Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J....

31
Advances in Digital Advances in Digital Video Content Video Content Protection Protection E. T. Lin, A. M. Eskicioglu, R. L. E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, Proceedings of the IEEE, VOL. 93, NO. 1, January 2005 January 2005

Transcript of Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J....

Page 1: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Advances in Digital Advances in Digital Video Content Video Content ProtectionProtection

E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. DelpDelp

Proceedings of the IEEE, VOL. 93, NO. 1, January Proceedings of the IEEE, VOL. 93, NO. 1, January 2005 2005

Page 2: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

OutlineOutline

Content Protection OverviewContent Protection Overview– Key players in content protectionKey players in content protection

Digital Rights Management (DRM)Digital Rights Management (DRM)– BasicsBasics– Legal and technical solutionsLegal and technical solutions– Methods and toolsMethods and tools

Research Issues Research Issues ConclusionConclusion

Page 3: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

MotivationsMotivations

Illegal copyingIllegal copying and and distributiondistribution on a massive on a massive scale facilitates misuse, scale facilitates misuse, piracy, plagiarism and piracy, plagiarism and misappropriation.misappropriation.– Example Example

Peer-to-peer (P2P) architecture Peer-to-peer (P2P) architecture based systems create based systems create considerable challenges for considerable challenges for copyright enforcement.copyright enforcement.

– P2P with anonymityP2P with anonymity– DRM for P2PDRM for P2P

http://www.kazaa.com/

http://www.edonkey.com/

http://www.bittorrent.com/

http://www.morpheus.com/

Page 4: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Failed Copy Protection Failed Copy Protection Schemes (1/2)Schemes (1/2) Content Scrambling System (Content Scrambling System (CSSCSS))

– To protect prerecorded movies stored on To protect prerecorded movies stored on DVD, including DVD, including

Encryption to scramble the video dataEncryption to scramble the video data– Decryption keys are stored on special areas only Decryption keys are stored on special areas only

accessible for compliant reader accessible for compliant reader A protocol for obfuscating the communication A protocol for obfuscating the communication

between the DVD player and attached devicebetween the DVD player and attached device Copy protection for digital/analog outputsCopy protection for digital/analog outputs

– DeCSSDeCSS software was successfully software was successfully developed!developed!

Once the encryption for a movie is broken, illegal Once the encryption for a movie is broken, illegal copies can be played by DVD reader. copies can be played by DVD reader.

Online Resource: http://www.dvdcca.org/

Page 5: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Failed Copy Protection Failed Copy Protection Schemes (2/2)Schemes (2/2) Secure Digital Music Initiative (Secure Digital Music Initiative (SDMISDMI))

– SDMI a forum that has brought together more than 200 SDMI a forum that has brought together more than 200 companies and organizations representing information companies and organizations representing information technology, consumer electronics, security technology, technology, consumer electronics, security technology, the worldwide recording industry, and Internet service the worldwide recording industry, and Internet service providers to develop and standardize technologies that providers to develop and standardize technologies that “protect the playing, storing and distribution of digital “protect the playing, storing and distribution of digital music”music”

– The SDMI “public challenge” was announced in SepteThe SDMI “public challenge” was announced in September 2000 to invite members of the public to try to breamber 2000 to invite members of the public to try to break the technologies SDMI developedk the technologies SDMI developed

– Defeated by Defeated by S. A. Craver, M. Wu, B. Liu, A. Stubblefield, B.S. A. Craver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D. S. Wallach, D. Dean and E. W. Felton Swartzlander, D. S. Wallach, D. Dean and E. W. Felton. .

See “Reading Between the Lines, Lessons from the SDMI See “Reading Between the Lines, Lessons from the SDMI Challenges”, Proceedings of the 10th USENIX Security SyChallenges”, Proceedings of the 10th USENIX Security Symposium, Aug. 2001mposium, Aug. 2001

Online Resource: http://www.sdmi.org/ http://www.cs.princeton.edu/sip/sdmi/

Page 6: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Market values of Market values of Content ProtectionContent Protection According to the IIPA report, According to the IIPA report,

– The copyright-based industries are one of The copyright-based industries are one of the fastest growing and most dynamic the fastest growing and most dynamic sector of the U.S. economy.sector of the U.S. economy.

