FromAudiobook to Multimedia-Book Zhoulan Zhang

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

1 Delivering Secure Continuing Education Using New Digital Rights Management Encryption Process at The University of Alabama in Huntsville Robert L. Middleton,
DataNaut, LLC 1 Building Cross-Platform Accessible Applications Using Qt Technical Overview September 2012.
Chapter 11: Multimedia Tools Section V: Using Multimedia Tools to Enhance Learning.
Digital rights management Audio watermark Jiamian.
                      Digital Audio 1.
Rob Farraher Ken Pickering Lim Vu
Voice Server. Aspiration Provide a unique service to the members of CCSU. Provide a unique service to the members of CCSU. Provide a Streaming Voice Server.
Using Audacity Audacity is a free, easy-to- use audio editor and recorder for a variety of operating systems.
PODCASTING By: Jan Abernethy What is podcasting? Podcasting is the method of distributing multimedia files, such as audio programs or music videos, over.
With the friendly assistance of: 4FriendsOnly.com AG (4FO AG) and Fraunhofer IIS AEMT Potato System and Signed Media Format - an Alternative Approach to.
DRM: Digital Rights Management DRM: Digital Rights Management IDPF: International Digital Publishing Forum IDPF: International Digital Publishing Forum.
TANDBERG Content Server January Organizational Challenges Corporations have struggled in the past:  Achieving unified communications within a global.
V | © OverDrive, Inc | Page 1 Browse, Check Out, Download! Learn how to browse, check out, and download digital titles from [YOUR LIBRARY]
© De Montfort University, Synchronised Presentations using Windows Media Howell Istance School of Computing De Montfort University.
1 Windows Media Rights Manager and FairPlay Seminar Digital Rights Management Clara Fernández de Castro.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 37 How iPods, iTunes, and Podcasting Work.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Computer Concepts 2013 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
1 Physical Audio formats. 2 Digital Audio Formats Uncompressed (WAV)‏ Lossless compression (lossless WMA, FLAC)‏ Lossy compression (mp3, lossy WMA, AAC)‏
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
1 MPEG-21 : Goals and Achievements Ian Burnett, Rik Van de Walle, Keith Hill, Jan Bormans and Fernando Pereira IEEE Multimedia, October-November 2003.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Jau-Wu Huang1 Digital Rights Management for Visual Content in Mobile Applications Trimeche, M.; Chebil, F.; Nokia Research Center Control, Communications.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
E GOV Universal Access Ahmed Gomaa CIMIC Rutgers University.
Development of Web-based Collaborative Environment For Distant Learning Supervised by Prof. Michael Lyu Presented by Ma Ka Po.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Chapter 14 Recording and Editing Sound. Getting Started FAQs: − How does audio capability enhance my PC? − How does your PC record, store, and play digital.
Application Software.  Topics Covered:  Software Categories  Desktop vs. Mobile Software  Installed vs. Web-Based Software.
C opyright Protection and Digital Rights Management 1.
Session: 11. © Aptech Ltd. 2HTML5 Audio and Video / Session 11  Describe the need for multimedia in HTML5  List the supported media types in HTML5 
Podcasting 101..and more. Workshop Objectives: Introduce iTunes: abundance of resources, multi-media organizer, classroom tool You do not need an iPod.
WINDOWS APPLICATIONS by Jane Cable Also called Accessories Also called Components.
Chapter 1 Introduction to HTML, XHTML, and CSS
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Secure Electronic Transaction (SET)
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
Computers Are Your Future Tenth Edition Spotlight 7: Multimedia Devices Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
1. Chapter 25 Protecting and Preparing Documents.
CHAPTER TEN AUTHORING.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Internet for Teaching and Learning. Understanding the Web The Web is A collection of publicly accessible pages (web sites) on the Internet All use the.
Content Protection Platform Shih-Kun Huang Chung-Po Lin Wei-Nan Hung Institute of Information Science Academia Sinica.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
Presentation On HTML & Podcast Done by: Shamelia Young & Sheriece Williamson.
Chapter 1 Introduction to HTML, XHTML, and CSS HTML5 & CSS 7 th Edition.
Lesson 5 MULTIMEDIA. Multimedia on the Web has expanded rapidly as broadband connections have allowed users to connect at faster speeds. Almost all Web.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Chapter 8 Adding Multimedia Content to Web Pages HTML5 & CSS 7 th Edition.
 The same story, information, etc can be represented in different media  Text, images, sound, moving pictures  All media can be represented digitally.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Add library banner image here
                      Digital Audio 1.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Digital Rights Management Market.
An Overview of MPEG-21 Cory McKay.
MUMT611: Music Information Acquisition, Preservation, and Retrieval
Distributed Digital Rights Management
Presentation transcript:

FromAudiobook to Multimedia-Book Zhoulan Zhang

2 Audiobook The audio presentation of a written book  Initially used by sight-impaired people, slow learners  Allow “reading” while pursuing other activities  Children’s audiobook  In-car entertainment  Educational tools… Moving from conventional audiobook to digital audiobook (e-audiobook), offering different formats. e.g.MP3, WMA, AAC Multimedia Book(m-audiobook)

3 Multimedia Book Adding images and text there are not included in e-audiobook e.g. Karaoke effect, CD/book cover, image, updated information Challenges  File size — bringing MMCs (Multimedia contents) may greatly increase the original file size  Compatibility — file structure may be modified  Synchronization — synchronize text and image with audio content  Security — ensures perfect audio quality and full access to MMCs only to legal users

4 Outline Introduction Adding multimedia contents (MMC) to e- audiobook  factors to consider: size, compatibility, synchronization Security System  from the views of vendor, and user Distribution Architecture  who will be involved? procedures? Reviews and Conclusions

5 E-audiobook Format Due to copyright and security problems, images and text are not provided with e-audiobooks. Format is questioned Some try to impose proprietary formats coupled with DRM(Digital Rights Management). e.g. Apple DRM MP3  Familiarity with the format  The large quantity of audio now available in MP3  The lack of DRM restrictions, which makes MP3 files easy to edit, copy and distributed over networks Making audiobook applications more attractive! Taking advantage of current mobile and multimedia scenario… How to add MMCs to MP3 e-audiobook?

6 Incorporating Multimedia Content (MMC) MMCs include: CD/book cover, image, karaoke-like service, updated information Goal1: without changing MP3’s file structure Goal2: minimize incrementing of MP3 file size Goal3: synchronization— timing property

7 Incorporating MMC Goal1: without changing MP3’s file structure

8 Incorporating MMC Goal1: without changing MP3’s file structure Describe all MMCs via a multimedia description language And store the resulting description into the MP3 files (Id3V2)

9 MECDL MECDL (MP3 Enhanced Contents Description Language) Designed to allow the spatial layout of different media elements to be described as well as temporal order in which these elements will play during presentation; Similar to makeup languages like SMIL and MPEG-7 DDl; however, it produces shorter MMCs description.

10 An Example of an MECDL description

11 MECDL Tags and Attributes

12 Incorporating MMC Goal2: minimize incrementing of MP3 file size MECDL does not store image directly into the e- audiobook. Only a link is stored. External media can be linked to MP3 file, but still live independently, for greater flexibility. MMC should be inserted into the MP3 file only on user request. The user need not to pay, in terms of downloading time and costs, for MMCs in which he/she is not interested.

13 Incorporating MMC Goal3: synchronization— timing property Timing information that relates the written text to the audio file is stored directly. The attribute time allows to establish timing relation between the text and the audio All the timing relations are represented by time units, defined via the unit value(in milliseconds) – granularity

14 An Example of an MECDL description

15 Outline Introduction Adding multimedia contents (MMC) to e- audiobook  factors to consider: size, compatibility, synchronization Security System  from the views of vendor, and user Distribution Architecture  who will be involved? procedures?

