during distribution. In this case, the watermark or digital forensic code is intended to apply a unique identifier to each of many copies of a multimedia work that are otherwise identical. In one application, this can be used to identify the source of an illegally copied content. Watermarking digital content, such as digital cinema, is one technique to deter thieves from misappropriating a copy of the content and then illegally redistributing it. This technique also encourages authorized distributors of digital content to maintain high security standards because watermarking can identify the specific authorized dealer from which the misappropriated copy originated. For example, if an illegal copy of the digital content is confiscated, the watermark information within the digital content can be used to determine the identity of the authorized distributor and, perhaps, the time and place of the public showing or sale of the digital content by the authorized distributor via the use of serial numbers in the forensic code. With this information, an investigation can begin at the identified authorized distributor to determine the conditions under which the misappropriation occurred.
In many applications, a unit of digitally watermarked content may undergo some modification between the time it is embedded and the time it is detected. These modifications are called “attacks” because they generally degrade the watermark and render its detection more difficult. If the attack is expected to occur naturally during the process of authorized or unauthorized distribution, then, the attack is considered “non-intentional”. Examples of non-intentional attacks can be: (1) watermarked content that is cropped, scaled, JPEG compressed, filtered etc. (2) watermarked content that is converted to NTSC/PAL SECAM for viewing on a television display, MPEG or DIVX compressed, re-sampled etc. On the other hand, if the attack is deliberately done with the intention of thwarting the purpose of the watermark, then the attack is “intentional”, and the party performing the attack is a thief or pirate. The three classes of intentional attack are unauthorized embedding, unauthorized detection, and unauthorized removal. This invention is concerned with unauthorized removal; removing the watermark or impairing its detection (i.e. the watermark is still in the content but cannot be easily retrieved by the detector). Unauthorized removal attacks generally have the goal of making the watermark unreadable while minimizing the perceptual damage to the content. Examples of attacks can be small, imperceptible combinations of line removals/additions and/or local rotation/scaling applied to the content to make difficult its synchronization with the detector (many watermark detectors are sensitive to de-synchronization).
One type of attack is a collusion attack where different copies are combined in an attempt to disguise or scramble the different digital watermark information contained in each. Attackers may also perform additional processing on the colluded copy before re-distributing the processed colluded copy. The additional processing may cause errors in the detected bits of the forensic codes. Without careful design, the forensic watermarking system can be easily broken by an attack by two or three colluders.
Prior art works on forensic marking codes design by Boneh-Shaw and Tardos are designed to resist collusion attacks. However, the Boneh-Shaw approach has the drawbacks of requiring a very long code and providing low collusion resistance when applied to multimedia signals, i.e. only a few colluders can break the system. The Tardos approach has good collusion resistance and requires shorter code length. However, its computational complexity and storage consumption during the code generation and detection is ten thousand times of that of a comparable Error Correcting Code (ECC) based forensic code. The ECC-based forensic marking scheme proposed by He and Wu uses Gaussian spread spectrum embedding to carry the code symbol rather than using a binary inner code. Since that scheme specifically uses spread spectrum embedding, it may not be applicable to other embedding schemes. It would be useful to develop a technique for constructing a binary inner code for generation of collusion-resistant watermarks that is also computationally efficient and has a reasonable length.
The present invention addresses the problems and issues raised above by the existing schemes and is directed to an inner binary orthogonal code designed to be used with the ECC outer code.
A method and apparatus are described including generating a unique code for each of a plurality of users using a plurality of symbols, generating a plurality of codes representing the plurality of symbols, substituting the plurality of codes into the unique code for each of the plurality of users, permuting the code resulting from the substitution to produce a codeword for each of the plurality of users and embedding the codeword into digital content. The second generating act further includes generating a string of first symbols followed by second symbols, wherein the first symbols are all ones and the second symbols are all negative ones, wherein a number of first symbols is equal to a number of the second symbols, and wherein if a length of the first symbols followed by the second symbols is less than a length of the code, then the first symbols followed by the second symbols are repeated until the code length is filled.
