Technologies for IPR and data protection

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

doi> Digital Object Identifier: overview
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
University of Surrey Information Services PATRON and PatronMark: negotiating and protecting rights in a higher education environment. Presented by Dr Liz.
Key Elements of a Rights Management System MODELS 10 1st-2nd November, 1999.
Configuration management
Configuration management
DSpace: the MIT Libraries Institutional Repository MacKenzie Smith, MIT EDUCAUSE 2003, November 5 th Copyright MacKenzie Smith, This work is the.
Security of Digital Rights Management Systems Hugo Jonker
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
1 Information Online 2009 Rights management – does copyright still matter in the 21st century? 20 January, 2009 Caroline Morgan General Manager, Corporate.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
A New Computing Paradigm. Overview of Web Services Over 66 percent of respondents to a 2001 InfoWorld magazine poll agreed that "Web services are likely.
1 MPEG-21 : Goals and Achievements Ian Burnett, Rik Van de Walle, Keith Hill, Jan Bormans and Fernando Pereira IEEE Multimedia, October-November 2003.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Jau-Wu Huang1 Digital Rights Management for Visual Content in Mobile Applications Trimeche, M.; Chebil, F.; Nokia Research Center Control, Communications.
Philips Research France Delivery Context in MPEG-21 Sylvain Devillers Philips Research France Anthony Vetro Mitsubishi Electric Research Laboratories.
ER-0317/2/99 G R U P O S G A E Intellectual Property Rights in digitisation of education Part 1. Current problems in the face of digitisation. Massive.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
MPEG-21 Multimedia Framework: Status and Directions January 8, 2003 John R. Smith Pervasive Media Management Group IBM T. J. Watson Research Center 19.
Metadata Presentation by Rick Pitchford Chief Engineer, School of Communication COM 633, Content Analysis Methods Fall 2009.
UFCEXR-20-1Multimedia Sound Production Multimedia Sound Production and Copyright.
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Music On The Internet Keith Hill - Strategy & Development Manager New Technology Division.
1 Functional reference model for Digital Rights Management Systems Vural Ünlü / Prof. Dr. Thomas Hess Munich School of Management Berlin, 5. September2004.
Digital Rights Management on the Web Dr Renato Iannella IPR Systems Chief Scientist 10th World-Wide Web.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy.
1 Seminar Presentation Multimedia Audio / Video Communication Standards Instructor: Dr. Imran Ahmad By: Ju Wang November 7, 2003.
EED 502: UNIT A MULTI MEDIA TOUR.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
DINI „Electronic Publishing Group“ DINI – Certificate Document and Publication Repositories “Electronic Publishing Group“
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
R EUTERS 150 Y EARS David Parrott Reuters/Chief Technology Office 18 July 2001 Report on Reuters Response to MPEG-21 CfR Report to XACML Committee Face-to-Face.
Rights Expression Languages in Digital Rights Management Xin Wang ContentGuard, Inc. October 19, 2006.
Metadata and Geographical Information Systems Adrian Moss KINDS project, Manchester Metropolitan University, UK
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
1 DOI for eBooks: What are we identifying? Steve Mooney Sophia-Antipolis, France 22 JAN 01.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Digital Rights Management with XML Eamonn Neylon Technology Director The YRM Group.
ER-0317/2/99 G R U P O S G A E DIGITAL RIGHTS MANAGEMENT INTRODUCTION/ OPTIONS EdReNe Seminar March 2008 Paul Sire Sociedad Digital de Autores y Editores.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
Presented by: Jody and Kenneth1 Copyright and Other Legal Issues in Distance Education Presented by Jody & Kenneth.
1 Not So Strange Bedfellows: Information Standards For Librarians AND Publishers November 6, 2015.
26/05/2005 Research Infrastructures - 'eInfrastructure: Grid initiatives‘ FP INFRASTRUCTURES-71 DIMMI Project a DI gital M ulti M edia I nfrastructure.
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Identifiers for a Digital World June 29, 2010 Patricia Payton Senior Director of Publisher Relations & Content Development
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Purchasing Rights on line Domenico Sindico Turin Master of Law in Intellectual Property WIPO / UNIVERSITY OF TURIN.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DRM in Proprietary Products and Digital Archive
An Overview of MPEG-21 Cory McKay.
William Hackett & Co. Solicitors
What is Digital Right Management’s Role in Modern Education System’s Play? —A Comparative Research of DRM System’s Influence in.
Distributed Digital Rights Management
Presentation transcript:

Technologies for IPR and data protection Theodore S. Papatheodorou & Dimitris K. Tsolis (University of Patras) Vito Cappellini & Alessandro Piva (University of Florence) Parma, 21 November 2003

Historical Note “Technologies for IPR and Data Protection”: Appeared firstly during the NRG meeting at Corfu (Greek Presidency – 26th June 2003). Is a joint initiative of Greece and Italy. Useful contributions were made by Mr. David Dawson (UK).

