Databases Reference
In-Depth Information
When fingerprint detection is applied to unmarked data, it may return some
binary string ( f 0 ,...f 1 ) as a potential fingerprint. Let f i be extracted ω i
times from data. Then, f i is detected to be zero or one with the same proba-
bility B (
; ω i , 0 . 5). The fingerprint scheme detects a binary string as a po-
tential fingerprint with probability 1
τω i
; ω i , 0 . 5), where the factor
2 means that each bit could be either zero or one. Let N be the total number
of valid fingerprints. The probability that the binary string is a valid finger-
print is
i =0 2 B (
τω i
2 1
N
2 . The overall misdiagnosis false hit is
N
i =0 2 B (
τω i
; ω i , 0 . 5) =
· 1
N
N
2 ,
which is tight in the case that all ω i are odd and τ =0 . 5. The upper bound
is independent of the size of the database relation being checked.
The misattribution false hit and false miss rates can be analyzed un-
der a typical modification attack in which an attacker randomly flips ev-
ery least significant bit with a probability p< 0 . 5 in fingerprinted data.
For the detection algorithm to extract a binary bit for fingerprint bit f i ,
either at most ω i
i =0 B (
τω i
; ω i , 0 . 5). The misdiagnosis false hit has upper bound
τω i
1 of its embedded bits are toggled, or more than
of its embedded bits are toggled. If the detection algorithm extracts
a binary string, the probability that the binary string is a valid but “in-
nocent” fingerprint is
τω i
N
1
2 . Therefore, the false misattribution false hit is
N 1
2 Π 1
N 1
i =0 (1
B ( ω i
τω i
1; ω i ,p )+ B (
τω i
; ω i ,p ))
2 . The mis-
N
1
attribution false hit rate has an upper bound
since B (
τω i
; ω i ,p )
2
B ( ω i
0 . 5. The upper bound is tight in the case
that all ω i are odd and τ =0 . 5. It is straightforward to get the false miss rate
τω i
1; ω i ,p ) when τ
Π 1
1
i =0 (1
B ( ω i
τω i
1; ω i ,p ))
N
1
Π 1
i =0 (1
B ( ω i
τω i
1; ω i ,p )+ B (
τω i
; ω i ,p )) .
2
Π 1
where 1
i =0 (1
B ( ω i
τω i
1; ω i ,p )) is the probability that the entire
fingerprint is detected incorrectly.
Fingerprinting schemes are susceptible to collusion attacks. A collusion at-
tack is launched by a coalition who has access to different fingerprinted copies
of the same data. Members of a coalition can identify the differences in their
fingerprinted copies, change the identified values to damage the correspond-
ing fingerprint bits, and create a useful data copy that does not implicate any
member of the coalition. Note that the collusion attack is specific to finger-
printing and there is no collusion attack in watermarking setting.
To thwart collusion attacks, the fingerprint codes need to be carefully de-
signed so that information that a coalition cannot detect can be used to trace
at least one of the traitors. Such fingerprinting codes have been rigorously
studied in the literature of cryptography. A well-known fingerprinting code,
called BoSh code (Boneh and Shaw [3]), is designed to be c -secure with -error,
as it enables the capture of a member of a coalition of at most c members with
probability at least 1
, where c and are two design parameters (increasing
c or reducing will result in longer BoSh codes).
 
Search WWH ::




Custom Search