The present invention is best understood from the following detailed description when read in conjunction with the accompanying drawings. The drawings include the following figures briefly described below where like-numbers on the figures represent similar elements:
a depicts an example outer code for an ECC-based encoder.
b depicts an orthogonal inner code for an ECC-based encoder.
c depicts a combination of an inner code into and outer code.
d depicts a randomization for an ECC-based encoder mechanism.
As used herein, “/” denotes alternative names for the same or similar components or structures. That is, a “/” can be taken as meaning “or” as used herein. A digital forensic code/watermark can be employed in a technique for identifying users who misappropriate multimedia content for illegal distribution or redistribution. These forensic codes/watermarks are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. One type of attack against such digital forensic codes is collusion, in which several differently marked copies of the same content are combined to disrupt the underlying forensic watermark information which identifies an authorized source of the digital multimedia content. A special challenge in multimedia forensic codes design is that when the protected data is multimedia, the colluders usually apply post-processing after collusion that forms an erroneous channel. For instance, the colluders can compress the multimedia to reduce the data size before redistributing the colluded copy. Therefore, it is important to design a collusion-resistant forensic code that is robust to channel error.
Generally, there are two types of collusion attacks that are widely studied; interleaving and majority attacks. In an interleaving attack, the colluders contribute copies of their forensic data on a bit by bit basis in roughly equal shares in an effort to evade valid forensic code/watermark detection. This type of attack can commence when there are two or more colluding users. This method threatens to result in a false positive detection of an innocent authorized distributor as one source of the misappropriated copy of the protected digital content. In a majority attack, the colluders combine their forensic data on a bit by bit basis such that the majority of bit states among the colluders is selected and placed in the final colluded copy of the protected digital content. This type of attack can commence when there are three or more colluding users. This method can also produce false positive results in forensic code word detection.
The present invention is directed to a method and apparatus for constructing an inner code for ECC based forensic codes to resist various collusion attacks, such as majority attack and interleaving attack, on watermarks embedded in digital multimedia signals. Substitution (also sometime called concatenation) of two orthogonal binary codes to construct the inner code for ECC-based forensic code is used.
During the detection process, the test signal is input to the watermark detector to extract the test forensic codeword. The codebook is generated or retrieved and each user's forensic codeword is used to compare with the test forensic codeword in the colluder detector. The output is the accused colluders.
a-3d depict a general method of generating a basic ECC-based forensic code. The first step of
Referring again to
A correlation based detector is employed in ECC forensic code scheme to detect users' codewords to identify colluders. Let y be the forensic code extracted from the colluded copy, xi be the forensic code of user i, and U be the set of all users. The detection statistic of user i is
where xi(j) and y(j) are the codewords corresponding to jth symbol of xi and y, respectively. In a maximum detector, user i is accused as a colluder if he/she has the highest detection statistic, i.e. Ti≧Tk ∀kεU. In a thresholding detector, user i is accused as a colluder if his/her detection statistic is greater than a threshold h, i.e. Ti≧h. Detection using Equation (1) may be termed soft detection.
It can be shown that for the ECC based binary forensic code, when the inner code is an exponential orthogonal code, the system performs better when the relative distance, i.e. the minimum_distance divided by the code_length of the outer ECC code gets larger. For Reed-Solomon code, the relative distance can be increased by increasing its alphabet size q. However, the code length of the exponential binary orthogonal code is 2q, which becomes too large when the alphabet size increases. Thus, a binary orthogonal inner code generated by substituting/concatenating two orthogonal binary codes is proposed.
Using majority collusion as an example, a theoretical analysis of the probability of detection of ECC-based code is as follows. The performance analysis under other attacks can be performed in a similar way.
