Technical Aspects of Digital Rights Management

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Prepared for DA 201  Introduction to Digital Watermarking.
Digital rights management Audio watermark Jiamian.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Confidentiality and Privacy Controls
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Digital Watermarking By: Li Yang
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Concepts of Multimedia Processing and Transmission IT 481, Lecture #9 Dennis McCaughey, Ph.D. 2 April, 2007.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
DIGITAL SIGNATURE.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Fun Stuff: Digital Media
STEGANOGRAPHY IN IMAGES
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Technical Aspects of Digital Rights Management Emilija Arsenova MI, RWTH-Aachen

Digital Intellectual Property Digital media properties Digital content (audio, video, graphics, images) can be easily copied, transmitted and distributed Exact copies of the original data Problem for content owners/providers?

Digital Rights Management I System for protecting the copyrights of data circulated via the Internet or other digital media by enabling secure distribution and/or disabling illegal distribution of the data http://lib.colostate.edu/lingo/d.html

What Does DRM Really Mean? You can play your new audio CD on your stereo system, but when you insert it into the CD drive on your Macintosh computer, the CD doesn't work. Worse still, the machine crashes and refuses to reboot. The disc remains stuck in the drive until you force the tray open by inserting a paper clip. You buy an e-book and discover you can read it on-screen but can't print a chapter, even though the book is by Dickens and entered the public domain more than a century ago. http://www.pcmag.com/article2

Digital Rights Management II DRM = digital restriction management ?

Digital Rights Management III DRM - commonly advertised as the technology that can restore the value of content ‘DRM is a system of IT components and services, corresponding law, policies and business models which strive to distribute and control IP and its rights’ (www.eu.int )

DRM Focus "DRMs' primary role is not about keeping copyrighted content off P2P networks. DRMs support an orderly market for facilitating efficient economic transactions between content producers and content consumers." Dan Glickman, Motion Picture Association of America, to BBC NEWS

DRM Architecture http://www.dlib.org/dlib/june01/iannella/06iannella.html

DRM Goals Protection of digital content Secure distribution Content authenticity Transaction non-repudiation (digital signature) Market participant identification (digital certificates)

DRM Techniques Encryption Public / private keys Digital certificates Watermarking Access control Secure communications protocols Fingerprinting Rights specification language Trust infrastructure Hashing

Security goals http://www.inf.tu-dresden.de/~hf2/

Protection of digital content Encryption scramble data to make it unreadable to everyone except the recipient Decryption recovering the original bits

Encrypting the file – is it enough? Managing the decryption key: creating it transferring it to the customer enforcing any time limitations changing user rights preventing theft or transfer of the key

Watermarking Steganography (covered writing) Digital Watermarking

Why Use Watermarking? Ease of replication Ease of transmission and multiple use Exact copies of digital data Permanently mark the data

Watermark Applications Proof of ownership Prove ownership in a court of law Broadcast monitoring Keep track of when and where a clip is played Owner identification Transactional watermarks (Fingerprinting) Identifying the source of an illegal copy www.digimarc.com

Watermark Applications Copy Control Prevention of illegal copying Classification/Filtering Classification of content Authentication www.digimarc.com

Types of watermarks Visible, invisible Fragile, robust Blind, semi-blind, non-blind

Visibly watermarked ‘Lena’ Original picture Watermark images Smaller watermark Bigger watermark M. Kankanahalli, et. al., ”Adaptive Visible Watermarking of Images”

Embedding and detecting systems P P Chun-Shien Lu, Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property

Ideal watermarking system perceptibility robust image compression protection of malicious attacks capacity speed

Digital Watermarking Techniques choice of watermark object spatial domain transform domain fractal domain

Choice of watermark object what form should the embedded message take?

Spatial Domain Techniques Addition of pseudo-random noise LSB modification Replace the LSB of each pixel with the secret message Pixels may be chosen randomly according to a key Drawbacks highly sensitive to signal processing operations easily corrupted

Example:LSB Encoding (R,G,B) = (00000000, 11111111, 00000000)

Transform Domain Techniques Wavelet based watermarking Most efficient domain for watermark embedding HVS DCT-based watermarking Fractal domain watermarking Computational expense Not suitable for general use

Robustness How robust are watermarking algorithms?

Testing watermarking algorithms Image watermarking algorithms must survive robustness attacks Geometric distortions Combinations of geometric distortions

Example – StirMark Tool Applies: Large set of different geometric distortions The image is slightly stretched, shifted, bent and rotated by an unnoticeable random amount Frequency displacement and deviation Embeds a small error in each sample value

Applying StirMark to images I Before StirMark After StirMark Copyright image courtesy of Kevin Odhner (jko@home.com)

Applying StirMark to images II Underlying grid Grid after StirMark Fabien A. P. Petitcolas and Ross J. Anderson, Evaluation of copyright marking systems

Questions?

THANK YOU!