Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J....
-
Upload
violet-walsh -
Category
Documents
-
view
214 -
download
0
Transcript of Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J....
Advances in Digital Advances in Digital Video Content Video Content ProtectionProtection
E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. DelpDelp
Proceedings of the IEEE, VOL. 93, NO. 1, January Proceedings of the IEEE, VOL. 93, NO. 1, January 2005 2005
OutlineOutline
Content Protection OverviewContent Protection Overview– Key players in content protectionKey players in content protection
Digital Rights Management (DRM)Digital Rights Management (DRM)– BasicsBasics– Legal and technical solutionsLegal and technical solutions– Methods and toolsMethods and tools
Research Issues Research Issues ConclusionConclusion
MotivationsMotivations
Illegal copyingIllegal copying and and distributiondistribution on a massive on a massive scale facilitates misuse, scale facilitates misuse, piracy, plagiarism and piracy, plagiarism and misappropriation.misappropriation.– Example Example
Peer-to-peer (P2P) architecture Peer-to-peer (P2P) architecture based systems create based systems create considerable challenges for considerable challenges for copyright enforcement.copyright enforcement.
– P2P with anonymityP2P with anonymity– DRM for P2PDRM for P2P
http://www.kazaa.com/
http://www.edonkey.com/
http://www.bittorrent.com/
http://www.morpheus.com/
Failed Copy Protection Failed Copy Protection Schemes (1/2)Schemes (1/2) Content Scrambling System (Content Scrambling System (CSSCSS))
– To protect prerecorded movies stored on To protect prerecorded movies stored on DVD, including DVD, including
Encryption to scramble the video dataEncryption to scramble the video data– Decryption keys are stored on special areas only Decryption keys are stored on special areas only
accessible for compliant reader accessible for compliant reader A protocol for obfuscating the communication A protocol for obfuscating the communication
between the DVD player and attached devicebetween the DVD player and attached device Copy protection for digital/analog outputsCopy protection for digital/analog outputs
– DeCSSDeCSS software was successfully software was successfully developed!developed!
Once the encryption for a movie is broken, illegal Once the encryption for a movie is broken, illegal copies can be played by DVD reader. copies can be played by DVD reader.
Online Resource: http://www.dvdcca.org/
Failed Copy Protection Failed Copy Protection Schemes (2/2)Schemes (2/2) Secure Digital Music Initiative (Secure Digital Music Initiative (SDMISDMI))
– SDMI a forum that has brought together more than 200 SDMI a forum that has brought together more than 200 companies and organizations representing information companies and organizations representing information technology, consumer electronics, security technology, technology, consumer electronics, security technology, the worldwide recording industry, and Internet service the worldwide recording industry, and Internet service providers to develop and standardize technologies that providers to develop and standardize technologies that “protect the playing, storing and distribution of digital “protect the playing, storing and distribution of digital music”music”
– The SDMI “public challenge” was announced in SepteThe SDMI “public challenge” was announced in September 2000 to invite members of the public to try to breamber 2000 to invite members of the public to try to break the technologies SDMI developedk the technologies SDMI developed
– Defeated by Defeated by S. A. Craver, M. Wu, B. Liu, A. Stubblefield, B.S. A. Craver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D. S. Wallach, D. Dean and E. W. Felton Swartzlander, D. S. Wallach, D. Dean and E. W. Felton. .
See “Reading Between the Lines, Lessons from the SDMI See “Reading Between the Lines, Lessons from the SDMI Challenges”, Proceedings of the 10th USENIX Security SyChallenges”, Proceedings of the 10th USENIX Security Symposium, Aug. 2001mposium, Aug. 2001
Online Resource: http://www.sdmi.org/ http://www.cs.princeton.edu/sip/sdmi/
Market values of Market values of Content ProtectionContent Protection According to the IIPA report, According to the IIPA report,
– The copyright-based industries are one of The copyright-based industries are one of the fastest growing and most dynamic the fastest growing and most dynamic sector of the U.S. economy.sector of the U.S. economy.
