An Assessment of Toshiba HIDE Technology against the ARDG Attribute List Oct. 22, 2003 TOSHIBA Corporation.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
© 2003 Verance Corporation. 1 Verance Copy Management System Presentation to CPTWG ARDG April 10, 2003.
A New Extended Copy Control Information (ExCCI) Data Packet by Brad Hunt Chief Technology Officer Motion Picture Association.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
HTML 5 and CSS 3, Illustrated Complete Unit K: Incorporating Video and Audio.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
UNIT K: INCORPORATING VIDEO AND AUDIO 1 Encoding: the process of transforming moving image and/or sound into a digital file. Each encoding method known.
‘DVD Technology’
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
Analog Reconversion Problem presented by the Motion Picture Association of America to the Analog Reconversion Discussion Group February 12, 2003.
1 Analog Reconversion History CPTWG’s Data Hiding SubGroup (DHSG) CPTWG’s.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Software Requirements
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
4K CONTENT PLAN Sony Pictures Technologies. The 4k Consumer Value 4k has to offer all of these features: – Higher resolution – Richer colors (wider color.
Analog Reconversion Reference Architecture Proposal presented to the Analog Reconversion Discussion Group March 5, 2003 by Brad Hunt Chief Technology Officer.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
Sony Pictures1 Preparing your customers and your facilities for Blu-ray A powerful format that leads to new challenges in authoring and creative design.
Digital Watermarking Parag Agarwal
Protecting Intellectual Property (IP) Evan Kuenzli Grant Miller.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Chapter 2, Exploring the Digital Domain
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Proposal for Representative Set of Usage Rights Signaling States presented to the Analog Reconversion Discussion Group April 10, 2003 Brad Hunt Chief Technology.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
CMPD273 Multimedia System Prepared by Nazrita Ibrahim © UNITEN2002 Multimedia System Characteristic Reference: F. Fluckiger: “Understanding networked multimedia,
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Apr. 10, 2003TOSHIBA Corporation 1 Toshiba Video Watermarking Technology HIDE -Human eye Insensitive Digitally Embedded watermark- Apr. 10, 2003 TOSHIBA.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
October 22-23, 2003 About Visionaire Develop and license IP Develop and license IP Focused on hardware based Copy-Protection Focused on hardware based.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Presentation to the Analog Reconversion Discussion Group October 22 nd /23 rd, 2003.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 18,
April 13, 2004 Not For Further Dissemination 1 Verimatrix / Siemens Watermarking Technology Application A presentation to the CPTWG.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
Agenda Analog Reconversion Discussion Group February 12 th, 2003 Washington D.C. 9:30am Welcome – CPTWG Co-chairs’ introduction 10:00am Overview of new.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Extended Content Control Information (ExCCI) Packet — The Studio Side of DRM Hollywood Post Alliance 11 th Technology Retreat – Rancho Mirage, CA January.
IntroductiontMyn1 Introduction MPEG, Moving Picture Experts Group was started in 1988 as a working group within ISO/IEC with the aim of defining standards.
A Partial Survey of the Perfect Digital Watermark Problem.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
DONE BY S.MURALIRAJAN M.NIRMAL
Sony Pictures Technologies
Parag Agarwal Digital Watermarking Parag Agarwal
Rate Control for GAS Requests
Clause 7 Comment Resolutions
Shared Infrastructure
TGn Sync MAC Response to Reasons and Cures Relating to Frame Formats
Presentation transcript:

An Assessment of Toshiba HIDE Technology against the ARDG Attribute List Oct. 22, 2003 TOSHIBA Corporation

Oct. 22, 2003ARDG2 0.Attributes, Criteria and Considerations The scheme is a video watermarking technology that is called HIDE (Human eye Insensitive Digitally Embedded watermark) and that works in baseband domain. The basic principle of HIDE consists of embedding a signal which carries rights signaling information into the video signal.

Oct. 22, 2003ARDG3 Features of HIDE  Robust against various kinds of operations and attacks  Especially, robust against scaling and filtering  Low false positive error rate  Good transparency  Sufficient capacity for copy control usage  Baseband detection, independent from the compression methods and formats

Oct. 22, 2003ARDG4 1.ARDG Goals Because the watermark signal is not affected by the conversion of a content from digital to analog format and reconversion to digital format, the rights signaling information persists throughout such conversion and reconversion. The foregoing makes it possible for a device to detect the watermark from the content signal and protect the security of the content by implementing playback and/or record control according to applicable compliance rules based on rights signaling information expressed in the watermark signal.

