Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
© 2003 Verance Corporation. 1 Verance Copy Management System Presentation to CPTWG ARDG April 10, 2003.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Digital rights management Audio watermark Jiamian.
Rob Farraher Ken Pickering Lim Vu
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Information Hiding: Watermarking and Steganography
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
Why the DMCA has the right to outlaw numbers
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
A Study of the Secure Digital Music Initiative Brandon Sutler Vineet Aggarwal Sachin Kamath University of Virginia CS 551.
Digital Right Management Chung Yip (Eric) CS 996 Information Security Management April 27, 2005.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
1 MPEG-21 : Goals and Achievements Ian Burnett, Rik Van de Walle, Keith Hill, Jan Bormans and Fernando Pereira IEEE Multimedia, October-November 2003.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Jau-Wu Huang1 Digital Rights Management for Visual Content in Mobile Applications Trimeche, M.; Chebil, F.; Nokia Research Center Control, Communications.
1 DVD Copyright Management Schemes Tanveer Alam CVN.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Protection for Web Delivered Music Patcharinee Tientrakool EE 6886: Topics in Signal Processing - Multimedia Security System.
MPEG-21 Multimedia Framework: Status and Directions January 8, 2003 John R. Smith Pervasive Media Management Group IBM T. J. Watson Research Center 19.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
C opyright Protection and Digital Rights Management 1.
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
Digital Rights Management An Overview By Jude Umeh (MBCS)
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
1 Functional reference model for Digital Rights Management Systems Vural Ünlü / Prof. Dr. Thomas Hess Munich School of Management Berlin, 5. September2004.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
A Gift of Fire, 2edChapter 6: Intellectual Property1 Intellectual Property.
Rights Expression Languages in Digital Rights Management Xin Wang ContentGuard, Inc. October 19, 2006.
Cryptography, Authentication and Digital Signatures
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 Anonymous Trust: Digital Rights Management Using Broadcast Encryption Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Digital Rights Management with XML Eamonn Neylon Technology Director The YRM Group.
Who owns the Bits? Digital copyright issues are continually evolving. IP address do not map to a single person – hard to trace user Music and movie industry.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
Towards a Software Architecture for DRM Joint work with Kristof Verslype, Wouter Joosen, and Bart De Decker DistriNet research.
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 11/29/2006 Social Implications Discussion 4 – Digital Rights Management.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Applying Digital Watermarking Technology to Control CD copying
An Overview of MPEG-21 Cory McKay.
Presentation transcript:

Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January 2005

Outline Content Protection Overview Content Protection Overview –Key players in content protection Digital Rights Management (DRM) Digital Rights Management (DRM) –Basics –Legal and technical solutions –Methods and tools Research Issues Research Issues Conclusion Conclusion

Motivations Illegal copying and distribution on a massive scale facilitates misuse, piracy, plagiarism and misappropriation. Illegal copying and distribution on a massive scale facilitates misuse, piracy, plagiarism and misappropriation. –Example Peer-to-peer (P2P) architecture based systems create considerable challenges for copyright enforcement. Peer-to-peer (P2P) architecture based systems create considerable challenges for copyright enforcement. –P2P with anonymity –DRM for P2P

Failed Copy Protection Schemes (1/2) Content Scrambling System (CSS) Content Scrambling System (CSS) –To protect prerecorded movies stored on DVD, including Encryption to scramble the video data Encryption to scramble the video data –Decryption keys are stored on special areas only accessible for compliant reader A protocol for obfuscating the communication between the DVD player and attached device A protocol for obfuscating the communication between the DVD player and attached device Copy protection for digital/analog outputs Copy protection for digital/analog outputs –DeCSS software was successfully developed! Once the encryption for a movie is broken, illegal copies can be played by DVD reader. Once the encryption for a movie is broken, illegal copies can be played by DVD reader. Online Resource:

Failed Copy Protection Schemes (2/2) Secure Digital Music Initiative (SDMI) Secure Digital Music Initiative (SDMI) – SDMI a forum that has brought together more than 200 companies and organizations representing information technology, consumer electronics, security technology, the worldwide recording industry, and Internet service providers to develop and standardize technologies that “ protect the playing, storing and distribution of digital music ” –The SDMI “ public challenge ” was announced in September 2000 to invite members of the public to try to break the technologies SDMI developed –Defeated by S. A. Craver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D. S. Wallach, D. Dean and E. W. Felton. See “ Reading Between the Lines, Lessons from the SDMI Challenges ”, Proceedings of the 10th USENIX Security Symposium, Aug See “ Reading Between the Lines, Lessons from the SDMI Challenges ”, Proceedings of the 10th USENIX Security Symposium, Aug Online Resource:

Market values of Content Protection According to the IIPA report, According to the IIPA report, –The copyright-based industries are one of the fastest growing and most dynamic sector of the U.S. economy. –Excluding Internet piracy, the annual worldwide losses of copyrighted materials are estimated to be $20 billion to $22 billion. –Three types of industries are devoted to the digital content protection arena Motion picture, consumer electronics and information technology Motion picture, consumer electronics and information technology

Key Players in Content Protection (1/5)

Key Players in Content Protection (2/5)

Key Players in Content Protection (3/5)

