Results 1 - 10
of
22
On multiple hypothesis testing with rejection option,” accepted
- IEEE Workshop Inform. Theory, Paraty
"... Abstract—We study the problem of multiple hypothesis testing (HT) in view of a rejection option. That model of HT has many different applications. Errors in testing of M hypotheses regarding the source distribution with an option of rejecting all those hypotheses are considered. The source is discre ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
(Show Context)
Abstract—We study the problem of multiple hypothesis testing (HT) in view of a rejection option. That model of HT has many different applications. Errors in testing of M hypotheses regarding the source distribution with an option of rejecting all those hypotheses are considered. The source is discrete and arbitrarily varying (AVS). The tradeoffs among error probability exponents/reliabilities associated with false acceptance of rejection decision and false rejection of true distribution are investigated, the optimal decision strategies are outlined. The special case of discrete memoryless source (DMS) is also discussed. An interesting insight that the analysis implies is the phenomenon (comprehensible in terms of supervised/unsupervised learning) that in optimal discrimination within M hypothetical distributions one permits always lower error than in deciding to decline the set of hypotheses. Geometric interpretations of the optimal decision schemes and bounds in multi-HT for AVS’s are given. I.
Active content fingerprinting: a marriage of digital watermarking and
"... content fingerprinting ..."
(Show Context)
Content Authentication and Identification under Informed Attacks
"... Abstract—We consider the problem of content identification and authentication based on digital content fingerprinting. Contrary to existing work in which the performance of these systems under blind attacks is analysed, we investigate the informationtheoretic performance under informed attacks. In t ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
(Show Context)
Abstract—We consider the problem of content identification and authentication based on digital content fingerprinting. Contrary to existing work in which the performance of these systems under blind attacks is analysed, we investigate the informationtheoretic performance under informed attacks. In the case of binary content fingerprinting, in a blind attack, a probe is produced at random independently from the fingerprints of the original contents. Contrarily, informed attacks assume that the attacker might have some information about the original content and is thus able to produce a counterfeit probe that is related to an authentic fingerprint corresponding to an original item, thus leading to an increased probability of false acceptance. We demonstrate the impact of the ability of an attacker to create counterfeit items whose fingerprints are related to fingerprints of authentic items, and consider the influence of the length of the fingerprint on the performance of finitelength systems. Finally, the information-theoretic achieveble rate of content identification systems sustaining informed attacks is derived under asymptotic assumptions about the fingerprint length. I.
INFORMATION-THEORETIC ANALYSIS OF DESYNCHRONIZATION INVARIANT OBJECT IDENTIFICATION
"... This paper is dedicated to the analysis of object identification under desynchronization distortions. While this class of degradations is almost unavoidable in the functionality of such systems especially at the verification stage via acquisition imperfections, currently available their performance ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
(Show Context)
This paper is dedicated to the analysis of object identification under desynchronization distortions. While this class of degradations is almost unavoidable in the functionality of such systems especially at the verification stage via acquisition imperfections, currently available their performance limits do not take its impact into consideration. In this paper we will try to close this gap providing the estimation of the achievable identification rates due to desynchronization distortions. Finally, the impact of the codeword length on the identification performance is justified. Index Terms — Identification of multimedia objects, desynchronization, capacity, probabilities of error.
A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects
"... Abstract: We introduce a new interpretation for the biometric enrollment and identification paradigms and show how the problem of multiple hypothesis testing (HT) for arbitrarily varying sources (AVS) in a special case relates to it. The traditional studies on biometric systems from communication pe ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
(Show Context)
Abstract: We introduce a new interpretation for the biometric enrollment and identification paradigms and show how the problem of multiple hypothesis testing (HT) for arbitrarily varying sources (AVS) in a special case relates to it. The traditional studies on biometric systems from communication perspectives assume the noisy channel model. If suppose that the process of the biometric data enrollment for a person can be performed several times and at each time both the person and the detector have some arbitrary “state”, then those observations characterized according to their empirical distributions can be treated as family distributions of an AVS. It means that M persons enrollment indicate M different AVS’s. Then the problem of biometric identification based on a new observation turns to be a detection of true AVS with an additional option of rejecting the existing M hypotheses. In this context, the biometric identification over noisy channels converts to one in an arbitrarily varying stochastic environment. We consider the problem within a fundamental framework of HT and information theory. The asymptotic tradeoffs among error probability exponents associated with false acceptance of rejection decision and false rejection of true distribution family are investigated and the optimal decision strategies are outlined. It is proved that for an optimal discrimination of M hypothetical distribution families/persons the ideal detector permits always lower error than in deciding in favor of the rejection. 1
Private content identification based on soft fingerprinting
"... In many problems such as biometrics, multimedia search, retrieval, recommendation systems requiring privacypreserving similarity computations and identification, some binary features are stored in the public domain or outsourced to third parties that might raise certain privacy concerns about the or ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
In many problems such as biometrics, multimedia search, retrieval, recommendation systems requiring privacypreserving similarity computations and identification, some binary features are stored in the public domain or outsourced to third parties that might raise certain privacy concerns about the original data. To avoid this privacy leak, privacy protection is used. In most cases, privacy protection is uniformly applied to all binary features resulting in data degradation and corresponding loss of performance. To avoid this undesirable effect we propose a new privacy amplification technique that is based on data hiding principles and benefits from side information about bit reliability a.k.a. soft fingerprinting. In this paper, we investigate the identification-rate vs privacy-leak trade-off. The analysis is performed for the case of a perfect match between side information shared between the encoder and decoder as well as for the case of partial side information. 1.