The multimedia processing of the colluded copy is modeled as a binary symmetric channel (BSC). That is, the probability that a 0 is recognized as a 1 (and vice versa) is δ and the probability that a 0 is recognized as a 0 (and that a 1 is recognized as a 1) is 1−δ. Let l be the length of the inner codes, 8 be the bit error rate (BER) of the binary symmetric channel (BSC), x be the inner code, and y(j) be the majority-colluded inner code of the jth symbol. y′(j) is the resulting inner code after y(j) has gone through a BSC with BER=δ. The detection statistics for user i, Ti is obtained as
where Ti(j)=<y(j)′, xi(j)/√{square root over (l)} as in Equation (2)
The BSC can be modeled by flipping the bits with probability δ. When y′(j) and x(j) is +1/−1, the order of the flipping operation and multiplication can be switched/reversed. Thus, <y′(j),
where y′(j)(i), y(j)(i), and x(j)(i) are the ith bit of y′(i), y(j), and x(j) respectively. <y′(j), x(j)> can be calculated by treating the process as sending the l bitwise products y(j)(i)×x(j)(i), 1≦i≦l through the BSC, and then summing them up. Let ai be the random variable that y(j)(i)×x(j)(i) that passes through BSC with BER=δ when y(j)(i)=x(j)(i), and b, be the random variable that y(j)(i)×x(j)(i) that passes through the BSC with BER=δ when y(j)=−x(j)(i). Therefore, <y′(j), x(j)> can be modeled as the sum of ai and bi, in which
where “w.p.” stands for “with probability”.
Thus the expectation of ai is 1−2δ, and the variance is 4δ(1−δ). The expectation of bi is 2δ−1, and bi′s variance is 4δ(1−δ). For instance, if y(j) and x(j) are orthogonal, then y(j) and x(j) share the same bits at l/2 positions and have different bits at the other l/2 positions. Thus, <y(j), x(j)> can be modeled as the sum of l/2 independent identical distribution (i.i.d.) ai, and l/2 i.i.d. bi. Since the inner code length l is on the order of 216, it is long enough to apply central limit theorem and model Ti(j)=<y′(j), x(j)>/>√{square root over (l)} as a Gaussian random variable.
Consider the worst case scenario that the RS outer code is equally distanced with the minimum distance D, therefore, there must be exactly L-D shared symbols between the outer codes of any two users. Assuming the RS codes are symmetric in the sense that given one codeword z, and a randomly selected another codeword z′, P[z(i)=z′(i)] is the same for all 1≦i≦L, where zi and z′i are the ith symbol of z and z′, respectively. Under these assumptions, the probability of all cases of the outer codes can be calculated and then the distributions of Ti for every user i can be obtained. For instance, if there are two colluders, then P[colluders share L-D symbols in outer codes]=1. As a result, Tcolluder=(L−D)×Tcolluderagreed code+D×Tcolluderdisagreed code, which can also be modeled as a Gaussian random variable. Thus the detection statistics of every user can be modeled as a Gaussian random variable, then the probability of detection can be obtained by calculating the probability that the highest detection statistics belong to a colluder.
In the following discussion, the code-analysis procedure of the present invention is demonstrated through an example. Assuming that there are 220 users with three colluders applying majority attack, the Reed-Solomon (RS) code is constructed to have the alphabet size and the code length of 24 and 15, respectively. Thus, the minimum distance of the RS outer code is 11, and the outer-code correlation is 4/15. Let x1(j), x2(j), x3(j) be the inner codes of the jth symbol for the three colluders, and X={x|x is an inner code and x≠x1(j), x2(j), x3(j)}. For each symbol position, the three colluders may have (first case) three distinct inner codes, or (second case) two of them share the same inner code (x3(j)=x2(j), or (third case) all of them have the same code) (x1(j)=x2(j)=x3(j)). Under a majority attack, in the first case when x1(j)≠x2(j), x2(j)≠x3(j), and x1(j)≠x3(j),
<y,x>=0∀xεX, and
<<y(j),x1(j)>=<y(j),x2(j)><y(j),x3(j)>=l/2. (4)
In the latter two cases, y will be equal to x3 which is always orthogonal to any inner codes in X, and also x1(j) in the second case, and)<y(j), x3(j)≧=l.
