Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Key Management And Key Distribution The essential problems addressed by all cryptosystems is how to safely exchange keys and how to easily manage the.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Digital rights management Audio watermark Jiamian.
Rob Farraher Ken Pickering Lim Vu
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
Cryptographic Technologies
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Digital Watermarking Parag Agarwal
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved Chapter 6: Video.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Pretty Good Privacy (PGP) Security for Electronic .
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 1 Introduction to Information Technology & Management.
Lecture 2: Introduction to Cryptography
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Garage Band For MAC. What is it? A digital audio workstation that can record and play back multiple tracks of audio. Is a software application for OS.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
IS3230 Access Security Unit 9 PKI and Encryption
Parag Agarwal Digital Watermarking Parag Agarwal
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Chapter 29 Cryptography and Network Security
Digital Watermarking Lecture 2
Presentation transcript:

Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?

Blue Spike © 2001 Blue Spike, Inc. - 2 What is the Problem? Copyright law developed at a time when making copies required significant capital investment. Now, for digital media, the capital investment required for exact duplication is minimal. With efficient networks, even mass redistribution is trivial.

Blue Spike © 2001 Blue Spike, Inc. - 3 The existing media companies’ business model is predicated on providing the capital necessary to enable mass distribution of physical media. As those capital needs approach zero, so does one of the barriers to entry in their business.

Blue Spike © 2001 Blue Spike, Inc. - 4 Because of the potential impact to their near-term bottom lines, the media companies have been reluctant to embrace new distribution models and new payment paradigms. First and foremost, they seek to preserve their current competitive advantages. More Problems…

Blue Spike © 2001 Blue Spike, Inc. - 5 Copy Control? This has led to an obsession with creating a technological barrier to digital duplication, or copy control. Recently, this has been expressed as a strong interest in digital watermarking.

Blue Spike © 2001 Blue Spike, Inc. - 6 What is Watermarking? At its simplest, digital watermarking is steganography: hiding one signal inside of another. The resulting signal is imperceptibly different from the original, yet contains a machine- readable payload.

Blue Spike © 2001 Blue Spike, Inc. - 7 Watermarking Standards In order for copy control information to be passed by a watermark (or by any method), a standard decoder needs to exist in every device. This requires the formation of a standards body. For audio, the Secure Digital Music Initiative (SDMI) fills this role.

Blue Spike © 2001 Blue Spike, Inc. - 8 SDMI SDMI was formed in December 1998 by the RIAA, and over 200 companies have joined since. At its core is an attempt to choose a standard watermark technology to transmit very basic music usage rules to consumer devices.

Blue Spike © 2001 Blue Spike, Inc. - 9 SDMI Rules under consideration Copy state (no more copies, copy once, copy freely). Distribution method (open format, secure format) Compression state (has it been compressed since distribution?)

Blue Spike © 2001 Blue Spike, Inc The Wish List To transmit these rules, SDMI requested a watermark which was: Inaudible Resistant to manipulation Uncrackable Computationally inexpensive Cheap

Blue Spike © 2001 Blue Spike, Inc Did they get it? In a word – no. Specifically, any watermark used for copy control MUST use a universal key for decoding, since every device must read it. And universal keys are universally insecure.

Blue Spike © 2001 Blue Spike, Inc So what will they do? SDMI will almost certainly choose a watermark anyway, and attempt to get all device and software manufacturers to support it. Then they hope to get consumers to accept it voluntarily, since they can’t technologically force them to obey.

Blue Spike © 2001 Blue Spike, Inc I’m a developer… If you wish your Mac software to be SDMI Compliant, you will need to pass all plaintext audio through the watermark detector. Expect: 5-15% processor load above playback 50 – 200K additional RAM

Blue Spike © 2001 Blue Spike, Inc So what IS watermarking good for? Authentication Audit Trails Open Signaling

Blue Spike © 2001 Blue Spike, Inc Watermarking, like ciphering, can be done securely or insecurely. In combination with a symmetric or asymmetric key, a watermark can be resistant to removal and eavesdropping and mathematically difficult to forge.

Blue Spike © 2001 Blue Spike, Inc The key is the key As with other cryptosystems, in secure watermarking key management is paramount. A watermark is always obscurable after a threshold of signal degradation is passed. Preventing forgery is the most important task.

Blue Spike © 2001 Blue Spike, Inc The key performs the following tasks: Randomizes the embedding process Provides input to the authentication hash algorithm Stores relevant aspects of the signal.

Blue Spike © 2001 Blue Spike, Inc Embedding Secure watermark embedding uses randomly selected multiple embedding algorithms with randomly selected parameters. The relation between the original signal and the watermarked signal should be as non-linear as possible.

Blue Spike © 2001 Blue Spike, Inc Authentication The watermark payload contains the output of a hash generated from: The message itself The binary sequence from the key Important features of the signal

Blue Spike © 2001 Blue Spike, Inc Human Interaction For maximum transparency, it is also best to include a human ear or eye in the embedding process. This maximizes the watermark strength while avoiding any possibility of artifacts. The human’s decisions are then also stored in the key.

Blue Spike © 2001 Blue Spike, Inc What does this get you? A secure watermark is an excellent alternative to a digital signature when the data to be signed is perceptual (audio, images, video). It is: persistent through format conversions more efficient than signature algorithms resistant to allowed manipulations hidden from eavesdroppers

Blue Spike © 2001 Blue Spike, Inc The Pitch… Blue Spike is the original provider of secure digital watermarking for all media. We can provide security components for creating authentication and protection of perceptual assets to round out a complete cryptosystem.

Blue Spike © 2001 Blue Spike, Inc Digital Rights Management? The success or failure of copy control standards and digital rights management systems depends upon consumer acceptance. Consumers will only accept usage restrictions if accompanied by significant improvements in user experience.

Blue Spike © 2001 Blue Spike, Inc Authentication watermarking to enable add-ons for consumer benefits Forensic watermarking to create audit trails Open watermarking to automate signal identification and monitoring The solution for copyright management