[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

560 views

Published on

Published in: Business, Technology, Art & Photos
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
560
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
19
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • 30여개 업체들이 영화완성을 위해 협업
  • [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

    1. 1. Digital Security, Authentication & Copyright Protection Evolution of Copyright Protection Technology John CHOI (Professor, STEI) Nov 25 2013
    2. 2. Digital Security, Authentication & Copyright Protection Agenda 1 From DRM to Watermarking Watermarking for Copyright Protection 2 3 Other Applications of Watermarking 2
    3. 3. I. DRM: prevention technology Digital Security, Authentication & Copyright Protection DRM: based on encryption and access control User C Payment Print Server Save Networks Copy User A Screen Capture Encryption and Access Control User B Use(Play, V iewing, etc. )
    4. 4. I. DRM: prevention technology Digital Security, Authentication & Copyright Protection Enterprise DRM: extend Content DRM to Enterprise Access Control based on POSITION, Department, Job assigned.
    5. 5. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection 1) Image Watermarking 5
    6. 6. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection Click the [Open Image] File Dialog pops up for file selection MAIM supports various file format : BMP, JPG, PNG, GIF, TIFF MAIM special version supports satellite image, JBIG, G4FAX format Select the file  Click [Open] Markany 00009440.jpg + **************** Select Key Embedding and change Intensity. If you select hilevel, Watermark is very strong but some noise added  Type Watermark Key Click [Run] for embedding Click [Save] for saving the watermarked Image If you click the image pane, original size image appears Original Image 6 Watermarked Image
    7. 7. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection Robustness Data amount embedded 1 Filtering (LPF, HPF, Median, Mean, etc) O 2 Cropping O 3 Translation O 4 Added noise O 5 Compression Attacks : JPEG, JPEG2000 O -90o ~ 90o (Support 360o 6 Rotation : ) 7 Scaling : 50 % ~ 200 % Format Convert : JPEG, TIFF, BMP, etc O 256 x 256 pixel Data capacity 48 bits(Extendable) Detection probability per WMS(1) > 90% False positive probability per WMS < 10-5 (Extendable) Error-free payload probability per WMS > 1 - 10-5 speed O 8 Watermark Minimum Segment (WMS) O Environments Embedding 40 msec Intel® CPU i5-2430M 2.40GHz, 4 GB RAM Extracting < image> Processing time 350 msec Windows 7 SP1, 1024 x 1024 resolution Watermark info watermark embedder Secret key Original Image (512x512 pixels, Color) < watermarked image >
    8. 8. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection 8
    9. 9. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection Select [Key Mark] radio button  Click [Original Audio] Select the original audio file  Click [Open] Click the play button to listen Type the watermark key Click the [Run] for watermark embedding Embedding File : TEST3.WAV Click the play button to listen to the watermarked audio file Click the [Save] for saving the watermarked file Type filename  Click [Save] 9 Markany1
    10. 10. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection 2. 오디오워터마킹 스펙 – MAO™ v3.5 robustness Amount embedded speed Original Audio Watermarked Audio
    11. 11. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection 3) Video Watermarking -MAVI™ v3.5 robustness 삽입정보량 처리속도 < image> Watermark info watermark embedder Secret key < watermarked image >
    12. 12. Digital Security, Authentication & Copyright Protection Agenda 1 From DRM to Watermarking 2 3 Watermarking for Copyright Protection Other Applications of Watermarking 12
    13. 13. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 1) Copyright Protection – MBC, EBS, KERIS, Kwangwon Province, etc WM Embedding Sys. 1 UCI UCI Meta Data Transfer WM Embedding UCI generation/ registration Transcoder /Encoder Transfer Manager Content Conversion UCI UCI based Mobile Service Content Transfer Digital Content Distribution (Contents Gateway) UCI based distribution Info UCI based Integrated Distribution MGT Web service UCI 2 UCI based content Integrated Distribution Service System
    14. 14. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 1) Pre-release It took 2 months from first report (2009.7.17) to capture (2009.9.17) Illegally distributed at 160 web hard sites Business Loss 18 million USD + social cost
    15. 15. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 1) Embed user info and distribute to pre-release organization • police report: “movie of „Chun Woo Chi‟ is illegally distributed in web hard site (2010.3.16) •Universal Music (UMI), SONY/BMG, Warner Brothers, EMI in Hollywood (Audio WM) •A Studio in Hollywood in testing Video WM Leakage site was identified in 2 hours after report
