1 Analog Reconversion History CPTWG’s Data Hiding SubGroup (DHSG) CPTWG’s.

Slides:



Advertisements
Similar presentations
Software change management
Advertisements

© 2003 Verance Corporation. 1 Verance Copy Management System Presentation to CPTWG ARDG April 10, 2003.
Prepared for DA 201  Introduction to Digital Watermarking.
1 CGMS-A Plus RC Response to CPTWG-ARDG CFI October 22/23, 2003 Multicompany Submission (Matsushita, Mitsubishi, Hitachi, Intel, JVC, Samsung, Thomson,
NCHRP Task 254 Project Vehicle Size & Weight Management Technology Transfer/Best Practices.
Copy Generation Management System - Analog Brian Markwalter Director of Engineering Consumer Electronics Association.
A New Extended Copy Control Information (ExCCI) Data Packet by Brad Hunt Chief Technology Officer Motion Picture Association.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
1 A Functional Taxonomy for Software Watermarking Jas Nagra, Clark Thomborson University of Auckland Christian Collberg University of Arizona.
An Assessment of Toshiba HIDE Technology against the ARDG Attribute List Oct. 22, 2003 TOSHIBA Corporation.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
Analog Reconversion Problem presented by the Motion Picture Association of America to the Analog Reconversion Discussion Group February 12, 2003.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
introduction to MSc projects
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
1 DVD Copyright Management Schemes Tanveer Alam CVN.
ACT CANADA 2014: Using Business Cases To Get Great Projects Financed and Delivered December 1, 2014| Michael Sutherland.
IACT303 – INTI 2005 World Wide Networking Welcome and Introduction to Subject. Penney McFarlane The University of Wollongong.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
ISPS 6. Ship Security Plan HZS ISPS
Group-1 Group members- Sadbodh sharma-y07uc101 Kapil Phatnani-y08uc065.
CPTWG 2002 / December / 04 Status Report from WG9 / DVD Forum DVD Forum WG9 1 Status Report from WG9/DVD Forum on Copy Protection System for Rewritable.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
Sony Pictures1 Preparing your customers and your facilities for Blu-ray A powerful format that leads to new challenges in authoring and creative design.
Technical Guidelines for Digital Learning Content: A Tool for Development, Evaluation and Selection Liz Johnson Advanced Learning Technologies Board of.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
CPS 182s 1.1 Digital Watermark l What is a watermark? A digital watermark?  Message about a work is embedded in the work l What is steganography?  The.
Glencoe Introduction to Multimedia Chapter 9 Video 1 Chapter Video 9  Section 9.1 Video in Multimedia  Section 9.2 Work with Video Contents.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Philips ElectronicsMarch 5, 2003 Architecture for Protection of Content Via Watermarks Michael Epstein Raymond Krasinski Philips Electronics.
Proposal for Representative Set of Usage Rights Signaling States presented to the Analog Reconversion Discussion Group April 10, 2003 Brad Hunt Chief Technology.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Apr. 10, 2003TOSHIBA Corporation 1 Toshiba Video Watermarking Technology HIDE -Human eye Insensitive Digitally Embedded watermark- Apr. 10, 2003 TOSHIBA.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Product Documentation Chapter 5. Required Medical Device Documentation  Business proposal  Product specification  Design specification  Software.
KATEWINTEREVALUATION.com Education Research 101 A Beginner’s Guide for S STEM Principal Investigators.
October 22-23, 2003 About Visionaire Develop and license IP Develop and license IP Focused on hardware based Copy-Protection Focused on hardware based.
1 Welcome to Senior Design 4106 Fall 2005 Section B: Dr. Marc Goetschalckx Dr. Spyros Reveliotis Webpage: Acknowledgement:
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Digital Media Project-3 Dr. Jordan Isailovic Web site:
Copyright and the Fine Art Collection Polly Christie Fine Art Project Manager Visual Arts Data Service.
Presentation to the Analog Reconversion Discussion Group October 22 nd /23 rd, 2003.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
ActivatedAudio™ Watermarking Suite Activated Content Media and Entertainment Services Company Founded in 2001 Customers include UMG, Sony / BMG, and Sterling.
VITAL at the National Library of Wales Glen Robson
How the AIM Consortium is Contributing the Implementation of NIMAS and Beyond May 5, 2008.
Timothy Putprush Baltimore, MD September 30, 2009 Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System Presentation to.
Agenda Analog Reconversion Discussion Group February 12 th, 2003 Washington D.C. 9:30am Welcome – CPTWG Co-chairs’ introduction 10:00am Overview of new.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
CPTWG 2002 / February/ 27 Status Report from WG9 / DVD Forum DVD Forum WG9 1 Status Report from WG9/DVD Forum on Copy Protection System for Rewritable.
November 28, 2001 CPTWG Protecting Against Unauthorized Redistribution of Digital Broadcast Content Presentation to the CPTWG Intel, Hitachi, Matsushita,
CPTWG 2002 / April/ 17 Status Report from WG9 / DVD Forum DVD Forum WG9 1 Status Report from WG9/DVD Forum on Copy Protection System for Rewritable and.
1 IMO Goal-based Standards A shipbuilders ’ opinion September 20, 2007 The Shipbuilders ’ Association of Japan NISHIYAMA, goro.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Safeguarding flight data and locating/recovering on-board recorders
DONE BY S.MURALIRAJAN M.NIRMAL
Stages of the monitoring process
Presented to the Project Certification Committee on June
PLANNING A SECURE BASELINE INSTALLATION
Digital Watermarking Lecture 2
Presentation transcript:

1 Analog Reconversion History CPTWG’s Data Hiding SubGroup (DHSG) CPTWG’s

2 DHSG - Introduction n Call for Proposals – July 1, 1997 n Responses – September 3, 1997 n Interim Report – May 26, 1998 n Call for Proposals – July 1, 1997 n Responses – September 3, 1997 n Interim Report – May 26, 1998

3 Call for Proposals – Purpose n Mark video content to identify marked material and prevent unauthorized recording/playback n Prevent casual copying by consumers n Mark video content to identify marked material and prevent unauthorized recording/playback n Prevent casual copying by consumers

4 Call for Proposals - Goals n Allow content providers to mark all copyrighted digital video material n Future digital recorders/players would respond appropriately: u refuse to record/play improper material n Allow content providers to mark all copyrighted digital video material n Future digital recorders/players would respond appropriately: u refuse to record/play improper material

5 Call for Proposals – Trade-offs n Recognize complex task – trade-offs between robustness, visibility, detectability, number of bits, speed of detection, etc. n DHSG particularly concerned about robustness/cost trade-off (including implementation) n Recognize complex task – trade-offs between robustness, visibility, detectability, number of bits, speed of detection, etc. n DHSG particularly concerned about robustness/cost trade-off (including implementation)

6 The Data Hiding “System” n Copy Protection States: u One-copy u No-more-copy u Never-copy n One-copy Subject to Compression, Decompression, and a Copy Made n Delivery via Disc, Tape, Cable, etc. n Copy Protection States: u One-copy u No-more-copy u Never-copy n One-copy Subject to Compression, Decompression, and a Copy Made n Delivery via Disc, Tape, Cable, etc.

7 The Data Hiding “System” - Continued n Essential Requirements: “ideally achieved … in the drive” n Detection in the MPEG Stream n Record Control: Prevent a Casual Consumer From Copying “Never-Copy” and “No-More-Copy” Material Onto a Recorder n Essential Requirements: “ideally achieved … in the drive” n Detection in the MPEG Stream n Record Control: Prevent a Casual Consumer From Copying “Never-Copy” and “No-More-Copy” Material Onto a Recorder

8 Essential Requirements n Transparency n Low Cost Digital Detection n Digital Detection Domain n Generational Copy Control for One Copy n Low False Positive n Reliable Detection n Transparency n Low Cost Digital Detection n Digital Detection Domain n Generational Copy Control for One Copy n Low False Positive n Reliable Detection

9 Essential Requirements – Continued n Watermark Survive Normal Video Processing in Consumer Use n License - Reasonable Terms n Technical Maturity n Data Payload n Minimum Impact on Content Preparation n Data Rate n Watermark Survive Normal Video Processing in Consumer Use n License - Reasonable Terms n Technical Maturity n Data Payload n Minimum Impact on Content Preparation n Data Rate

10 Evaluation Methodology n Three Phase Approach u Preliminary paper analysis u Visual, functional, and technical maturity demonstration u More detailed analysis n Results Reported to CPTWG With or Without Specific Recommendations n Three Phase Approach u Preliminary paper analysis u Visual, functional, and technical maturity demonstration u More detailed analysis n Results Reported to CPTWG With or Without Specific Recommendations

11 Interim Report n Received 11 Proposals n Significant Differences in Addressing 13 Essential Requirements: Generational Control Most Difficult n Needed to Revisit Visibility and False Positive Assumptions n Certain Points Need NDA’s, e.g., Gate Count and Licenses n Learned from Exercise n [Interim Report on the ARDG Web Site] n Received 11 Proposals n Significant Differences in Addressing 13 Essential Requirements: Generational Control Most Difficult n Needed to Revisit Visibility and False Positive Assumptions n Certain Points Need NDA’s, e.g., Gate Count and Licenses n Learned from Exercise n [Interim Report on the ARDG Web Site]

12 Interim Evaluation n Transparency n Digital Detection Cost n Digital Detection Domain n Generational Copy Control for One Copy n False Positive n Reliable Detection n Transparency n Digital Detection Cost n Digital Detection Domain n Generational Copy Control for One Copy n False Positive n Reliable Detection

13 Interim Evaluation – Continued n Watermark Survival n Licensable Terms n Technical Maturity n Data Payload n Impact on Content Preparation n Data Rate n No Disclosure of Technical Approach n Watermark Survival n Licensable Terms n Technical Maturity n Data Payload n Impact on Content Preparation n Data Rate n No Disclosure of Technical Approach

14 “Phase III” n WaRP (Watermark Review Panel) n Formed After DHSG Phase II Report (December 1998) n Provided Advice to the Advisory Board to DVD CCA n WaRP (Watermark Review Panel) n Formed After DHSG Phase II Report (December 1998) n Provided Advice to the Advisory Board to DVD CCA