Overview of DVD Copy Protection Methods, With Emphasis on Digital Watermarking James Painter EGR 230.

Slides:



Advertisements
Similar presentations
Mobile Phone Jamming A Brief Overview by Robert Maine and Robert Cochrane.
Advertisements

Variations of the Turing Machine
U.S.A GLOBAL NELSON GROUP L.L.C. At the same time many other countries are also included in the itinerary of this reform schedule, and as it a forcibly.
Symmetric Encryption Prof. Ravi Sandhu.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
NATIONAL LIBRARY OF MEDICINE PubMed Central Edwin Sequeira National Library of Medicine May 26, 2004.
SEM25-01 ETSI Documentation Service (EDS) Antoinette van Tricht Editor © ETSI All rights reserved ETSI Seminar.
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Legal Issues in e-Learning?. 2 Presenter Betty Willder JISC Legal
Chapter 6 File Systems 6.1 Files 6.2 Directories
Intermediate 2 Computing
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Office 2003 Introductory Concepts and Techniques M i c r o s o f t Windows XP Project An Introduction to Microsoft Windows XP and Office 2003.
Photo Slideshow Instructions (delete before presenting or this page will show when slideshow loops) 1.Set PowerPoint to work in Outline. View/Normal click.
1 Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization CCSEIT 12 October 2012 Audio Steganography Using.
© 2003 Verance Corporation. 1 Verance Copy Management System Presentation to CPTWG ARDG April 10, 2003.
Transitioning to Digital Television (DTV) Information compiled by the Montgomery County Office of Consumer Protection Graphic courtesy of
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
Chapter 6 File Systems 6.1 Files 6.2 Directories
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Prepared for DA 201  Introduction to Digital Watermarking.
1 CGMS-A Plus RC Response to CPTWG-ARDG CFI October 22/23, 2003 Multicompany Submission (Matsushita, Mitsubishi, Hitachi, Intel, JVC, Samsung, Thomson,
Adding Up In Chunks.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
CINAHL Keyword Searching. This presentation will take you through the procedure of finding reliable information which can be used in your academic work.
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
St. Paul Public Television Quality Workshop - July 8-9, 2010
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
1 What is the Internet Archive We are a Digital Library Mission Statement: Universal access to human knowledge Founded in 1996 by Brewster Kahle in San.
Copy Generation Management System - Analog Brian Markwalter Director of Engineering Consumer Electronics Association.
Fourier Transforms and Their Use in Data Compression
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
Macrovision Video Copy Protection Paul Low CS265 Spring 2003.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
C opyright Protection and Digital Rights Management 1.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Macrovision Corp. November 18, 2004 David Mizell Mary Voss Wei Wang.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
CPS 182s 1.1 Digital Watermark l What is a watermark? A digital watermark?  Message about a work is embedded in the work l What is steganography?  The.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
A Partial Survey of the Perfect Digital Watermark Problem.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Applying Digital Watermarking Technology to Control CD copying
Digital Watermarking Lecture 2
Presentation transcript:

Overview of DVD Copy Protection Methods, With Emphasis on Digital Watermarking James Painter EGR 230

Movie Piracy About $3 billion lost annually Difficult in days of VHS Relatively easy now, since DVD encryption has been cracked (1999)

Series of decryption keys Relatively simple 40-bit encryption compared to todays standard 128-bit Short lived, but lessons learned Method 1: Content Scrambling System

Method 1: CSS

Method 2: Copy Generation Management System Two bits embedded in DVD video indicating one of four copy states DVD recorder reads copy state, terminates burn if necessary

Method 2: CGMS Two bits = 2 2 = 4 possible copy states: CGMS BitsMeaning 0, 0Copying is permitted without restriction 0, 1 Condition not to be used (No more copies in EIA-805) 1, 0One generation of copies may be made 1, 1No copying is permitted

