ICWS 2003 Implementing Watermark Token in WS-Security for Digital Contents Distribution Presenter: Patrick Hung Co-authors:

Slides:



Advertisements
Similar presentations
1 An Asymmetric Fingerprinting Scheme based on Tardos Codes Ana Charpentier INRIA Rennes Caroline Fontaine CNRS Télécom Bretagne Teddy Furon INRIA Rennes.
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 # Public/Private Keys = 2 n.
1 A Buyer-Seller Watermarking Protocol IEEE Trans. On Image Processing, Vol.10,No.4, pp , April 2001 Multimedia Security.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
1 Digital Rights Management using RFID in an E-Commerce Environment World Applied Sciences Journal,5 (3), pp , 2008 Asso Hamzehei Department of.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL.
Buyer-Seller Watermarking (BSW) Protocols Geong Sen Poh 31 Oct 2006.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Birthday Attack on Efficient and Anonymous Buyer-Seller Watermarking Protocol BY Qurat-ul-Ain M. Mahboob Yasin COMSATS Institute of Information Technology,
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
HICSS 36 A Watermarking Infrastructure for Enterprise Document Management Presenter S.C. Cheung Department of Computer Science.
ICEC 2002 A Watermarking Infrastructure for Digital Rights Protection Presenter S.C. Cheung Department of Computer Science.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Key Mangement Marjan Causevski Sanja Zakovska. Contents Introduction Key Management Improving Key Management End-To-End Scheme Vspace Scheme Conclusion.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
An Overview and Evaluation of Web Services Security Performance Optimizations Robert van Engelen & Wei Zhang Department of Computer Science Florida State.
1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997.
A novel DRM framework for peer-to- per music content delivery Authors: Jung-Shian Li, Che-Jen Hsieh, Cheng-Fu Hung Source: 2010, Journal of Systems and.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
DIGITAL SIGNATURE.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 Hello World and Welcome to The simple crypt Key=23 {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Digital Signatures and Digital Certificates Monil Adhikari.
Private key
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Key management issues in PGP
Computer Communication & Networks
Secure Electronic Transaction (SET) University of Windsor
Public-Key, Digital Signatures, Management, Security
Chapter 29 Cryptography and Network Security
Fun Stuff: Digital Media
Electronic Payment Security Technologies
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Presentation transcript:

ICWS 2003 Implementing Watermark Token in WS-Security for Digital Contents Distribution Presenter: Patrick Hung Co-authors: S.C. Cheung Hanif Curreem: Dickson Chiu

2June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Outline Introduction Watermarking Protocol Rights Token in WS Security DiscussionConclusion Future Work

3June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Introduction Digital rights enforcement has drawn much attention lately Billions of dollars are lost annually Billions of dollars are lost annually P2P applications promote unauthorized copying P2P applications promote unauthorized copyingWhy? Digital contents are easy to duplicate without distortions Digital contents are easy to duplicate without distortions Compression techniques can cut down file size effectively (MP3, DivX) Compression techniques can cut down file size effectively (MP3, DivX)

4June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Introduction (con’t) How to prevent Encryption Encryption Not effective since decrypted content is vulnerable to recording No rights information is stored in decrypted content Digital Rights Management Systems (DRMS) Digital Rights Management Systems (DRMS) Watermarks are usually used. Rights information can be inserted as imperceivable signals Watermarks are hard to remove without the proper insertion key

5June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Watermarking Protocol 1 Uses encrypted watermark to avoid exposure of the original watermark Prevents unethical merchants from framing buyers for illegal content distribution The buyer is not required to submit his watermark or other evidence in case of a dispute Introduction of watermark certificate (WCert) Our protocol should support both direct purchase and re- selling transactions 1 S.C. Cheung and Hanif Curreem, Rights Protection for Digital Contents Redistribution Over the Internet, in the Proceedings of 26th International Computer Software and Applications Conference (COMPSAC 2002), IEEE Computer Press, Oxford, United Kingdom, August 2002, pp

6June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Watermarking Protocol Consists of four subprotocols: 1. Watermark Generation Protocol 2. Watermark Insertion Protocol 3. Copyright Violator Identification Protocol [illegal copy found] Merchant Buyer Content Distributor Watermark Certification Authority 4. Dispute Resolution Protocol Judge

