Digital Security, Authentication & Copyright Protection
Nov 25 2013
Evolution of Copyright Protection Technology
John CHOI (Professor, STEI)
Digital Security, Authentication & Copyright Protection
From DRM to Watermarking1
Watermarking for Copyright Protection2
Other Applications of Watermarking3
Agenda
2
Digital Security, Authentication & Copyright Protection
Encryption and Access Control
Payment
Save
Screen Capture
Use(Play, Viewing,
etc.)
Copy
User A
Server
Networks
User C
User B
I. DRM: prevention technology
DRM: based on encryption and access control
Digital Security, Authentication & Copyright Protection
Access Control based on POSITION, Department, Job assigned.
I. DRM: prevention technology
Enterprise DRM: extend Content DRM to Enterprise
Digital Security, Authentication & Copyright Protection
5
I. watermark: tracing technology
1) Image Watermarking
Digital Security, Authentication & Copyright Protection
6
Click the [Open Image]
File Dialog pops up for file selection
MAIM supports various file format: BMP, JPG, PNG, GIF, TIFF
MAIM special version supports satel-lite image, JBIG, G4FAX format
Select the file Click [Open]
Select Key Embedding and change In-tensity. If you select hi-level, Water-mark is very strong but some noise added Type Watermark Key
Click [Run] for embedding
Markany00009440.jpg + ****************
Click [Save] for saving the watermarked Image
If you click the image pane, original size image ap-pears
Original Image Watermarked Image
I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection
Robustness
1 Filtering (LPF, HPF, Median, Mean, etc)
O
2 Cropping O
3 Translation O
4 Added noise O
5 Compression Attacks : JPEG, JPEG2000
O
6 Rotation : -90o ~ 90o (Support 360o )
O
7 Scaling : 50 % ~ 200 % O
8 Format Convert : JPEG, TIFF, BMP, etc
O
I. watermark: tracing technology
Data amount embedded
Watermark Minimum Segment (WMS) 256 x 256 pixel
Data capacity 48 bits(Extendable)
Detection probability per WMS(1) > 90%
False positive probability per WMS < 10-5 (Extendable)
Error-free payload probability per WMS > 1 - 10-5
speed
Processing time Environments
Embedding 40 msec Intel® CPU i5-2430M 2.40GHz, 4 GB RAM
Windows 7 SP1, 1024 x 1024 resolutionExtracting 350 msec
water-mark
embedder
Secret key
Watermark info < image> < watermarked image >
Original Image (512x512 pixels, Color)
Digital Security, Authentication & Copyright Protection
8
I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection
9
Select [Key Mark] radio button Click [Orig-inal Audio]
Select the original audio file Click [Open]
Click the play button to listen
Type the watermark key
Markany1
Embedding File : TEST3.WAV
Click the [Run] for watermark embedding
Click the play button to listen to the water-marked audio file
Click the [Save] for saving the watermarked file
Type filename Click [Save]
I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection
2. 오디오워터마킹 스펙 – MAO™ v3.5
robustness
I. watermark: tracing technology
Amount embedded
speed
Original Audio Watermarked Audio
Digital Security, Authentication & Copyright Protection
3) Video Watermarking -MAVI™ v3.5
robustness
I. watermark: tracing technology
삽입정보량
처리속도
water-mark
embedder
Secret key
Watermark info < image>
< watermarked image >
Digital Security, Authentication & Copyright Protection
From DRM to Watermarking1
Watermarking for Copyright Protection2
Other Applications of Watermarking3
Agenda
12
Digital Security, Authentication & Copyright Protection
Archive DB
Archive Storage
UCI generation/registration
Content Stor-age
Transcoder/Encoder
TransferManager
UCIWM Embedding
UCIMeta Data Transfer
UCI basedMobile Service
UCI basedIntegrated Distri-bution MGT Web
service
Distribution DB
Content Conversion
Content Transfer
UCI
UCI based distribution Info
Digital Content Distribution(Contents Gateway)
UCI
1
2
WM Embedding Sys.