    16. 16. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 2. IPTV/CATV - KT OllehTV, SKB Btv Illegal copy and distribution from user device (STB) : Analog Hall TV User Network Content Delivery External Output CAS/DRM On-line Service Platform (IPTV / VoD) distribution chance: security hall  It is possible to obtain High Quality Content through Analog Hole Illegal Distribution Channel  In content service process, exists illegal Analog Hole C C Camcording SD quality C C Capture Device: Component, Composite, S-VHS Illegal User – NTSC Signal Capturing SD quality C C TV Encoder: VGA, SVHS Illegal User – Analog Signal Capturing SD급 품질 (고품질)
    17. 17. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 2. IPTV/CATV– KT OllehTV, SKB Btv When service provider sends contents, automatically embeds user info into the contents Illegal Copy Found User “A” compromised Watermark Detector Owner Illegal Distribution from “A” A < Illegal User > Front-End Service System < User “A” or STB “A” Domain > A Fingerprinting Control Unit Video Decoder CA/DRM De-Packager Video Watermarking Audio Decoder UniCast Audio Watermarking Splitter < User “B” or STB “B” Domain > Video Decoder Audio Watermarking Splitter < User “C” or PC “C” Domain > Fingerprinting Control Unit Download Service Video Decoder IP Network Video Watermarking Audio Decoder CA/DRM De-Packager Legal Copy Video Watermarking Audio Decoder CA/DRM De-Packager Back-End System B Fingerprinting Control Unit MultiCast Legal Copy Audio Watermarking Splitter C Legal Copy
    18. 18. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 3.Digital Cinema Tracing – Forensic watermarking ETM DCP Storage Auditorium 1 ETM + ITM (Security Network) SMS Media SPB 2 Security Manager (A) SPB 1 Media Decryption ETM ETM Plain Text Media Decoding Project Forensic Marking Integrated Projection System TMS ETM ETM + ITM (Security Network) SMS Auditorium 2 Theater Network Security Manager (B) SPB 1 Media Decryption Media Decoding Forensic Marking Image Media Block Link Encryption Projection System
    19. 19. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 4. OTT Service Tracing– Irdeto(ND), MSI(USA), Korea Movie Promotion Two ways of embedding: (1)real-time embedding at service platform (2) embed user info at user terminal when downloaded Service system Content Delivery System Digital Rights Management System PC / User Player VOD/스트리밍 서비스 Device / exclusive Player Illegal distribution channel Device based FM system Legacy System User & Device Management System Platform based FM systems Content Management System User terminal (device) Web ahrd 불법 유출 P2P Portal site monitoring FM Tracker Refer tracking info 2. Service based FM 1. Device based FM
    20. 20. II. Diversified Copyright Protection Technologies Digital Security, Authentication & Copyright Protection Recent trends: many more technologies are applied  (1) Fingerprinting:  Automatic Content Recognition technology  Recognize using pattern matching (extraction of prespecified signal patterns and search Database)  Accuracy lower, Gracenote leads the market  (2) SINBAD:  Search the internet for non-authorized books and displays developed by Flemish book publishers  Webcrawler
    21. 21. Digital Security, Authentication & Copyright Protection Agenda 1 From DRM to Watermarking 2 3 Watermarking for Copyright Protection Other Applications of Watermarking 21
    22. 22. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection Tracing Technology Micro Devices Prevention Technology Smart phones Lap-top-computer Desk-top-computer Evolution of Internal Security Technology time
    23. 23. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection  Multi screen: desktop, tablet, smart phone, smart TV, automobile, refrigerator, etc..  Smartphone becomes a security headache  New devices: Google “Glass” computer, iWatch  Micro Devices: Ball Pen camcoder, USB camcode N-Screen Mobile Office Micro Devices
    24. 24. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection Wholesale - Discreet OL Glasses Digital Video Recorder with 8G Memory Built-in, Digital Voice Recorder, Hidden C
    25. 25. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection Tracing : audio watermarking technology extracting tracing info (when, where, etc.) < security area – confidential meeting > Tracing info generator Tracing info signal (when, where, etc.) checking Leaked out Recording Meeting voice meeting Recorded file extractor
    26. 26. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection Alarm!!
    27. 27. IV. Prevention of Illegal Modification Digital Security, Authentication & Copyright Protection Semi-fragile watermark – Picaso Info, EwahTron, Multivia etc. Fragile Watermarking: broken when modified, but robust to conversion. Applied to DVR (Surveillance System) to collect digital evidence Fragile & Robust Watermarking: Info. For Integrity Test, Location Info, Time Info. Surveillance System Camera DVR -Compression -Realtime Watermarking Storage Original Material Malicious Tamper Tampered Material Integrity Verification: Court Detector -Watermark Detector -Tamper Proofing/Detect Frouds : Normal : Illegal
    28. 28. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection Semi-Fragile Watermarking Generate signature from original contents and then verify illegal modification for fame-unit, slice unit, block unit. Watermark embedded 원영상 photo Modified photo 위변조된 영상 Identify 위변조 검출 modified parts

    ×