SCALABLE MULTIMEDIA FINGERPRINTING FORENSICS WITH SIDE INFORMATION W. Sabrina Lin, H. Vicky Zhao and K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ABSTRACT Digital fingerprinting uniquely labels each distributed copy with user’s ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a powerful attack against digital fingerprinting, in which a group of attackers collectively mount attacks to remove the embedded identification information. To resist such multi-user collusion and support multimedia forensics, this paper investigates the side information based multimedia fingerprinting. We explore techniques to utilize side information of collusion attacks during colluder identification process, and show that the means of the detection statistics at the detector’s side can significantly improve the traitor tracing capability. We also investigate how the fingerprint detector can probe such side information from the colluded copy, and our simulation results show that the proposed scheme helps the fingerprint detector achieve the optimum detection performance. 1. INTRODUCTION Digital fingerprinting is an emerging forensic tool to protect multimedia from illegal alteration and unauthorized redistribution. It seamlessly embeds a unique label, known as “fingerprint”, into each distributed copy to track the usage of multimedia data. Multiuser collusion is a powerful attack against digital fingerprinting, where a group of attackers collectively mount attacks to remove traces of the identifying fingerprints. To offer consistent and reliable traitor tracing, multimedia fingerprinting should resist such multi-user collusion as well as attacks by a single adversary. Most prior work on multimedia fingerprinting focused on collusion resistant multimedia fingerprint design. A two-layer fingerprint design scheme was proposed in [1], where an inner code from spread spectrum embedding is combined with an outer errorcorrecting code. In [2], finite projective geometry was used to generate codes whose overlap with each other can identify colluding users. The combinatorial theory based Anti Collusion Code for multimedia was proposed in [3]. In [4], prior knowledge of possible collusion patterns was used to improve the collusion resistance. These prior works assumed that the fingerprint detector has no information about multi-user collusion. They considered a simple colluder identification process, which first calculates the similarity between the colluded copy and each of the originally distributed copies and then estimates the identities of the colluders. If some information of collusion attacks is available during the colluder identification process, intuitively, utilizing such side information can help improve the traitor tracing performance. It is important to investigate which side information about collusion can help improve the collusion resistance, explore techniques to probe and utilize such side information during fingerprint detection, and analyze The authors can be reached at wylin, hzhao and [email protected].

its performance. Such investigation helps formulate the dynamics between the colluders and the detector in multimedia forensics, and enables to offer stronger protection of multimedia. This paper considers scalable multimedia systems where users receive copies of different quality due to network and device heterogeneity, and investigates the side information assisted forensic systems for scalable multimedia. The rest of the paper is organized as follows. Section 2 introduces the scalable multimedia forensic system model. In Section 3, we investigate how to probe and utilize side information about collusion during colluder identification to improve the detection performance. Section 4 shows the simulation results, and conclusions are drawn in Section 5. 2. SYSTEM MODEL 2.1. Scalable Video Coding Systems To accommodate heterogeneous networks and users with different processing capability, scalable video coding is widely used in the literature to encode the video content into several bit streams of different priority. The base layer contains the most important information of the video and is received by all user. The enhancement layers gradually refine the reconstructed sequence at the decoder’s side and are only received by users with sufficient bandwidth. Without loss of generality, we consider a three-layer temporally scalable video coding system that encodes different frames in different layers [5]. As an example, with MPEG-2 video coding, the base layer may include all the I frames, the enhancement layer 1 may contain all the P frames, and the enhancement layer 2 encodes all the B frames. Define Fb , Fe1 and Fe2 as the sets containing indices of the frames that are encoded in the base layer, enhancement layer 1 and enhancement layer 2, respectively; and we define F (i) as the set containing the indices of the frames that user u(i) receives. Ub is the subgroup of users who receive the base layer only; Ub,e1 contains all users who subscribe to the medium quality version and receive the base layer and the enhancement layer 1; and Uall includes users who receive all three layers. 2.2. Scalable Multimedia Fingerprinting Systems Spread Spectrum Fingerprint Embedding In this paper, we use spread spectrum embedding [6, 7] to embed fingerprints in the host signal. For Sj , the jth frame in the video, and for each user u(i) who subscribes to frame j, the content owner generates a (i) (i) unique fingerprint Wj of the same length as Sj . We let {Wj } 2 follow normal distribution N (0, σW ) in this paper since Gaussian distributed fingerprints have been proven to be robust against many attacks, and fingerprints for different users are independent of each other. The content owner then generates the fingerprinted frame (i) (i) Xj = Sj + JN Dj Wj , and distributes it to u(i) . JN D here is

