1 / 119

Watermarking in DRM systems

Watermarking in DRM systems. B . Macq Communications and Remote Sensing Laboratory École Polytechnique de Louvain UCL - Belgium. B-Crypt/ESAT:KUL/May 2009. Outline. DRM in an heterogeneous world Business Law Technology Conditional Access DRM for digital cinema Exhibition watermarks.

Download Presentation

Watermarking in DRM systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Watermarking in DRM systems B. Macq Communications and Remote Sensing Laboratory École Polytechnique de Louvain UCL - Belgium B-Crypt/ESAT:KUL/May 2009

  2. Outline • DRM in an heterogeneous world • Business • Law • Technology • Conditional Access • DRM for digital cinema • Exhibition watermarks

  3. Broadcast Home network Conditional Access Receiver Distribution Render. Unit Receiver Broadband DRM Mobile Terminal Business Models Protected Support Packaging Creation Value chain

  4. Law expressivity oSDML - Signed Document Markup Language oSyncML - Synchronization Markup Language oTML - Telephony Markup Language oWML - Wireless Markup Language oXACL - XML Access Control Language oXACML - Extensible Access Control Markup Language oXFDL - Extensible Forms Description Language oXMCL - Extensible Media Commerce Language oXML-F - XML-for-Fax  oXOL - XML-based Ontology Exchange Language oXrML - eXtensible Rights Markup Language

  5. Introduction Watermarking’s communication scheme. • Communication channel with side-information. • Information hiding game. Cover media Distorting channel Watermark detector & decoder Detection confidence Watermark encoder & embedder Deformation Input message Output message Noise Key

  6. Why digital cinema? • D-cinema needs specific solutions • Standard-based interfaces • Open & Interoperable system • Independent actor Confidential

  7. Digital Cinema Specificity Very High Added-Value Content Security&Flexibility Confidential

  8. Market model Distributors Intermediate actors • High level of security • Full end-to-end control • Projection rights enforcement • Security policy management • Secured audit trail reports Business rules Theaters Theaters Theatres Studios Players Players • Hidden security • Balance between enforcement and audit trail monitoring • In-theater screen and device management Confidential

  9. Design philosophy • Respect cinema business rules ! • Strongcryptographic design • No security by obscurity • Public encryption algorithms & protocols • Platform protection • Interoperability • Open & standard based interfaces • Evolutivity • Component-based design • Built-in secure & dynamic renewability Confidential

  10. Conditional Access ? • Conventional CA System = prevent unauthorized ‘access’ • CA for DC requires more than conventional CA ! • Content protection • & Rights enforcement • & Secured audit trails • & Modules & equipment certification • & Renewability • & Support of business agreements Confidential

  11. Why NOT a pay-TV CA system? • Different markets • B2B and not B2C • Known and (a priori) trustworth actors • Bi-directional contractual relations • Actors can make economic pressure • Flexible system • Different techologies • File-based approach and not stream-oriented • Different paths for content and authorizations • Flexible individual and group theater management Confidential

  12. Outline • Octalis introduction • System Overview • Technical Description • How does it work ? • Key technologies • System advantages • Roadmap & Business Model • Conclusions Confidential

  13. Octalis’ system Three modules Two information paths: movies and rights Confidential

  14. How does it work? Confidential

  15. How does it work? Confidential

  16. How does it work? Confidential

  17. How does it work? Confidential

  18. How does it work? Confidential

  19. How does it work? Confidential

  20. How does it work? Confidential

  21. How does it work? Confidential

  22. Octalis’ system Confidential

  23. Key Technologies (1)XML-based entitlements • Description language • Unlimited expressiveness • Open and de-facto standard for e-business • Key advantages: • Built-in cryptography (encryption, signature) • Extensible • Fully integrated in the Dynamic Security Platform Confidential

  24. Key Technologies (2)Dynamic Security • Component certification • Component revocation • Per-component access control • Role-based authorizations • Smart cards for strong security • Dynamic component downloading • Extensions, upgrades, patches • Component-level renewability • Immediate response to security attacks Preventinsiderattacks Confidential

  25. Key Technologies (3)Equipment Certification • Equipment-level protection • certification & revocation • Manufacturer responsibility • Security policy • per studio • list of trusted manufacturers • per movie • security requirement Confidential

