+ All Categories
Home > Business > [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Date post: 10-May-2015
Category:
Upload: segitiganet
View: 253 times
Download: 1 times
Share this document with a friend
Popular Tags:
28
Digital Security, Authentication & Copyright Protection Nov 25 2013 Evolution of Copyright Protection Technology John CHOI (Professor, STEI)
Transcript
Page 1: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Nov 25 2013

Evolution of Copyright Protection Technology

John CHOI (Professor, STEI)

Page 2: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

From DRM to Watermarking1

Watermarking for Copyright Protection2

Other Applications of Watermarking3

Agenda

2

Page 3: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Encryption and Access Control

Payment

Save

Print

Screen Capture

Use(Play, Viewing,

etc.)

Copy

User A

Server

Networks

User C

User B

I. DRM: prevention technology

DRM: based on encryption and access control

Page 4: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Access Control based on POSITION, Department, Job assigned.

I. DRM: prevention technology

Enterprise DRM: extend Content DRM to Enterprise

Page 5: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

5

I. watermark: tracing technology

1) Image Watermarking

Page 6: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

6

Click the [Open Image]

File Dialog pops up for file selection

MAIM supports various file format: BMP, JPG, PNG, GIF, TIFF

MAIM special version supports satel-lite image, JBIG, G4FAX format

Select the file Click [Open]

Select Key Embedding and change In-tensity. If you select hi-level, Water-mark is very strong but some noise added Type Watermark Key

Click [Run] for embedding

Markany00009440.jpg + ****************

Click [Save] for saving the watermarked Image

If you click the image pane, original size image ap-pears

Original Image Watermarked Image

I. watermark: tracing technology

Page 7: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Robustness

1 Filtering (LPF, HPF, Median, Mean, etc)

O

2 Cropping O

3 Translation O

4 Added noise O

5 Compression Attacks : JPEG, JPEG2000

O

6 Rotation : -90o ~ 90o (Support 360o )

O

7 Scaling : 50 % ~ 200 % O

8 Format Convert : JPEG, TIFF, BMP, etc

O

I. watermark: tracing technology

Data amount embedded

Watermark Minimum Segment (WMS) 256 x 256 pixel

Data capacity 48 bits(Extendable)

Detection probability per WMS(1) > 90%

False positive probability per WMS < 10-5 (Extendable)

Error-free payload probability per WMS > 1 - 10-5

speed

Processing time Environments

Embedding 40 msec Intel® CPU i5-2430M 2.40GHz, 4 GB RAM

Windows 7 SP1, 1024 x 1024 resolutionExtracting 350 msec

water-mark

embedder

Secret key

Watermark info < image> < watermarked image >

Original Image (512x512 pixels, Color)

Page 8: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

8

I. watermark: tracing technology

Page 9: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

9

Select [Key Mark] radio button Click [Orig-inal Audio]

Select the original audio file Click [Open]

Click the play button to listen

Type the watermark key

Markany1

Embedding File : TEST3.WAV

Click the [Run] for watermark embedding

Click the play button to listen to the water-marked audio file

Click the [Save] for saving the watermarked file

Type filename Click [Save]

I. watermark: tracing technology

Page 10: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

2. 오디오워터마킹 스펙 – MAO™ v3.5

robustness

I. watermark: tracing technology

Amount embedded

speed

Original Audio Watermarked Audio

Page 11: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

3) Video Watermarking -MAVI™ v3.5

robustness

I. watermark: tracing technology

삽입정보량

처리속도

water-mark

embedder

Secret key

Watermark info < image>

< watermarked image >

Page 12: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

From DRM to Watermarking1

Watermarking for Copyright Protection2

Other Applications of Watermarking3

Agenda

12

Page 13: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Archive DB

Archive Storage

UCI generation/registration

Content Stor-age

Transcoder/Encoder

TransferManager

UCIWM Embedding

UCIMeta Data Transfer

UCI basedMobile Service

UCI basedIntegrated Distri-bution MGT Web

service

Distribution DB

Content Conversion

Content Transfer

UCI

UCI based distribution Info

Digital Content Distribution(Contents Gateway)

UCI

1

2

WM Embedding Sys.

UCI based content Integrated Distribution Service System

1) Copyright Protection – MBC, EBS, KERIS, Kwangwon Province, etc

II. Watermarking for Copyright Pro-tection

Page 14: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Illegally distributed at 160 web hard sites

Business Loss 18 million USD + social cost

It took 2 months from first report (2009.7.17) to capture (2009.9.17)

1) Pre-release

II. Watermarking for Copyright Pro-tection

Page 15: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

• police report: “movie of ‘Chun Woo Chi’ is illegally distributed in web hard site (2010.3.16)

• Universal Music (UMI), SONY/

BMG, Warner Brothers, EMI in Hollywood (Audio WM)

• A Studio in Hollywood in testing Video WM

Leakage site was identified in 2 hours after report

1) Embed user info and distribute to pre-release organization

II. Watermarking for Copyright Pro-tection

Page 16: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Illegal copy and distribution from user device (STB) : Analog Hall

2. IPTV/CATV - KT OllehTV, SKB Btv

Analog Hole

TV

User Net-workContent Delivery

Capture Device: Compo-nent, Composite, S-VHS

Illegal User – NTSC Signal Capturing

TV Encoder: VGA, S-VHS

CC

Illegal User – Analog Signal Captur-

ing

SD quality

CC

SD 급 품질( 고품질 )