Key Players in Content Protection (4/5)

Key Players in Content Protection (5/5)

Objectives of DRM A DRM system protects and enforces the rights associated with the use of digital content A DRM system protects and enforces the rights associated with the use of digital content –Access control To ensure that access to protected content is only possible under the conditions specified by the content owner To ensure that access to protected content is only possible under the conditions specified by the content owner –Copy control To prevent the creation of unauthorized copies To prevent the creation of unauthorized copies –Content tracking To detect and trace each copy To detect and trace each copy

What a DRM System Do? 1. Packaging content 2. Obtaining access conditions specified by content owners 3. Determining if access conditions are fulfilled 4. Temper-proofing DRM components

Content Packaging To force all accesses to the protected content to be governed by the DRM system To force all accesses to the protected content to be governed by the DRM system Once the security of the package is defeated, the unprotected content will be accessed or copied directly Once the security of the package is defeated, the unprotected content will be accessed or copied directly Packaging is usually accomplished by encryption Packaging is usually accomplished by encryption

Access Conditions Components of access conditions (usage rules) Components of access conditions (usage rules) –A means of right expression for the content owner XrML, ORDL XrML, ORDL –A mechanism of rights association (persistence) Metadata or watermarking Metadata or watermarking –A secure scheme to determine if rules are enforced Obtaining secure authentication, transaction, context information Obtaining secure authentication, transaction, context information

Temper-proof and Renewability Temper-proving Temper-proving –Components of DRM systems must be temper-proof to avoid attempts to circumvent, modify, or reverse-engineer the security protocol Renewability Renewability –Security can be restored or upgraded even after some devices have been compromised Device revocation Device revocation

Attacking A DRM System For Bob only For Anyone Authorization Legal Copy/Record Illegal Bob Authorization “ Bob ” Alice Authorization “ Bob ” Authorization Copy Protection Authentication Integrity Checking Temper-proving Content Tracking Content Packaging Renewability

Access Control Copy Protection Content Tracking Content Packaging Metadata Definition Metadata Persistence Content Identification Metadata Format Authentication Renewability Temper-proofing Secure Comm. Relationships between DRM Function Blocks Integrity checking How to realize them? Cryptography Watermarking Interoperable Standards

Layering View of DRM Building Blocks Digital Rights Management (DRM) Access Control Integrity Checking Credential Authentication Copy Control Transaction Tracking Rule Specification Non-Technical Aspects Cryptography Hashes and protocols Block cipher Public-key encryption/decryption Watermarking Media specific techniques Fingerprinting Rights Language REL XrML Business ModelLegislative ActsPublic Interests

DRM Applications of Encryption Packaging Packaging Forcing devices to adhere to access conditions Forcing devices to adhere to access conditions Device authentications Device authentications Secure communications Secure communications Integrity checking Integrity checking

Shortcomings of Encryption Fragile cipher-text Fragile cipher-text –The decryption will fail even only one bit error occurs in cipher-text –Hindering lossy or non-sequential video applications Video streaming Video streaming Scalable video Scalable video Computational cost Computational cost –Important for real-time applications or low-cost devices Solutions Solutions –Use selective encryption to reduces computation and preserve video structure Issues about encrypting scalable video Issues about encrypting scalable video

DRM Applications of Watermarking Copyright/owner identification Copyright/owner identification Copy protection Copy protection Access control Access control Content tracking Content tracking

Video Watermarking Methods Methods –Additive embedding –Multiplicative embedding –Quantization Embedding domains Embedding domains –Spatial domain –Spatial-Temporal domain –Frequency domain –Accompany audio domain Requirements Requirements –Blind-detection –Computational costs Compressed- domain watermarking Compressed- domain watermarking –Drifts compensation –Rate-control

Research Issues of Encryption and Watermarking Selective encryption Selective encryption Encryption of scalable video Encryption of scalable video Robustness and security of watermarking schemes Robustness and security of watermarking schemes Anti-collusion of content tracking Anti-collusion of content tracking Watermarking performance evaluation Watermarking performance evaluation The location of watermarking in video DRM The location of watermarking in video DRM Content tracking in broadcast or multicast networks Content tracking in broadcast or multicast networks

Other Issues about DRM Analog holes Analog holes Temper-proofing of devices Temper-proofing of devices System renewability System renewability Countless attackers Countless attackers Compromising the whole DRM system after only one success Compromising the whole DRM system after only one success Long period Long period

Legislative Efforts World Intellectual Property Organization (WIPO) World Intellectual Property Organization (WIPO) –WIPO Copyright Treaty –WIPO Performance and Phonograms Treaty U. S. Congress U. S. Congress –The Digital Millennium Copyright Act (DMCA), 1998 –Consumers, Schools, and Libraries DRM Awareness Act of 2003, 2003

Effects on Users and Consumers The use of DRM is controversial The use of DRM is controversial –Usage rules of DRM system may contravene the rights and privileges granted to the public under copyright law –Information releasing may violate expectations of privacy –DRM may reduce competition –DRM may increase cost of devices

Current DRM Systems for Video (1/4)

Current DRM Systems for Video (2/4)

Current DRM Systems for Video (3/4)

Current DRM Systems for Video (4/4)