1 Chapter 7: Digital Watermarking and Copy(right) Protection.

Slides:



Advertisements
Similar presentations
Digital rights management Audio watermark Jiamian.
Advertisements

Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Steganography and Watermarks Trust and Reputation.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Macrovision Video Copy Protection Paul Low CS265 Spring 2003.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Steganography Rayan Ghamri.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
One possible way to encode information in text is print it in two slightly different typefaces. The secret message is decoded by ignoring one of the typefaces.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
Digital Watermarking Parag Agarwal
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Cryptography, Authentication and Digital Signatures
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Security Issues for Visual Data: Copyright and Access Control
Computers Talk Binary.
Applying Digital Watermarking Technology to Control CD copying
Watermarking for Image Authentication ( Fragile Watermarking )
Khan, Mohammed Minhajuddin
It is easy to spot bootlegs in toys, animation, and movie posters.
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Fun Stuff: Digital Media
Chapter 1: Introduction
Presentation transcript:

1 Chapter 7: Digital Watermarking and Copy(right) Protection

2 Digital recording  The biggest advantages of digital recording: no quality degradation over time, transmission, copying; contents can be transmitted and “sold” over the digital network  Problem: difficult to guard against piracy

3 Digital watermarking, cryptography, and steganography  One way to protect your content from being stolen is to encrypt it. You make sure that only an intended (paid) recipient has the key to decrypt the content.  Unfortunately, cryptography does not prevent the recipient from making copies of the content and re-sell them.

4 Hardware key  To prevent re-distribution, we can encrypt the file using a key that is dependent on the user’s hardware e.g., a palm device or a PC has a unique processor id  Before a user download a (paid) file, he will have to send his machine’s id to the server. The server then encrypts the file based on the id.  To use/process/read the file, the user has to download a special program, which will access the hardware id and use that to decrypt the file. There should be no other way to read the file content.

5 Hardware key shop user hardware key (k), money k shop user encrypted file, F’, reader program P k F user kPF’ user’ k’PF’ another user obtaining P and F’ would not be able to read the file since he does not have the right processor id.

6 Hardware key  Disadvantages: a user can only read the file on one machine only users cannot “upgrade” their hardware without losing the paid content if the hardware is broken, the file can no longer be read

7 Digital watermarking, cryptography, and steganography  Another possibility is to hide some secret information into your content to prove your ownership. Ben’s photo It is my photo, not yours

8 Steganography  literally means “covered writing”  refers to hiding information in ways that prevent the detection of hidden messages  used to communicate information without letting others even notice that a communication is being taken place

9 Steganography  Example: A German spy sent the following “harmless” message in WWII Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.

10 Steganography  If we extract the 2 nd letter in each word, we get: Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.  Or the secret message: Pershing sails from NY June 1.

11 Another example  “This hidden article needs keeping safe from other renegade Yeomen of unscrupulous repetition awaiting to theorize every new technological idea of nonsense!” (taken from DataMark Technology)

12 A third example AND

13 Digital watermarking  Similar to steganography, watermarking is about hiding information in other data. The difference is that a watermark should be somewhat resilience against attempts to remove it.  There are watermarking techniques for embedding information in text image audio video

14 Terminology  cover data (image) – data (image) to be protected  watermark – secret data to be hidden in a cover  watermarked data – cover data + watermark

15 Watermarking applications  Ownership assertion – a rightful owner can retrieve the watermark from his content to prove his ownership.  Fingerprinting – an owner can embed a watermark into his content that identifies the buyer of the copy (c.f. serial number). If unauthorized copies are found later, the owner can trace the origin of the illegal copies.

16 Watermarking applications  Authentication – the creator of a content can embed a fragile watermark into the content to provide a proof of authenticity and integrity. Any tampering of the original can be detected.  Visible watermarking – a visible watermark (an image) can be embedded on a “preview” to destroy its commercial value.

17 A visible watermark taken from IBM research magazine

18 Invisible watermark

19 LSB substitution  Let w i be the i th bit of the watermark  Let p j be the j th pixel of a cover image  LSB substitution simply converts the least significant bit of p i to w i.  Since only the LSBs are changed, the modification does not cause much perceptible noise to the cover.

20 LSB substitution with a secret key  If you want to enhance the watermark secrecy, we can insert the watermark bit at random pixels, dependent upon a key.  A user selects a secret key, k. A sequence of pseudo-random numbers r i ’s are generated using k as the seed.  Example: pick a number m and a number a r 1 = (k mod m) + 1 r i = (a * r i-1 mod m) + 1

21 LSB substitution with a secret key suppose the number sequence is: … only if one knows the key does one know how to retrieve the watermark

22 Robustness  LSB substitution is not robust against attempts to remove the watermark. A simple modification of the image (e.g., by setting all LSBs of all pixels to ‘0’) can wipe out the watermark. Transcoding (such as converting the image into lossy JPEG file) can also remove the watermark effectively.