Looking at the distribution of the detection statistic Ti(j) for a codeword x(j) that is not involved in the collusion, x(j) may be a codeword from the innocent users' codeword X, or x1(j) in the above second case, i.e. x(j)=x1(j) when x1(j)≠x2(j)=x3(j). Thus for x(j)εX
in the second case or x(j)εX in the third case, <y′(j),
When l is long enough, by central limit theorem,
follows a normal/Gaussian distribution given by N(1−2δ, 4δ(1−δ)(l/2)), and
also follows a normal/Gaussian distribution given by N(2δ−1, 4δ(1−δ)/l/2)). In the notation used herein N(m,v), m is the mean/expectation and v is the variance. Thus, <y′(j), x(j)>/(l/2)=Ti(j)/(√{square root over (l)}/2) follows a normal/Gaussian distribution given by N(0, 4δ(1−δ) /(l/4)). Therefore, Ti(j) follows a normal/Gaussian distribution given by N(0, 4δ(1−δ)) if the jth symbol of user i xi(j)δX or xi(j)εX∪{x1(j)} in the above second case.
The detection statistic Ti(j) for a codeword x(j) that contributes to the colluded copy is derived as follows. In the first case when all three colluder codewords are distinct, i.e. x1(j)≠x2(j), x2(j)≠x3(j), and x1(j)≠x3(j), <y′(j), x1(j)/(l/4) follows a normal/Gaussian distribution given by N(2(1−2δ), 16δ(1−δ)/(l/4)). Thus Tcolluder1(j) follows a normal/Gaussian distribution given by N(√{square root over (l)}(1−2δ)/2, 4δ(1−δ)), and Tcolluder2(j), Tcolluder3(j) also have the same distribution by symmetry. That is, when the colluded symbol is derived when all three symbols are different, the mean of the detection statistic is ½√{square root over (l)}(1−2δ). In the second case and the third case, when x1(j)·x2(j)=x3(j), or x1(j)=x2(j)=x3(j), y=x3(j). For colluder 3, <y′(j), x3(j)>/l follows a normal/Gaussian distribution given by N(1−2δ, 4δ(1−δ)/l)=>Tcolluder3(j) follows a normal/Gaussian distribution given by N(−√{square root over (l)}/(1−2δ), 4δ(1−δ)). That is, when the colluded symbol totally comes from one of the colluders, i.e. either all three colluders' symbols are the same, or two of them are the same, the mean of the detection statistic is √{square root over (l)}(1−2δ). The variance is the same for both cases.
The notation (c1, c2, c3) is used to represent the symbol distribution among the three colluders at one symbol position. (1, 1, 1) means that all the three colluders have different inner codes, (2, 1, 0) means that two colluders share the same inner code, and the third colluder has a different code, and (3, 0, 0) indicates that all three colluders share the same inner code. For simplicity, it is assumed that the RS code has equal distance which is the minimum distance of the code 11. Thus, there are 4 symbols shared between every pair of the codewords. Without loss of generality, it is assumed that the first 4 symbols are shared between the first two colluders, colluder 1 and colluder 2, and the shared symbol set is denoted as sym12. Similarly, the shared symbol set between colluder 1 and colluder 3 is denoted as sym13 and the shared symbol set between colluder 2 and colluder 3 is denoted as sym23. When the third colluder, colluder 3, joins, there are several cases. (sym13∩sym23)∩sym12=Ø. Then there is no symbol position where all three colluders share the same symbol, i.e. the number of (3, 0, 0) in the 15 symbol positions, #(3, 0, 0)=0. In order to keep the pair-wise shared symbol number equal to 4, sym13∩sym23=Ø. As a result, among the 15 symbols positions, 12 positions in {sym12∪sym13∪sym23} have (2, 1, 0), the remaining 3 positions are (1, 1, 1). Thus the probability of the event {#(3, 0, 0)=0} can be calculated as:
P[#(3,0,0)=0]=P[(1,1,1)=3,(2,1,0)=12,(3,0,0)=0]=C114C74/(C44+C43C111C101+C42C112C92+C41C113C83+C114C74).