CC

Camcording SD quality

Illegal D

istributio

n C

hannel

CAS/DRM

In content service process, exists

illegal distribution chance: security

hall

It is possible to obtain High Quality

Content through Analog Hole

External Out-put

On-line Service Plat-form (IPTV / VoD)

II. Watermarking for Copyright Pro-tection

Page 17: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

When service provider sends contents, automatically embeds user info into the contents

2. IPTV/CATV– KT OllehTV, SKB Btv

Illegal Distribution from “A”

Illegal Copy FoundUser “A” compromised

Front-EndService System

IP Network

Back-EndSystem

Owner

< User “B” or STB “B” Domain >

< User “A” or STB “A” Domain >

< User “C” or PC “C” Domain >

B

C

ALegalCopy

LegalCopy

LegalCopy

A< Illegal User >

WatermarkDetector

CA/ DRMDe-Packager

Fingerprinting Control Unit

Splitter

VideoDecoder

AudioDecoder

VideoWatermarking

AudioWatermarking

CA/ DRMDe-Packager

Fingerprinting Control Unit

Splitter

VideoDecoder

AudioDecoder

VideoWatermarking

AudioWatermarking

CA/ DRMDe-Packager

Fingerprinting Control Unit

Splitter

VideoDecoder

AudioDecoder

VideoWatermarking

AudioWatermarking

UniCast

MultiCast

DownloadService

II. Watermarking for Copyright Pro-tection

Page 18: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

3.Digital Cinema Tracing – Forensic watermarking

SMS

Storage

TMS

Auditorium 1

Auditorium 2

DCP

ETM ETM

ETM

Media

SMS

ETM

Th

eate

r Netw

ork

ETM + ITM (Security Network)

ETM + ITM (Security Network)

Image Media Block Projection System

Integrated Projection System

MediaDecryption

LinkEncryption

Security Manager (B)

SPB 1

ForensicMarking

MediaDecoding

PlainText

Project

MediaDecryption

ForensicMarking

MediaDecoding

Security Manager (A)

SPB 1

SPB 2

II. Watermarking for Copyright Pro-tection

Page 19: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection4. OTT Service Tracing– Irdeto(ND), MSI(USA), Korea Movie Promotion

Service system User terminal (device) Illegal distribution channel

Content Management System

User & Device Management System

Content Delivery System

Digital Rights Management System

Pla

tform

based

FM

syste

ms

PC /User Player

Device /exclusive Player

Devic

e b

ased

FM

syste

m

Web ahrd

P2PPortal site

FM Tracker

VOD/ 스트리밍서비스

불법 유출

monitoring

Refer tracking info

1. Device based FM 2. Service based FM

Leg

acy S

yste

m

Two ways of embedding: (1)real-time embedding at service platform (2) em-bed user info at user terminal when downloaded

II. Watermarking for Copyright Pro-tection

Page 20: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Recent trends: many more technologies are applied

(1) Fingerprinting: Automatic Content Recognition technologyRecognize using pattern matching (extraction of pre-

specified signal patterns and search Database)Accuracy lower, Gracenote leads the market

(2) SINBAD:Search the internet for non-authorized books and dis-

plays developed by Flemish book publishersWebcrawler

II. Diversified Copyright Protection Technologies

Page 21: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

From DRM to Watermarking1

Watermarking for Copyright Protection2

Other Applications of Watermarking3

Agenda

21

Page 22: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Desk-top-computer

Lap-top-computer

Smart phones

Micro Devices

PreventionTechnology

Tracing Technology

timeEvolution of Internal Security Technology

III. Watermarking for Cyber Secu-rity

Page 23: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Multi screen: desktop, tablet, smart phone, smart TV, auto-mobile, refrigerator, etc..

Smartphone becomes a security headache New devices: Google “Glass” computer, iWatch Micro Devices: Ball Pen camcoder, USB camcode

N-Screen Mobile Office Micro Devices

III. Watermarking for Cyber Secu-rity

Page 24: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Wholesale - Discreet OL Glasses Digital Video Recorder with 8G Memory Built-in, Digital Voice Recorder, Hidden C

III. Watermarking for Cyber Secu-rity

Page 25: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Recorded file

checking

extractor

extracting tracing info(when, where, etc.)

Tracing info generator

meetingRecording

Tracing info signal (when, where, etc.)

Meeting voice

Leaked out

< security area – confidential meeting >

Tracing : audio watermarking technology

III. Watermarking for Cyber Secu-rity

Page 26: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Alarm!!

III. Watermarking for Cyber Secu-rity

Page 27: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Semi-fragile watermark – Picaso Info, EwahTron, Multivia etc.

Court

Tampered Material

OriginalMaterial

MaliciousTamper

Camera DVRDVR

Storage-Compression-Realtime Watermarking

-Watermark Detector-Tamper Proofing/Detect Frouds

Surveillance System

: Normal: I llegal

Detector

Fragile & Robust Watermarking: Info. For Integrity Test, Location Info,

Time Info.

Integrity Verification:

Fragile Watermarking: broken when modified, but robust to conversion.Applied to DVR (Surveillance System) to collect digital evidence

IV. Prevention of Illegal Modifica-tion

Page 28: [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

Digital Security, Authentication & Copyright Protection

Semi-Fragile Watermarking

Generate signature from original contents and then verify illegal modification for fame-unit, slice unit, block unit.

원영상 위변조된 영상 위변조 검출 Watermark embedded photo

Modified photo Identify modi-fied parts

III. Watermarking for Cyber Secu-rity


Recommended