Applying Digital Watermarking Technology to Control CD copying

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Rob Farraher Ken Pickering Lim Vu
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
Social and Ethical Issues Piracy & Copyright. Piracy.
Macrovision Video Copy Protection Paul Low CS265 Spring 2003.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
C opyright Protection and Digital Rights Management 1.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
1 Chapter 7: Digital Watermarking and Copy(right) Protection.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Addendum of Digital Video Watermarking MMSEC 2008.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
The Classic Amiga Preservation Society (CAPS) Software Preservation Society István Fábián.
Gate2Start Role Model: Mr. Petros Skalkos – CD-ROM Copy Protection.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
J. S. PATIL.  The revolution in internet and technology has made the future much more uncertain than most people assume it to be.  People can make money.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
November 28, 2001 CPTWG Protecting Against Unauthorized Redistribution of Digital Broadcast Content Presentation to the CPTWG Intel, Hitachi, Matsushita,
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
INTRO. To I.T Razan N. AlShihabi
Microsoft Office Access 2010 Lab 1
Evaluating New Copy-Prevention Techniques for Audio CDs
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Top 3 Best Cinavia Removal Software
The Ethical Use of Electronic Media.
Who owns the Bits? Digital copyright issues are continually evolving.
The Ethical Use of Electronic Media
Technical Aspects of Digital Rights Management
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
Intellectual Property
Information and Network Security
Digital Signature.
Protecting and Managing Electronic Content using Digital Battery
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Content protection for 4k
                      Digital Audio 1.
CE Operating Systems Lecture 21
Emulation: Good or Bad? Emulation as a Digital Preservation Strategy – Stewart Granger Reality and Chimeras in the Preservation of Electronic Records –
The Ethical Use of Electronic Media.
DISSERTATION ON CRYPTOGRAPHY.
Encryption and Digital Rights Management
File System Management
Forensic Recovery of Evidence Device (FRED)
Fun Stuff: Digital Media
Communicating in the IT Industry
G061 - Network Security.
Security Mechanisms Network Security.
Who owns the Bits? Digital copyright issues are continually evolving.
Digital Watermarking Lecture 2
Presentation transcript:

Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI

Problem Descriptions Software piracy Software industry lost billions of dollars each year Discourages individuals and businesses to create innovative software Discourages technology transfers between nations Source:SIIA’s Report on Global Software Piracy 2000

Motivations of pirates Low cost of reproduction Price of CD writer is about $200 Price of CD-Duplicator is about $2000 Easily access to tools CD-R, CD-RW, CD-Duplicator Take short time Take about 7 mins with speed of 8x CD-R to copy Take less than 1 min to copy with CD-Duplicator Ineffective of intellectual property law Not enough law enforcement High Demand

Ordinary Pirates You make copies of a software to your three best friends Each of your best friends make copies of the software to his three best friends

Exponential Growth of three

Objectives To review the components that are being built in to consumer devices To study how the components are working To study how to apply the components to software industry

Goal To help reduce the number of software piracy

Basic idea of Watermarking

What is Digital Watermarking? A digital watermark is a piece of information embedded inside a digital object. It is either visible or invisible.

Digital marks can be used to: Identify the origin of the data or uniquely establish ownership Identify the recipient of the data Check integrity of the data

Terminology Content Scrambling System (CSS) developed by Matsushita, a device requires a pair of keys, is used to descramble data. Secure Transmission System provides a mechanism for pair of compliant devices on a computer bus to exchange keys.

Terminology (continues) Copy Generation Management System (CGMS) is simply a pair of bits in the header of data stream that encode one of three possible rules for copying: “copy-always”, “copy-never”, “copy-once”.

Terminology (continues) Analog Protection System (APS) , developed by Macrovision, is a method of modifying NTSC signals so that they can be displayed on television, but cannot be recorded on VCR’s

CD copy protection without watermarking Legal disks will be scrambled with CSS and can be played only on compliant devices. Bit-for-bit copies of these disks won’t be playable on any devices, because they won’t contain the descrambling keys. This in ensured by storing the keys on the lead-in area of the legal disk, which is only read by compliant drives.

CD copy protection without watermarking

Problem CGMS in intended to prevent illegal copies, however a non compliant player may strip out these copy control bits from the header, leaving the data unprotected. APS works only when the display device is a compliant. A pirate can simply route it into an appropriate non-compliant recorder and make an unencrypted copy. Such a copy would not contain the CGMS bits.

CD copy protection with watermarking Record control takes over the job of CGMS. It works regardless of how the data reaches the compliant recorder, since the watermark that contains the CGMS data is never removed by normal processing.

CD copy protection with watermarking

Purpose of introducing watermarking into the system To improve the protection provided by CGMS by making the copy control information harder to remove To make unencrypted copies unplayable on compliant devices

Facilities & Resources Need a laboratory Need experts to help implement the prototype Need the special hardware and technology

Future implementation The watermark system requires enforcement to the device manufacturers to implement watermark detectors in their products Better encryption algorithm in the watermark (IBM-Data Hiding)

Conclusion This research shows how to apply the watermarking to make it harder to reproduce the illegal software The experiment from the laboratory will give us the result. The prototype may be developed to help reduce the numbers of software piracy.

THE END