Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Digital rights management Audio watermark Jiamian.
Rob Farraher Ken Pickering Lim Vu
A New Extended Copy Control Information (ExCCI) Data Packet by Brad Hunt Chief Technology Officer Motion Picture Association.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
Guide to Computer Forensics and Investigations, Second Edition
Social and Ethical Issues Piracy & Copyright. Piracy.
Macrovision Video Copy Protection Paul Low CS265 Spring 2003.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Birthday Attack on Efficient and Anonymous Buyer-Seller Watermarking Protocol BY Qurat-ul-Ain M. Mahboob Yasin COMSATS Institute of Information Technology,
©TheMcGraw-Hill Companies, Inc. Permission required for reproduction or display. COMPSCI 125 Introduction to Computer Science I.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
UFCEXR-20-1Multimedia Sound Production Multimedia Sound Production and Copyright.
C opyright Protection and Digital Rights Management 1.
 area of law that deals with protecting the rights of those who create original works  Also called as confidential information.  It is called “intellectual”
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
1 Chapter 7: Digital Watermarking and Copy(right) Protection.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Addendum of Digital Video Watermarking MMSEC 2008.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Philips ElectronicsMarch 5, 2003 Architecture for Protection of Content Via Watermarks Michael Epstein Raymond Krasinski Philips Electronics.
Digital Steganography
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Cryptography, Authentication and Digital Signatures
The OSI Model.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
1 FAQ’S ABOUT WAP Presented By Abhilash Pillai CSCI 5939-Independent Study.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Who owns the Bits? Digital copyright issues are continually evolving. IP address do not map to a single person – hard to trace user Music and movie industry.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Intellectual Property (Quinn Chapter 4) CS4001 Kristin Marsicano.
The Classic Amiga Preservation Society (CAPS) Software Preservation Society István Fábián.
Gate2Start Role Model: Mr. Petros Skalkos – CD-ROM Copy Protection.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
DIGITAL SIGNATURE.
J. S. PATIL.  The revolution in internet and technology has made the future much more uncertain than most people assume it to be.  People can make money.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
November 28, 2001 CPTWG Protecting Against Unauthorized Redistribution of Digital Broadcast Content Presentation to the CPTWG Intel, Hitachi, Matsushita,
A Partial Survey of the Perfect Digital Watermark Problem.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Operating Systems Protection Alok Kumar Jagadev.
Intellectual Property
Information and Network Security
Digital Signature.
Protecting and Managing Electronic Content using Digital Battery
Applying Digital Watermarking Technology to Control CD copying
Forensic Recovery of Evidence Device (FRED)
Fun Stuff: Digital Media
Presentation transcript:

Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI

Problem Descriptions Software piracy Software industry lost billions of dollars each year Discourages individuals and businesses to create innovative software Discourages technology transfers between nations Source:SIIA’s Report on Global Software Piracy 2000

Motivations of pirates Low cost of reproduction Price of CD writer is about $200 Price of CD-Duplicator is about $2000 Easily access to tools CD-R, CD-RW, CD-Duplicator Take short time Take about 7 mins with speed of 8x CD-R to copy Take less than 1 min to copy with CD-Duplicator Ineffective of intellectual property law Not enough law enforcement High Demand

Ordinary Pirates You make copies of a software to your three best friends Each of your best friends make copies of the software to his three best friends

Exponential Growth of three

Objectives To review the components that are being built in to consumer devices To study how the components are working To study how to apply the components to software industry

Goal To help reduce the number of software piracy

Basic idea of Watermarking

What is Digital Watermarking? A digital watermark is a piece of information embedded inside a digital object. It is either visible or invisible.

Digital marks can be used to: 1. Identify the origin of the data or uniquely establish ownership 2. Identify the recipient of the data 3. Check integrity of the data

Terminology Content Scrambling System (CSS) developed by Matsushita, a device requires a pair of keys, is used to descramble data. Secure Transmission System provides a mechanism for pair of compliant devices on a computer bus to exchange keys.

Terminology (continues) Copy Generation Management System (CGMS) is simply a pair of bits in the header of data stream that encode one of three possible rules for copying: “copy- always”, “copy-never”, “copy-once”.

Terminology (continues) Analog Protection System (APS), developed by Macrovision, is a method of modifying NTSC signals so that they can be displayed on television, but cannot be recorded on VCR’s

CD copy protection without watermarking Legal disks will be scrambled with CSS and can be played only on compliant devices. Bit-for-bit copies of these disks won’t be playable on any devices, because they won’t contain the descrambling keys. This in ensured by storing the keys on the lead-in area of the legal disk, which is only read by compliant drives.

CD copy protection without watermarking

Problem 1. CGMS in intended to prevent illegal copies, however a non compliant player may strip out these copy control bits from the header, leaving the data unprotected. 2. APS works only when the display device is a compliant. A pirate can simply route it into an appropriate non-compliant recorder and make an unencrypted copy. Such a copy would not contain the CGMS bits.

CD copy protection with watermarking Record control takes over the job of CGMS. It works regardless of how the data reaches the compliant recorder, since the watermark that contains the CGMS data is never removed by normal processing.

CD copy protection with watermarking

Purpose of introducing watermarking into the system To improve the protection provided by CGMS by making the copy control information harder to remove To make unencrypted copies unplayable on compliant devices

Facilities & Resources Need a laboratory Need experts to help implement the prototype Need the special hardware and technology

Future implementation The watermark system requires enforcement to the device manufacturers to implement watermark detectors in their products Better encryption algorithm in the watermark (IBM-Data Hiding)

Conclusion This research shows how to apply the watermarking to make it harder to reproduce the illegal software The experiment from the laboratory will give us the result. The prototype may be developed to help reduce the numbers of software piracy.

THE END