– Excluding Internet piracy, the annual Excluding Internet piracy, the annual worldwide losses of copyrighted materials worldwide losses of copyrighted materials are estimated to be $20 billion to $22 are estimated to be $20 billion to $22 billion.billion.
– Three types of industries are devoted to Three types of industries are devoted to the digital content protection arenathe digital content protection arena
Motion picture, consumer electronics and Motion picture, consumer electronics and information technologyinformation technology
Key Players in Content Key Players in Content Protection (1/5)Protection (1/5)
Key Players in Content Key Players in Content Protection (2/5)Protection (2/5)
Key Players in Content Key Players in Content Protection (3/5)Protection (3/5)
Key Players in Content Key Players in Content Protection (4/5)Protection (4/5)
Key Players in Content Key Players in Content Protection (5/5)Protection (5/5)
Objectives of DRMObjectives of DRM
A DRM system protects and enforces A DRM system protects and enforces the rights associated with the use of the rights associated with the use of digital contentdigital content– Access controlAccess control
To ensure that access to protected content is To ensure that access to protected content is only possible under the conditions specified by only possible under the conditions specified by the content ownerthe content owner
– Copy controlCopy control To prevent the creation of unauthorized copiesTo prevent the creation of unauthorized copies
– Content trackingContent tracking To detect and trace each copy To detect and trace each copy
What a DRM System What a DRM System Do?Do?
1.1. PackagingPackaging content content
2.2. Obtaining Obtaining access conditionsaccess conditions specified by content ownersspecified by content owners
3.3. Determining if access conditions Determining if access conditions are are fulfilledfulfilled
4.4. Temper-proofingTemper-proofing DRM DRM componentscomponents
Content PackagingContent Packaging
To force all accesses to the To force all accesses to the protected content to be governed protected content to be governed by the DRM systemby the DRM system
Once the security of the package Once the security of the package is defeated, the unprotected is defeated, the unprotected content will be accessed or content will be accessed or copied directlycopied directly
Packaging is usually Packaging is usually accomplished by accomplished by encryptionencryption
Access ConditionsAccess Conditions
Components of access conditions (usage ruComponents of access conditions (usage rules)les)– A means of right expressionA means of right expression for the content ownfor the content own
erer XrML, ORDLXrML, ORDL
– A mechanism of rights association (persistence)A mechanism of rights association (persistence) Metadata or watermarking Metadata or watermarking
– A secure scheme to determine if rules are enforcA secure scheme to determine if rules are enforceded
Obtaining secure authentication, transaction, context Obtaining secure authentication, transaction, context information information
Temper-proof and Temper-proof and Renewability Renewability Temper-provingTemper-proving
– Components of DRM systems must Components of DRM systems must be temper-proof to avoid attempts be temper-proof to avoid attempts to circumvent, modify, or reverse-to circumvent, modify, or reverse-engineer the security protocol engineer the security protocol
RenewabilityRenewability– Security can be restored or Security can be restored or
upgraded even after some devices upgraded even after some devices have been compromisedhave been compromised Device revocation Device revocation
Attacking A DRM Attacking A DRM SystemSystem
For Bob only
For Anyone
Authorization
Legal
Copy/Record
Illegal
Bob
Authorization
“Bob”
Alice
Authorization
“Bob”
Authorization
Copy Protection
Authentication
Integrity Checking
Temper-proving
Content Tracking
Content Packaging
Renewability
Access Control Copy Protection
Content Tracking
•Content Packaging
•Metadata Definition
•Metadata Persistence
•Content Identification
•Metadata Format
•Authentication
•Renewability
•Temper-proofing
•Secure Comm.