P[#(3,0,0)=1]=P[(1,1,1)=5,(2,1,0)=9,(3,0,0)=1]=C41C113C83/(C44+C43C111C101+C42C112C92+C41C113C83+C114C74),
P[#(3,0,0)=2]=P[(1,1,1)=7,(2,1,0)=6,(3,0,0)=2]=C42C112C92/(C44+C43C111C101+C42C112C92+C41C113C83+C114C74),
P[#(3,0,0)=3]=P[(1,1,1)=9,(2,1,0)=3,(3,0,0)=3]=C43C111C101/(C44+C43C111C101+C42C112C92+C41C113C83+C114C74),
P[#(3,0,0)=4]=P[(1,1,1)=11,(2,1,0)=0,(3,0,0)=4]=C44/(C44+C43C111C101+C42C112C92+C41C113C83+C114C74).
P[#(3,0,0)=k]=0, for all k≠0,1,2,3,4 (5)
Take the event #(1, 1, 1)=11, #(2, 1, 0)=0, #(3, 0, 0)=4 as an example. In this case, all three colluders have the same symbols for the first four symbol positions. Based on the inner code analysis, the detection statistics of the three colluders, Tcolluder1, Tcolluder2, and Tcolluder3, will have the same distribution, N(19√{square root over (l)}(1−2δ)/2, 4δ(1−δ)). As an innocent user, there are several cases/possibilities.
1. The innocent user also has the same symbols as the colluders for the first four symbol positions as shown in the following figure. Then, the mean of the Ti for this innocent user would be 4*√{square root over (l)}(1−2δ). This corresponds to the a Ti distribution that follows a normal Gaussian distribution N(4√{square root over (l)}(1−2δ), 4δ(1−δ)) with probability C44×C110/K4, where K4=C44+(C43×C111C101C91)+(C42×C112C92C72)+(C41×C113C83C53).
2. The innocent user has the same symbols as the colluders for the first three out of the first four symbol positions as shown in the following figure. In order to keep a total of four matched symbols between any pair of codewords, the innocent user must have one symbol in the remaining 11 positions that matches with each of the three colluders. These matched symbol positions cannot overlap. Then, the mean of the Ti for this innocent user would be 3*√{square root over (l)}(1−2δ)+3*½√{square root over (l)}(1−2δ)= 9/2√{square root over (l)}/(1−2δ). This corresponds to a Ti distribution that follows a normal/Gaussian distribution N(9√{square root over (l)}(1−2δ), 4δ(1−δ)) with probability C43×C111C101C91/K4, where K4=C44+(C43×C111C101C91)+(C42×C112C92C72)+(C41×C113C83C53).
3. The innocent user has the same symbols as the colluders for the first two out of the first four symbol positions as shown in the following figure. In order to keep a total of four matched symbol between any pair of codewords, the innocent user must have two symbols in the remaining 11 positions that match with each of the three colluders. These matched symbol positions cannot overlap. Then, the mean of the Ti for this innocent user would be 2*√{square root over (l)}/(1−2δ)+6*½√{square root over (l)}(1−2δ)=5√{square root over (l)}(1−2δ). This corresponds to a Ti distribution that follows a normal/Gaussian distribution N(5√{square root over (l)}/(1−2δ), 4δ(1−δ)) with probability C42×C112C92C72/K4, where K4=C44+(C43×C111C101C91)+(C42×C112C92C72)+(C41×C113C83C53).
