Download presentation
Presentation is loading. Please wait.
Published byBennett Baldwin Modified over 8 years ago
1
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI
2
Problem Descriptions Software piracy Software industry lost billions of dollars each year Discourages individuals and businesses to create innovative software Discourages technology transfers between nations Source:SIIA’s Report on Global Software Piracy 2000
3
Motivations of pirates Low cost of reproduction Price of CD writer is about $200 Price of CD-Duplicator is about $2000 Easily access to tools CD-R, CD-RW, CD-Duplicator Take short time Take about 7 mins with speed of 8x CD-R to copy Take less than 1 min to copy with CD-Duplicator Ineffective of intellectual property law Not enough law enforcement High Demand
4
Ordinary Pirates You make copies of a software to your three best friends Each of your best friends make copies of the software to his three best friends
5
Exponential Growth of three
6
Objectives To review the components that are being built in to consumer devices To study how the components are working To study how to apply the components to software industry
7
Goal To help reduce the number of software piracy
8
Basic idea of Watermarking
9
What is Digital Watermarking? A digital watermark is a piece of information embedded inside a digital object. It is either visible or invisible.
10
Digital marks can be used to: 1. Identify the origin of the data or uniquely establish ownership 2. Identify the recipient of the data 3. Check integrity of the data
11
Terminology Content Scrambling System (CSS) developed by Matsushita, a device requires a pair of keys, is used to descramble data. Secure Transmission System provides a mechanism for pair of compliant devices on a computer bus to exchange keys.
12
Terminology (continues) Copy Generation Management System (CGMS) is simply a pair of bits in the header of data stream that encode one of three possible rules for copying: “copy- always”, “copy-never”, “copy-once”.
13
Terminology (continues) Analog Protection System (APS), developed by Macrovision, is a method of modifying NTSC signals so that they can be displayed on television, but cannot be recorded on VCR’s
14
CD copy protection without watermarking Legal disks will be scrambled with CSS and can be played only on compliant devices. Bit-for-bit copies of these disks won’t be playable on any devices, because they won’t contain the descrambling keys. This in ensured by storing the keys on the lead-in area of the legal disk, which is only read by compliant drives.
15
CD copy protection without watermarking
16
Problem 1. CGMS in intended to prevent illegal copies, however a non compliant player may strip out these copy control bits from the header, leaving the data unprotected. 2. APS works only when the display device is a compliant. A pirate can simply route it into an appropriate non-compliant recorder and make an unencrypted copy. Such a copy would not contain the CGMS bits.
17
CD copy protection with watermarking Record control takes over the job of CGMS. It works regardless of how the data reaches the compliant recorder, since the watermark that contains the CGMS data is never removed by normal processing.
18
CD copy protection with watermarking
19
Purpose of introducing watermarking into the system To improve the protection provided by CGMS by making the copy control information harder to remove To make unencrypted copies unplayable on compliant devices
20
Facilities & Resources Need a laboratory Need experts to help implement the prototype Need the special hardware and technology
21
Future implementation The watermark system requires enforcement to the device manufacturers to implement watermark detectors in their products Better encryption algorithm in the watermark (IBM-Data Hiding)
22
Conclusion This research shows how to apply the watermarking to make it harder to reproduce the illegal software The experiment from the laboratory will give us the result. The prototype may be developed to help reduce the numbers of software piracy.
23
THE END
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.