UCI based content Integrated Distribution Service System
1) Copyright Protection – MBC, EBS, KERIS, Kwangwon Province, etc
II. Watermarking for Copyright Pro-tection
Digital Security, Authentication & Copyright Protection
Illegally distributed at 160 web hard sites
Business Loss 18 million USD + social cost
It took 2 months from first report (2009.7.17) to capture (2009.9.17)
1) Pre-release
II. Watermarking for Copyright Pro-tection
Digital Security, Authentication & Copyright Protection
• police report: “movie of ‘Chun Woo Chi’ is illegally distributed in web hard site (2010.3.16)
• Universal Music (UMI), SONY/
BMG, Warner Brothers, EMI in Hollywood (Audio WM)
• A Studio in Hollywood in testing Video WM
Leakage site was identified in 2 hours after report
1) Embed user info and distribute to pre-release organization
II. Watermarking for Copyright Pro-tection
Digital Security, Authentication & Copyright Protection
Illegal copy and distribution from user device (STB) : Analog Hall
2. IPTV/CATV - KT OllehTV, SKB Btv
Analog Hole
TV
User Net-workContent Delivery
Capture Device: Compo-nent, Composite, S-VHS
Illegal User – NTSC Signal Capturing
TV Encoder: VGA, S-VHS
CC
Illegal User – Analog Signal Captur-
ing
SD quality
CC
SD 급 품질( 고품질 )
CC
Camcording SD quality
Illegal D
istributio
n C
hannel
CAS/DRM
In content service process, exists
illegal distribution chance: security
hall
It is possible to obtain High Quality
Content through Analog Hole
External Out-put
On-line Service Plat-form (IPTV / VoD)
II. Watermarking for Copyright Pro-tection
Digital Security, Authentication & Copyright Protection
When service provider sends contents, automatically embeds user info into the contents
2. IPTV/CATV– KT OllehTV, SKB Btv
Illegal Distribution from “A”
Illegal Copy FoundUser “A” compromised
Front-EndService System
IP Network
Back-EndSystem
Owner
< User “B” or STB “B” Domain >
< User “A” or STB “A” Domain >
< User “C” or PC “C” Domain >
B
C
ALegalCopy
LegalCopy
LegalCopy
A< Illegal User >
WatermarkDetector
CA/ DRMDe-Packager
Fingerprinting Control Unit
Splitter
VideoDecoder
AudioDecoder
VideoWatermarking
AudioWatermarking
CA/ DRMDe-Packager
Fingerprinting Control Unit
Splitter
VideoDecoder
AudioDecoder
VideoWatermarking
AudioWatermarking
CA/ DRMDe-Packager
Fingerprinting Control Unit
Splitter
VideoDecoder
AudioDecoder
VideoWatermarking
AudioWatermarking
UniCast
MultiCast
DownloadService
II. Watermarking for Copyright Pro-tection
Digital Security, Authentication & Copyright Protection
3.Digital Cinema Tracing – Forensic watermarking
SMS
Storage
TMS
Auditorium 1
Auditorium 2
DCP
ETM ETM
ETM
Media
SMS
ETM
Th
eate
r Netw
ork
ETM + ITM (Security Network)
ETM + ITM (Security Network)
Image Media Block Projection System
Integrated Projection System
MediaDecryption
LinkEncryption
Security Manager (B)
SPB 1
ForensicMarking
MediaDecoding
PlainText
Project
MediaDecryption
ForensicMarking
MediaDecoding
Security Manager (A)
SPB 1
SPB 2
II. Watermarking for Copyright Pro-tection
Digital Security, Authentication & Copyright Protection4. OTT Service Tracing– Irdeto(ND), MSI(USA), Korea Movie Promotion
Service system User terminal (device) Illegal distribution channel
Content Management System
User & Device Management System
Content Delivery System
Digital Rights Management System
Pla
tform
based
FM
syste
ms
PC /User Player
Device /exclusive Player
Devic
e b
ased
FM
syste
m
Web ahrd
P2PPortal site
FM Tracker
VOD/ 스트리밍서비스
불법 유출
monitoring
Refer tracking info
1. Device based FM 2. Service based FM
Leg
acy S
yste
m
Two ways of embedding: (1)real-time embedding at service platform (2) em-bed user info at user terminal when downloaded
II. Watermarking for Copyright Pro-tection
Digital Security, Authentication & Copyright Protection
Recent trends: many more technologies are applied
(1) Fingerprinting: Automatic Content Recognition technologyRecognize using pattern matching (extraction of pre-
specified signal patterns and search Database)Accuracy lower, Gracenote leads the market
(2) SINBAD:Search the internet for non-authorized books and dis-
plays developed by Flemish book publishersWebcrawler
II. Diversified Copyright Protection Technologies
Digital Security, Authentication & Copyright Protection
From DRM to Watermarking1
Watermarking for Copyright Protection2
Other Applications of Watermarking3
Agenda
21
Digital Security, Authentication & Copyright Protection
Desk-top-computer
Lap-top-computer
Smart phones
Micro Devices
PreventionTechnology
Tracing Technology
timeEvolution of Internal Security Technology
III. Watermarking for Cyber Secu-rity
Digital Security, Authentication & Copyright Protection
Multi screen: desktop, tablet, smart phone, smart TV, auto-mobile, refrigerator, etc..
Smartphone becomes a security headache New devices: Google “Glass” computer, iWatch Micro Devices: Ball Pen camcoder, USB camcode
N-Screen Mobile Office Micro Devices
III. Watermarking for Cyber Secu-rity
Digital Security, Authentication & Copyright Protection
Wholesale - Discreet OL Glasses Digital Video Recorder with 8G Memory Built-in, Digital Voice Recorder, Hidden C
III. Watermarking for Cyber Secu-rity
Digital Security, Authentication & Copyright Protection
Recorded file
checking
extractor
extracting tracing info(when, where, etc.)
Tracing info generator
meetingRecording
Tracing info signal (when, where, etc.)
Meeting voice
Leaked out
< security area – confidential meeting >
Tracing : audio watermarking technology
III. Watermarking for Cyber Secu-rity
Digital Security, Authentication & Copyright Protection
Alarm!!
III. Watermarking for Cyber Secu-rity
Digital Security, Authentication & Copyright Protection
Semi-fragile watermark – Picaso Info, EwahTron, Multivia etc.
Court
Tampered Material
OriginalMaterial
MaliciousTamper
Camera DVRDVR
Storage-Compression-Realtime Watermarking
-Watermark Detector-Tamper Proofing/Detect Frouds
Surveillance System
: Normal: I llegal
Detector
Fragile & Robust Watermarking: Info. For Integrity Test, Location Info,
Time Info.
Integrity Verification:
Fragile Watermarking: broken when modified, but robust to conversion.Applied to DVR (Surveillance System) to collect digital evidence
IV. Prevention of Illegal Modifica-tion
Digital Security, Authentication & Copyright Protection
Semi-Fragile Watermarking
Generate signature from original contents and then verify illegal modification for fame-unit, slice unit, block unit.
원영상 위변조된 영상 위변조 검출 Watermark embedded photo
Modified photo Identify modi-fied parts
III. Watermarking for Cyber Secu-rity