4. The innocent user has the same symbols as the colluders for the first one out of the first four symbol positions as shown in the following figure. In order to keep a total of four matched symbol between any pair of codewords, the innocent user must have three symbols in the remaining 11 positions that match with each of the three colluders. These matched symbol positions cannot overlap. Then, the mean of the Ti for this innocent user would be 1*√{square root over (l)}/(1−2δ)+9*½√{square root over (l)}(1−2δ)= 11/2√{square root over (l)}(1−2δ). This corresponds to a Ti distribution that follows a normal/Gaussian distribution N(11√{square root over (l)}/(1−2δ), 4δ(1−δ)) with probability C41×C113C83C53/K4, where K4=C44+(C43×C111C101C91)+(C42×C112C92C72)+(C41×C113C83C53).
Similarly, the detection statistics of the three colluders and each innocent user for the events #(3, 0, 0)=k, where k=0, 1, 2, 3 can be obtained. Given the detection statistics of all the users under all the cases above, the probability of detection of ECC-based code under the assumption of equal distance can be obtained. Note that the actual ECC code's pair-wise distance is not always equal to the minimum distance. Many of them are larger than the assumed distance. Also, the total number of codeword combinations is C154(C44+C43C111C101+C42C112C92+C41C113C83+C114C74)=8.3×107, which is larger than the total number of users 1.05×106. Thus, all the cases are not seen in the codebook. As a result, the probability analysis that is obtained is the lower bound of the actual performance as shown in
For three colluders mounting a majority attack, a summary is as follows:
Let D be the minimum distance of the outer code, L be the length of outer code and 1 be the length of the exponential orthogonal inner code. The colluder's detection statistics Tcolluder follow a normal/Gaussian distribution given by N((D+(L−D)/2)√{square root over (l)}(1−2δ), 4δ(1−δ)), and the innocent users' detection statistics will have several possibilities, and the one with highest mean Timax follows a normal/Gaussian distribution given by N((└D/3┘2+(L−D))√{square root over (l)}(1−2δ), 4δ(1−δ)) if D<L−3, and Timax follows a normal/Gaussian distribution given by N(3(L−D)√{square root over (l)}(1−2δ)/2, 4δ(1−δ)) if D≧L−3. Therefore, the difference between the mean of Tcolluder and Timax will be at least (D−└D/3┘)√{square root over (l)} if D<L−3, and 2D−L if D≧L−3. Thus the difference between the mean of Tcolluder and Timax is a non-decreasing function of D. Since the forensic detector chooses the user with largest detection statistics, the larger difference between the mean of Tcolluder and Timax, the better the colluder-tracing performance.
From the analysis above, it can be seen that the outer-code minimum distance plays an important role. For example, if the minimum distance is equal to the code length, i.e. overall code correlation is 0, then the mean of Ti for any innocent user i would be reduced to 0, while the mean of Tcolluder for the colluders will be 15√{square root over (l)}/2. Thus the overall detection probability should be increased. Consideration is now given reducing the code correlation by employing a RS code with alphabet size 32, dimension 4 and the outer code length 31. In this situation, if an orthogonal inner code is still used, the overall correlation becomes 3/31. Compared with code used in prior work by the same inventors, where RS code had an alphabet size 16, dimension 5 and code length 15, the correlation is reduced by 0.17( 4/15− 3/31). Thus much improved performance is expected using this new code setting. However, if a binary inner code as described herein is still used, the overall code length would be increased to 31×232−1.3×1011, which is larger than what can be afforded in terms of storage and complexity. Therefore, to maintain the same code length, a family of orthogonal inner codes with shorter code length is proposed.