Oct. 22, 2003ARDG5 2. Capacity of the Scheme HIDE can carry up to 7 bits. Supports CCI states for remarking. A content protection scheme can define as its own discretion how many bits and states are actually used and what meaning is attributed to each of such states. 2.1 What states does and can the scheme carry?

Oct. 22, 2003ARDG6 2.2 In the analog space, how are the rights carried? 2.3 What is the technical mechanism by which the rights signaling insertion technology determines the appropriate rights states to apply to the content? 2.4 To what extent does the rights signaling scheme have the capacity to replicate the rights states of the protected digital content?

Oct. 22, 2003ARDG7 Reference: Analog Reconversion Reference Architecture by Brad Hunt CTO, MPAA Rights Signaling Insertion Point (Digital) A Rights Signaling Insertion Point (Digital) B Rights Signaling Insertion Point (Digital) D Rights Signaling Insertion Point (Analog) E Possible Rights Signaling Insertion Points Rights Signaling Insertion Point (Digital) C Rights Signaling Detection Point (Analog) W Rights Signaling Detection Point (Digital) X Rights Signaling Detection Point (Digital) Y Possible Rights Signaling Detection Points Rights Signaling Detection Point (Digital) Z Digital Content Master Digital Source Device with Analog Output (Trusted Environment) Copy Control Information Digital Content Link Protected Digital Output with CCI Digital Processing (decryption, decoding, etc.) Protected Digital Content Delivery with Copy Control Information (CCI) Digital Sink Device with Analog Input (Trusted Environment) Rights Information Digital Content Secure Digital Video Record Function (CCI = Rights) Secure Digital Output Function (CCI = Rights) Record Control Redistribution Control Protected Digital Output with CCI Protected Digital Recording with CCI Analog Output with Rights Signaling Digital -to- Analog Video Converter (Rights = CCI) Analog Output with Rights Signaling Protected Digital Output with CCI Digital Processing (encoding, encryption, etc.) Digital Content CCI Link Protected Digital Input with CCI Analog -to- Digital Video Converter WM insertion by content provider

Oct. 22, 2003ARDG8 2.5 Is a mandate required for the content usage rights signaling, detection and interpretation? We believe that contractual/licensing obligations accompanied with reasonable enforcement activities should provide the required protection of the content. However, should one think that a more stringent control through official authority is required for the intended goal, a governmental mandate may be preferable.

Oct. 22, 2003ARDG9 2.6 Does the scheme require an anticircumvention mandate in order to be reasonably effective? Because HIDE technology provides sufficient survivability against the normal processing including conversion from digital to analog, reconversion from analog to digital, noise reduction and transformation, we think that an anticircumvention mandate is not necessarily required. However, should one think that a more stringent control through official authority is required for the intended goal, a governmental mandate may be preferable.

Oct. 22, 2003ARDG Is protection consistent across IT and CE platforms? Yes. HIDE works across IT and CE platform in a non- discriminatory manner.

Oct. 22, 2003ARDG "What is the reliability of the scheme under ideal conditions?" The reliability of HIDE is 100% under ideal condition. Under normal operating conditions, it is more than 50% for a unit of detection window period and it increases towards 100% by extending the detection window. HIDE is reliable against normal attacks such as transformations and removal of known analog copy protection signals.

Oct. 22, 2003ARDG In what form or aspect is the scheme itself upgradeable and/or renewable? The scheme is upgradable by changing embedding pattern of the watermark. The function, performance and robustness of HIDE remain unchanged by an upgrade. The watermark detector would be still usable if the upgraded embedding pattern is implemented in advance. 3.2 What is the upgradeability/renewability mechanism? 3. Robustness

Oct. 22, 2003ARDG What is the mechanism and cost (dollars, cpu cycles, gates, etc.) of known circumvention? For HIDE technology, there is no known circumvention method that preserves enjoyable video quality. 3.5 How does the system address known circumventions?

Oct. 22, 2003ARDG14 Robustness/Survivability HIDE technology is robust against various kinds of attacks:  Vertical and/or horizontal scaling  MPEG2/MPEG4 compression and decompression  VHS recording  D/A and A/D conversions  Random noise addition  Gamma correction  Jitter attack  Rotation attack  Stirmark attack

Oct. 22, 2003ARDG Have the specifications been published and/or reviewed? If so, where? The technology has been offered to and reviewed by DVD- CCA.

