Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.

Slides:



Advertisements
Similar presentations
Prepared for DA 201  Introduction to Digital Watermarking.
Advertisements

1 CGMS-A Plus RC Response to CPTWG-ARDG CFI October 22/23, 2003 Multicompany Submission (Matsushita, Mitsubishi, Hitachi, Intel, JVC, Samsung, Thomson,
Copy Generation Management System - Analog Brian Markwalter Director of Engineering Consumer Electronics Association.
A New Extended Copy Control Information (ExCCI) Data Packet by Brad Hunt Chief Technology Officer Motion Picture Association.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
An Assessment of Toshiba HIDE Technology against the ARDG Attribute List Oct. 22, 2003 TOSHIBA Corporation.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
1 Analog Reconversion History CPTWG’s Data Hiding SubGroup (DHSG) CPTWG’s.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Introduction of Content Protection technologies 林至勇.
Macrovision Video Copy Protection Paul Low CS265 Spring 2003.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
1 DVD Copyright Management Schemes Tanveer Alam CVN.
Electronic Watermarking Jean-Paul M.G. Linnartz Nat.Lab., Philips Research.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
Analog Reconversion Reference Architecture Proposal presented to the Analog Reconversion Discussion Group March 5, 2003 by Brad Hunt Chief Technology Officer.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Digital Watermarking Parag Agarwal
1 Chapter 7: Digital Watermarking and Copy(right) Protection.
Quality of Protection (QoP) An approach that separates the development of security services from the application development partitions security services.
Addendum of Digital Video Watermarking MMSEC 2008.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Philips ElectronicsMarch 5, 2003 Architecture for Protection of Content Via Watermarks Michael Epstein Raymond Krasinski Philips Electronics.
ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Apr. 10, 2003TOSHIBA Corporation 1 Toshiba Video Watermarking Technology HIDE -Human eye Insensitive Digitally Embedded watermark- Apr. 10, 2003 TOSHIBA.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
October 22-23, 2003 About Visionaire Develop and license IP Develop and license IP Focused on hardware based Copy-Protection Focused on hardware based.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
The First 50 Years of Electronic Watermarking Ingemar J. Cox, Matt L. Miller NEC Research Institute Journal of Applied Signal Processing, 2002, 2,
Presentation to the Analog Reconversion Discussion Group October 22 nd /23 rd, 2003.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Presented by HDMI, L.L.C. May, 2005 HDMI Retail Training Program Part 1: Overview HDMI – The Standard for Connecting HDTV.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
April 13, 2004 Not For Further Dissemination 1 Verimatrix / Siemens Watermarking Technology Application A presentation to the CPTWG.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
ActivatedAudio™ Watermarking Suite Activated Content Media and Entertainment Services Company Founded in 2001 Customers include UMG, Sony / BMG, and Sterling.
IT2002 ATI Naiwala 1 By ATI Naiwala. IT2002 ATI Naiwala Combination of time Variant Image and Sound – Most realistic media Dynamic Huge data size(Very.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Presented by HDMI, L.L.C. May, 2005 HDMI Retail Training Program Part II: Additional Information HDMI – The Standard for Connecting HDTV.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Secure Scalable Multimedia Streaming Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto.
New Efficient Image Encryption Scheme Based on Partial Encryption Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto.
Mar RTLAB KNU1 DTCP (Digital Transmission Content Protection) Real Time Systems Lab. KNU Myung Jin, Lee Hitachi, Ltd. Intel Corporation MEI (Matsushita.
A Partial Survey of the Perfect Digital Watermark Problem.
Windows Vista Configuration MCTS : Media Applications.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
Applying Digital Watermarking Technology to Control CD copying
Fun Stuff: Digital Media
Digital Watermarking Lecture 2
Presentation transcript:

Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw 1999

I - Introduction 1996: First DVD players ProsCons High quality videocopy perfect reproduction vs VHS Late 1999: DVD recorders Copy Protection Movie-> MPEG-2 & encryption->DVD

I - Introduction Encryption not enough: Back of DVD player Decrypted content Additional protections needed

Agenda II - DVD Copy Protection system in 1999 III - Content Protection During Digital Transmission IV - Watermark System Design Issues V - Copy-Generation Management IEEE 1394 cable Encrypted content Key exchange between compliant devices only Watermark: Copy once Copy never … copy1 DVD recorder copy1 copy2

