Presentation on theme: "Technical Aspects of Digital Rights Management"— Presentation transcript:
1Technical Aspects of Digital Rights Management Emilija ArsenovaMI, RWTH-Aachen
2Digital Intellectual Property Digital media propertiesDigital content (audio, video, graphics, images) can be easily copied, transmitted and distributedExact copies of the original dataProblem for content owners/providers?
3Digital Rights Management I System for protecting thecopyrights of data circulatedvia the Internet or other digitalmedia by enabling securedistribution and/or disablingillegal distribution of the data
4What Does DRM Really Mean? You can play your new audio CD on your stereo system, but when you insert it into the CD drive on your Macintosh computer, the CD doesn't work. Worse still, the machine crashes and refuses to reboot. The disc remains stuck in the drive until you force the tray open by inserting a paper clip.You buy an e-book and discover you can read it on-screen but can't print a chapter, even though the book is by Dickens and entered the public domain more than a century ago.
5Digital Rights Management II DRM = digital restriction management ?
6Digital Rights Management III DRM - commonly advertised as the technology that can restore the value of content‘DRM is a system of IT components and services, corresponding law, policies and business models which strive to distribute and control IP and its rights’ (www.eu.int )
7DRM Focus"DRMs' primary role is not about keeping copyrighted content off P2P networks. DRMs support an orderly market for facilitating efficient economic transactions between content producers and content consumers."Dan Glickman, Motion Picture Association of America, to BBC NEWS
15Why Use Watermarking? Ease of replication Ease of transmission and multiple useExact copies of digital dataPermanently mark the data
16Watermark Applications Proof of ownershipProve ownership in a court of lawBroadcast monitoringKeep track of when and where a clip is playedOwner identificationTransactional watermarks (Fingerprinting)Identifying the source of an illegal copy
17Watermark Applications Copy ControlPrevention of illegal copyingClassification/FilteringClassification of contentAuthentication
18Types of watermarks Visible, invisible Fragile, robust Blind, semi-blind, non-blind
20Embedding and detecting systems PPChun-Shien Lu, Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property
21Ideal watermarking system perceptibilityrobustimage compressionprotection of malicious attackscapacityspeed
22Digital Watermarking Techniques choice of watermark objectspatial domaintransform domainfractal domain
23Choice of watermark object what form should the embedded message take?
24Spatial Domain Techniques Addition of pseudo-random noiseLSB modificationReplace the LSB of each pixel with the secret messagePixels may be chosen randomly according to a keyDrawbackshighly sensitive to signal processing operationseasily corrupted
26Transform Domain Techniques Wavelet based watermarkingMost efficient domain for watermark embeddingHVSDCT-based watermarkingFractal domain watermarkingComputational expenseNot suitable for general use
28Testing watermarking algorithms Image watermarking algorithms must survive robustness attacksGeometric distortionsCombinations of geometric distortions
29Example – StirMark Tool Applies:Large set of different geometric distortionsThe image is slightly stretched, shifted, bent and rotated by an unnoticeable random amountFrequency displacement and deviationEmbeds a small error in each sample value
30Applying StirMark to images I Before StirMarkAfter StirMarkCopyright image courtesy of Kevin Odhner
31Applying StirMark to images II Underlying gridGrid after StirMarkFabien A. P. Petitcolas and Ross J. Anderson, Evaluation of copyright marking systems