Oct. 22, 2003ARDG To what extent, considered purely as a technical matter, and considered apart from rights-allocation choices made by the content owner or distributor does the scheme create side effects in the use of material? As the basic principle of HIDE consists of embedding a signal which carries rights signaling information into the video signal and such embedding results in changing intensity values for some pixels, there is some picture quality degradation in principle. However such degradation is comparable with the degradation resulting from the MPEG-2 compression used for DVD-Video and is not distinguishable by an average user. 4. Side Effects

Oct. 22, 2003ARDG Does the scheme have a mechanism apart from the rights signaling method to convey the rules and conditions to the consumer? The HIDE technology itself does not contain such mechanism.

Oct. 22, 2003ARDG Will the scheme have a mechanism for indicating to the consumer when improper behavior is attempted? The HIDE technology itself does not contain such mechanism for indicating to the consumer when improper behavior is attempted. However, it would be easy for a product that incorporate the HIDE technology to implement such mechanism.

Oct. 22, 2003ARDG Extent to which the scheme's effects are perceptable to consumer, such as visibility and audibility of the scheme. As the basic principle of HIDE consists of embedding a signal which carries rights signaling information into the video signal, there is some picture quality degradation in principle, however such degradation is comparable with the degradation resulting from the MPEG-2 compression used for DVD-Video and is not distinguishable by an average user.

Oct. 22, 2003ARDG Does the scheme increase the exposure to malicious attacks of systems owned by the consumer? E.g. Disable equipment, harm to media, denial of service, etc. There is no identified malicious attack that will be encouraged by the introduction of HIDE technology.

Oct. 22, 2003ARDG21 4.6/4.7 Does the scheme increase the cost and/or complexity of a digital broadcast system or a content mastering/creation system serving as the source for the content? Yes, the scheme increase the cost of a digital broadcast system or a content mastering/creation system serving as the source for the content by adding a watermark embedder. However it does not increase complexity because the watermark embedder is just simply placed after the source or the content mastering/creation system.

Oct. 22, 2003ARDG22 4.8/4.9 Does the scheme increase the cost and/or complexity of digital broadcast operations or content mastering/creation operations serving as the source for the content? No, though it is required to input the rights signaling information for the watermark, those operations are anyway required when the content is marked with a rights signaling information.

Oct. 22, 2003ARDG Does any aspect of the scheme inhibit the end user's equipment or network from playing or recording audio or video content for which copy protection was not asserted Because there is no watermark in a content for which copy protection is not asserted, the scheme does not inhibit playback or recording of such content. 5. Impact on Legacy Devices or on Material Not Protected by the Scheme

Oct. 22, 2003ARDG What is the impact of the scheme on legacy devices (new content and new devices on or with legacy devices)? As legacy device does not detect or react to the watermark, there is no impact on behavior of legacy device. 5.3 What is the impact of the scheme on the use of legacy content with new devices? As legacy content does not contain the watermark, there is no impact on treatment of the legacy content.

Oct. 22, 2003ARDG To what extent does the scheme require the disclosure of personally identifiable information from a user to the service or content provider(s)? The HIDE technology has nothing to do with any personally identifiable information. 6. Privacy

Oct. 22, 2003ARDG Is the specification for the scheme complete enough as to meet generally accepted requirements for a submission to standards bodies? The documentation of specification has not reached sufficient completion level. It will be completed when required. 7. Scheme Documentation

Oct. 22, 2003ARDG Does the scheme embody IP which requires a license? If so, what are the terms of the license for the use of this technology in this application? Does anything in the license effect the availability of the technology in this application? Toshiba's HIDE technology consists of copyrights and trade secrets embodied in a technical specification and other inventions protected by patents or patent applications. Toshiba is prepared to grant license rights, on a per application basis and under reasonable and non- discriminatory terms and conditions, under all claims of such patents/patent applications whether now existing or existing in the future, any trademarks, and all copyrights and trade secrets that is either owned by Toshiba or licensable by Toshiba, that cover the HIDE technology. 8. Contractual Requirements

Oct. 22, 2003ARDG Are the contractual requirements affecting the technical aspects of the proposal, if any, completely described a priori in non-confidential documents? Toshiba is prepared to offering its HIDE technology for licensing for its application to appropriate content protection schemes. Contractual requirements with respect to both technical aspects of implementation of the technology and usage rules do remain yet to be set by the applicable content protection scheme. However, we expect that such requirements would include, without limitation, robustness rules of a reasonable level as well as certain compliance rules/usage rules.

Oct. 22, 2003ARDG What mechanisms, if any, are there for contractual change of technical requirements? Toshiba is prepared to offering its HIDE technology for licensing for its application to appropriate content protection schemes. Mechanisms for contractual change of technical requirements yet remain to be set by the applicable content protection scheme.

