ICEC 2002 A Watermarking Infrastructure for Digital Rights Protection Presenter S.C. Cheung Department of Computer Science.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography and Network Security
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Safeguarding and Charging for Information on the Internet Hector Garcia-Molina, Steven P. Ketchpel, Narayanan Shivakumar Stanford University Presented.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
1 A Buyer-Seller Watermarking Protocol IEEE Trans. On Image Processing, Vol.10,No.4, pp , April 2001 Multimedia Security.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Digital Rights Management using RFID in an E-Commerce Environment World Applied Sciences Journal,5 (3), pp , 2008 Asso Hamzehei Department of.
ICWS 2003 Implementing Watermark Token in WS-Security for Digital Contents Distribution Presenter: Patrick Hung Co-authors:
An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL.
Buyer-Seller Watermarking (BSW) Protocols Geong Sen Poh 31 Oct 2006.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Anonymity and Security in Public Internet Forums Ho-fung LEUNG Senior Member, IEEE Dept. of Computer Science & Engineering The Chinese University of Hong.
Birthday Attack on Efficient and Anonymous Buyer-Seller Watermarking Protocol BY Qurat-ul-Ain M. Mahboob Yasin COMSATS Institute of Information Technology,
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
HICSS 36 A Watermarking Infrastructure for Enterprise Document Management Presenter S.C. Cheung Department of Computer Science.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
حماية البيانات الإلكترونية نموذج البصمات المائية الهواري غوثي و د. جار الله الغامدي كلية علوم و هندسة الحاسب الآلي جامعة الملك فهد للبترول والمعادن شعبان.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Secure Electronic Transaction (SET)
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Phosphor A Cloud based DRM Scheme with Sim Card th International Asia-Pacific Web Conference Author : Peng Zou, Chaokun Wang, Zhang Liu, Dalei.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
DIGITAL SIGNATURE.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Key management issues in PGP
Uses Uses of cryptography Lab today on RSA
Information and Network Security
NET 311 Information Security
Secure Electronic Transaction (SET) University of Windsor
Secure Electronic Transactions (SET)
Fun Stuff: Digital Media
Instructor Materials Chapter 5: Ensuring Integrity
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

ICEC 2002 A Watermarking Infrastructure for Digital Rights Protection Presenter S.C. Cheung Department of Computer Science Hong Kong University of Science and Technology Co-authors Hanif Curreem Dickson K.W. Chiu

2ICEC scc A Watermarking Infrastructure for Digital Rights Protection Outline Watermarking Infrastructure Research Issues Three Phases of Watermarking Protocol Watermark Acquisition Watermark Acquisition Purchase Transactions Purchase Transactions Dispute Resolution Dispute Resolution Watermarking Protocol Meeting ebXML Conclusion & Future Work

3ICEC scc A Watermarking Infrastructure for Digital Rights Protection Introduction Digital rights enforcement has drawn much attention lately Billions of dollars are lost annually Billions of dollars are lost annually P2P applications promote unauthorized copying P2P applications promote unauthorized copyingWhy? Digital contents are easy to duplicate without loss in quality Digital contents are easy to duplicate without loss in quality Availability of powerful compression techniques that can reduce file size effectively (MP3, DivX) Availability of powerful compression techniques that can reduce file size effectively (MP3, DivX)

4ICEC scc A Watermarking Infrastructure for Digital Rights Protection Introduction (con’t) Two copyrights protection approaches: Cryptography Cryptography Transform digital contents into unperceivable format Provides effective access control Decrypted content is vulnerable to recording Digital Watermarking Digital Watermarking Hide the copyright control information into digital content by modification the content itself Watermarks are difficult to be removed from contents without the knowledge of the insertion key.

5ICEC scc A Watermarking Infrastructure for Digital Rights Protection Introduction (con’t) Application of digital watermarking to manage digital rights in order to: Identify and claim the copyrights ownership Identify and claim the copyrights ownership Identify the origin of illegal distribution  Identify the origin of illegal distribution 

6ICEC scc A Watermarking Infrastructure for Digital Rights Protection Digital Watermarking is originated from Steganography

7ICEC scc A Watermarking Infrastructure for Digital Rights Protection Digital Watermarking insertiondetection

8ICEC scc A Watermarking Infrastructure for Digital Rights Protection Watermarking Infrastructure

9ICEC scc A Watermarking Infrastructure for Digital Rights Protection Research Issues in Watermarking Protocol PhasesIssues Watermark acquisition - Secrecy of watermarks Purchase transactions - Buyers cannot be trusted - Merchants cannot be trusted Dispute resolution - Buyers cannot be trusted - Merchants cannot be trusted - Judge cannot be trusted

10ICEC scc A Watermarking Infrastructure for Digital Rights Protection Problem Identify the origin of illegal distribution Buyer of the origin is liable Buyer of the origin is liable Buyer watermark are analogous to a private key Buyer watermark are analogous to a private key  Could we protect buyer’s watermark in a purchase transaction to prevent merchants and content distributors from abusing the watermark?

