Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.

Slides:



Advertisements
Similar presentations
SeND Hash Threat Analysis CSI WG Ana Kukec, Suresh Krishnan, Sheng Jiang.
Advertisements

1 G CARD Lock your data in memory card. The key to unlock your data is your memory card. Cross Platform for your security solution 8/25/2011.
© 2003 Verance Corporation. 1 Verance Copy Management System Presentation to CPTWG ARDG April 10, 2003.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
A New Extended Copy Control Information (ExCCI) Data Packet by Brad Hunt Chief Technology Officer Motion Picture Association.
PRIVATE AND CONFIDENTIAL Page 1January, 2006 Common Questions - Answered.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
An Assessment of Toshiba HIDE Technology against the ARDG Attribute List Oct. 22, 2003 TOSHIBA Corporation.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
Inexpensive Media Recognition for Optical Disks Maurice Maes Joop Talstra
Analog Reconversion Problem presented by the Motion Picture Association of America to the Analog Reconversion Discussion Group February 12, 2003.
1 Analog Reconversion History CPTWG’s Data Hiding SubGroup (DHSG) CPTWG’s.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
Chapter 3: System design. System design Creating system components Three primary components – designing data structure and content – create software –
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
1 DVD Copyright Management Schemes Tanveer Alam CVN.
Electronic Watermarking Jean-Paul M.G. Linnartz Nat.Lab., Philips Research.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
4K CONTENT PLAN Sony Pictures Technologies. The 4k Consumer Value 4k has to offer all of these features: – Higher resolution – Richer colors (wider color.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
4K CONTENT PLAN Sony Pictures Technologies. Consumer Offering Broadcast (Over the air, cable, satellite, IPTV) Premium Content (Movies, episodic TV) Premium.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
CPTWG Jan MacroSafe TM System A Solution for Secure Digital Media Distribution Presentation to the CPTWG Jan. 15, 2002.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
CPS 182s 1.1 Digital Watermark l What is a watermark? A digital watermark?  Message about a work is embedded in the work l What is steganography?  The.
Copyright © DivXNetworks, Inc. All Rights Reserved. DivX is a registered trademark of DivXNetworks, Inc. SLIDE 2 © DivXNetworks, Inc. 19 September 2015.
Philips ElectronicsMarch 5, 2003 Architecture for Protection of Content Via Watermarks Michael Epstein Raymond Krasinski Philips Electronics.
ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.
4K. Contents Context Online required? UltraViolet connection.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
BDA UHD Format Study (SPE internal update)
Apr. 10, 2003TOSHIBA Corporation 1 Toshiba Video Watermarking Technology HIDE -Human eye Insensitive Digitally Embedded watermark- Apr. 10, 2003 TOSHIBA.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
HDCP1.4+ Material for Certification 10 August 2012 Sony Corporation 2012/8/10 Sony Confidential 1.
SmartRight™ 1 THOMSON multimedia 2001 ©11 july 2001 Copy Protection System for Digital Home Networks CPTWG – July 11, 2001.
1 Anonymous Trust: Digital Rights Management Using Broadcast Encryption Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
October 22-23, 2003 About Visionaire Develop and license IP Develop and license IP Focused on hardware based Copy-Protection Focused on hardware based.
Presentation to the Analog Reconversion Discussion Group October 22 nd /23 rd, 2003.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
April 13, 2004 Not For Further Dissemination 1 Verimatrix / Siemens Watermarking Technology Application A presentation to the CPTWG.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
ActivatedAudio™ Watermarking Suite Activated Content Media and Entertainment Services Company Founded in 2001 Customers include UMG, Sony / BMG, and Sterling.
Extended Content Control Information (ExCCI) Packet — The Studio Side of DRM Hollywood Post Alliance 11 th Technology Retreat – Rancho Mirage, CA January.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
November 28, 2001 CPTWG Protecting Against Unauthorized Redistribution of Digital Broadcast Content Presentation to the CPTWG Intel, Hitachi, Matsushita,
A Partial Survey of the Perfect Digital Watermark Problem.
Nero Copyright Nero Multi-layer Proposal 2 nd September 2005 David Burg.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Top 3 Best Cinavia Removal Software
SPE Expectations Leverage existing delivery technologies
4k Content Delivery Sony Pictures Technologies.
DONE BY S.MURALIRAJAN M.NIRMAL
Applying Digital Watermarking Technology to Control CD copying
Content protection for 4k
4k Discussion Sony Pictures.
Presentation transcript:

Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection Technical Working Group September 20, 2000

Contents  What’s new?  What does a license give you?  System overview  relation with encryption schemes  Summary of features  Security  Extensions: scaling and HD content  Conclusion

What’s New?  Secondary mark instead of tickets for copy once  Improved security  No “ Copy Free ” watermark state  Improved frame-adaptive embedding  Additional Features  Postmarking to allow players with enhanced image processing (e.g. extensions to existing zoom features)  Easy transition to High Definition Video  Compatible with CSS and CPRM play & record control  New Digimarc audio/video watermarking patent

What’s New? (2)  Deployment Schedule  WARP Tested Detector – Available Now  Scale resistant detectors & secondary mark embedder – December 2000  Professional Embedders - December 2000  HD video compatible detectors – 2 nd quarter 2001  Licensing agreements available September 30