used to control the energy and achieve the imperceptibility of the embedded fingerprints [7]. Multi-user Collusion It was shown in [8] that nonlinear collusions can be modeled as averaging collusion followed by additive noise, and all collusion attacks have similar performance if they generate colluded copies of the same perceptual quality. Therefore, we only consider averaging based collusion in this paper. During collusion, depending on the resolution of their received fingerprinted copies, the colluders divide themselves into three non-overlapping subgroups: SC b contains the indices of the colluders who receive the base layer only; SC b,e1 contains the indices of the colluders who subscribe to the medium quality version and receive the base layer and the enhancement layer 1; and SC all contains the indices of the colluders who have sufficient bandwidth to receive all three layers. K b , K b,e1 and K all are the number of colluders in SC b , SC b,e1 and SC all , respectively. K = K b + K b,e1 + K all is the total number of colluders. Following the work in [5], the colluders first apply intra-group collusion: for each frame j ∈ Fb that they received, colluders in P (k) SC b generate Zbj = k∈SC b Xj /K b . Similarly, for each frame j ∈ Fb ∪ Fe1 that they received, colluders in SC b,e1 calculate P (k) Zb,e1 = k∈SC b,e1 Xj /K b,e1 ; and for each frame in the video j P (k) all sequence, colluders in SC all generate Zall . j = k∈SC all Xj /K Then, the colluders apply inter-group collusion: for each frame j ∈ Fb in the base layer, the colluded frame is Vj = β1 Zbj + β2 Zb,e1 +β3 Zall j +nj , where 0 ≤ β1 , β2 , β3 ≤ β1 +β2 +β3 = 1 j and nj is additive noise to further hinder detection. For each frame j ∈ Fe1 in the enhancement layer 1, Vj2 = α1 Zb,e1 + α2 Zall j + j nj , where 0 ≤ α1 , α2 ≤ α1 + α2 = 1. For each frame j ∈ Fe2 in the enhancement layer 2, Vj3 = Zall j + nj . The colluders seek the collusion parameters {αk , βl } to ensure that all colluders have the same probability of being detected. Details of the collusion parameter selection and the constraints on collusion to achieve fairness are in [5] and not repeated here. Fingerprint Detection and Colluder Identification We consider a non-blind detection scenario where the host signal is first removed from the test copy before colluder identification. The detector then extracts the fingerprint Yj from the jth frame Vj in the colluded copy, compares the extracted fingerprint Y with each of the original fingerprints {W(i) }, and outputs the identities of d the estimated colluders SC. Performance Criteria To evaluate the traitor tracing capability of the forensic system, we use the commonly used criteria in the literature [8]: the probability of capturing at least one colluder (Pd ) and the probability of accusing at least one innocent user (Pf p ). Other criteria give the same trend. 3. MULTIMEDIA FORENSIC DETECTOR WITH SIDE INFORMATION This section investigates fingerprint detection with side information for scalable multimedia. As an example, we consider the scenario where the colluded copy contains all three layers and has the highest quality, and we assume that the constraints on collusion to achieve fairness in [5] are satisfied. The analysis for other scenarios is similar. Without loss of generality, we use users in Uall as an example to demonstrate the detection process and analyze the performance. For users in Ub,e1 and Ub , the colluder identification process and the performance analysis are similar.

