DocumentCode :
3585892
Title :
Source distinguishability under corrupted training
Author :
Barni, Mauro ; Tondi, Benedetta
Author_Institution :
Dept. of Inf. Eng. & Math., Univ. of Siena, Siena, Italy
fYear :
2014
Firstpage :
197
Lastpage :
202
Abstract :
We study a new variant of the source identification game with training data in which part of the training data is corrupted by an adversary. In such a scenario, the defender wants to decide whether a test sequence ξn has been drawn from the same source which generated a training sequence tN, part of which has been corrupted by the adversary. By adopting a game theoretical formulation, we derive the unique rationalizable equilibrium of the game in the asymptotic setup. Moreover, by mimicking Stein´s lemma, we derive the best achievable performance for the defender, permitting us to analyze the ultimate distinguishability of the two sources.We conclude the paper by comparing the performance of the test with corrupted training to the simpler case in which the adversary can not modify the training sequence, and by deriving the percentage of samples that the adversary needs to modify to make source identification impossible.
Keywords :
game theory; security of data; signal processing; Stein lemma; adversarial signal processing; asymptotic setup; corrupted training; rationalizable equilibrium; source distinguishability; source identification game; test sequence; Conferences; Error probability; Forensics; Games; Reliability; Security; Training;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
Type :
conf
DOI :
10.1109/WIFS.2014.7084327
Filename :
7084327
Link To Document :
بازگشت