Download CONTENT SECURITY AND WATERMARKING

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Algorithm wikipedia , lookup

Operational transformation wikipedia , lookup

Digital history wikipedia , lookup

Transcript
In the last part of the course we make a
review of selected technical problems in
multimedia signal processing
First problem:
CONTENT SECURITY
AND WATERMARKING
• DIGITAL CONTENT (AUDIO,
VIDEO, GRAPHICS, IMAGES)
CAN BE EASILY COPIED, TRANSMITTED
AND DISTRIBUTED
THIS HAS GREAT ADVANTAGES AND
BUSINESS POTENTIAL, NO PHYSICAL
MEDIA AND TRANSPORT IS NEEDED
EXAMPLE: Nokia Ovi store
Buying music, movies, pictures, maps from the
network means that content has to be protected
against copying
• DIGITAL MEDIA BRINGS ALSO BIG
PROBLEMS FOR CONTENT OWNERS
DUE TO UNAUTHORIZED USE. THEY CAN
EASILY LOSE THEIR PROPERTY AND
BUSINESS
• CONTENT OWNERS NEED THUS A
STRONG PROTECTION OF THEIR
CONTENT AGAINST UNAUTHORIZED
USE
• CONTENT PROTECTION IS QUITE
DIFFICULT AND INCLUDES MANY ASPECTS
THIS PROBLEM IS KNOWN CURRENTLY
UNDER THE NAME DRM
DIGITAL
RIGHTS
MANAGEMENT
• WHAT ARE THE REQUIREMENTS FOR
THE DRM?
- DRM SHOULD PREVENT AGAINST COPYING
- DRM SHOULD AUTHORIZE ACCESS
LIMITED TO: PARTICULAR USER,
SPECIFIC TIME, SPECIFIC NUMBER
USAGE AND COPIES, ETC.
- DRM SHOULD FACILITATE PAYMENT
FOR CONTENT (E.G. RENTING FOR SPECIFIC
TIME AND RENEWAL OF RIGHTS)
• ALL REQUIREMENTS FOR DRM ARE VERY
DIFFICULT TO SATISFY
• IN PARTICULAR THEY ARE DIFFICULT IF THE
DRM SYSTEM WOULD BE STANDARDIZED,
THAT IS IS STRUCTURE WOULD BE KNOWN
TO EVERYBODY
• THIS IS BECAUSE STANDARDIZED SYSTEM
MIGHT BE EASIER TO BREAK THAN SECRET
SYSTEM
• IN PRINICPLE DIGITAL CONTENT CAN
BE EASILY (?) PROTECTED BY
ENCRYPTION AND WATERMARKING
WHAT IS ENCRYPTION?
ENCRYTPION MEANS THAT THE
CONTENT BITS ARE MANIPULATED IN
SECRET WAY BY SOME ALOGRITHM.
• THE ORIGINAL BITS CAN BE RECOVERED BY
REVERSING THE OPERATION OF THE
ALGORITHM, REVERSE ALGORITHM IS
CALLED DECRYPTION SO WE HAVE TWO
ALGORITHMS WHICH CAN REVERSE:
CONTENT
ENCRYPTION
ALGORITHM
DECRYPTION
ALGORITHM
CONTENT
•
BUT SUCH SYSTEM HAS PROBLEMS
1. IF ALGORITHM IS KNOWN, EVERYBODY
WILL USE IT
2. HOW TO CONTROL THE ACCESS TO
CONTENT? WHAT IF USERS BUY ACCESS
FOR SOME TIME AND FOR SOME
CONTENT ONLY?
3. WHAT TO DO WITH USERS WHICH
WILL USE PROPER ACCESS FOR
ILLEGAL COPYING AND DISTRIBUTION
OF CONTENT?
•
•
THUS THE DRM CONTENT PROTECTION
MUST BE MORE CLEVER.
IT HAS TO BE BASED ON
1. CONDITIONAL ACCESS
2. ENCRYPTION ALGORITHMS
2. WATERMARKING
• WHAT IS CONDITIONAL ACCESS?
IT IS ACCESS GIVEN ON LIMITED
CONDITIONS, E.G. TIME, CONTENT,
PAYMENT AND SO ON
CONDITIONAL ACCESS ENABLED AFTER PAYING
CONTENT
ENCRYPTION
ALGORITHM
DECRYPTION
ALGORITHM
CONDITIONAL ACCESS CAN BE A CARD GIVEN
TO THE USER, OR A CERTIFICATE SEND VIA
INTERNET
• EXAMPLE – THE SYSTEM USED IN
DIGITAL TELEVISION FOR WATCHING
PAY PROGRAMS,
IN THIS SYSTEM CONDITIONAL ACCESS HAS A
FORM OF SUBSCRIPTION CARD, ON THE CARD
THERE IS PROCESSOR IMPLEMENTING PART
OF CA SYSTEM
ANOTHER PART IS IMPLEMENTED IN A
MODULE CALLED CAM – CONDITIONAL
ACCESS SYSTEM, THE CARD SLIDS INTO THE
CAM. THIS MODULE MAKES POSSIBLE TO USE
DIFFERENT CA ALGORITHMS BY DIFFERENT
OPERATORS
RECEIVER FOR DIGITAL TELEVISION
SUBSCRIPTION CARD
CAM MODULE
• ONE RECEIVER CAN ALSO HAVE SEVERAL
CAM’s WITH CARDS FOR RECEIVING
PAY PACKAGES FROM DIFFERENT
OPERATORS.
SUCH SYSTEMS ARE WIDELY USED IN
TELEVISION.
BUT MANY OF THE SYSTEMS WERE ALSO
BROKEN SINCE ONE CAN ANALYZE
PROGRAM ON THE CARD AND TRACE
TRAFFIC BETWEEN THE CARD AND CAM.
• ENHANCED SOLUTION:
AUTHENTICATE THE USER
THIS CAN BE DONE IF THE USER
IS CONNECTED TO THE TELEPHONE OR
THE INTERNET, THE SYSTEM CAN
CHECK IF THE ORIGINAL CARD IS USED.
• BUT WHAT TO DO IF A USER HAS
VALID SUBSCRIPTION BUT USES
