Download presentation
Presentation is loading. Please wait.
Published byOsborne Wheeler Modified over 9 years ago
1
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email: ace@ecn.purdue.edu http://www.ece.purdue.edu/~ace http://www.ima.umn.edu/~delp
2
IMA - Digital Libraries February 13, 2001 Slide 2 Outline Problem Overview What are the Issues? Is Their Hope?
3
IMA - Digital Libraries February 13, 2001 Slide 3 Multimedia Security “Everything” is digital these days - a copy of a digital media element is identical to the original How can an owner protect their content? Are images still “fossilized light”? (Can you believe something unless you see it or hear it in real-time?) What does all of this mean in terms of law? Does any security system really work or does it just make us feel good!
4
IMA - Digital Libraries February 13, 2001 Slide 4 Media Elements Audio Images Video Documents (including HTML documents) Graphics Graphic or Scene Models Programs (executable code)
5
IMA - Digital Libraries February 13, 2001 Slide 5 Attitude Problem People are giving up on content protection - we all need to think differently! “Information needs to be free” –would you take something from my house? Napster DivX what does it mean to own “bits”? A massive assault on copyright occurred at universities this past Fall!!! (ABC Nightline - February 9, 2001)
6
IMA - Digital Libraries February 13, 2001 Slide 6 Attitude Problem “Information may want to be free as long as it does not belong to you” –should your personal information be “free” or just information that has a copyright? –“I have the right to take this information because the owner is greedy and makes too much money!” –not all users of file sharing programs share
7
IMA - Digital Libraries February 13, 2001 Slide 7
8
IMA - Digital Libraries February 13, 2001 Slide 8
9
IMA - Digital Libraries February 13, 2001 Slide 9
10
IMA - Digital Libraries February 13, 2001 Slide 10
11
IMA - Digital Libraries February 13, 2001 Slide 11
12
IMA - Digital Libraries February 13, 2001 Slide 12
13
IMA - Digital Libraries February 13, 2001 Slide 13 Digital Communication System
14
IMA - Digital Libraries February 13, 2001 Slide 14 Typical Network System: Trusted Users Source User Insecure Channel Attacker Is this a pirate?
15
IMA - Digital Libraries February 13, 2001 Slide 15 Network System: User Not Trusted Source User Insecure Channel Authentication
16
IMA - Digital Libraries February 13, 2001 Slide 16 Multimedia Security Applications Privacy Authentication Access Control Forgery Detection Copyright Protection Proof of Purchase (non-deniable) Proof of Delivery (non-deniable) Audit Trails Intruder Detection
17
IMA - Digital Libraries February 13, 2001 Slide 17 What Do We Want From a Multimedia Security System? Access Control Copy Control Auditing (fingerprinting) –Who did what and when? Playback Control Record Control Generation Control
18
IMA - Digital Libraries February 13, 2001 Slide 18 Multimedia Security - Tools Set Encryption Authentication Hashing Time-stamping Watermarking SYSTEM
19
IMA - Digital Libraries February 13, 2001 Slide 19 Results - Girls Original “Girls” Altered “Girls”
20
IMA - Digital Libraries February 13, 2001 Slide 20
21
IMA - Digital Libraries February 13, 2001 Slide 21 New Applications Home Networks Streaming Media Digital Cinema Wireless e-books
22
IMA - Digital Libraries February 13, 2001 Slide 22 Digital Data in the Home Digital Television Server Satellite ComputerDVD PlayerAudio Telephone Home IP Network Broadcast Media Provider
23
IMA - Digital Libraries February 13, 2001 Slide 23 Streaming: Unicast
24
IMA - Digital Libraries February 13, 2001 Slide 24 Streaming: Multicast
25
IMA - Digital Libraries February 13, 2001 Slide 25 What is Needed? Models of complex end-to-end systems with to respect to security (this is very difficult) Cryptography in a noisy channel - can one still recover something? Models of watermarking/data hiding - model as a channel coding problem with side information How can one authenticate in a portable and/or wireless environment?
26
IMA - Digital Libraries February 13, 2001 Slide 26 What Is Needed? Renewable systems - if the system is “broken” can it be fixed without “product recall” The security system should exploit the unique properties of the media element with respect to how it is represented and transported (for example multicast) The security “features” should survive signal processing operations and conversion to analog Cryptography is not enough and certainly watermarking is not enough - must take a system approach - must understand the application
27
IMA - Digital Libraries February 13, 2001 Slide 27 Digital Millennium Copyright Act What does it mean to own bits? Will it be illegal to remove a security feature from a multimedia element?
28
IMA - Digital Libraries February 13, 2001 Slide 28 Conclusion We need to think differently about our attitudes towards “copyright” - particularly in how we train our students New “paying models” need to be developed We need to take a system approach - this is difficult
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.