II - DVD Copy Protection system in : CPTWG (Copy Protection Technical Working Group) –Discuss technical pbs of protecting digital video piracy –No official decision-making power – : design major part of copy protection system 2 major principles guided the CPTWG’s work: - Copy-protection system not mandatory - Copy-protection system cost effective “Keep honest people honest”

II - DVD Copy Protection system in components built: –CSS: Content Scrambling System –APS: Analog Protection System –CGMS: Copy Generation System CSS: Low cost method of scrambling MPEG-2 video (Matsushita) Lead in Lead out 2 keys read by compliant drives only Prevent byte-for-byte copies of an MPEG stream from being playable since copy does not include keys

II - DVD Copy Protection system in components built: –CSS: Content Scrambling System –APS: Analog Protection System –CGMS: Copy Generation System APS: Encodes NTSC/PAL signals so cannot be recorder on VCR but play on TV (Macrovision) encoder Not NTSC/PAL encoded header MPEG stream VCR

II - DVD Copy Protection system in components built: –CSS: Content Scrambling System –APS: Analog Protection System –CGMS: Copy Generation System CGMS: Pair of bits in header MPEG stream header MPEG stream Copy_freely Copy_never Copy_once CCI

II - DVD Copy Protection system in components built: –CSS: Content Scrambling System –APS: Analog Protection System –CGMS: Copy Generation System 3 additional components being considered: –Protection Transmission system –Media identifiers –Watermarking

II - DVD Copy Protection system in additional components being considered: –Protection Transmission system –Media identifiers –Watermarking IEEE 1394 cable Encrypted content Key exchange between compliant devices only Protection Transmission system:

II - DVD Copy Protection system in additional components being considered: –Protection Transmission system –Media identifiers –Watermarking Media identifier: - Identify recordable media - Identify whether a compliant recorder has produced the disk - Distinguish between original ROM disks and a piracy copy

II - DVD Copy Protection system in additional components being considered: –Protection Transmission system –Media identifiers –Watermarking Watermarking: - For a more secure form than CGMS: Record control header MPEG stream Copy_freely Copy_never Copy_once Do not survive D/A conversion Non compliant player strip out copy-control bits Watermark encoding the same info: - Survive D/A conversion - Not too easily strip out - Reduces the value of illegal, unencrypted copies by making them unplayable on compliant devices: Playback control

II - DVD Copy Protection system in 1999 Without WatermarkingWith Watermarking No keys Strip out CCI: copy control bits DVD RAM without CSS or CGMS Analog RGB to appropriate non compliant recorder Cannot remove the CCI: watermark IEEE 1394 standard Most devices will be compliant

III - Content Protection During Digital Transmission transmission DTDG (Digital Transmission Discussion Group) decided: - Content: encrypted - Exchange of CCI: robust - AKE: Authentication for compliant devices Key exchange: keys to exchange encrypted content

III - Content Protection During Digital Transmission

IV – Watermark System Design Issues Economic Costs: - Watermark detector must fit onto unused silicon already in the drive False Positives Rate: - Detector should be good at deciding whether a watermark is present Interaction with MPEG compression: - Watermark adds details that MPEG encoder tries to preserve -> reduce bits available for content  minimize this effect - Watermark detectable in both compressed data stream and reconstructed video

IV – Watermark System Design Issues Detector Placement: In the DriveWithin the Application Pros: Pirated content will never leave the drive and or will never copied onto a disk Pros: MPEG Codec and detector can share a lot of resources. Cons: Additional complexity Cons: Dual system -> sol: compliant drive & compliant application program

IV – Watermark System Design Issues Robustness: Common signal processing: - Geometric distortion - Scaling - Cropping Intentional Tampering: Watermark more difficult to find

V – Copy-Generation Management Copy-generation management requires that the “copy-once” state be detected and changed to a “copy-no-more” state as the video is being recorded. 2 Approaches: - Secondary watermark - Removal of additional information: Tickets “Copy-once” “Copy-no-more” Record video

V – Copy-Generation Management Secondary Watermark: Watermark #1 for “Copy-once”Watermark #1 + Watermark #2 for “Copy-no-more” Record video Computationally inexpensive Insertion in both baseband and compressed video domain Robust Unobtrusive More susceptible to tampering => Want to make the 2 nd watermark undetectable

V – Copy-Generation Management Tickets: Solution to tampering T: cryptographic counter implemented as a multi-bit random number contents # n of playbacks & recording generations allowed T T’

Questions?