Method 2: CGMS CGMS bits transmitted through television broadcasts –PVR, DVD recorder Problems –Non-compliance leads to CGMS bit deletion –Loose regulation

Information (literally text) embedded in every video frame –Owner identification –License information –Misc. video details –Indicators of previous copy attempts –CGMS copy states Method 3: Digital Watermarking

Method 3: Watermarking DVD recorder searches for watermarks, blocks burn if copyrighted material Also used for tracking ripped DVDs –Search engines

Method 3: Watermarking Implementation in camcorders prevent piracy within the theater Digital watermarks can be embedded in television broadcast signals (similar to station logos)

Method 3: Watermarking Watermarks of varying focus levels Flat mask vs. Gradual mask Allows brightness increases of up to 16% while preserving invisibility

Method 3: Watermarking Original image with no watermark (left), watermarked image (center), difference between the original and watermarked images (right)

Method 3: Watermarking Images without watermark (top), images with watermark (bottom)

Method 3: Watermarking Effects of false positives False positive probability minimized to less 4.7x10 -23

Method 3: Watermarking Attempts to remove watermarks will cause severely garbled pictures Possible future implementation in other consumer electronics

Though CGMS (Method 1) is ineffective by itself, copy states embedded within a watermark can accomplish CGMSs goal –Difficulty of removal –Survives digital-to-analog conversion Combination of Methods

Concluding Remarks Cooperation among industries with differing interests Nothing will stop the determined hacker Keeping honest people honest

References m%20reel2.gif D. Avioli, Hollywood Ups Ante In Copy Protection Fight, IEEE Spectrum, vol. 39, pp , Jul J. A. Bloom, I. J. Cox, T. Kalker, J.-P. M. G. Linnartz, M. L. Miller, and C. B. S. Traw, Copy Protection for DVD Video, Proceedings of the IEEE, vol. 87, pp , Jul G. Kresden, Carnegie Mellon University, Dec. 6, 2000, Content Scrambling System (CSS): Introduction, Wikipedia contributors, Wikipedia: The Free Encyclopedia, Mar. 31, 2006, Content-scrambling system, Macrovision Corporation, Mar. 2003, Preserving an Effective DVD Copy Protection System, macrovision.com/pdfs/Preserving-an-effective-DVD-Copying-System_0303.pdf. B. Markwalter, Consumer Electronics Association, April 20, 2004, Copy Generation Management System - Analog, FILES/ ARDG/CEA ARDG CGMS-A ppt. Wikipedia contributors, Wikipedia: The Free Encyclopedia, Mar. 19, 2006, CGMS-A, wikipedia.org/wiki/CGMS-A. F. Hartung and B. Girod, Watermarking of Uncompressed and Compressed Video, Signal Processing, vol. 66, pp , May N. F. Johnson, Z. Duric, and S. Jajodia, A Role for Digital Watermarking in Electronic Commerce, ACM Computing Surveys, M. Maes, T. Kalker, J.-P. Linnartz, J. Talstra, G. Depovere, and J. Haitsma, Digital Watermarking for DVD Video Copy Protection, IEEE Signal Processing Magazine, vol. 17, pp , Sept D. Kirovski, M. Peinado, and F. A. P. Petitcolas, Digital Rights Management for Digital Cinema, presented at the International Symposium On Optical Science and Technology, Security in Imaging, Theory and Applications, San Diego, Calif. July, Geek.com Geek News, May 10, 2005, UMD format cracked, pirate games available, news/geeknews/2005May/bga htm. M. J. Geier, Lights, Camera, Controls!, IEEE Spectrum, vol. 40, pp , May T. S. Perry, DVD Copy Protection: Take 2, IEEE Spectrum, vol. 42, pp , Jan A. M. Eskicioglu and E. J. Delp, An Overview of Multimedia Content Protection in Consumer Electronics Devices, Signal Processing: Image Communication, vol. 16, pp , Aug. 10, 2000.