SlideShare a Scribd company logo
1 of 28
Digital Security, Authentication & Copyright Protection

Evolution of Copyright Protection
Technology
John CHOI (Professor, STEI)

Nov 25 2013
Digital Security, Authentication & Copyright Protection

Agenda

1

From DRM to Watermarking

Watermarking for Copyright Protection

2

3

Other Applications of Watermarking

2
I. DRM: prevention technology
Digital Security, Authentication & Copyright Protection

DRM: based on encryption and access control

User C

Payment

Print

Server

Save

Networks
Copy
User A

Screen
Capture
Encryption and
Access Control

User B

Use(Play, V
iewing, etc.
)
I. DRM: prevention technology
Digital Security, Authentication & Copyright Protection

Enterprise DRM: extend Content DRM to Enterprise

Access Control based on POSITION, Department, Job assigned.
I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection

1) Image Watermarking

5
I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection

Click the [Open Image]

File Dialog pops up for file selection
MAIM supports various file format
: BMP, JPG, PNG, GIF, TIFF
MAIM special version supports
satellite image, JBIG, G4FAX format
Select the file  Click [Open]
Markany
00009440.jpg + ****************

Select Key Embedding and change
Intensity. If you select hilevel, Watermark is very strong but
some noise added  Type Watermark
Key
Click [Run] for embedding

Click [Save] for saving the watermarked Image
If you click the image pane, original size image
appears

Original Image

6

Watermarked Image
I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection

Robustness

Data amount embedded

1

Filtering (LPF, HPF, Median, Mean, etc)

O

2

Cropping

O

3

Translation

O

4

Added noise

O

5

Compression Attacks : JPEG,
JPEG2000

O

-90o

~

90o (Support

360o

6

Rotation :

)

7

Scaling : 50 % ~ 200 %
Format Convert : JPEG, TIFF, BMP, etc

O

256 x 256 pixel

Data capacity

48 bits(Extendable)

Detection probability per WMS(1)

> 90%

False positive probability per WMS

< 10-5 (Extendable)

Error-free payload probability per WMS

> 1 - 10-5

speed

O

8

Watermark Minimum Segment (WMS)

O

Environments

Embedding

40 msec

Intel® CPU i5-2430M 2.40GHz, 4 GB RAM

Extracting

< image>

Processing time

350 msec

Windows 7 SP1, 1024 x 1024 resolution

Watermark info

watermark
embedder

Secret key

Original Image (512x512 pixels, Color)

< watermarked image >
I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection

8
I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection

Select [Key Mark] radio button  Click
[Original Audio]
Select the original audio file  Click [Open]
Click the play button to listen
Type the watermark key
Click the [Run] for watermark embedding
Embedding File : TEST3.WAV

Click the play button to listen to the
watermarked audio file
Click the [Save] for saving the watermarked
file
Type filename  Click [Save]

9

Markany1
I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection

2. 오디오워터마킹 스펙 – MAO™ v3.5
robustness

Amount embedded

speed

Original Audio

Watermarked Audio
I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection

3) Video Watermarking -MAVI™ v3.5
robustness

삽입정보량

처리속도

< image>

Watermark info

watermark
embedder

Secret key

< watermarked image >
Digital Security, Authentication & Copyright Protection

Agenda

1

From DRM to Watermarking

2

3

Watermarking for Copyright Protection

Other Applications of Watermarking

12
II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection

1) Copyright Protection – MBC, EBS, KERIS, Kwangwon Province, etc
WM Embedding Sys.

1
UCI

UCI
Meta Data Transfer

WM Embedding

UCI generation/
registration

Transcoder
/Encoder

Transfer
Manager

Content
Conversion

UCI

UCI based
Mobile Service

Content Transfer

Digital Content Distribution
(Contents Gateway)
UCI based
distribution Info
UCI based
Integrated
Distribution MGT
Web service

UCI

2

UCI based content Integrated Distribution Service System
II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection

1) Pre-release

It took 2 months from first report (2009.7.17) to capture (2009.9.17)
Illegally distributed at 160 web hard sites

Business Loss 18 million USD + social cost
II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection

1) Embed user info and distribute to pre-release organization

• police report: “movie of „Chun Woo
Chi‟ is illegally distributed in web hard
site (2010.3.16)
•Universal Music (UMI), SONY/BMG,
Warner Brothers, EMI in Hollywood
(Audio WM)
•A Studio in Hollywood in testing
Video WM

Leakage site was identified in 2 hours after report
II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection

2. IPTV/CATV - KT OllehTV, SKB Btv
Illegal copy and distribution from user device (STB) : Analog Hall

TV
User Network

Content Delivery

External Output

CAS/DRM

On-line Service Platform
(IPTV / VoD)

distribution chance: security hall
 It is possible to obtain High Quality Content

through Analog Hole

Illegal Distribution Channel

 In content service process, exists illegal

Analog Hole
C
C
Camcording

SD quality

C
C
Capture Device: Component,
Composite, S-VHS

Illegal User –
NTSC Signal Capturing

SD quality

C
C
TV Encoder: VGA, SVHS

Illegal User –
Analog Signal Capturing

SD급 품질
(고품질)
II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection

2. IPTV/CATV– KT OllehTV, SKB Btv
When service provider sends contents, automatically embeds user info into the contents

Illegal Copy Found
User “A” compromised

Watermark
Detector

Owner

Illegal Distribution from “A”

A

< Illegal User >

Front-End
Service System

< User “A” or STB “A” Domain >

A

Fingerprinting Control Unit

Video
Decoder
CA/DRM
De-Packager

Video
Watermarking

Audio
Decoder

UniCast

Audio
Watermarking

Splitter

< User “B” or STB “B” Domain >

Video
Decoder

Audio
Watermarking

Splitter

< User “C” or PC “C” Domain >
Fingerprinting Control Unit

Download
Service

Video
Decoder

IP Network

Video
Watermarking

Audio
Decoder

CA/DRM
De-Packager

Legal
Copy

Video
Watermarking

Audio
Decoder

CA/DRM
De-Packager

Back-End
System

B

Fingerprinting Control Unit

MultiCast

Legal
Copy

Audio
Watermarking

Splitter

C

Legal
Copy
II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection

3.Digital Cinema Tracing – Forensic watermarking

ETM
DCP

Storage

Auditorium 1

ETM + ITM (Security Network)

SMS

Media
SPB 2
Security Manager (A)
SPB 1
Media
Decryption

ETM

ETM

Plain
Text
Media
Decoding

Project

Forensic
Marking

Integrated Projection System

TMS

ETM

ETM + ITM (Security Network)

SMS

Auditorium 2

Theater Network

Security Manager (B)
SPB 1
Media
Decryption

Media
Decoding

Forensic
Marking

Image Media Block

Link
Encryption

Projection System
II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection

4. OTT Service Tracing– Irdeto(ND), MSI(USA), Korea Movie Promotion
Two ways of embedding: (1)real-time embedding at service platform (2) embed user info at user
terminal when downloaded

Service system

Content Delivery System

Digital Rights Management
System

PC /
User Player
VOD/스트리밍
서비스

Device /
exclusive Player

Illegal distribution channel

Device based FM system

Legacy System

User & Device Management
System

Platform based FM systems

Content Management
System

User terminal (device)

Web ahrd
불법 유출

P2P
Portal site

monitoring

FM Tracker
Refer tracking info

2. Service based FM

1. Device based FM
II. Diversified Copyright Protection Technologies
Digital Security, Authentication & Copyright Protection

Recent trends: many more technologies are applied

 (1) Fingerprinting:
 Automatic Content Recognition technology
 Recognize using pattern matching (extraction of prespecified signal patterns and search Database)
 Accuracy lower, Gracenote leads the market

 (2) SINBAD:
 Search the internet for non-authorized books and
displays developed by Flemish book publishers
 Webcrawler
Digital Security, Authentication & Copyright Protection

Agenda

1

From DRM to Watermarking

2

3

Watermarking for Copyright Protection

Other Applications of Watermarking

21
III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection

Tracing Technology
Micro Devices

Prevention
Technology

Smart phones

Lap-top-computer
Desk-top-computer

Evolution of Internal Security Technology

time
III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection

 Multi screen: desktop, tablet, smart phone, smart TV,
automobile, refrigerator, etc..
 Smartphone becomes a security headache
 New devices: Google “Glass” computer, iWatch
 Micro Devices: Ball Pen camcoder, USB camcode

N-Screen

Mobile Office

Micro Devices
III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection

Wholesale - Discreet OL Glasses Digital
Video Recorder with 8G Memory Built-in,
Digital Voice Recorder, Hidden C
III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection

Tracing : audio watermarking technology
extracting tracing info
(when, where, etc.)