3.1. Different Fingerprint Detection Strategies A Collective Fingerprint Detector The work in [5] considered a simple fingerprint detector that uses fingerprints extracted from all layers collectively to identify colluders. For each user u(i) , the detector first calculates F˘ (i) = F (i) ∩ F c , where F (i) contains the indices of the frames received by u(i) and F c contains the indices of the frames in Then the detector calculates 0the colluded copy. 1 s X X (i) (i) T N (i) = @ hYj , Wj iA / ||Wj ||2 , (1) ˘ (i) j∈F

where

(i) ||Wj ||

˘ (i) j∈F (i) norm of Wj . (i)

is the Euclidean Given a pred determined threshold h, SC = {i : T N > h}. Assume that the colluders choose the parameters {αk , βl } in the same way as in [5] and F c = Fb ∪ Fe1 ∪ Fe2 . Under the assumption that the detection noises are i.i.d. and follow Gaussian distribution N (0, σn2 ), from the analysis in [5], for i ∈ Uall , ( ` ´ N µc , σn2 , if i ∈ SC, (i) ` ´ TN ∼ where (2) N 0, σn2 , if i 6∈ SC, µc ≈

(Nb + Ne1 + Ne2 )σW √ √ √ . K b Nb + K e1 Nb + Ne1 + K e2 Nb + Ne1 + Ne2

Nb , Ne1 and Ne2 are the lengths of the fingerprints embedded in the base layer, enhancement layer 1, and enhancement layer 2, re(i) spectively. Define Ps as the probability of successfully capturing (i) (i∈SC) a colluder u , and Pf a is the probability of falsely accusing an innocent u(i) where i 6∈ SC. With the detector in (1), „ « h − µc Ps(i) ≈ Q for i ∈ SC all , σ n „ « h (i) and Pf a ≈ Q for i 6∈ SC, (3) σn where Q(·) is the Gaussian tail function. (i) With the collective detector in (1), Ps for i ∈ SCb,e1 and i ∈ SCb are the same as in (3). From [5], Y Y (i) Pd ≈ 1 − (1 − Ps(i) ) and Pf p ≈ 1 − (1 − Pf a ). (4) i∈SC

i6∈SC

Fingerprint Detection at Each Individual Layer To identify colluders, instead of using fingerprints extracted from all three layers collectively, the detector can also examine fingerprints extracted from each layer individually. For example, for user ui ∈ Uall who receives all three layers from the content owner, the detector can use the fingerprints extracted from the enhancement layer 2 only to decide if u(i) is a colluder. Given {Yj }j∈Fe2 , the fingerprints extracted from the enhancement layer 2, the detector compares {Yj }j∈Fe2 with (i) {Wj }j∈Fe2 , calculates the detection statistics ! s X X (i) (i) (i) T Ne2 = hYj , Wj i / ||Wj ||2 , (5) j∈Fe2

j∈Fe2

d if T N (i) > h where h is the predeand decides that i ∈ SC e2 (i) termined threshold. The analysis of the detection statistics T Ne2 (i) in (5) is similar to that of T N in (1). If the detection noises (i) are i.i.d. and follow distribution N (0, σn2 ), with T Ne2 in (5), for i ∈ SC all , following the same analysis as in [5], we can have ! √ (i) h − µe2 Ne2 (i) Ps(i) ≈ Q where µe2 ≈ σW . (6) σn K all

1 Probability of selecting the optimum detection statistics

3.5

Mean of the Detection Statistics for i ∈ SC

all

µc

µ(i) in (6)

3

µ(i) b

e2

µ(i) e1

2.5

µ(i) e2

2

µc in (2)

µ(i) in (8) e1

1.5

1

µ(i) b

in (10)

0.5

0 0.4

0.45

0.5

0.55

0.6

0.65

0.7

0.95 0.9 0.85 0.8 0.75 0.7 0.65 0.6 0.55 0.4

0.75

0.45

0.5

all

(i)