Given a set of binary orthogonal codes which take values ±1, if the bits that take the value “1” are replaced by a binary sequence V, and the “−1” bits are replaced with −V, the codes are still orthogonal to each other. Furthermore, if the two sets of orthogonal codes are concatenated, the concatenated codes are also orthogonal. Here, the concatenation/matrix multiplication of X and Y, denoted by XY, is defined as follows:
Therefore, concatenating/multiplying the q/qc exponential orthogonal inner with other qc orthogonal sequences (e.g., an orthogonal matrix, such as but not limited to a Hadamard matrix), results in q orthogonal inner codes. Following are listed the two orthogonal codes that are to be concatenated/multiplied by the exponential orthogonal inner codes.
Take as an example the concatenation/multiplication of two exponential orthogonal inner codes with q=32, qc=4. The number of shared symbols for every pair of outer codes is 3, and outer-code correlation is 3/31. All possibilities are exhaustively searched and it is determined that when there are three colluders mounting a majority attack, the colluded inner code y(j) is orthogonal to every xεX, in spite of the relationship of the three colluders' codes. Also, <y(j), x1(j)>=<y(j), x2(j)>=<y(j), x3(j))>=l′/2 if x1(j)≠x2(j), x2(j)≠x3(j), and x1(j)≠x3(j). l′ is the inner code length for q=32. Note that since the outer-code length has been expanded to 31, the inner-code length l′ has to be shortened to 15l/31≈l/2. Thus, the same analysis as above can be applied to arrive at
P[#(3,0,0)=0]=P[#(1,1,1)=22,#(2,1,0)=9,(3,0,0)=0]=C283×C253/(C33+C32C281C271+C32C282C262+C30C283C253),
P[#(3,0,0)=1]=P[#(1,1,1)=24,#(2,1,0)=6,(3,0,0)=1]=C31C282C262/(C33+C32C281C271+C31C282C262+C30C283C253),
P[#(3,0,0)=2]=P[#(1,1,1)=26,#(2,1,0)=3,(3,0,0)=2]=C32C281C271/(C33+C32C281C271+C31C282C262+C30C283C253),
P[#(3,0,0)=3]=P[#(1,1,1)=28,#(2,1,0)=0,(3,0,0)=3]=C33/(C33+C32C281C271+C31C282C262+C30C283C253),
P[#(3,0,0)=k]=0, for all k≠0, 1, 2, 3 (6)
Take the event #(1, 1, 1)=28, #(2, 1, 0)=0, #(3, 0, 0)=3 as an example. In this case, based on the inner code analysis, the detection statistics of the three colluders, Tcolluder1, Tcolluder2, and Tcolluder3, will have the same distribution, N(17√{square root over (Linn)}(1−2δ)/√{square root over (2)}, 4δ(1−δ)). The detection statistics of innocent user i become
Given the detection statistics of all the users under all the cases in (6), the lower bound of the probability of detection of the ECC code can be numerically examined. This lower bound is shown in
It is to be understood that the present invention may be implemented in various forms of hardware (e.g. ASIC chip), software, firmware, special purpose processors, or a combination thereof, for example, within a server, an intermediate device (such as a wireless access point or a wireless router) or mobile device. Preferably, the present invention is implemented as a combination of hardware and software. Moreover, the software is preferably implemented as an application program tangibly embodied on a program storage device. The application program may be uploaded to, and executed by, a machine comprising any suitable architecture. Preferably, the machine is implemented on a computer platform having hardware such as one or more central processing units (CPU), a random access memory (RAM), and input/output (I/O) interface(s). The computer platform also includes an operating system and microinstruction code. The various processes and functions described herein may either be part of the microinstruction code or part of the application program (or a combination thereof), which is executed via the operating system. In addition, various other peripheral devices may be connected to the computer platform such as an additional data storage device and a printing device.
It is to be further understood that, because some of the constituent system components and method steps depicted in the accompanying figures are preferably implemented in software, the actual connections between the system components (or the process steps) may differ depending upon the manner in which the present invention is programmed. Given the teachings herein, one of ordinary skill in the related art will be able to contemplate these and similar implementations or configurations of the present invention.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US2008/011210 | 9/26/2008 | WO | 00 | 3/22/2011 |