Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.

Slides:



Advertisements
Similar presentations
Rob Farraher Ken Pickering Lim Vu
Advertisements

Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
A Study of the Secure Digital Music Initiative Brandon Sutler Vineet Aggarwal Sachin Kamath University of Virginia CS 551.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍.
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Informatics and Control Systems Faculty. Student: Levan Julakidze Informatics and Control Systems Faculty Doctorate II year Leader: Zurab Kochladze TSU.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
Digital Watermarking Parag Agarwal
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Cryptography, Authentication and Digital Signatures
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Digital Watermarking
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
DPA Countermeasures by Improving the Window Method Kouichi Itoh, Jun Yajima, Masahiko Takenaka and Naoya Torii Workshop on Cryptographic Hardware and Embedded.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Information Systems Design and Development Security Precautions Computing Science.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Unit 3 Section 6.4: Internet Security
Crypto in information security
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
EXTRACTING SPREAD-SPECTRUM HIDDEN DATA FROM DIGITAL MEDIA
DONE BY S.MURALIRAJAN M.NIRMAL
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Authors: J.J. Murillo-Fuentes
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON Teddy DIEHL Eric THOMSON multimedia R&D France

Confidential 2 Corporate Research © THOMSON multimedia, 1999 Plan  Introduction  Limitations of encryption and watermark  A mixed approach: DVD-COPS  Public key like watermark?  Conclusion

Confidential 3 Corporate Research © THOMSON multimedia, 1999 Copy protection for CE devices  Every multimedia content will be digital Easily copied  Protection against illegal copy Four states to manage – Copy free, copy never, copy once, and copy no more Cost effective solution Keep Honest People Honest – Not against pirate organization  The aim is not To protect against copyright infringement To trace the pirate

Confidential 4 Corporate Research © THOMSON multimedia, 1999 Some proposed solutions  Mainly two classes of protection  Encryption based protection The content to protect is encrypted Duration of the protection varies – XCA: From reception till display – 5C’s DTCP: On the bus connecting two devices  Watermark based protection The watermark describes the copy status Handling of copy once varies – MILLENIUM: cryptographic ticket – GALAXY: additional watermark when recording

Confidential 5 Corporate Research © THOMSON multimedia, 1999 Plan  Introduction  Limitations of encryption and watermark  A mixed approach DVD-COPS  Public key like watermark?  Conclusion

Confidential 6 Corporate Research © THOMSON multimedia, 1999 Why encryption is not enough? CP Decryption key Original Content CP Encryption key Protected Content

Confidential 7 Corporate Research © THOMSON multimedia, 1999 Why Watermark is not enough? CP Original Content WM emb. WM emb. Watermarked Content WMdet. WMdet. WM det WM det

Confidential 8 Corporate Research © THOMSON multimedia, 1999 Plan  Introduction  Limitations of encryption and watermark  A mixed approach: DVD-COPS  Public key like watermark?  Conclusion

Confidential 9 Corporate Research © THOMSON multimedia, 1999 A mixed approach (1/3)  Protected creation by watermark & encryption Removing watermark is useless Breaking encryption is not sufficient  One bit payload Detection of presence of watermark  More robust then isolated protection #1 Personal creation Protected creation Free copy

Confidential 10 Corporate Research © THOMSON multimedia, 1999 A mixed approach (2/3)  A recordable medium carries only copies  Detection of media type Assume that media type is tamper proof #1 Personal creation Protected creation Free copy Original Copy No more copy #2

Confidential 11 Corporate Research © THOMSON multimedia, 1999 A mixed approach (3/3)  Digital signature protects “copy once”  Hacker has no interest to tamper or break the signature Bad signature means “copy never”  Using asymmetric cryptosystem Secret only for content owner #1 Personal creation Protected creation Free copy Original Copy Never copy No more copy Copy Once #2 #3

Confidential 12 Corporate Research © THOMSON multimedia, 1999 Plan  Introduction  Limitations of encryption and watermark  DVD-COPS: an example  Public key like watermark?  Conclusion

Confidential 13 Corporate Research © THOMSON multimedia, 1999 Public key like WM  Embedding ciphertext in watermark does not improve security Detection of watermark is weakest point  Applying cryptographic trap door function in signal processing is not possible.  Mimicking the basic ideas of public key crypto- system is the only way to succeed.

Confidential 14 Corporate Research © THOMSON multimedia, 1999 From cryptography to signal processing  Basic ideas in cryptography are: One way function Observe the effect, ignoring the cause.  How to achieve that with real signals? Filtering a Gaussian white noise is a one way operation (h n, v n )  w n = h n  v n The effect of filtering is noticeable in spectral analysis  ww( f ) ~ |H( f )| 2

Confidential 15 Corporate Research © THOMSON multimedia, 1999 Classical spread spectrum technique Transformation Cover Content Watermarked Content Adder Multiplier Human Perception Model Inverse Transformation Gaussian noise Private key

Confidential 16 Corporate Research © THOMSON multimedia, 1999 Improving SSWM scheme Embedding the WM Transformation Cover Content Watermarked Content Adder Multiplier Human Perception Model H filter Interleaver Gaussian noise Private key Inverse Transformation

Confidential 17 Corporate Research © THOMSON multimedia, 1999 Improving WMSS scheme Detecting the WM  The detection process is a test hypothesis in spectral analysis using a public key Transformation Content Interleaver Estimated Spectrum Test Hypothesis Y / N Public key

Confidential 18 Corporate Research © THOMSON multimedia, 1999 Plan  Introduction  Limitations of encryption and watermark  DVD-COPS: an example  Public key like watermark?  Conclusion

Confidential 19 Corporate Research © THOMSON multimedia, 1999 Conclusion J The CE device has now only public keys (signature and watermark). WM is robust because of low capacity  Extra constraints Copy Once on pressed media  The system is only based on switch decisions (Y / N). Can a switch be implemented securely in hardware? Can a switch be implemented securely in software?