– Excluding Internet piracy, the annual Excluding Internet piracy, the annual worldwide losses of copyrighted materials worldwide losses of copyrighted materials are estimated to be $20 billion to $22 are estimated to be $20 billion to $22 billion.billion.

– Three types of industries are devoted to Three types of industries are devoted to the digital content protection arenathe digital content protection arena

Motion picture, consumer electronics and Motion picture, consumer electronics and information technologyinformation technology

Page 7: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Key Players in Content Key Players in Content Protection (1/5)Protection (1/5)

Page 8: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Key Players in Content Key Players in Content Protection (2/5)Protection (2/5)

Page 9: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Key Players in Content Key Players in Content Protection (3/5)Protection (3/5)

Page 10: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Key Players in Content Key Players in Content Protection (4/5)Protection (4/5)

Page 11: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Key Players in Content Key Players in Content Protection (5/5)Protection (5/5)

Page 12: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Objectives of DRMObjectives of DRM

A DRM system protects and enforces A DRM system protects and enforces the rights associated with the use of the rights associated with the use of digital contentdigital content– Access controlAccess control

To ensure that access to protected content is To ensure that access to protected content is only possible under the conditions specified by only possible under the conditions specified by the content ownerthe content owner

– Copy controlCopy control To prevent the creation of unauthorized copiesTo prevent the creation of unauthorized copies

– Content trackingContent tracking To detect and trace each copy To detect and trace each copy

Page 13: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

What a DRM System What a DRM System Do?Do?

1.1. PackagingPackaging content content

2.2. Obtaining Obtaining access conditionsaccess conditions specified by content ownersspecified by content owners

3.3. Determining if access conditions Determining if access conditions are are fulfilledfulfilled

4.4. Temper-proofingTemper-proofing DRM DRM componentscomponents

Page 14: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Content PackagingContent Packaging

To force all accesses to the To force all accesses to the protected content to be governed protected content to be governed by the DRM systemby the DRM system

Once the security of the package Once the security of the package is defeated, the unprotected is defeated, the unprotected content will be accessed or content will be accessed or copied directlycopied directly

Packaging is usually Packaging is usually accomplished by accomplished by encryptionencryption

Page 15: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Access ConditionsAccess Conditions

Components of access conditions (usage ruComponents of access conditions (usage rules)les)– A means of right expressionA means of right expression for the content ownfor the content own

erer XrML, ORDLXrML, ORDL

– A mechanism of rights association (persistence)A mechanism of rights association (persistence) Metadata or watermarking Metadata or watermarking

– A secure scheme to determine if rules are enforcA secure scheme to determine if rules are enforceded

Obtaining secure authentication, transaction, context Obtaining secure authentication, transaction, context information information

Page 16: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Temper-proof and Temper-proof and Renewability Renewability Temper-provingTemper-proving

– Components of DRM systems must Components of DRM systems must be temper-proof to avoid attempts be temper-proof to avoid attempts to circumvent, modify, or reverse-to circumvent, modify, or reverse-engineer the security protocol engineer the security protocol

RenewabilityRenewability– Security can be restored or Security can be restored or

upgraded even after some devices upgraded even after some devices have been compromisedhave been compromised Device revocation Device revocation

Page 17: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Attacking A DRM Attacking A DRM SystemSystem

For Bob only

For Anyone

Authorization

Legal

Copy/Record

Illegal

Bob

Authorization

“Bob”

Alice

Authorization

“Bob”

Authorization

Copy Protection

Authentication

Integrity Checking

Temper-proving

Content Tracking

Content Packaging

Renewability

Page 18: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Access Control Copy Protection

Content Tracking

•Content Packaging

•Metadata Definition

•Metadata Persistence

•Content Identification

•Metadata Format

•Authentication

•Renewability

•Temper-proofing

•Secure Comm.