7June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Watermarking Protocol A) Watermark Generation Protocol 1) Bob (Buyer) sends his PKI certificate Cert to WCA 1) Bob (Buyer) sends his PKI certificate Cert to WCA 2) WCA generates W and returns the watermark certificate WCert B to Bob 2) WCA generates W and returns the watermark certificate WCert B to Bob

8June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Watermarking Protocol (con’t) B) Watermark Insertion Protocol 1) Bob (Buyer) sends his WCert B and Sign(H(  )) to Alice (Merchant) 1) Bob (Buyer) sends his WCert B and Sign(H(  )) to Alice (Merchant) 2) Alice redirects WCert B and Sign(H(  )) to CD (Content Distributor) 2) Alice redirects WCert B and Sign(H(  )) to CD (Content Distributor)

9June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Watermarking Protocol (con’t) B) Watermark Insertion Protocol (con’t) 3) CD generates V’ (transaction identifier), X’ (content) and retrieves  (permutation function). 3) CD generates V’ (transaction identifier), X’ (content) and retrieves  (permutation function). 4) CD store transaction details to its database 4) CD store transaction details to its database

10June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Watermarking Protocol (con’t) B) Watermark Insertion Protocol (con’t) 5) CD generates E KB (X’   (W)) 5) CD generates E KB (X’   (W)) 6) Bob retrieves E KB (X’   (W)) and recovers X’   (W) using his private PKI key. 6) Bob retrieves E KB (X’   (W)) and recovers X’   (W) using his private PKI key.

11June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Watermarking Protocol (con’t) C) Copyright Violator Identification Protocol 2: Extract V’ 3: Is V’ found in database?

12June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Watermarking Protocol (con’t) D) Dispute Resolution Protocol 1) Judge verifies Sign(E KB (W)) in WCert B 1) Judge verifies Sign(E KB (W)) in WCert B 2) Judge encrypts Y to E KB (Y) and checks if E KB (  (W)) can be extracted from it 2) Judge encrypts Y to E KB (Y) and checks if E KB (  (W)) can be extracted from it  )), E KB (X’) Sign(H(  )), E KB (X’)

13June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Implementation Framework in Web Services

14June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Watermark Token in SOAP Header <S:Envelope xmlns:S=" xmlns:wsse=" xmlns:wm=" SHA1RSA GTE CyberTrust WCAWCA Hanif Curreem, O=HKUST, C=HK buyer 045FB… md5RSA......

15June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Conclusion Our proposed protocol relies mainly on the security of the underlying watermarking and encryption schemes. As for the encryption schemes, we have used the RSA cryptosystem. As for the encryption schemes, we have used the RSA cryptosystem. For the watermarking scheme, we have not yet identified a watermarking scheme which is certified to be both secure and robust. However, our proposed protocol does not rely on a specific watermarking scheme except that it must be linear. For the watermarking scheme, we have not yet identified a watermarking scheme which is certified to be both secure and robust. However, our proposed protocol does not rely on a specific watermarking scheme except that it must be linear. The digital signature of the permutation function relieves buyers from submitting their confidential watermarks to the judge in dispute resolution. Our protocol allows the secrecy of watermarks the distribution of rightful digital contents over the Internet. We demonstrate our model in the context of Web services environment. An implementation approach is proposed to encapsulate a watermark into a watermark token in a SOAP header.

16June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Future Work Improve the performance of our system Optimize the code, try using various RSA key length Optimize the code, try using various RSA key length Investigate which watermarking scheme work best for our protocol Research on new watermarking protocol that supports copyrights in peer-to-peer sharing

17June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Q & A

18June 03 - ICWS03 Implementing Watermark Token in WS-Security for Digital Contents Distribution Permutation Function (optional) Permutation function void permutefunc(VLONG wmark[], int size, int seed) { int i, index1, index2; srand(seed); for (i=0; i < rand() % )// min. 50 times, max 150 times { VLONG tmp; index1=rand()%size;index2=rand()%size; // swap the two watermark coefficient tmp = wmark[index1]; wmark[index1]=wmark[index2];wmark[index2]=tmp;}}