16 Security Goals Goal(1) Protecting the rights of the source, allowing playout of an m-audiobook to only those who legally bought it Goal(2) Protecting both source and user from unauthorized alteration of the MMCs. Goal(3) Giving the content provider the possibility of tracing the distributors of illegal copies Goal(4) Providing transparency to honest users and allowing them fair use of the m-audiobook Techniques: encryption, digital signature, watermarking

17 Security System The source endows each user with a proprietary player Each player is provided with a specific watermarking key. Only the player that uses that key can retrieve the watermarked data. WID=H(MMC1 || H(E k (MMC2))) for the weak inte veri K-- the symmetric key for decrypting E k (MMC2) α-- the symmetric key for decrypting the audio stream F-- a fingerprint for traitor tracing

18 Security Goal 1 Allow unprotected reproduction of first portion(30s) of the audio stream Second portion play-out needs αand K Give the software player sufficient time to retrieve the decryption key without imposing any delay on the user  Goal1 is met (protecting the rights of the source, allowing playout of an m-audiobook to only those who legally bought it)

19 Security Goal 2 For consumer protection, there is a verification procedure that inhibits playout if MMCs have been altered: WID=H(MMC1 || H(E k (MMC2))) For forensic purposes, in a website maintained by a music distributor, the signiture σ= Sig(PH(audio)||MMC1||MMC2) is made available  Goal 2 is met (protecting both source and user from unauthorized alteration of the MMCs)

20 Security Goal 3 Traitor Tracing: a Trusted Third Party(TTP) embeds a fingerprint in the second portion of the audio stream. The fingerprint data can be watermarked in the audio stream only before encryption. Even if a user makes “personal” copy of the audio stream, the copy is marked with the unique fingerprint of the user. Goal 3 is met (giving the content provider the possibility of tracing the distributors of illegal copies)

21 Security Goal 4 To ensure fair use policy, the player should provide the user with the ability to burn personal copies of the m-audiobook Only audio not MMC Goal 4 is met (providing transparency to honest users and allowing them fair use of the m- audiobook)

22 Outline Introduction Adding multimedia contents (MMC) to e- audiobook  factors to consider: size, compatibility, synchronization Security System  from the views of vendor, and user Distribution Architecture  who will be involved? procedures?

23 Distribution Architecture Three different entities with different tasks participate in the realization of an m-audiobook M-audiobook production is done by the source and the TTP( trusted third party) M-audiobook distribution is done by the interactions among the customer, the source, and the TTP M-audiobook playout is performed at the customer side by a special player

24 Distribution (1)C requests an m- audiobook for S, disclosing the ID of his software player (2) S gives C the data necessary to complete payment and requests that C contact TTP for payment; (3) C contacts TTP, transfers to TTP all necessary data, and payment is completed

25 Distribution (4) TTP informs S that C has paid; (5) S embeds WID, K, and α in the audio stream using the player’s watermarking key, adds the MMC’s description to the ID3v2 field and forwards the audio stream to the TTP for fingerprint insertion along with the encryption key α; (6) TTP embeds a fingerprint F in the portion of the audio stream following the first 30 seconds worth, and encrypts that portion with the key α. F identifies C uniquely; TTP forwards the resulting m-audiobook to C and informs S that the transaction has been completed.

26 Reviews The security mechanism proposed above imposes symmetric decryption of audio and textual data on the end devices; however, complex computation may not be suitable for some portable devices. Watermarking assumptions. Assume that the WM is invisible, robust, and tamper-resistant. Secure hash function assumptions Other formats (AAC) In the proposed distribution architecture, customer may communicate with source directly

27 Conclusion MECDL efficiently enriches MP3 files with MMCs MP3 file is no longer a single audio track, but a media-rich product The security mechanism protects both the vendor and consumer May find new markets for audiobook industry in educational and entertainment worlds

28 Reference [1] L Egidi and M Furini, “From Digital Audiobook to SecureDigital Multimedia-Book”, ACM Computers in Entertainment, Vol.4, No.3, July 2006 [2] L Egidi and M Furini, “Bringing Multimedia Contents into MP3 Files”, IEEE Communications Magazine, May 2005 [3] Watermarking world, [4] Digital Rights Management from Wikipedia, [5] Windows Media DRM FAQ, q.aspx q.aspx [6] iPod Q&A pod_faq/ipod-supported-music-formats-good-sound-quality.html pod_faq/ipod-supported-music-formats-good-sound-quality.html