23 A DCT-based technique  Given a cover image, first decompose it into a number of 8  8 blocks.  If the watermark contains n bits, use a secret key to locate n blocks at “pseudo-random” locations.  The i th block B i is used to carry the i th bit of the watermark, w i.

24 A DCT-based technique  Compare the DCT coefficients: u3v0 and u2v2, try to enforce the following: if u3v0 > u2v2 then w i = 1; w i = 0 otherwise  if the original values of u3v0 and u2v2 do not follow the above, swap them

25 DCT-based watermarking

26 DVD Region Code  8 regions: 1: U.S., Canada, U.S. Territories 2: Japan, Europe, South Africa, and Middle East (including Egypt) 3: Southeast Asia and East Asia (including Hong Kong) 4: Australia, New Zealand, Pacific Islands, Central America, Mexico, South America, and the Caribbean 5: Eastern Europe (Former Soviet Union), Indian subcontinent, Africa, North Korea, and Mongolia 6: China 7: Reserved 8: Special international venues (airplanes, cruise ships, etc.)

27 DVD Region Code  A region code (an 8-bit byte) is recorded on a disc.  A player checks if its region code matches that of a disc.

28 DVD copy protection  Traditional recording media (e.g., audio tape, VHS tape) for audio and video are analog.  Piracy is not too big of a concern because quality degrades with each copy generation.  With digital recording and high-resolution video, DVD copy protection was a big issue to the movie industry.  In fact, it took about 2 years after the invention of DVD to put DVD movies on the shelf. Part of it is due to the development of a reasonable copy protection scheme.

29 CSS  Content Scrambling System  proposed by the Copy Protection Technical Working Group for DVD (CPTWG), IBM, Intel, Matsushita, Toshiba.  The idea: Alice sells Bob a video, in order for Alice to prevent Bob from re-disseminating the video to others, Alice tries to make sure that Bob only accesses the video data on a trusted (or complaint) device.

30 Trusted devices  A trusted device is manufactured by a trusted manufacturer.  A manufacturer is trusted if it joins the Copy Control Association (CCA)  A trusted device is given a (secret) player key k i.  The trusted manufacturer has to sign an agreement with CCA, basically barring it from making devices that could undermine the copy protection mechanism.

31 CSS  In most cases, a DVD (video disk) is protected by the CSS scheme. Intuitively, the video content is encrypted using a disc key, k.  In the lead-in area of a CSS-protected DVD, the disk’s key k is encrypted about 400 times, each using a different player key.  A DVD player with the i th player key will read the i th entry of the key block. This entry is then decrypted using the player key k i to obtain the disk key k.  The video content is then decrypted on-the-fly while the movie is played.

32 CSS  An off-the-shelf DVD writer will not copy the key block in the lead-in area, hence even the file on the DVD is copied, the copy will not have the key block. This makes the disk non-playable.  However, it is still possible that people make pirated copies with the lead-in key block.  Also, if someone decrypts a video, he can make pirated copies without CSS (i.e., not encrypted)

33 CSS  Another possibility is to go for a digital-analog- digital route. One can feed the analog output (AV or components) from a compliant player to an MPEG encoder. The encoded MPEG file is then written on DVD disks (without CSS). legal DVD r g b complaint player MPEG encoder DVD writer pirated DVD

34 Is VCR illegal?  In the States, videotaping a TV program for time- shifting purposes does not constitute copyright infringement.  However, a person cannot make a copy of the copy.  A digital video stream can be obtained from DVD (may not be copied) Digital TV broadcast (can be copied once)  We need a mechanism to distinguish the 2 cases  copy generation management system (CGMS)

35 CGMS  A CGMS is a pair of bits in the header of an MPEG stream: copy_freely copy_never copy_once copy_no_more  When a compliant DVD recorder is given a copy_once video, it will change the CGMS bits to copy_no_more in the DVD copy it writes.  A complaint DVD recorder will refuse to write a video whose CGMS bits are copy_never or copy_no_more.

36 CGMS  The CGMS bits in the MPEG header is not very secure. It can be easily removed.  Suggestions are there that the video should be watermarked with the CGMS bits – to make them very difficult to remove.  Watermarking can also help preventing piracy. If a compliant player detects a watermark (copy_never, copy_no_more) from a video that is itself un- encrypted (i.e., without CSS), the player should refuse to play.

37 MacroVision  Analog Protection System (APS)  prevent recording a DVD movie on consumer tapes.  A player with APS modifies the analog signal output (e.g., by adding pulses to the vertical blanking signal). This confuses most VCR. The recorded pictures are significantly distorted.