Philips Digital and Analog Protection System (Philips DNA) Michael Epstein Raymond Krasinski Martin Rosner October 22-23, 2003

Download Report

Transcript Philips Digital and Analog Protection System (Philips DNA) Michael Epstein Raymond Krasinski Martin Rosner October 22-23, 2003

Philips Digital and Analog
Protection System (Philips DNA)
Michael Epstein
Raymond Krasinski
Martin Rosner
October 22-23, 2003
Outline
• Problem Statement
– D-A-D of video content
– Special case: Broadcast content
• Solution Concept
– Two proposals A and B
• Proposal B is the simples subset of proposal A
• Other subsets or combinations are possible
• Tools
– Watermarking
– Zone coding
– Re-conversion detection
• Remote verification
• Summary
2
Problem Statement
• D-A-D conversion carriage of content protection states
– Prevent the copying of “copy never” (CN) content
– Prevent improper copying of “one generation” content (COG)
– Prevent the Internet re-transmission to the public (NIR)
• To allow personal use when appropriate
3
Features
• Prevents redistribution of video content via the Internet
– Preserves compatibility with legacy equipment
– Permits reasonable transmission of content over the Internet
between appropriate locations
• Provides protection after content is placed on the
Internet without authorization
– Does not fail catastrophically after secured content is
compromised
• Permits manufacture of computers free of any legal
mandate
• Becomes more effective with the passage of time, as the
population of compliant equipment grows
4
Solution Concept
• Encryption systems
– Protect content insides a compliant world
– When content is lost to the non-compliant world
• Content is played in the non-compliant world
• Content is played in the compliant world
• DNA system – a holistic solution
– Assume that content will leak to the non-compliant world
– Assume content will want/need to return to the compliant
world
– This will work for all types of content (CN, COG, NIR)
STOP CONTENT FROM RETURNING
TO THE COMPLIANT WORLD
5
Assumptions
• It remain difficult to transmit video across the
Internet without using lossey compression
technologies
• It will be desirable to use compliant devices to
record/play/watch video
6
Watermark Detection
• Watermark detectors will exist in:
– Optical/magnetic player or recording drives which
will check well known video formats on command
– Video generators
• e.g. computer graphics cards
– Displays
• Televisions or monitors
7
Tools
• Watermarks
– Base watermark
– Remark
• Zone coding
– Tagging content with geographic information
• Reconversion detection
– Detect D-A-D
– Detect compression
• Remote verification
– Information at one device aids in decisions of a second
device
8
Watermark Fundamentals
• An indelible mark that carries information
– Typically applied by the owner/distributor of content
• Does not interfere with the use of content
• Should be difficult to remove
– Without destroying the content
• Should be difficult to write
• Should be inexpensive to find
– If you know the secrets
• A remark is a watermark that is applied by consumer
equipment according to certain rules
9
Zone Coding
• Zone coding for NIR and COG content
– Set at the broadcast station
– Internal Zone code set in devices by inputs
• Quick reset allowed once in a while
• Devices play content that matches the
internally stored zone
– Adjacent zones are also allowed
• Boundary areas
10
Zone Coding
NIR-B
NIR content zone B
NIR content zone A
Internet
D/A
NIR-A
DVD Recorder
Unregulated Demodulator
Computer
Display
zone A
zone B
11
End Proposal B-Simplified Proposal
• Protects only NIR content
– Prevents retransmission to remote locations
• Most basic proposal using our tools
– Zone coding is a portion of the A proposal
• Combining zone coding with reconversion
detection provides a more complete approach
to NIR content
12
Reconversion Detection
• Hash the bits of a “sector” and use the hash to
construct a watermark (or remark) for a
subsequent “sector”
• Verify content against the watermark (or
remark)
– If the content changes verification will fail
• D-A-D conversion inevitably changes content
• So does compression
13
Reconversion Detection-Recording
Content
1
2
3
4
5
6
mark
mark
mark
mark
mark
HASH
HASH
HASH
HASH
HASH
1
2
3
4
5
6
Recorded Content
14
Reconversion Detection-Checking
mark
equal?
mark
equal?
mark
equal?
mark
equal?
HASH
HASH
HASH
HASH
HASH
1
2
3
4
5
mark
equal?
6
Recorded Content
15
NIR Example – Hashed Remark
NIR
Television
Receiver
DVD Recorder
NIR – No Internet Retransmission to public
NIR-RM – NIR-remarked
NIR-RM
DVD Player
NIR-RM
DVD Recorder
16
Failure to Traverse the Internet
A/D
Internet
DVD Recorder
DVD Player
NIR-Altered content
Non-compliant
DVD Recorder
NIR-RM
(compression)
NIR-RM – NIR-remarked
DVD Player
NIR-Altered content
17
Remote Verification
• There will be situations where content is
altered prior to watermark detection for valid
reasons
– e.g. software sharpening
• Content source sends verification data to the
watermark detecting device
– e.g. graphics card works with DVD drive
• Checking device uses source-generated
verification data in conjunction with the
detected watermark
18
Remote Verification
Computer
Verification
request
Drive
Video
Generator
Content +
verification data
Display
content
NIR-RM
19
Mandates
• All displays must have a watermark detector
• Video generators with uni-directional outputs must
have a watermark detector
– e.g. analog outputs or DVI
• Video generators with bi-directional outputs may
license a watermark detector
• Disk drives (magnetic/optical) may license a watermark
detector
• Thus, a computer that has only bi-directional outputs
need have no watermark detectors at all
– but such a computer will not be able to play marked content
20
Summary
• Prevent improper content from coming into the
compliant world
– It is a given that content will leak from the compliant
world to the non-compliant world
• Attach rights to content
– Pervasive protection
• More compliant equipment increases the efficacy
of the solution
– But increases or maintains consumer functionality
21