Technical Aspects of Digital Rights Management - uni
Download
Report
Transcript Technical Aspects of Digital Rights Management - uni
Technical Aspects of
Digital Rights
Management
Emilija Arsenova
MI, RWTH-Aachen
Digital Intellectual Property
Digital media properties
Digital content (audio, video, graphics, images)
can be easily copied, transmitted and distributed
Exact copies of the original data
Problem for content owners/providers?
Digital Rights Management I
System for protecting the
copyrights of data circulated
via the Internet or other digital
media by enabling secure
distribution and/or disabling
illegal distribution of the data
RIGHTS
OWN
USERS
OVER
CREATE/
USE
CONTENT
http://lib.colostate.edu/lingo/d.html
What Does DRM Really Mean?
You can play your new audio CD on your stereo system,
but when you insert it into the CD drive on your
Macintosh computer, the CD doesn't work. Worse still,
the machine crashes and refuses to reboot. The disc
remains stuck in the drive until you force the tray open
by inserting a paper clip.
You buy an e-book and discover you can read it onscreen but can't print a chapter, even though the book is
by Dickens and entered the public domain more than a
century ago.
http://www.pcmag.com/article2
Digital Rights Management II
DRM = digital restriction management ?
Digital Rights Management III
DRM - commonly advertised as the technology
that can restore the value of content
‘DRM is a system of IT components and
services, corresponding law, policies and
business models which strive to distribute and
control IP and its rights’
(www.eu.int )
DRM Focus
"DRMs' primary role is not about keeping
copyrighted content off P2P networks. DRMs
support an orderly market for facilitating efficient
economic transactions between content
producers and content consumers."
Dan Glickman, Motion Picture Association of America, to BBC
NEWS
DRM Architecture
http://www.dlib.org/dlib/june01/iannella/06iannella.html
DRM Goals
Protection of digital
content
Secure distribution
Content authenticity
Transaction nonrepudiation (digital
signature)
Market participant
identification (digital
certificates)
DRM Techniques
Encryption
Public / private keys
Digital certificates
Watermarking
Access control
Secure communications protocols
Fingerprinting
Rights specification language
Trust infrastructure
Hashing
Security goals
SECURITY GOAL
TECHNIQUES
PREVENTION
CONDITIONAL ACCESS
COPY
DETECTION
ENCRYPTION
TAMPER
RESISTANT
HW DEVICES
FINGERPRINTING
INTEGRITY PROTECTION
PROTECTION OF
OWNERSHIP
WATERMARKING
http://www.inf.tu-dresden.de/~hf2/
Protection of digital content
Encryption
scramble data to make it unreadable to everyone
except the recipient
Decryption
recovering the original bits
Encrypting the file – is it enough?
Managing the decryption key:
creating it
transferring it to the customer
enforcing any time limitations
changing user rights
preventing theft or transfer of the key
Watermarking
Steganography (covered writing)
Digital Watermarking
Why Use Watermarking?
Ease of replication
Ease of transmission and multiple use
Exact copies of digital data
Permanently mark the data
Watermark Applications
Proof of ownership
Broadcast monitoring
Prove ownership in a court of law
Keep track of when and where a clip is played
Owner identification
Transactional watermarks (Fingerprinting)
Identifying the source of an illegal copy
www.digimarc.com
Watermark Applications
Copy Control
Classification/Filtering
Prevention of illegal copying
Classification of content
Authentication
www.digimarc.com
Types of watermarks
Visible, invisible
Fragile, robust
Blind, semi-blind, non-blind
Visibly watermarked ‘Lena’
Original
Watermark
picture
images
Smaller
Bigger
watermark
watermark
M. Kankanahalli, et. al., ”Adaptive Visible Watermarking of Images”
Embedding and detecting systems
WATERMARK
P
ORIGINAL
MEDIA
SIGNAL
ENCODER
WATERMARKED
MEDIA SIGNAL
KEY
P
PIRATE
PRODUCT
ATTACKED
CONTENT
DECODER
DECODER
RESPONSE
KEY
Chun-Shien Lu, Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property
Ideal watermarking system
perceptibility
robust
image compression
protection of malicious attacks
capacity
speed
Digital Watermarking Techniques
choice of watermark object
spatial domain
transform domain
fractal domain
Choice of watermark object
what form should the embedded message take?
Spatial Domain Techniques
Addition of pseudo-random noise
LSB modification
Replace the LSB of each pixel with the secret
message
Pixels may be chosen randomly according to a key
Drawbacks
highly sensitive to signal processing operations
easily corrupted
Example:LSB Encoding
(R,G,B) = (00000000, 11111111, 00000000)
(R,G,B) = (00000001, 11111111, 00000000)
Transform Domain Techniques
Wavelet based watermarking
Most efficient domain for watermark embedding
HVS
DCT-based watermarking
Fractal domain watermarking
Computational expense
Not suitable for general use
Robustness
WATERMARKED
IMAGE OR SOUND
How robust
are watermarking
algorithms?
W
LOSSY
COMPRESSION
GEOMETRIC
DISTORTIONS
W
CORRUPTED
WATERMARKED
IMAGE OR SOUND
SIGNAL
PROCESSING
OPERATIONS
Testing watermarking algorithms
Image watermarking algorithms must survive
robustness attacks
Geometric distortions
Combinations of geometric distortions
Example – StirMark Tool
Applies:
Large set of different geometric distortions
The image is slightly stretched, shifted, bent and
rotated by an unnoticeable random amount
Frequency displacement and deviation
Embeds a small error in each sample value
Applying StirMark to images I
Before StirMark
After StirMark
Copyright image courtesy of Kevin Odhner ([email protected])
Applying StirMark to images II
Underlying grid
Grid after StirMark
Fabien A. P. Petitcolas and Ross J. Anderson, Evaluation of copyright marking systems
Questions?
THANK YOU!