Rob Farraher Ken Pickering Lim Vu

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Prepared for DA 201  Introduction to Digital Watermarking.
Digital rights management Audio watermark Jiamian.
IRMA Anti-Piracy Compliance Programme. What is IRMA? International Recording Media Association IRMA developed the Anti-Piracy Compliance Programme in.
A Study of the Secure Digital Music Initiative Brandon Sutler Vineet Aggarwal Sachin Kamath University of Virginia CS 551.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
1 Issues in Digital Audio. 2 Intellectual Property  Non-tangible property that is the result of creativity:  Patents – products, processes etc.  Copyright.
Digital Rights Management with Consumer Interests 逢甲大學資工系 教授 李維斌 Nov. 06, 2009.
Protection for Web Delivered Music Patcharinee Tientrakool EE 6886: Topics in Signal Processing - Multimedia Security System.
UFCEXR-20-1Multimedia Sound Production Multimedia Sound Production and Copyright.
4K CONTENT PLAN Sony Pictures Technologies. The 4k Consumer Value 4k has to offer all of these features: – Higher resolution – Richer colors (wider color.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
© Folens 2008 Cultural changes in music Brought about by ICT.
Digital Watermarking Parag Agarwal
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
Watermarking Video Content What is video watermarking? November 2010 Rajaram Pejaver Note: The views presented here are solely those of.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
Cryptography, Authentication and Digital Signatures
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Theme: Multimedia Sound ProductionUFCFY Multimedia Sound Production and Copyright.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
Web 2.0: Making the Web Work for You, Illustrated Unit B: Finding Media for Projects.
EC The transformative character of the IT sector and the eCommerce applications built upon it is deep and provocative. Consider the example of the entertainment.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
MPEG 7 &MPEG 21.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Copyright Computer crime and cyber security.
Copyright Jeopardy Music Theory 2009.
Diana Einmo Rob Holmes Kurt Weber
A review of audio fingerprinting (Cano et al. 2005)
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
DONE BY S.MURALIRAJAN M.NIRMAL
An Overview of MPEG-21 Cory McKay.
By Jake Schmitt, Seth Raleigh, Neil McLain
Presentation transcript:

Rob Farraher Ken Pickering Lim Vu Digital Watermarking Rob Farraher Ken Pickering Lim Vu

Big Brother Industries © 1984 Joe Wahoo decides to be a law abiding citizen and purchase music online from Big Brother Industries Joe Wahoo

Big Brother Industries © 1984 He purchases licenses to listen the mp3s he has downloaded He also owns the latest SDMI mp3 player

SDMI? Secure Digital Music Initiative Who: Conglomerate of world-wide recording, consumer electronic, and information technology corporations Purpose: To design and implement a copyright protection scheme for music How: Digital Watermarking

MP3 Nirvana? Joe’s friend, Dave, sends him a new NSync mp3 Joe loves the song and wants to listen to it on his new mp3 player But a slight problem arises

Rejection Dave’s mp3 turns out to be watermarked only for his use Joe’s mp3 player rejects Dave’s NSync mp3 because it detects the mp3 watermark registered to Dave

Breakin’ the Law Joe decides to hack and remove the watermark on Dave’s mp3 so his mp3 player will play the song He uses the attacks described in a research paper released by Princeton’s professor Felton

What Is Watermarking? Digital information embedded within any digital media that can later be detected and extracted Characteristics Perceptible or Imperceptible Robust or Fragile

Watermarking Applications Applications include Authentication and verification Fingerprinting Ownership Assertion Content labeling Usage Control

Authentication and Verification Use of any type of watermark to authenticate files and digital media Verification allow users to download files in an insecure channel Similar to a cryptographic hash sent with a file but much more difficult for an attacker to forge and insert a correct watermark

Fingerprinting Imperceptible watermarks used to label content for identification purposes If content is copied and improperly used, the watermark can be viewed and the source of the copying can be found If Joe Wahoo distributes music with his watermark embedded, any authority with the watermark directory can track him down

Ownership Assertion A watermark can be placed in a music document to declare who owns/ produces the music This is basically used to remove the “value” of the data, in a lot of circumstances since it asserts it as the owners intellectual property or copyright

Content Labeling Involves using watermarks to carry and deliver data on the media they are embedded within Uses within databases and search engines Advantage in that description of data is internally stored within file

Usage Control A proposed use for watermarking could be to control accessing and copying music. The theory is that when a copy is made, some counter in the file is decremented. This requires a monopoly on copying.

Problems with Watermarking Must not be audible and change little content of MP3 file Plain text to “message” will always be available Must be universally accepted by software developers that make encoding software and players

Plaintext/Ciphertext Attacks The plaintext is always available for the MP3 file so, therefore, any attackers can see the additions the watermark makes (and remove them) Ease of removal is variable, depending on the algorithm used

Universal Acceptance As long as users can rip MP3’s without watermarks, piracy will always proliferate If the MP3 players and portable devices play unwatermarked MP3’s, there’s no point in having the system in place at all

Conclusion Watermarking is useful in a lot of circumstances. Digital music isn’t one of them. If someone wants to remove music watermarking, with all current algorithms, they will be able to. RIP Napster. We’ll miss you.