1 A Functional Taxonomy for Software Watermarking Jas Nagra, Clark Thomborson University of Auckland Christian Collberg University of Arizona.

Slides:



Advertisements
Similar presentations
Rob Farraher Ken Pickering Lim Vu
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
H Mar-01 Clark Thomborson Software Security CompSci 725 Handout 12: Student Presentations, Watermarking & Obfuscation Clark Thomborson University.
Techniques for Software Watermarking and Fingerprinting Prof. Clark Thomborson Presentation at Tsinghua University 17 th March 2010.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Wmobf.1 1/5/00 Clark Thomborson Watermarking, Tamper-Proofing and Obfuscation – Tools for Software Protection Christian Collberg & Clark Thomborson Computer.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Applied Cryptography for Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Cryptography and Network Security
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf.
Development, Marketing, Licensing, and Distribution.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Methods for Software Protection Prof. Clark Thomborson Keynote Address at the International Forum on Computer Science and Advanced Software Technology.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Copyright 2000, Odyssey Research Associates, Inc. SL Semantic Data Integrity DARPA Program Review Cornell Business & Technology Park 33 Thornwood.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Software Watermarking Imran Ali CSEP 590TU. What is software watermarking? Embed a secret into software which can be retrieved on demand Embed a secret.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Could Software Watermarks Express Both Rules and Assurances? Prof. Clark Thomborson Presentation to the ReTRUST Group Villach, Austria 11 th March 2008.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Protecting Software Code By Guards The George Washington University Cs297 YU-HAO HU.
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.
Haley Gayden. Copyright is a law of protection given to the authors or creators of “original works of authorship,” only allowing people with permission.
A Partial Survey of the Perfect Digital Watermark Problem.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
OGSA Service Classifications
DONE BY S.MURALIRAJAN M.NIRMAL
Applying Digital Watermarking Technology to Control CD copying
Software Watermarking Deterring Software Piracy
Methods for Software Protection
Parag Agarwal Digital Watermarking Parag Agarwal
Information Theoretical Analysis of Digital Watermarking
Fun Stuff: Digital Media
Authors: J.J. Murillo-Fuentes
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

1 A Functional Taxonomy for Software Watermarking Jas Nagra, Clark Thomborson University of Auckland Christian Collberg University of Arizona

30 January 2002SW WM Taxonomy 2 Why Build a Taxonomy? The first step in wisdom is to know the things themselves; this notion consists in having a true idea of the objects; objects are distinguished and known by classifying them methodically and giving them appropriate names. Therefore, classification and name-giving will be the foundation of our science. Carolus Linnæus, Systema Naturæ, 1735 (from Lindqvist and Jonsson, “How to Systematically Classify Computer Security Intrusions”, 1997.)

30 January 2002SW WM Taxonomy 3 Software Watermarking Copyleft … Watermarked Software Watermarking Process Unprotected Software Watermark: “ Copyleft …”  Authorship, Copyright  Ownership  Validity  Licensed Uses Recognisable mark; no change to function.

30 January 2002SW WM Taxonomy 4 Taxonomy by Technology  Static software watermarks: either in –Data (e.g. const string “Copyright …”) or in –Code (e.g. ordering of basic blocks). –Static SW watermarks are recognisable by a static analysis, e.g. grepping for strings. The recognition may involve cryptography.  Dynamic software watermarks: –I/O behaviour (Copyright notice; “Easter Egg”), –Data structure, or –Execution trace (opcodes, addresses, …).

30 January 2002SW WM Taxonomy 5 Easter Eggs  A special I/O sequence (a “secret key”) reveals the Egg: a recognition system is distributed with the watermarked software.  They’re fun to hide and to hunt.  The hiding process is a security concern, as are the Eggs.  See

30 January 2002SW WM Taxonomy 6 Goals of our Taxonomy  Names should be –Precise // Concise // Already familiar;  Classification tree should be –Complete & unambiguous; –Well-balanced (not many criteria); and –Useful to (Technologists // Lawyers)  (Experts // Novices). Two of our goals are internally contradictory, so we won’t find an optimal solution!