(i)

(i)

Similarly, for ui ∈ Uall , the detector can also use fingerprints extracted from the enhancement layer 1 only to determine if u(i) is a colluder. The detector uses the following ! s detection statistics X X (i) (i) (i) T Ne1 = hYj , Wj i / ||Wj ||2 , (7) j∈Fe1

to measure the similarity between the extracted fingerprint and the d if original fingerprints embedded in X(i) , and outputs i ∈ SC (i) T Ne1 > h for a given threshold h. Following the same analysis as in [5], if the detection ! noises are i.i.d. Gaussian N (0, σn2 ), then √ (i) h − µe1 Ne1 (i) where µe1 ≈ α2 all σW . (8) Ps(i) ≈ Q σn K For ui ∈ Uall , if the detector uses fingerprints extracted from the base layer only he calculates 0during colluder identification, 1 sX X (i) (i) (i) ||Wj ||2 , T Nb = @ (9) hYj , Wj iA / j∈Fb

0.6

0.65

0.7

0.75

K /K

Fig. 1. Comparison of µc in (2), µe2 in (6), µe1 in (8) and µb in (10) for i ∈ SC all . (Nb , Ne1 , Ne2 ) = (50000, 50000, 100000). K = 250 and K b = 50.

j∈Fe1

0.55 all

K /K

j∈Fb

compares with a predetermined threshold h, and considers u(i) (i) as a colluder if T Nb > h. Using the same analysis as in [5], under the assumption that the detection noises are i.i.d. and follow (i) distribution N (0, σn2 ), using T Nb in (9), ! √ (i) h − µb Nb (i) where µb ≈ β3 all σW . (10) Ps(i) ≈ Q σn K (i)

For detectors (5), (7) and (9), the analysis of Pf a and that of (Pd , Pf p ) are the same as in (3) and (4), and are not repeated. 3.2. Performance Comparison This section compares the performance of the four detectors (1), (5), (7) and (9) when identifying colluders in SC all . From the (i) (i) above analysis, for a given h and a fixed Pf a , comparing Ps is equivalent to comparing the means of the detection statistics. For a colluder i ∈ SC all , Figure 1 shows an example of the means of the detection statistics in (1), (5), (7) and (9). In Figure (i) 1, Wj follow Gaussian distribution N (0, 1), and fingerprints for different users are independent of each other. The lengths of the fingerprints embedded in the base layer, enhancement layer 1 and enhancement layer 2 are Nb = 50000, Ne1 = 50000 and Ne2 = 100000, respectively. We fix the total number of colluders K = 250, and K b = 50 of them receive the fingerprinted base layer only. Each point on the X axis corresponds to a unique triplet

Fig. 2. Probability of selecting the optimum detection statistics when identifying colluders in Uall for the example in Figure 1. ht (i) is chosen to let Pf a = 10−2 for an innocent user i 6∈ SC. (K b , K e1 , K e2 ). The colluders follow the work in [5] to select the collusion parameters and generate a colluded copy with all three layers under the fairness constraints in [5]. From Figure 1, T N (i) in (1) has the best performance when more than 60% of the colluders receive a high-quality copy with all three layers. This is because in this scenario, u(i) ’s fingerprints are spread all over the entire colluded copy V and, therefore, from detection theory [9], fingerprints extracted from all layers should be used during detection to improve the performance. When K all /K < 0.6, due to the selection of the collusion parameters in [5] to achieve fairness of the attack, a significant portion of W(i) ’s energy is in the enhancement layer 2, while the other two layers of the colluded copy contain little information of u(i) ’s (i) identity. Thus, T Ne2 in (5) gives the best detection performance. 3.3. Colluder Identification with Side Information The four detection statistics in Section 3.1 do not consider how attackers collude when identifying colluders and neither of them can achieve the optimum performance in all scenarios. Intuitively, if some information about collusion can be made available to the detector, utilizing such side information during colluder identification will help improve the detection performance. From the above sections, the selection of collusion parameters determines how the energy of each colluder’s fingerprint distributes in the colluded copy and has significant impact on the detection performance. Thus, one candidate of such side information about collusion is the selected collusion parameters, or equivalently, the means of different detection statistics. For each subgroup of colluders, if the exact values of the means of the detection statistics are available to the detector, the colluder identification process can always select the detection statistics with the largest mean and, therefore, achieves the optimum detection performance. If the detector does not have perfect knowledge of the means of the detection statistics, he/she has to examine the colluded copy and probe such side information himself/herself. To identify colluders in Uall , the key steps in probing the means of the detection statistics and selecting the optimum detection statistics are: • For every user u(i) in Uall , the detector first calculates T N (i) , (i) (i) (i) dall T N , T N and T N as in Section 3.1, and outputs SC c = e2