  26. Key Technologies (3)Equipment Certification • IETF’s SPKI standard • Localnames • No root Certification Authority • Truststarts at the user/actor Confidential

  27. System Architecture Octalis’ CA System Digital Rights Evaluator Engine Equipment Validation Engine Time Sched. Condition Evaluation Manager Security Policy Verifier Trusted Info. Manager Certificate Database Certificate Manager Logs Certificate Verifier Capability Registry Show time Min proj/day Max # shows … ACL Secured Database Smart Card Manager System monitoring and logging Confidential

  28. Dynamic security platform Comp. 1 Comp. 2 Engine 3 Engine 4 Dynamic security platform Secure Device Authentication Protocol Certification Engine ... Confidential

  29. Key distribution procedure • Studios and distributors: • generate their own keys • Theatres • receive their keys with the smart cards • Public keys • exchanged securely • guaranteed with certificates Confidential

  30. Smart Cards • Store keys and SW modules of the DRM to increase the system security • Theatre: 1 smart card for all distributors No card swapping! • If different CA systems: • 1 additional smart card • /additional CA system • or /external distributor Confidential

  31. Exhibition watermarking Cinema A Cinema E Cinema B Cinema D Cinema C

  32. Digital Cinema Forensic Marking • Cryptography only protects content while transmission • Exhibition capture piracy happens at the end of the distribution pathway • Forensic Marking embeds tracking information into content at the time of playback (option in the Digital Cinema Initiatives – DCI Specs) – indicating time, date and location of playback FM

  33. Survivability • Transparency • Adaptive method based on original image characteristics to decrease watermarking artifacts • Robustness • Image processing attacks (filtering, noise addition, resizing, brightness …) • Video processing attacks (time shifts, frame rate, …) • Format conversion (frequency, spatial resolution, …) • Camcorder capture & low bit-rate compression Note: we do not address in this paper collusion attacks

  34. Transparency DCI Standard Eval. Material

  35. Robustness to Camcorder capture and Compression 640x480 spatial resolution 470x260

  36. Original image Captured image

  37. Watermarking Resistant against Geometrical Transforms Benoit Macq www.tele.ucl.ac.be ACIVS 2003 Gent

  38. Watermarking Cover media Watermarked media Embedding 010110100 Message Attacking channel key Extracted Message 010110100 Detection Attacked media < D Threshold > Confidence ACIVS 2003 Gent

  39. Watermarking robustness Information made unreadable (Detection Scheme Weakness) Information removed, made irrelevant, or misused (Cryptographic, System-protocol Weakness) Synchronous Distortions (e.g. additive noise, Compression, Linear Filtering) Asynchronous Distortions (e.g. Geometrical & Temporal deformations) ACIVS 2003 Gent

  40. Origin of the distortion • Usual processing : Distortion = unavoidable consequence • Editing • D/A & A/D Conversions • Malicious manipulation (tampering) : Distortion = target under constraints Constraints : quality, (complexity) Qualification of the origin depends on distortion’s nature and severity ACIVS 2003 Gent

  41. Origin: Digital Cinema ACIVS 2003 Gent

  42. Digital projector Digital Cinema Scenario Decompression module Compression module Central server Compressed Movie Files STUDIO/DISTRIBUTOR THEATRE ACIVS 2003 Gent

  43. Digital projector Security Threads Decompression module Compression module Central server Compressed Movie Files STUDIO/DISTRIBUTOR THEATRE ACIVS 2003 Gent

  44. Digital projector Watermarking Tracability of the source of piracy: exhibition fingerprint Unique identifier of the exhibition: -Unique ID of playback equipement -Date & Time Stamp ~ 40-60 bits payload Decryption Decompression & Fingerprinting module Smart Card Copy Control Watermark ? Encryption module Central server Central server Local server Compressed Movie Files Encrypted Movie Files STUDIO/DISTRIBUTOR THEATRE Find the movie theater that let somebody enter with a camera ! ACIVS 2003 Gent

  45. ACIVS 2003 Gent

  46. ACIVS 2003 Gent

  47. Origin: Print & Scan ACIVS 2003 Gent

More Related