IT FOR RECORDING AND DISTRIBUTING
CONTENT ILLEGALLY? IN THIS CASE
WE CAN NOT PROTECT THE CONTENT
ONE SOLUTION IS TO PREVENT
RECORDING AND/OR TO PREVENT
GETTING THE RECORDING OUT
OF THE DEVICE
• FOR EXAMPLE IN MEDIA TERMINAL USER
CAN RECORD DIGITAL TV PROGRAMS
ON INTERNAL HARD DISC
• BUT RECORDED CONTENT IS
ENCRYPTED AND THERE IS NO
WAY OF GETTING IT OUT OF THE
TERMINAL
• STILL, HACKERS MAY BE ABLE
TO BREAK SUCH SYSTEM TOO
• THUS, TO PROTECT THE CONTENT
TECHNICALLY MIGHT BE SOMETIMES
DIFFICULT OR EVEN IMPOSSIBLE
• THE ONLY WAY TO DEAL WITH IT
COULD BE MARKING THE CONTENT IN AN
INVISIBLE WAY TO DETECT WHO AND WHEN
COPIED IT.
THIS CAN BE USED AS A PROOF FOR
CRIMINAL OFFENCE AND FOR USING LEGAL
MEANS TO PROTECT THE CONTENT OWNER
• THE OVERALL PROBLEM OF DRM IS A
COMPLEX TECHNICAL AND LEGAL PROBLEM
MANY OF ITS ASPECTS ARE OUTSIDE OF
SIGNAL PROCESSING, THEY BELONG TO
COMPUTER AND NETWORK SECURITY AREA
BUT HOW TO MARK THE CONTENT IN
SECRET WAY IS A SIGNAL PROCESSING
PROBLEM
• MARKING OBJECTS IN AN INVISIBLE WAY
IS CALLED
WATERMARKING
WATERMARKING IS A WORD
COMING FROM PAPER MONEY WHICH IS
MARKED IN SUCH A WAY THAT IT IS
VISIBLE UNDER BACKLIGHT
OUR PROBLEM HERE IS
HOW TO MAKE DIGITAL WATERMARKING?
Why to use watermarks?
Because digital media have following
features making easy copyright violations:
•
•
•
•
Ease of replication
Ease of transmission and multiple use
Plasticity (easy to change format)
Equivalence of works in digital form
Digital Watermark definition
A method of embedding a copyright stamp into
an image, sound or video. The watermark is
embedded such that the quality of the host
media is not noticeably degraded to the human
eye/ear.
Uses of Watermarking
• Copyrighting embedding
• Data hiding (Steganography)
• Source/ownership verification
Requirements
•
•
•
•
•
•
•
•
•
for Good Watermarks
Imperceptible
Undeletable
Statistically Undetectable
Robust to Lossy Data Compression
Robust to Signal Manipulation and Processing
Operations
Unambiguous
Readily detectable
Unobtrusive
Innumerable
What Watermarking Allows
• Allows authors/artists to mark their work as
their own
• Allows companies to verify source/origin of
media on a website, detect
plagiarism/copyright infringement
• Allows receiver to verify authenticity of
media
Watermarking Techniques Examples
• Least-significant-bit (LSB) insertion and
noise manipulation
– Can insert a lot of data if image is simple
– Not very robust
• Discrete Cosine Transformation (DCT)
– Very robust
– Can’t insert large amounts of data
Watermarking Example
Using Least-Significant-Bit (LSB)
• Original GIF photo
(97KB)
• Photo containing
53KB of text (80KB)
Watermarking Example 2
Using Least-Significant-Bit (LSB)
• Original Photo (24KB) • Photo containing
29KB of text (29KB)
Watermarking Techniques
Examples
• Least-significant-bit (LSB) insertion and
noise manipulation
– Can insert a lot of data if image is simple
– Not very robust
• Discrete Cosine Transformation (DCT)
– Very robust
– Can’t insert large amounts of data
NEXT
FROM THE DIFFERENTIAL
PICTURE ONE CAN
EXTRACT THE
WATERMARK BUT...
• PEOPLE MAY TRY TO ATTACK
THE WATERMARK EVEN
IF THEY DO NOT KNOW HOW
IT IS DONE FOR EXAMPLE, THEY
MAY COMPRESS THE PICTURE OR
ENLARGE IT
WATERMARK SHOULD BE
ROBUST AGAINST THESE ATTEMPT
THIS IS SHOWN IN THE NEXT
EXAMPLES
RESPONSE TO MANY WATERMARKS
Watermarking Example 3
Using Discrete Cosine Transformation (DCT)
• Original JPEG photo
(32KB)
• Photo containing 1 line
copyright info (33 KB)
Video Watermarking
• DCT-Based Video Watermarking
– MPEG-based method
CONCLUSION
• PRESERVING COPYRIGHT WILL BE
MORE AND MORE IMPORTANT
• AT PRESENT THERE ARE NO
SYSTEMS WHICH WOULD BE
RESISTANT TO ALL COPYRIGHT ATTACKS
• WATERMARKS CAN BE PRODUCED BUT
THE ACTUAL METHODS ARE SECRET