Oct. 22, 2003ARDG To what extent, if any, is the solution available solely for the purposes set forth in 1.1 (as opposed to part of a package with other rights and obligations)? The HIDE technology itself does not contain any mechanism limiting the use of the technology solely for the purposes set forth in 1.1. Meanwhile, Toshiba anticipates that it will offer its HIDE technology for licensing on a per embedding field of use basis to be determined from time to time by Toshiba.

Oct. 22, 2003ARDG What is the maturity of the scheme? Toshiba HIDE technology has been evaluated by DVD- CCA and their contracted evaluator and has remained as a candidate for video watermark for protecting DVD-Video contents. 9. Current and Future Capability 9.2 Is the scheme of sufficient maturity that the function, efficacy, and resource requirements have been confirmed by field trials or other appropriate testing?

Oct. 22, 2003ARDG Have the results been shown to be reproducible by entities other than the scheme developers? Yes, the evaluation results by DVD-CCA show well-similar results with ours.

Oct. 22, 2003ARDG "How will the scheme adapt to future content formats (codecs, scan rates, etc)?" As the HIDE technology works in a baseband domain, it is independent from codecs, scan rates or resolutions. 9.5 To which existing analog video standards (e.g. 1080i, VGA, 525i, 525p, 625i etc.) is the scheme applicable? As the HIDE technology is independent from scan rates or resolutions, it is applicable to any existing or future analog video standards.

Oct. 22, 2003ARDG Is the scheme technically capable of interoperation with or use in connection with other systems? As the HIDE technology works on a new concept and does not have any conflict with existing technology, it can interoperate with any existing scheme.

Oct. 22, 2003ARDG Does the scheme stand on its own as a solution to the issues set forth in 1.1, or is it part of a content protection solution that requires adopting additional technology? Yes, Toshiba HIDE technology provides a complete solution as a scheme to convey rights as defined by the ARDG Goals.

Oct. 22, 2003ARDG What is the estimated gate count and/or CPU resources required to implement the scheme, including the gate count and/or CPU resource changes in other system functions required to support the scheme's operation? With off-chip memory W/o off-chip memory 38kB 8kB 83k gates 12kBOn-chip memory Instruction ROM Random 10. Performance/Cost

Oct. 22, 2003ARDG What are the costs as a percentage of total resources? Assuming that "total resources" means the entirety of an end-user DVD player product, the cost of implementing HIDE technology is less than 1% and therefore it is negligible What other system costs are associated with the scheme? As Toshiba HIDE technology provides a complete solution as a scheme to convey rights as defined by the ARDG Goals, there is no other system costs associated with the scheme.

Oct. 22, 2003ARDG38 Rights Signaling Insertion Point (Digital) A Rights Signaling Insertion Point (Digital) B Rights Signaling Insertion Point (Digital) D Rights Signaling Insertion Point (Analog) E Possible Rights Signaling Insertion Points Rights Signaling Insertion Point (Digital) C Rights Signaling Detection Point (Analog) W Rights Signaling Detection Point (Digital) X Rights Signaling Detection Point (Digital) Y Possible Rights Signaling Detection Points Rights Signaling Detection Point (Digital) Z Digital Content Master Digital Source Device with Analog Output (Trusted Environment) Copy Control Information Digital Content Link Protected Digital Output with CCI Digital Processing (decryption, decoding, etc.) Protected Digital Content Delivery with Copy Control Information (CCI) Digital Sink Device with Analog Input (Trusted Environment) Rights Information Digital Content Secure Digital Video Record Function (CCI = Rights) Secure Digital Output Function (CCI = Rights) Record Control Redistribution Control Protected Digital Output with CCI Protected Digital Recording with CCI Analog Output with Rights Signaling Digital -to- Analog Video Converter (Rights = CCI) Analog Output with Rights Signaling Protected Digital Output with CCI Digital Processing (encoding, encryption, etc.) Digital Content CCI Link Protected Digital Input with CCI Analog -to- Digital Video Converter 10.4 Does the scheme require implementation in multiple locations within the system? WM insertion WM detection WM detection / remarking

Oct. 22, 2003ARDG Is the implementation cost comparable across IT and CE platforms? If not, please explain. Yes, the implementation cost is comparable given that other conditions such as resolution etc. are same.

Oct. 22, 2003ARDG Are there certification requirements? If so, what are they? Toshiba HIDE technology does not require any certification; however Toshiba is prepared to offering its HIDE technology for licensing for application to appropriate content protection schemes, that may wish to provide for certification obligations. 11. Certification