e1

b

(i) dall dall {i : T N (i) > ht }, SC e2 = {i : T Ne2 > ht }, SC e1 = {i : all (i) db = {i : T N (i) > ht } for a given ht . T N > ht }, and SC e1

b

1 Collective Detector Optimum Detector Self−Probing Detector

0.95

0.9

P

d

Optimum detector, self−probing detector 0.85

Collective detector 0.8

0.75

0.7 0.4

0.45

0.5

0.55

0.6

0.65

0.7

0.75

Kall/K

Fig. 3. Pd of the collective detector in [5], the optimum detector with perfect knowledge of the side information, and the detector who probes the side information himself/herself. Pf p = 10−3 . • The detector combines the above four sets of estimated colluddall = SC dall dall dall dall ers in Uall and lets SC c ∪ SC e2 ∪ SC e1 ∪ SC b . all d , the detector estimates the means of the four de• Given SC tection statistics in Section 3.1: X T N (k) X T N (k) e2 µ ˆc = , µ ˆe2 = , all all d d | | d all |SC d all |SC k∈SC

µ ˆe1 =

k∈SC

X d k∈SC

all

(k)

T Ne1 , and µ ˆb = dall | |SC

X d k∈SC

all

(k)

T Nb d |SC

all

. (11) |

• The detector compares µ ˆc , µ ˆe2 , µ ˆe1 and µ ˆb and selects the detection statistics with the largest estimated mean. For example, the collective detector in (1) is chosen if µ ˆc has the largest value. For the example in Figure 1, based on 10000 simulation runs, Figure 2 plots the probability that the above algorithm selects the optimum detection statistics when identifying colluders in Uall . (i) (i) (i) We only choose between T N (i) and T Ne2 since T Ne1 and T Nb never outperform the other two in Figure 1. From Figure 2, the above algorithm selects the optimum detection statistics with probability 0.6 when K all /K ≈ 0.6; while in other scenarios, the detector always picks the best detection statis(i) tics. From Figure 1, when K all /K ≈ 0.6, µc ≈ µe2 and T N (i) (i) and T Ne2 have approximately the same performance. Therefore, choosing the sub-optimum detection statistics does not signif(i) icantly deteriorate the detection performance. When µc and µe2 differ significantly from each other, the detector always chooses the optimum detection statistics when identifying colluders in Uall . 4. SIMULATION RESULTS Figure 3 shows the simulation results based on 10000 simulation runs. In our simulations, we assume that each frame has 5000 embeddable coefficients and test on a total of 40 frames. We consider a temporally scalable video coding system with Fb = {1, 5, 9, · · · }, Fe1 = {3, 7, 11, · · · } and Fe2 = {2, 4, 8, · · · }. {W(i) } follow distribution N (0, 1) and fingerprints for different users are generated independently. The lengths of the fingerprints embedded in the three layers are Nb = 50000, Ne1 = 50000 and Ne2 = 100000, respectively. |Ub | = |Ub,e1 | = |Uall | = 250. There are a total of K = 250 colluders, and K b = 50 of them receive the fingerprinted base layer only. Each point on the X axis