Introduction Objectives of the presentation. Summarize technological solutions for copyright protection and management, which are proposed, implemented and applied to cultural applications, European projects, etc. Collect recommendations, key points and limitations of these technological solutions.

IPR & IST IPR protection and management is an issue that is gradually becoming critical: Advances in technology have improved the ability to reproduce, distribute, manage and publish information. The information structure has been integrated into everyday life, affecting directly, amongst others, the IPR legislation. Lack of awareness of both content holders and content users is observed.

Technological Solutions Overview Proposals and Practices across MS are mainly focusing on: How to provide access without giving up control. A complete technological schema includes: Technical Protection Means (TPM). A TPM is a technology that supports users, content owners and organizations to secure and protect digital content (text, image, video, sound, graphics) from unauthorized use. The definition implies the traceability of an improper use. Digital Rights Management Systems (DRMS). Systems which are supporting the management of rights of digital content for providers and users including time and usage based business models.

TPM / DRM & Legislation TPM / DRM are legally protected by the EC Directive 2001/29, from acts of circumvention and other attacks. Legislation harmonization for all MS is required.

Technical Protection Means The TPM used by practices and projects amongst MS are summarized bellow: Security and integrity features of computer operating systems (include, for example, the traditional file access privileges enforced by the system). Encryption, allows digital works to be scrambled so that they can be unscrambled by legitimate users only. Persistent encryption, allows the consumer to use information while the system maintains it in an encrypted form. Data hiding (watermarking), embeds information (e.g., about ownership) into a digital work. A digital watermark can help owners track copying and distribution of digital works. Special – Purpose Devices (e.g. DVD protection).

Data Hiding Multidisciplinary research field that combines signal processing with cryptography, communication and coding theory. Data hiding techniques were first applied to copyright protection applications. Used to verify whether the content has been modified since its distribution. Fragile watermarks. Used to embed hidden labels and annotations into the host data. Robust watermarks.

What makes a TPM successful? Usability. A difficult to use protection system may discourage users from using it. Appropriateness to the content. The cost of designing, developing, and deploying the system has to be in harmony with the type of the content. For inexpensive content which is already available in a reasonably priced, non-Internet medium, there is no point to an expensive TPM that drives up the price of Internet delivery. Appropriateness to the threat. Preventing honest customers from making copies may require nothing more that a reasonably priced product, a good distribution system, and a clear set of instructions. Preventing “electronic theft” of extremely valuable content that must at some point reside to a computer network requires a very sophisticated TPM, and even the best available with current technology may not be efficient. The cost-benefit analysis is difficult but necessary.

Digital Rights Management - 1 Identification Systems. Aiming at facilitating persistent identification and interoperable exchange of Intellectual Property on digital networks Persistent URLS. Digital Object Identifier. Custom made identification systems. Metadata for IPR management. Dublin Core and DIG 35. Languages. Programming languages based on metadata sets and W3C standards: Extensible Access Control Markup Language, OASIS Rights Language, Extensible Rights Markup Language, IEEE LTSC DREL Project, INDECS – Rights Data Dictionary, MPEG Rights Expression Language, Open Digital Rights Language.

Digital Rights Management - 2 Formats. Copyright information is embedded to the file format. Audio, print (PDF, LIT), video, and image (JPEG2000) formats Operating systems. Incorporating rights management functions into the OS. Windows Rights Management Services (RMS) technology for Windows Server 2003. Delivery Systems. Applications widely used which enforce rights management tasks in parallel with the on-line content delivery. Adobe, DMD Secure, IBM EMMS, Info2Clear, DWS, InterTrust, Liquid audio, Macrovision, Microsoft, Realnetworks, Sony.

