Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.

Slides:



Advertisements
Similar presentations
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Advertisements

Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
9.0 EMBEDDED SOFTWARE DEVELOPMENT TOOLS 9.1 Introduction Application programs are typically developed, compiled, and run on host system Embedded programs.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
1. Processor Speed This is the speed at which a computer can run applications. It is measured in hertz (abbreviation: Hz). As technology develops, recent.
EXTENSIBILITY, SAFETY AND PERFORMANCE IN THE SPIN OPERATING SYSTEM B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers,
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
Section 3.2: Operating Systems Security
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
1 Web Server Administration Chapter 3 Installing the Server.
Chapter 2: Impact of Machine Architectures What is the Relationship Between Programs, Programming Languages, and Computers.
4K CONTENT PLAN Sony Pictures Technologies. The 4k Consumer Value 4k has to offer all of these features: – Higher resolution – Richer colors (wider color.
Operating Systems.
Group 5 Alain J. Percial Paula A. Ortiz Francis X. Ruiz.
The Internet & The World Wide Web Notes
4K CONTENT PLAN Sony Pictures Technologies. Consumer Offering Broadcast (Over the air, cable, satellite, IPTV) Premium Content (Movies, episodic TV) Premium.
11 Games and Content Session 4.1. Session Overview  Show how games are made up of program code and content  Find out about the content management system.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
Computing Fundamentals Module A Unit 2: Using Windows Vista LessonTopic 8Looking at Operating Systems 9Looking at the Windows Desktop 10Starting Application.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Media Server Streaming Elizabeth Canela David Vera Bernard James Lilian Ohanian.
Chapter 2 – Software Part A. Definition Computer is made up of two components Hardware Physical components Software Instructions for the computer Two.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Watermarking Video Content What is video watermarking? November 2010 Rajaram Pejaver Note: The views presented here are solely those of.
ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.
Intro to Architecture – Page 1 of 22CSCI 4717 – Computer Architecture CSCI 4717/5717 Computer Architecture Topic: Introduction Reading: Chapter 1.
4K. Contents Context Online required? UltraViolet connection.
1 The Software Development Process  Systems analysis  Systems design  Implementation  Testing  Documentation  Evaluation  Maintenance.
BDA UHD Format Study (SPE internal update)
Media Center and OTT. 10 years ago Now Offerings Spectrum: PPV, Pay TV, Basic cable, Free to air IP: VOD, SVOD, FVOD, AVOD Windows: early window, home.
Chapter 14 Part II: Architectural Adaptation BY: AARON MCKAY.
Confidential. For use within only Slide 1 iOS and Android content protection requirements Version 0.2 Sony Pictures Entertainment Tim Wright.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
F1 Encoding and Content Security Spencer Stephens CTO, Sony Pictures.
Reading Flash. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also choose some.
F1 BOX/SECURITY/SERVER SYSTEM SPTECH FEEDBACK(DRAFT2) 12012/9/21Sony/SPTech Confidential.
1 The Software Development Process ► Systems analysis ► Systems design ► Implementation ► Testing ► Documentation ► Evaluation ► Maintenance.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 6: Securing the Cloud
Programmable Hardware: Hardware or Software?
Media Center and OTT.
Discovering Computers 2012: Chapter 8
Netscape Application Server
Top 3 Best Cinavia Removal Software
Outline What does the OS protect? Authentication for operating systems
SPE Expectations Leverage existing delivery technologies
4k Content Delivery Sony Pictures Technologies.
Outline What does the OS protect? Authentication for operating systems
Introduction to Computers
Applying Digital Watermarking Technology to Control CD copying
Content protection for 4k
4k Discussion Sony Pictures.
Chapter 2: System Structures
9.0 EMBEDDED SOFTWARE DEVELOPMENT TOOLS
4K Content protection overview
4K Content protection overview
Chapter 1 Introduction.
Hardware Security – Highlevel Survey Review for Exam 4
2.C Memory GCSE Computing Langley Park School for Boys.
4K Content protection overview
XProtect R New features
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Sony Pictures Confidential Watermarking in AACS

Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised – Establish framework that allows multiple watermarking vendors to be supported in a variety of devices without requiring the device makers to include any vendor specific components Assumptions: no collusion, pristine content – Identify watermark payload from 5 minute clip Assumptions: pristine content – Identify 2 to 5 colluders from 20min ~ entire film – Cover both TV shows (~40min) and feature film (90min~) to be protected Assumptions: content degraded below HD quality – Subjective threshold to be established at which recovery of watermark is not required – Such quality content has little value in extracting watermark as such copy may not come from Consumer Device compromise 2

Sony Pictures Confidential Typical Capabilities of Watermark Solutions Bit density: 5+ bpm, 48+ bits per 10 min, 480+ bits in typical film Increases size of content by 1% to 10% Payloads from 16 to 48 bits Mark embedding in the encrypted domain Embedding requires little CPU or memory Marks robust to severe degradation of video Sony Pictures Confidential 3

keys rip detect embed preprocess metadata Stages of Forensic Watermarking original video marked encrypted encrypted marked Device ID Vendor Unique Element key sequence also encodes the watermark Sony Pictures Confidential 4

Forensic watermarking by programmable code Content Metadata Security Modules Consumer Device Program Media Pipeline WM provider Device Info Mark Info Marked Stream Instantiate Stream keys Encrypted Content metadata -Programmable code modifies encrypted stream file using metadata. (marking) - Marked stream to be sent to media pipeline. - Marking process is faster than max drive data transfer speed. - Stream/Marked stream overhead is small. - Only the Keys required for playback of marked stream (unique for the IDs associated for that device/model) to be provided. Sony Pictures Confidential WM provider can provide Mark info at external server, or include logic inside security modules to perform embedding offline. 5

Sony Pictures Confidential Forensic watermarking without programmable code Content Metadata Consumer Device Marking Process Media Pipeline Marked Stream Stream keys Encrypted Content metadata - Metadata need to have standardized instruction sets. - Marking process will perform instruction sets provided for each content - Marking process is faster than max drive data transfer speed. - Stream/Marked stream overhead is small. - Only the Keys required for playback of marked stream (unique for the IDs associated for that device/model) to be provided. Sony Pictures Confidential 6

Security Module

Unfulfilled Requirements Hack One, Only Hack One Software Diversity Systems relying on software that is potentially subject to attack shall be implemented in diverse ways so that an attack is unlikely to be portable. This diversity shall vary by version of the system, by platform and by individual installation. Copy & Title Diversity The content protection system shall provide capabilities so that in the event of a breach on one title or version of a title, additional work is needed to breach the content protection on the next title or another version. (N.B., simply using different content keys is not sufficient to satisfy this practice.) All Blu-ray players will rely on software unless implemented only in gate arrays. Embedded software From Wikipedia, the free encyclopedia Embedded software is computer software, written to control machines or devices that are not typically thought of as computers. It is typically specialized for the particular hardware that it runs on and has time and memory constraints. This term is sometimes used interchangeably with firmware, although firmware can also be applied to ROM-based code on a computer, on top of which the OS runs, whereas embedded software is typically the only software on the device in question. Critical requirement. No proposal discussed in AACS.

Choices to Fulfill Requirements 1.Assume content providers don’t care and ignore the requirements 2.Satisfy the requirements in AACS specifications 3.Build framework in AACS to support external code loaded with content 4.Other options?

Option 3 – Security Module Security Module (SM) is code supplied by a 3 rd party to the content provider, is delivered on the disc and plugs into the Security Module Holder Content Provider Security Module (CPSM), not AACS, meets the two diversity requirements Default Security Module (DSM) is part of the player and could be a simple pass- through function AACS specification for SM interfaces simpler than designing robust solution to diversity requirements DSM function is AACS’s choice, CPSM function is content providers’ choice within SM specification Player Platform Disc AACS DecryptDemuxDecode HDCP Re-encrypt SM Holder CPSM DSM

Compliance and Robustness Rules

Sony Pictures Confidential Updating the Compliance and Robustness Rules 12 1.Definition of SW and HW – is hardware only relevant for products built entirely using gate arrays. 2.Is there any different requirements for SW and HW from security stand point? 3.How renewability is defined for the system? 4.Need to make sure there is no outdated descriptions (as we are trying to refine 10~20 years old document) 5.Consider advancements in the circumvention tools Sony Pictures Confidential