Relationships between Relationships between DRM Function BlocksDRM Function Blocks
•Integrity checking
•How to realize them?•Cryptography •Watermarking•Interoperable Standards
Layering View of DRM Layering View of DRM Building BlocksBuilding Blocks
Digital Rights Management (DRM)
Access Control
Integrity Checking
Credential Authentication
Copy Control
Transaction Tracking
Rule Specification
Non-Technical Aspects
Cryptography
•Hashes and protocols•Block cipher•Public-key encryption/decryption
Watermarking
•Media specific techniques•Fingerprinting
Rights Language
•REL
•XrML
Bu
siness M
od
el
Leg
islative Acts
Pu
blic In
terests
DRM Applications of DRM Applications of Encryption Encryption Packaging Packaging Forcing devices to adhere to Forcing devices to adhere to
access conditionsaccess conditions Device authenticationsDevice authentications Secure communicationsSecure communications Integrity checking Integrity checking
Shortcomings of Shortcomings of EncryptionEncryption Fragile cipher-textFragile cipher-text
– The decryption will fail even only one bit error occurs The decryption will fail even only one bit error occurs in cipher-textin cipher-text
– Hindering lossy or non-sequential video applicationsHindering lossy or non-sequential video applications Video streamingVideo streaming Scalable video Scalable video
Computational costComputational cost– Important for real-time applications or low-cost Important for real-time applications or low-cost
devicesdevices SolutionsSolutions
– Use selective encryption to reduces computation Use selective encryption to reduces computation and preserve video structureand preserve video structure
Issues about encrypting scalable video Issues about encrypting scalable video
DRM Applications of DRM Applications of WatermarkingWatermarking Copyright/owner identificationCopyright/owner identification Copy protectionCopy protection Access controlAccess control Content tracking Content tracking
Video WatermarkingVideo Watermarking
MethodsMethods– Additive embedding Additive embedding – Multiplicative embeddingMultiplicative embedding– QuantizationQuantization
Embedding domainsEmbedding domains– Spatial domainSpatial domain– Spatial-Temporal domainSpatial-Temporal domain– Frequency domainFrequency domain– Accompany audio domainAccompany audio domain
RequirementsRequirements– Blind-Blind-
detectiondetection– ComputationaComputationa
l costsl costs Compressed-Compressed-
domain domain watermarkingwatermarking
– Drifts Drifts compensationcompensation
– Rate-control Rate-control
Research Issues of Research Issues of Encryption and Encryption and WatermarkingWatermarking Selective encryption Selective encryption Encryption of scalable videoEncryption of scalable video Robustness and security of watermarking Robustness and security of watermarking
schemesschemes Anti-collusion of content tracking Anti-collusion of content tracking Watermarking performance evaluationWatermarking performance evaluation The location of watermarking in video The location of watermarking in video
DRMDRM Content tracking in broadcast or Content tracking in broadcast or
multicast networks multicast networks
Other Issues about Other Issues about DRMDRM Analog holesAnalog holes Temper-proofing of devicesTemper-proofing of devices System renewabilitySystem renewability Countless attackers Countless attackers Compromising the whole DRM Compromising the whole DRM
system after only one successsystem after only one success Long period Long period
Legislative Efforts Legislative Efforts
World Intellectual Property World Intellectual Property Organization (WIPO)Organization (WIPO)– WIPO Copyright Treaty WIPO Copyright Treaty – WIPO Performance and Phonograms TreatyWIPO Performance and Phonograms Treaty
U. S. CongressU. S. Congress– The Digital Millennium Copyright Act The Digital Millennium Copyright Act
(DMCA), 1998(DMCA), 1998– Consumers, Schools, and Libraries DRM Consumers, Schools, and Libraries DRM
Awareness Act of 2003, 2003 Awareness Act of 2003, 2003
Effects on Users and Effects on Users and ConsumersConsumers The use of DRM is controversial The use of DRM is controversial
– Usage rules of DRM system may Usage rules of DRM system may contravene the rights and privileges contravene the rights and privileges granted to the public under copyright granted to the public under copyright law law
– Information releasing may violate Information releasing may violate expectations of privacyexpectations of privacy
– DRM may reduce competitionDRM may reduce competition– DRM may increase cost of devices DRM may increase cost of devices
Current DRM Systems Current DRM Systems for Video (1/4)for Video (1/4)
Current DRM Systems Current DRM Systems for Video (2/4)for Video (2/4)
Current DRM Systems Current DRM Systems for Video (3/4)for Video (3/4)
Current DRM Systems Current DRM Systems for Video (4/4)for Video (4/4)