in Figure 3 corresponds to a unique triplet (K b , K b,e1 , K all ). The colluders select {αk , βl } in the same way as in [5] and generate a colluded copy with all three layers under the fairness constraints in [5]. For each frame j in the colluded copy, we adjust the power (i) of the additive noise such that ||nj ||2 = ||Wj ||2 . Other values give the same trend. We simulate three different fingerprint detectors: the simple collective detector in [5]; the optimum detector with perfect knowledge of the means of the detection statistics; and the self-probing detector, who first uses the algorithm in 3.3 to select the detection statistics and then follows Section 3.1 to identify colluders. From Figure 3, compared with the simple collective detector in [5], the means of the detection statistics help the fingerprint detector significantly improve the performance, especially when K all /K is small and the colluders’ fingerprints are not evenly distributed in the three layers of the colluded copy. In addition, the side information probing algorithm in Section 3.3 helps the detector choose the best detection statistics to identify colluders and achieve the optimum detection performance. 5. CONCLUSIONS This paper studies multimedia forensics with side information, investigates which side information about collusion attacks can help improve the forensic system’s traitor tracing capability, and explores techniques to probe and utilize such side information during colluder identification. We show that the means of the detection statistics can help significantly improve the collusion resistance. We also propose a method for the fingerprint detector to probe such side information from the colluded copy himself/herself, and show that the proposed method helps the detector achieve the optimum detection performance. 6. REFERENCES [1] F. Zane, “Efficient watermark detection and collusion security,” Proc. of Financial Cryptography, Lecture of Notes in Computer Science, vol. 1962, pp. 21–32, Feb. 2000. [2] J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, “Combining digital watermarks and collusion secure fingerprints for digital images,” SPIE Journal of Electronic Imaging, vol. 9, no. 4, pp. 456– 467, Oct. 2000. [3] W. Trappe, M. Wu, Z. Wang, and K. J. R. Liu, “Anti-collusion figerprinting for multimedia,” IEEE Tran. on Signal Processing, vol. 51, no. 4, pp. 1069–1087, April 2003. [4] Z. J. Wang, M. Wu, W. Trappe, and K. J. R. Liu, “Group-oriented fingerprinting for multimedia forensics,” EURASIP Journal on Applied Signal Processing, vol. 2004, no. 14, pp. 2142–2162, Nov. 2004. [5] H. V. Zhao and K. J. R. Liu, “Fair collusion attacks on scalable video fingerprinting systems,” IEEE Int. Conf. on Acoustics, Speech and Signal Processing, vol. 2, pp. 1045–1048, March 2005. [6] I. Cox, J. Killian, F. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing, vol. 6, no. 12, pp. 1673–1687, Dec. 1997. [7] C. Podilchuk and W. Zeng, “Image adaptive watermarking using visual models,” IEEE Journal on Sel. Area in Comm., vol. 16, no. 4, pp. 525–540, May 1998. [8] Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, “Anticollusion forensics of multimedia fingerprinting using orthogonal modulation,” IEEE Trans. on Image Processing, vol. 14, no. 6, pp. 804–821, June 2005. [9] H. V. Poor, An Introducton to Signal Detection and Estimation, Springer Verlag, 2nd edition, 1999.

SCALABLE MULTIMEDIA FINGERPRINTING ...

Digital fingerprinting is an emerging forensic tool to protect mul- ... and enables to offer stronger protection of multimedia. .... Other criteria give the same trend. 3.

148KB Sizes 1 Downloads 291 Views

Recommend Documents

A scalable service-oriented architecture for multimedia ... - Uni Marburg
development and use of web services for a broad scope of multimedia .... computational cloud, such as the Amazon Elastic Compute Cloud (EC2) (Amazon Web ... The service provider is interested in efficient services in that the response time.

