Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Prepared for DA 201  Introduction to Digital Watermarking.
Rob Farraher Ken Pickering Lim Vu
Security of Digital Rights Management Systems Hugo Jonker
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
Confidentiality and Privacy Controls
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Protecting Digital Content - The Challenge Andy Barlow CTO – Phocis.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
SECURITY IN MOBILE NETWORKS BY BHONGIRI ANAND RAJ VENKAT PAVAN RAVILISETTY NAGA MOHAN MADINENI.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Architecture & Data Management of XML-Based Digital Video Library System Jacky C.K. Ma Michael R. Lyu.
Jau-Wu Huang1 Digital Rights Management for Visual Content in Mobile Applications Trimeche, M.; Chebil, F.; Nokia Research Center Control, Communications.
Philips Research France Delivery Context in MPEG-21 Sylvain Devillers Philips Research France Anthony Vetro Mitsubishi Electric Research Laboratories.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Electronic Commerce Semester 1 Term 1 Lecture 2. Forces Fuelling E-Commerce Interest in e-commerce is being fuelled by: –Economic forces –Customer interaction.
MPEG-21 Multimedia Framework: Status and Directions January 8, 2003 John R. Smith Pervasive Media Management Group IBM T. J. Watson Research Center 19.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
C opyright Protection and Digital Rights Management 1.
E-Tailing Electronic Retailing or E-Tailing - is the sale of goods or services through the internet. This can include: business-to-business sales (B2B)
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
Presentation on Copyright (c) 2011 Presentation Point ( m)
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Rights Expression Languages in Digital Rights Management Xin Wang ContentGuard, Inc. October 19, 2006.
Cryptography, Authentication and Digital Signatures
Mobile Commerce (M-Commerce)
Media Center and OTT. 10 years ago Now Offerings Spectrum: PPV, Pay TV, Basic cable, Free to air IP: VOD, SVOD, FVOD, AVOD Windows: early window, home.
Copyright (c) 2011 Presentation Point (
ECEN “Internet Protocols and Modeling”, Spring 2012 Slide 2.
The First 50 Years of Electronic Watermarking Ingemar J. Cox, Matt L. Miller NEC Research Institute Journal of Applied Signal Processing, 2002, 2,
Copyright Frost & Sullivan Mobile Digital Rights Management: Managing Rights, Managing Revenues Interactive Analyst Briefing Allison Webb 12 March 2003.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.
On Requirements for Mobile Commerce By Aj.Pongthep Termsnguanwong.
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
E-COMMERCE: DIGITAL MARKETS, DIGITAL GOODS Part-I.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
E-Commerce & M-Commerce. Introduction Electronic commerce, commonly known as e- commerce, It is a type of industry where buying and selling of product.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Media Center and OTT.
DONE BY S.MURALIRAJAN M.NIRMAL
BY GAWARE S.R. DEPT.OF COMP.SCI
By Jake Schmitt, Seth Raleigh, Neil McLain
Mobile Commerce.
Presentation transcript:

Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE Communications Magazine, Nov. 2003

Outline  Introduction  Digital Rights Management for Multimedia –MPEG-4 DRM Standardization –SDMI Portable Device Specification  Watermarking Technology –Watermarking for E-commerce application  Mobile DRM

E-commerce and M-commerce  E-commerce has become a huge business and a driving factor in the development of the Internet.  With the advent of evolved 2G and 3G mobile network, mobile e-commerce (m-commerce) will be more and more significant.  Online delivery of digital media, such as MP3 audio or video, is becoming an increasing important part in e-commerce and m- commerce.  Unlimited consecutive copying in the digital domain is the major obstacle for digital media distribution and associated business.

Digital Rights Management  Digital rights management systems are required to protect both rights and business  Like any cryptographic system, a DRM system is as strong as its weakest component Digital Rights Management Encryption Conditional Access Copy Control Identification and Tracing The DRM pillar model

DRM Systems Principles  A DRM system enables the secure exchange of intellectual property, such as copyright-protected music, video, or text, in digital form over the Internet or other electronic media, such as CDs, removable disks, or mobile networks  DRM allows content owners to distribute securely to authorized recipients and gives them control over the whole distribution chain

Functions of DRM Systems  DRM systems shall provide –Encryption of the content or parts in order to disallow uncontrolled access Partial or full encryption Real-time or off-line encryption –Decryption key management –Access control (conditional access) according to flexible usage rules Usage rules can be adapted to the business model Examples: –Restricting access to certain users, a limited time, or a limited number of accesses –Trading access right for customer information or advertisement exchange –Initial access to digital data may be free, while subsequent access must be paid for

Functions of DRM Systems –Interface to billing systems or mechanisms DRM system must be able to trigger monetary transactions –Copy control or copy prevention The DRM system can enforce copy restrictions, such as no/one/several/unlimited copies of the multimedia data are allowed, and with/without rights to produce copies of these copies Watermarking is suitable for some usage rules. –Identification and tracing of multimedia data Copies produced from the analog output cannot be prohibited Individual watermarking (fingerprinting) of the distributed data shall be part of the DRM system

A Digital Watermarking System Cover Work Watermark Embedder Watermark Message Watermarked Work Watermark Detector Detected Watermark Message Recording, transmissions, or processing (c) 1979 Playboy Magazine

Watermarking Technology  Requirements of digital watermarking –Imperceptibility –Robustness Against malicious or unintentional attacks –Capacity

Watermarking for E-commerce Applications  Watermarking is not a standalone technology –It is only useful as system component  Important applications of digital watermarking –DRM MPEG-4 SDMI DVD –Copyright protection

Is Watermarking Secure?  Watermarking methods have reached a certain level of maturity, but they are not as secure as modern cryptography  Thus, they will be regarded as weak pillar of DRM system Digital Rights Management Encryption Conditional Access Copy Control Identification and Tracing

Mobile DRM  DRM systems in mobile environment v.s. DRM systems in fixed Internet –Advantages Mobile terminals provide much more reliable information about the identity of the user Rights management and protection is potentially more secure in more closed environments –Telephone communication devices like phones are potentially less vulnerable to attacks against DTRM systems than open systems, like PC as used in the Internet –Disadvantages Additional traffic between the network and the terminal Additional complexity in the terminal

Watermarking in Mobile Network Multimedia Server Watermarking Mobile IP Network Client/Receiver Reliable Receiver ID