Relationships between Relationships between DRM Function BlocksDRM Function Blocks

•Integrity checking

•How to realize them?•Cryptography •Watermarking•Interoperable Standards

Page 19: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Layering View of DRM Layering View of DRM Building BlocksBuilding Blocks

Digital Rights Management (DRM)

Access Control

Integrity Checking

Credential Authentication

Copy Control

Transaction Tracking

Rule Specification

Non-Technical Aspects

Cryptography

•Hashes and protocols•Block cipher•Public-key encryption/decryption

Watermarking

•Media specific techniques•Fingerprinting

Rights Language

•REL

•XrML

Bu

siness M

od

el

Leg

islative Acts

Pu

blic In

terests

Page 20: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

DRM Applications of DRM Applications of Encryption Encryption Packaging Packaging Forcing devices to adhere to Forcing devices to adhere to

access conditionsaccess conditions Device authenticationsDevice authentications Secure communicationsSecure communications Integrity checking Integrity checking

Page 21: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Shortcomings of Shortcomings of EncryptionEncryption Fragile cipher-textFragile cipher-text

– The decryption will fail even only one bit error occurs The decryption will fail even only one bit error occurs in cipher-textin cipher-text

– Hindering lossy or non-sequential video applicationsHindering lossy or non-sequential video applications Video streamingVideo streaming Scalable video Scalable video

Computational costComputational cost– Important for real-time applications or low-cost Important for real-time applications or low-cost

devicesdevices SolutionsSolutions

– Use selective encryption to reduces computation Use selective encryption to reduces computation and preserve video structureand preserve video structure

Issues about encrypting scalable video Issues about encrypting scalable video

Page 22: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

DRM Applications of DRM Applications of WatermarkingWatermarking Copyright/owner identificationCopyright/owner identification Copy protectionCopy protection Access controlAccess control Content tracking Content tracking

Page 23: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Video WatermarkingVideo Watermarking

MethodsMethods– Additive embedding Additive embedding – Multiplicative embeddingMultiplicative embedding– QuantizationQuantization

Embedding domainsEmbedding domains– Spatial domainSpatial domain– Spatial-Temporal domainSpatial-Temporal domain– Frequency domainFrequency domain– Accompany audio domainAccompany audio domain

RequirementsRequirements– Blind-Blind-

detectiondetection– ComputationaComputationa

l costsl costs Compressed-Compressed-

domain domain watermarkingwatermarking

– Drifts Drifts compensationcompensation

– Rate-control Rate-control

Page 24: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Research Issues of Research Issues of Encryption and Encryption and WatermarkingWatermarking Selective encryption Selective encryption Encryption of scalable videoEncryption of scalable video Robustness and security of watermarking Robustness and security of watermarking

schemesschemes Anti-collusion of content tracking Anti-collusion of content tracking Watermarking performance evaluationWatermarking performance evaluation The location of watermarking in video The location of watermarking in video

DRMDRM Content tracking in broadcast or Content tracking in broadcast or

multicast networks multicast networks

Page 25: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Other Issues about Other Issues about DRMDRM Analog holesAnalog holes Temper-proofing of devicesTemper-proofing of devices System renewabilitySystem renewability Countless attackers Countless attackers Compromising the whole DRM Compromising the whole DRM

system after only one successsystem after only one success Long period Long period

Page 26: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Legislative Efforts Legislative Efforts

World Intellectual Property World Intellectual Property Organization (WIPO)Organization (WIPO)– WIPO Copyright Treaty WIPO Copyright Treaty – WIPO Performance and Phonograms TreatyWIPO Performance and Phonograms Treaty

U. S. CongressU. S. Congress– The Digital Millennium Copyright Act The Digital Millennium Copyright Act

(DMCA), 1998(DMCA), 1998– Consumers, Schools, and Libraries DRM Consumers, Schools, and Libraries DRM

Awareness Act of 2003, 2003 Awareness Act of 2003, 2003

Page 27: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Effects on Users and Effects on Users and ConsumersConsumers The use of DRM is controversial The use of DRM is controversial

– Usage rules of DRM system may Usage rules of DRM system may contravene the rights and privileges contravene the rights and privileges granted to the public under copyright granted to the public under copyright law law

– Information releasing may violate Information releasing may violate expectations of privacyexpectations of privacy

– DRM may reduce competitionDRM may reduce competition– DRM may increase cost of devices DRM may increase cost of devices

Page 28: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Current DRM Systems Current DRM Systems for Video (1/4)for Video (1/4)

Page 29: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Current DRM Systems Current DRM Systems for Video (2/4)for Video (2/4)

Page 30: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Current DRM Systems Current DRM Systems for Video (3/4)for Video (3/4)

Page 31: Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.

Current DRM Systems Current DRM Systems for Video (4/4)for Video (4/4)