Semiconductor & Hardware Licensees  Signing allows licensee to obtain:  Modules  C- Reference Code  VHDL code  Compliance rules  Courses to accelerate the design process  “ Designing the Watermark Detector into your IC ”  “ Designing the Secondary Watermark Embedder into your IC ”  “ Designing the WobbleTrack TM Detector into your IC ”  “ Design of Millennium Compliant Products ”

Semiconductor & Hardware Licensees  Self-Test  Modules are provided with test vectors  For players, disc based watermarked content  For recorders, analog video input with watermarks  Certification  Millennium compliance certification will occur in parallel with Macrovision APS certification

Content Owners  Studio Watermark Embedder  CO and CN primary watermark embedding  Studio Watermark Detector  To allow for quality assurance testing on embedded content  WobbleTrack TM  Secure recordable media playback control

Millennium Technical Update Maurice Maes Philips Maurice Maes Philips

Copy Protection States  Copy Never - represented by primary watermark  Copy Once - represented by primary watermark  Copy No More - only by secondary watermark  Copy Free - by the absence of a watermark

Primary Watermarks - Usage  The “copy never” (CN) watermark is to be used for pre-recorded video, and for e.g. PPV content.  CN watermarked video content on a DVD-ROM disc will be CSS-encrypted.  The “copy once” (CO) watermark can be used for broadcasts or any form of digital transmission.  The exact role of the CO state still needs to be discussed by the industries.

Record Control Rules  Record control rule: Millennium-compliant recorders (DVD, D-VHS, …) shall check unencrypted video content on their inputs for the presence of primary and secondary watermarks.  Any content containing a CN or a CNM watermark shall not be recorded.  Any content containing a CO watermark shall only be recorded using an approved CO protection scheme. For DVD recordables, this includes encryption (e.g. CPRM) and Millennium secondary mark embedding.

DVD Record Control NO Record stop YES (CN/CNM) Conditional Record YES (CO) watermark? APS/CGMS etc Recording allowed Video in

Play Control Rules  Play control rule: Unencrypted video content on a DVD disc shall be checked for watermarks. If such content contains a watermark, the player shall refuse to play back.  For CSS encrypted video, Millennium offers the WobbleTrack TM solution for secure recordable media playback control.

To be discussed only needed when the encryption would be hacked Recordable media playback control DVD Play Control Encrypted? watermark? NO (home video) playstop YES (CO/CN/CNM) CPRM/other NO YES stop CSS play NO (legacy disc) Wobble trigger? Correct wobble? YES stop NO play YES CN watermark?

Secondary Mark Embedding The secondary (CNM) watermark will be embedded by means of: 1. Pre-marking: CNM mark is embedded before CPRM encryption in CPRM-enabled recorders 2. Post-marking: CNM mark is embedded after CPRM decryption in CPRM-enabled players

Post-marking extension proposal Always post-mark CSS /CPRM encrypted video content where (Macrovision) APS is activated. Advantages: 1. Fancy video processing features in players that happen to remove watermarks are no longer a security threat. 2. Watermark protection for existing discs having no primary watermark yet.

Extended DVD Play Control Proposal Encrypted? watermark? NO playstop YES (CO/CN/CNM) CPRM/other NO YES stop CSS NO (legacy disc) Wobble trigger? Correct wobble? YES stop NO YES CN watermark? Post-mark & play

Secondary Mark Embedding  First generation operates in baseband  Small hardware cost (< 3 Kgates, 3 KBytes)  Detectable by primary mark detector  So no additional gate count for detectors  Invisible & robust  Little difference with primary mark embedding

Summary of Features As verified in the WARP testing:  Invisible  Payload: 8 bits  Detection time: 1 to 10 seconds  False positive probability: <  Robustness (MPEG, noise, filtering, etc.)  WARP testing survived of 5 DA/AD conversions  Low cost implementation (memory sharing)

Security Features  Millennium offers a secure, future-proof method for recordable media type recognition: ROM-wobble.  No “Copy Free” state: so the CF watermark cannot be misused to overrule e.g. a CN watermark.  Separate software keys, with renewability options, will be used if software implementations are required. A compromise of “SW keys” would then not affect “HW keys”.  Even in the event keys would leak, they are hardly useful to hackers, because the embedding process has numerous “random” elements in the frame-adaptive embedding.  Proposed “post-marking” scenario deals with all future fancy image processing features in players.

HDTV formats  Millennium system is independent of image size padding y Y + y Y x 128

HDTV (and other) formats  1920 x 1080, 1280 x 720, 704 x 480, 640 x 480 … (progressive/interlaced) Embedding remains the same Detection remains the same  Format conversions such as 1280 x x 480 can be handled as a scaling/zooming/re-sampling problem

Millennium scale-resistance August 1999 CPTWG demonstration:  Watermark resistance against arbitrary scalings ranging from 60% to 140%, approximately  Independent horizontal and vertical scale  Using an upgrade of the WARP-tested Millennium technology, so no new embedding!  No consequence for false positives, visibility, etc.  Implementation impact:  Longer detection times (30 seconds, but only for scaled video);  Required memory size (36 Kbytes -> 72 Kbytes, no issue when integrated in e.g. MPEG encoder/decoder)  Additional gate count of 2K gates

Millennium products  Detectors and secondary mark embedders  For both baseband and MPEG domain  C-reference code and VHDL code  Preferably integrated in existing IC’s for  Cost-effectiveness  Security

Concluding The Millennium solution  Fully satisfies the WARP testing criteria  Offers various new security features  Future-proof (HD, scaling, ROM-wobble)  Cost-efficient (sharing of resources)  Available now