Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-ndw9j Total loading time: 0 Render date: 2024-11-05T09:03:20.711Z Has data issue: false hasContentIssue false

6 - Leveraging side information in colluder social networks

from Part II - Behavior forensics in media-sharing social networks

Published online by Cambridge University Press:  28 April 2011

H. Vicky Zhao
Affiliation:
University of Alberta
W. Sabrina Lin
Affiliation:
University of Maryland, College Park
K. J. Ray Liu
Affiliation:
University of Maryland, College Park
Get access

Summary

In general, side information is the information other than the target signal that can help improve system performance. For instance, in digital communications, side information about channel conditions at the transmitter's side can help reduce the bit error rate, and in learning theory, the side information map can also improve the classification accuracy. In this chapter, we use multimedia fingerprinting as an example and discuss how side information affects user behavior in media-sharing social networks.

In the scalable fingerprinting system in Chapter 5, given a test copy, the fingerprint detector simply uses fingerprints extracted from all layers collectively to identify colluders, and does not use any other information in the detection process. Intuitively, if some information about collusion can be made available during the colluder identification process, using such side information can help improve the traitor-tracing performance. In this chapter, we investigate two important issues in multimedia fingerprinting social networks that are related to side information: which side information can help improve the traitor-tracing performance, and how it affects user behavior in multimedia fingerprinting systems.

In this chapter, we first examine which side information can help improve the traitor tracing performance; our analysis shows that information about the statistical means of the detection statistics can significantly improve the detection performance. We then explore possible techniques for the fingerprint detector to probe and use such side information, and analyze its performance.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×