What makes a DRM successful? Interoperability. Rights expression languages is the key to interoperability. Security in DRM. Pointer to TPM. Usability. Licensing. Licensing negotiations tend to be extremely lengthy in practice. An adaptation to a more efficient electronic licensing model is necessary. Reasonable Costs of DRM technologies. Business Models. A DRM should be based upon a clear and well-defined business model.

A Business Model - 1 IMPRIMATUR Project, TRADEX. Management of policies. in DRM systems a policy is a conditional statement describing how to handle actions attempted on the content by an authorised user. Players - Entities. The key entities can be listed as: The author, who will be the creator of the copyrighted work. The rights-holder (or copyright owner). The creation provider (or service producer). The media distributor (or service provider). The IPR register or database. The Unique Number issuer. The controller. The certification authority. The purchaser.

A Business Model - 2 The transactions: Transfer of the work: the work object of the trading can be transferred from the creator, to the creation provider, then to the media distributor and finally to the purchaser. Transfer of values: this is the exchange of money given for compensating the use of the multimedia work. Assignment of rights: the rights on the multimedia creation can be transferred from the original creator to a rights-holder. Assignment of a unique number identifier: this is requested by the creation provider and provided by the unique number issuer. Transfer of IPR information: it is usually the rights-holder that is charged to upload the correct IPR information into the IPR database, making them available for the other parties.

Key & Open Issues, Technical – 1 Technology provides means and not answers to social, legal and economic questions. There is not a TPM that can protect perfectly. Technology changes rapidly, making previously secure systems progressively less secure. The key measure of success for a TPM / DRM system is that it should make easier for users to be honest, rather than placing major barriers in their access to digital content. Some TPM are designed to keep honest people honest and others (more ambitious) provide for robust security. The quality and cost of a TPM / DRM should be in harmony with the resources it protects. TPM / DRM almost invariably cause some inconvenience to the user.

Key & Open Issues, Technical – 2 While TPM and DRM are often viewed as tools for providing financial profit, this view point is too narrow. Technical protection offers additional important services, including verifying the authenticity of information and of the users involved in the content transactions. A TPM will not (probably) contribute to an increase of revenue. Technical implementations of protection mechanisms are difficult to sustain because of annual renewal costs In one vision of the future, implementations are leading to the development and widespread adoption of hardware based, end-to-end systems that facilitate control of digital IP. These “trusted systems” constitute an open research area.

Open Issues - Standards Further standardization of emerging technologies for IPR protection is an open issue. Even if certain practices have been promoted, the incorporation of trust management elements in existing IPR standards is an open issue too. There is no common agreement of the resolution of images and the format of multi-media content that should be made publicly accessible.

Open Issues - Other Business Models A model for enabling the use of materials for e-Learning does not exist and is considered necessary. There are few models that enable true publicly-accessible digital libraries. Only those policies that can be reliably expressed through binary decisions (yes/no) can be automated successfully. There could be a role for a Trusted Third Party to act on behalf of the Cultural Sector.

Applications - Watermarking Watermark W W encoder Watermarked content Original content key Sandro Filipepi, called il Botticelli, La nascita di Venere, Firenze, Galleria degli Uffizi, a part

Applications - Watermarking Original content W Content users Attacker Pirate product Attacked content Sandro Filipepi, called il Botticelli, La nascita di Venere, Firenze, Galleria degli Uffizi, a part

Applications - Watermarking Watermark W Decoder response: The watermark W is present ? YES/NOT Pirate product Decoder Key Sandro Filipepi, called il Botticelli, La nascita di Venere, Firenze, Galleria degli Uffizi, a part

Applications - Watermarking Parameters for watermark embedding

Watermark embedding

Watermark embedding

Watermark detection

Watermark detection

Applications - Watermarking Project – “IPR Protection and Management for Ulysses – The Portal of Hellenic Culture”

Image Management Project – “IPR Protection and Management for Ulysses – The Portal of Hellenic Culture”

Metadata Management Project – “IPR Protection and Management for Ulysses – The Portal of Hellenic Culture”

Watermark embedding Project – “IPR Protection and Management for Ulysses – The Portal of Hellenic Culture”

Watermark detection Project – “IPR Protection and Management for Ulysses – The Portal of Hellenic Culture”

Acropolis CD-Rom Project – “Acropolis CD-ROM”

Watermarked Images - CD Project – “Acropolis CD-Rom”