30 January 2002SW WM Taxonomy 7 Ambiguity of “Watermark”  Should a watermark be visible to end-users? –Yes [Kaplan 1996] –Not usually [Lacy, Quackenbush, Reibman & Snyder 1998] –In some applications [Cox & Linnartz 1998] –No [Miller, Cox, Linnartz & Kalker 1999] –Yes, if it’s a “visible watermark”; no, if it’s an “invisible watermark” [Kutter & Hartung 2000]  Our technological taxonomy has focussed our attention on technical detail (how it works) rather than on design goals (what it’s supposed to do).

30 January 2002SW WM Taxonomy 8 Ambiguity of “Watermark” (cont.)  Should a watermark be robust (survive common transformations such as copying, moving to a different location, compression)? –Yes [Kutter & Hartung 2000] –Yes or no, depending on the application [Miller, Cox, Linnartz & Kalker 1999]  Carelessly drafted laws might forbid (or require) us to destroy (or preserve) any watermark used for “digital rights management”!  The absence of robustness does not guarantee fragility!!

30 January 2002SW WM Taxonomy 9 Robustness and Fragility  List of Transformations: 1.Copying within a protection domain 2.Copying into another domain 3.Deriving a substantially-similar work 4.Copying a short excerpt  A robust watermark will survive any transform with a small number.  A fragile watermark will be destroyed by any transform with a large number.  Some watermarks are neither fragile nor robust! (For example: WMs destroyed by some “class 1” transforms, but surviving some in class 4.)

30 January 2002SW WM Taxonomy 10 Resolution of the Ambiguities  Should a watermark be visible to end-users? –Yes, if it’s an assertion (e.g. of copyright or authorship) or an affirmation (e.g. of authenticity). –No, if its purpose is to permit or prevent an unauthorised use.  Should a watermark be robust? –Yes, for affirmations and preventions. –No, for assertions and permissions.

30 January 2002SW WM Taxonomy 11 Types of Software Watermarks  Visible robust watermarks: useful for assertion (of copyright or authorship)  Invisible robust watermarks: useful for prevention (of unlicensed use)  Visible fragile watermarks: useful for affirmation (of authenticity or validity)  Invisible fragile watermarks: useful for permission (of licensed uses).

30 January 2002SW WM Taxonomy 12 Authorship Marks (Assertion)  An assertion of authorship, and its related copyright and moral rights, can be made in what we call an “Authorship Mark”.  Visibility is desired, otherwise the end-user won’t be given notice.  Robustness is desired, otherwise the authorship mark would not be present in a substantially similar work.

30 January 2002SW WM Taxonomy 13 Fingerprint Marks (Prevention)  A publisher, distributor or other agent of the author might embed a unique “fingerprint mark” on each copy they sell or license.  Fingerprints should be robust, ideally surviving even in modestly-sized excerpts.  Fingerprints should be invisible, otherwise they will be easily removed by pirates, and they may annoy the end-user.  Fingerprints will prevent unauthorised use, when suitable detection & response systems are in place.  Used in the “Content Protection System Architecture” proposal from 4C Entity.

30 January 2002SW WM Taxonomy 14 License Marks (Permission)  Fragile marks, which are destroyed or suitably modified whenever a copy is made, allow us to design a system that permits licensed use. For example: an object with a “copy-2” mark can be transformed into two objects with “copy-0” marks.  License Marks are most useful in conjunction with Fingerprint Marks: the Fingerprint Mark indicates what sort of License Mark is required.  License Marks should be invisible, so that they may resist attacks by pirates.  LWMs (License Watermarks) are used with FWMs (Fingerprint Watermarks) in the Content Protection for Recordable Media proposal from 4C Entity.

30 January 2002SW WM Taxonomy 15 Validity Marks (Affirmation)  Visible, fragile marks can affirm, to the end-user, that the software has not been modified in any important way since manufacture.  VWMs for software are typically designed to be fragile except for verbatim copying; a single-bit change will invalidate the VWM.  Cryptographic signature algorithms are used to implement VWMs in Java and in Microsoft’s Authenticode.

30 January 2002SW WM Taxonomy 16 A Fifth Function?  Any watermark is useful for the transmission of unrelated information (espionage, humour, …).

30 January 2002SW WM Taxonomy 17 Our Functional Taxonomy Goal: “… wisdom … by classifying [watermarks] methodically and giving them appropriate names.”