11ICEC scc A Watermarking Infrastructure for Digital Rights Protection Solution Sketch Buyers need not release their watermarks Instead, buyers release an encrypted version of their watermarks So, how does a merchant or content distributor validate an encrypted watermark? Trusted Watermark Certification Authority Use watermark certificate to protect the integrity of encrypted watermark

12ICEC scc A Watermarking Infrastructure for Digital Rights Protection Enhanced Watermarking Infrastructure

13ICEC scc A Watermarking Infrastructure for Digital Rights Protection Data Structure of Watermark Certificate

14ICEC scc A Watermarking Infrastructure for Digital Rights Protection apply for watermark certificate Watermark Certificate Request generate watermark Watermark Certificate WCert B obtain PKI certificate store certificate Buyer Watermark Certification Authority Watermark Acquisition

15ICEC scc A Watermarking Infrastructure for Digital Rights Protection forward certificate Watermark Certificate WCert B decrypt contents Encrypted Watermarked Contents E KB (X’  σW) place order BuyerMerchantContent Provider Watermark Certificate WCert B verify generate transaction identifier (V) update license database with V encrypt contents insert encrypted watermark Encrypted Contents E KB (X’) deliver contents Decrypted Watermarked Contents (X’  σW) Encrypted Watermarked Contents E KB (X’  σW) permutate watermark Permutated Watermark E KB (σW) Purchase Transaction

16ICEC scc A Watermarking Infrastructure for Digital Rights Protection Dispute Resolution encrypt X” by E KB Evidence Response ( σ, WCert B ) discover a suspected content (X”) Law Enforcer / JudgeContent Provider retrieve the transaction identifier (V) from X” lookup permutation function σ and watermark certificate (WCert B ) from database send evidence σ & WCert B Encrypted Document E KB (X”) data objects activities Evidence Request (X”) submit X” retrieve public key E KB retrieve encrypted watermark E KB (W) apply permutation function σ Permutated Encrypted Watermark E KB ( σ W) detect existence of E KB ( σ W) in E KB (X”) [no] X” originates from the end user of WCert B [yes]

17ICEC scc A Watermarking Infrastructure for Digital Rights Protection Watermarking Protocol Meeting ebXML

18ICEC scc A Watermarking Infrastructure for Digital Rights Protection Conclusion We have proposed a watermarking protocol infrastructure that supports three common roles in B2C e- commerce model: customers, merchants and content providers; supports three common roles in B2C e- commerce model: customers, merchants and content providers; does not require trusts on these parties in the protection of watermarks; does not require trusts on these parties in the protection of watermarks; assumes a trusted watermark certification authority and the use of watermark certificates assumes a trusted watermark certification authority and the use of watermark certificates

19ICEC scc A Watermarking Infrastructure for Digital Rights Protection Future Work Study the effectiveness of our protocol with respect to various watermarking schemes Adapt the techniques to digital contents in JPEG2000 format Study the integration of watermarking protocols and payment protocols Studies are being carried out to apply watermarking protocol for enterprise document management (preliminary results to appear in HICSS-36)

Questions and Answers

21ICEC scc A Watermarking Infrastructure for Digital Rights Protection Supplementary Slides (Q&A) Permutation function void permutefunc(VLONG wmark[], int size, int seed) { int i, index1, index2; srand(seed); for (i=0; i < rand() % )// min. 50 times, max 150 times { VLONG tmp; index1=rand()%size;index2=rand()%size; // swap the two watermark coefficient tmp = wmark[index1]; wmark[index1]=wmark[index2];wmark[index2]=tmp;}}

22ICEC scc A Watermarking Infrastructure for Digital Rights Protection Supplementary Slides (Q&A) Watermark generation and insertion Privacy homomorphism If the watermark insertion operation is: X  W = { x 1 (1+αw 1 ), x 2 (1+αw 2 ),…, x 1000 (1+αw 1000 )} X  W = { x 1 (1+αw 1 ), x 2 (1+αw 2 ),…, x 1000 (1+αw 1000 )} Then we have, (E(x)  E(y)) mod n = E(x  y) (E(x)  E(y)) mod n = E(x  y) Therefore we can insert watermark in the encrypted domain: E KB (X’  σ(W)) = E KB (X’)  σ(E KB (W)) E KB (X’  σ(W)) = E KB (X’)  σ(E KB (W))