Presentation on theme: "Technical Aspects of Digital Rights Management"— Presentation transcript:
1 Technical Aspects of Digital Rights Management Emilija ArsenovaMI, RWTH-Aachen
2 Digital Intellectual Property Digital media propertiesDigital content (audio, video, graphics, images) can be easily copied, transmitted and distributedExact copies of the original dataProblem for content owners/providers?
3 Digital Rights Management I System for protecting thecopyrights of data circulatedvia the Internet or other digitalmedia by enabling securedistribution and/or disablingillegal distribution of the data
4 What Does DRM Really Mean? You can play your new audio CD on your stereo system, but when you insert it into the CD drive on your Macintosh computer, the CD doesn't work. Worse still, the machine crashes and refuses to reboot. The disc remains stuck in the drive until you force the tray open by inserting a paper clip.You buy an e-book and discover you can read it on-screen but can't print a chapter, even though the book is by Dickens and entered the public domain more than a century ago.
5 Digital Rights Management II DRM = digital restriction management ?
6 Digital Rights Management III DRM - commonly advertised as the technology that can restore the value of content‘DRM is a system of IT components and services, corresponding law, policies and business models which strive to distribute and control IP and its rights’ (www.eu.int )
7 DRM Focus"DRMs' primary role is not about keeping copyrighted content off P2P networks. DRMs support an orderly market for facilitating efficient economic transactions between content producers and content consumers."Dan Glickman, Motion Picture Association of America, to BBC NEWS
15 Why Use Watermarking? Ease of replication Ease of transmission and multiple useExact copies of digital dataPermanently mark the data
16 Watermark Applications Proof of ownershipProve ownership in a court of lawBroadcast monitoringKeep track of when and where a clip is playedOwner identificationTransactional watermarks (Fingerprinting)Identifying the source of an illegal copy
17 Watermark Applications Copy ControlPrevention of illegal copyingClassification/FilteringClassification of contentAuthentication
20 Embedding and detecting systems PPChun-Shien Lu, Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property
21 Ideal watermarking system perceptibilityrobustimage compressionprotection of malicious attackscapacityspeed
22 Digital Watermarking Techniques choice of watermark objectspatial domaintransform domainfractal domain
23 Choice of watermark object what form should the embedded message take?
24 Spatial Domain Techniques Addition of pseudo-random noiseLSB modificationReplace the LSB of each pixel with the secret messagePixels may be chosen randomly according to a keyDrawbackshighly sensitive to signal processing operationseasily corrupted
26 Transform Domain Techniques Wavelet based watermarkingMost efficient domain for watermark embeddingHVSDCT-based watermarkingFractal domain watermarkingComputational expenseNot suitable for general use
28 Testing watermarking algorithms Image watermarking algorithms must survive robustness attacksGeometric distortionsCombinations of geometric distortions
29 Example – StirMark Tool Applies:Large set of different geometric distortionsThe image is slightly stretched, shifted, bent and rotated by an unnoticeable random amountFrequency displacement and deviationEmbeds a small error in each sample value
30 Applying StirMark to images I Before StirMarkAfter StirMarkCopyright image courtesy of Kevin Odhner
31 Applying StirMark to images II Underlying gridGrid after StirMarkFabien A. P. Petitcolas and Ross J. Anderson, Evaluation of copyright marking systems