Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.

Slides:



Advertisements
Similar presentations
Prepared for DA 201  Introduction to Digital Watermarking.
Advertisements

Rob Farraher Ken Pickering Lim Vu
Steganography and Watermarks Trust and Reputation.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Fifth International Conference on Information
Macrovision Video Copy Protection Paul Low CS265 Spring 2003.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Addendum of Digital Video Watermarking MMSEC 2008.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
CPS 182s 1.1 Digital Watermark l What is a watermark? A digital watermark?  Message about a work is embedded in the work l What is steganography?  The.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
The Steganographic File System Ross Anderson, Roger Needlham, Adi Shamir Presented by: Pan Meng Presented by: Pan Meng.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Philips ElectronicsMarch 5, 2003 Architecture for Protection of Content Via Watermarks Michael Epstein Raymond Krasinski Philips Electronics.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Digital Watermarking
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Top 3 Best Cinavia Removal Software
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
DONE BY S.MURALIRAJAN M.NIRMAL
Applying Digital Watermarking Technology to Control CD copying
Digital Watermarking for Image Authentication with Localization
Fun Stuff: Digital Media
Authors: J.J. Murillo-Fuentes
Digital Watermarking Lecture 2
Presentation transcript:

Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is copyright control…” Ingemar J Cox, Jean-Paul M.G. Linnartz

Summary Introduction Introduction Restricted/Unrestricted Watermarking Restricted/Unrestricted Watermarking Usage of Unrestricted key watermarks for DVD copy protection Usage of Unrestricted key watermarks for DVD copy protection Intentional Attacks Intentional Attacks –Exploiting the presence of a Watermark Detector Device –Attacks based on the presence of a Watermark Inserter –Attacks by Statistical Averaging –Attacks on the Copy Control Mechanism Conclusion Conclusion

Introduction A combination of encryption and watermarking is unlikely to stop professional piracy A combination of encryption and watermarking is unlikely to stop professional piracy Video content for a DVD is scambled before being placed on a disk, but after descrambling the content is unprotected Video content for a DVD is scambled before being placed on a disk, but after descrambling the content is unprotected A DVD player checks for watermarks and prevents playback if a ‘never copy’ watermark is detected on a recordable disk A DVD player checks for watermarks and prevents playback if a ‘never copy’ watermark is detected on a recordable disk The watermark must be able to survive signal transformations and survive trivial attacks by normal users The watermark must be able to survive signal transformations and survive trivial attacks by normal users

Restricted/Unrestricted Watermarking The Key The Key –“The key itself may simply be a pseudo-random number sequence embedded in all images or might be some parameter of the original unwatermarked image, such that a different key is used for each different image” Ingemar J Cox, Jean-Paul M.G. Linnartz Unrestricted-key Unrestricted-key –The watermark key is availible to a large number of detectors Restricted-key Restricted-key –The watermark is only readable from a limited number of trusteded recievers which know the key

Usuage of Unrestricted-key watermarks for DVD copy protection The image quality of DVD’s provides a significant improvement over existing home video equipment but is a greater risk to content providers as each DVD is an exact digital reproduction The image quality of DVD’s provides a significant improvement over existing home video equipment but is a greater risk to content providers as each DVD is an exact digital reproduction The aim of copy protection is to prevent illegal copies being made, or if this fails to reduce the value of illegal copies The aim of copy protection is to prevent illegal copies being made, or if this fails to reduce the value of illegal copies Copy protection is supported in three ways Copy protection is supported in three ways –Video Content is encrypted –DVD players are equiped with an Analog Protection System (APS) –A watermark prevents copying by telling compliant devices not to copy it, it also reduces the value of illegal copies by preventing them being played on compliant devices

Exploiting the presence of a Watermark Detector Device The attacker has access to a watermark detector The attacker has access to a watermark detector The watermark detector provides information about whether an image contains a watermark The watermark detector provides information about whether an image contains a watermark The attacker can use this information to remove the watermark, or change the image so the detector doesn’t recognise the watermark The attacker can use this information to remove the watermark, or change the image so the detector doesn’t recognise the watermark

Attacks based on a Watermark Inserter The attacker has access to a watermark inserter The attacker has access to a watermark inserter The DVD copy control management information is modified The DVD copy control management information is modified The attacker has access to the material both before and after the changing of the watermark, and can use this to calculate the original The attacker has access to the material both before and after the changing of the watermark, and can use this to calculate the original

Attacks by Statisical Averaging If the watermark doesn’t depend significantly on the image an attacker may estimate the watermark, and refine his estimate over many frames If the watermark doesn’t depend significantly on the image an attacker may estimate the watermark, and refine his estimate over many frames This would enable the attacker to remove the watermark from all remaining frames with very little extra effort This would enable the attacker to remove the watermark from all remaining frames with very little extra effort

Attacks on the copy control Mechanism An attacker, rather then modifing the watermarked image, may just tamper with the copy control mechanism and modify the output of the watermark detector so it always sees a ‘no- watermark’ detection, even if the watermark is present An attacker, rather then modifing the watermarked image, may just tamper with the copy control mechanism and modify the output of the watermark detector so it always sees a ‘no- watermark’ detection, even if the watermark is present The watermark detection process of the player is only designed to detect the watermark when the image is perceptually meaningful, so distort/scramble the content, copy it, then undistort/unscramble it, and a perfect digital copy is produced The watermark detection process of the player is only designed to detect the watermark when the image is perceptually meaningful, so distort/scramble the content, copy it, then undistort/unscramble it, and a perfect digital copy is produced

Conclusion Legal, economic and technological efforts are all needed to prevent and/or deter DVD piracy. Legal, economic and technological efforts are all needed to prevent and/or deter DVD piracy. Unrestricted key watermarking is a promising technology, especially when combined with encryption, but unfortuantly one that cannot be absolutly secure. Unrestricted key watermarking is a promising technology, especially when combined with encryption, but unfortuantly one that cannot be absolutly secure.

Questions Why can Unrestricted-key watermarking never be fully secure? Why can Unrestricted-key watermarking never be fully secure? Does Watermarking for DVD’s need to be totally secure? Does Watermarking for DVD’s need to be totally secure?