Geometrically robust perceptual fingerprinting: an asymmetric case
- in Proc. SPIE 2011
, 2011
"... In this paper, the problem of multimedia object identification in channels with asymmetric desynchronizations is studied. First, we analyze the achievable rates attainable in such protocols within digital communication framework. Secondly, we investigate the impact of the fingerprint length on the e ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
In this paper, the problem of multimedia object identification in channels with asymmetric desynchronizations is studied. First, we analyze the achievable rates attainable in such protocols within digital communication framework. Secondly, we investigate the impact of the fingerprint length on the error performance of these protocols relaxing the capacity achieving argument and formulating the identification problem as multi class classification. 1.
Identification with Privacy Protection based on Data Hiding
"... Abstract-In many problems such as biometrics, multimedia search and retrieval, recommendation systems requiring privacypreserving similarity computations and identification, some binary features are stored in the public domain or outsourced to the third parties that might raise certain privacy conc ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract-In many problems such as biometrics, multimedia search and retrieval, recommendation systems requiring privacypreserving similarity computations and identification, some binary features are stored in the public domain or outsourced to the third parties that might raise certain privacy concerns about the original data. To avoid this privacy leak, privacy protection is used. In the most cases, the privacy protection is uniformly applied to all binary features resulting in the data degradation and corresponding loss of performance. To avoid this undesirable effect we propose a new privacy amplification technique that is based on data hiding principles and benefits from side information about bit reliability a.k.a. soft fingerprinting. In this paper, we investigate the identification rate vs. privacy-leak tradeoff. The analysis is performed for the case of perfect match between the side information shared between the encoder and decoder as well as for the case of partial side information. Index Terms-identification rate, privacy leakage, privacy preserving.
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification
"... Abstract—Content identification based on digital fingerprinting attracts a lot of attention in different emerging applications. In this paper, we consider digital identification based on the signmagnitude decomposition of fingerprint codewords and analyze the achievable rates for each component. We ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—Content identification based on digital fingerprinting attracts a lot of attention in different emerging applications. In this paper, we consider digital identification based on the signmagnitude decomposition of fingerprint codewords and analyze the achievable rates for each component. We introduce a channel splitting approach and reveal certain interesting phenomena related to channel polarization. It is demonstrated that under certain conditions almost all rate in the sign channel is concentrated in reliable components, this can be of interest for complexity and security in various content identification applications. The envisioned extensions cover applications where the input and output alphabets of the channel are different at the encoding and decoding stages. Additionally, the reduction of the input data dimensionality at the encoding/enrollment stage can increase the cryptographic protection in terms of privacy leakage and simplify the decoding algorithms in biometric applications. I.
Information–Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting
"... Identification of contents or objects based on some data that are stored/distributed in public domain is required in various applications. At the same time, these data should not reveal any information about original content or object that may be missused in terms of privacy leakage. We consider a p ..."
Abstract
- Add to MetaCart
(Show Context)
Identification of contents or objects based on some data that are stored/distributed in public domain is required in various applications. At the same time, these data should not reveal any information about original content or object that may be missused in terms of privacy leakage. We consider a privacy protection strategy based on reliable components of data and investigate the performance of this scheme with respect to achievable identification rate and privacy leak. The data stored/distributed in the public domain are binary, while the encoder and the decoder operate with real data. The advocated strategy is referred to as soft fingerprinting.