A scalable service-oriented architecture for multimedia ... - Uni Marburg
BPEL for data-intensive applications and (b) provides tools that further ease the ... management and cluster/grid computing, including multidisciplinary analysis ..... Step 3 After processing the whole input video in this manner, a final list is give

Fingerprinting Information.pdf
PCMI will contact you to complete the second phase of paperwork. 4. Once PCMI has processed all of your paperwork, you and AMAESD will be. notified via e‐mail that you are in compliance. Page 1 of 1. Fingerprinting Information.pdf. Fingerprinting I

Fingerprinting Quantized Host Signals
Mostly for uncompressed host signals. ❑ First work on collusion-resistant ... Motivation for Compressed Domain Fingerprinting. Cable TV distribution System.

Incorporating Active Fingerprinting into SPIT Prevention ... - CiteSeerX
million users [20]. Similarly ... establish and terminate calls, media transport for transmission of audio and video ... social network mechanisms. An area that has ...

Content Fingerprinting Using Wavelets - Research at Google
Abstract. In this paper, we introduce Waveprint, a novel method for ..... The simplest way to combine evidence is a simple voting scheme that .... (from this point on, we shall call the system with these ..... Conference on Very Large Data Bases,.

Gel Electrophoresis and DNA Fingerprinting PCR Sequencing ...
Gel Electrophoresis and DNA Fingerprinting PCR Sequencing Testing Notes.pdf. Gel Electrophoresis and DNA Fingerprinting PCR Sequencing Testing Notes.

Multimedia Systems
Course Outline: 1. Introduction. 2. Multimedia Data ... Lab on Multimedia Programming (JMF), Adobe Flash. • Review of Articles. – Will be given by the Instructor.

Low-Overhead Bug Fingerprinting for Fast Debugging - Dependable ...
tem for collecting such runtime information about deadlocks and including it in the ... Software debugging is time-consuming and labor-intensive, with most of the work ..... An efficient data race fingerprinting system employs static analysis to ...

Review Article Plant DNA fingerprinting: an overview
genebank management, are numerous. Practically, all DNA ... Genebank management. Genetic .... tomato and maize that highlight the utility of molecular data and help ... big-money seed industry by providing DNA fingerprints as varietal.

Reading Multimedia DESCRIPTORS.pdf
Page 1 of 2. Close Reading of Multimedia Texts. The Elements of Multimedia Composition Descriptors. Developed by Mary Ellen Dakin with contributions from ...

Multimedia Compression Technologies
Feb 1, 2008 - Body. Standard Bit-rate. Application. ITU-T H.261. 192Kbps. ISDN-Phone. ISO. MPEG-1. 1.5Mbps. CD-ROM. ISO. MPEG-2. 4-8Mbps. SDTV ...

Scalable Component Abstractions - EPFL
from each other, which gives a good degree of type safety. ..... Master's thesis, Technische Universität ... Department of Computer Science, EPFL, Lausanne,.

Reading Multimedia ORGANIZER.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Reading ...

Online Multimedia Advertising - Semantic Scholar
the creative itself; for example, hour of the day and TV .... column of Xand center and scale the remain- ing columns. Call the result X*. 3. .... onds and under two hours. ... 18-24. Female. No. No. No. 25-34. Both. Unknown. Unknown. 35-44.

Fingerprinting with Equiangular Tight Frames - University of Illinois at ...
Abstract—Digital fingerprinting is a framework for marking media files, such as images, music, or movies, with user-specific signatures to deter illegal distribution.

survey and evaluation of audio fingerprinting ... - Research at Google
should be short for mobile applications (e.g., 10 seconds for retrieval. ... age features in the computer vision community for content- .... on TV and from laptop speakers in noisy environments. In.

Incorporating Active Fingerprinting into SPIT Prevention ...
active fingerprints that are obtained by introducing additional pro- ...... Result Cache: Another optimization that can help reduce response control path data path.

Sphere Packing Lower Bound on Fingerprinting Error ...
Dept. of Electrical and Computer Engineering. Dept. of Electrical and .... coalition of size at most equal to K. To do so, it suffices to fix f. We choose the uniform ...