< security area – confidential meeting >
Tracing info
generator

Tracing info signal
(when, where, etc.)

checking

Leaked out

Recording

Meeting voice

meeting
Recorded file

extractor
III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection

Alarm!!
IV. Prevention of Illegal Modification
Digital Security, Authentication & Copyright Protection

Semi-fragile watermark – Picaso Info, EwahTron, Multivia etc.
Fragile Watermarking: broken when modified, but robust to conversion.
Applied to DVR (Surveillance System) to collect digital evidence

Fragile & Robust Watermarking:
Info. For Integrity Test, Location Info, Time Info.

Surveillance System
Camera

DVR

-Compression
-Realtime
Watermarking

Storage

Original
Material

Malicious
Tamper

Tampered
Material

Integrity Verification:

Court
Detector

-Watermark Detector
-Tamper Proofing/Detect Frouds

: Normal
: Illegal
III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection

Semi-Fragile Watermarking
Generate signature from original contents and then verify illegal modification for fame-unit, slice unit, block unit.

Watermark embedded
원영상
photo

Modified photo
위변조된 영상

Identify
위변조 검출
modified parts

More Related Content

Similar to [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia filesApurva Vyas
 
Presentation Deck Dec.pdf
Presentation Deck Dec.pdfPresentation Deck Dec.pdf
Presentation Deck Dec.pdfPaolo Costanzo
 
Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)PasocoPteLtd
 
Digital Right Management
Digital Right ManagementDigital Right Management
Digital Right ManagementOmkar Tembe
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
Case study about voip
Case study about voipCase study about voip
Case study about voipelmudthir
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
Can DRM achieve its security goals?
Can DRM achieve its security goals?Can DRM achieve its security goals?
Can DRM achieve its security goals?blogzilla
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518IJRAT
 
An Introduction to castLabs
An Introduction to castLabs An Introduction to castLabs
An Introduction to castLabs JamesHynard1
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...wajug
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiSTO STRATEGY
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon Berlin
 

Similar to [InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology (20)

digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia files
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
Presentation Deck Dec.pdf
Presentation Deck Dec.pdfPresentation Deck Dec.pdf
Presentation Deck Dec.pdf
 
Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)
 
Digital Right Management
Digital Right ManagementDigital Right Management
Digital Right Management
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
sym
symsym
sym
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Securing your Video Conferences: How to Minimize Risks of Hacking
Securing your Video Conferences: How to Minimize Risks of HackingSecuring your Video Conferences: How to Minimize Risks of Hacking
Securing your Video Conferences: How to Minimize Risks of Hacking
 
DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Can DRM achieve its security goals?
Can DRM achieve its security goals?Can DRM achieve its security goals?
Can DRM achieve its security goals?
 
What is DRM?
What is DRM? What is DRM?
What is DRM?
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 
An Introduction to castLabs
An Introduction to castLabs An Introduction to castLabs
An Introduction to castLabs
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
 

More from Segitiga.Net

Presentasi Plenary Studi dan Perencanaan Pengembangan Ekonomi Kreatif Indones...
Presentasi Plenary Studi dan Perencanaan Pengembangan Ekonomi Kreatif Indones...Presentasi Plenary Studi dan Perencanaan Pengembangan Ekonomi Kreatif Indones...
Presentasi Plenary Studi dan Perencanaan Pengembangan Ekonomi Kreatif Indones...Segitiga.Net
 
Daus Gonia: Imaji dan Nasi [Prototype Day]
Daus Gonia: Imaji dan Nasi [Prototype Day]Daus Gonia: Imaji dan Nasi [Prototype Day]
Daus Gonia: Imaji dan Nasi [Prototype Day]Segitiga.Net
 
[InDMF 2013] Lolly Amalia Abdullah - Empowering Society through Digital Media
[InDMF 2013] Lolly Amalia Abdullah - Empowering Society through Digital Media[InDMF 2013] Lolly Amalia Abdullah - Empowering Society through Digital Media
[InDMF 2013] Lolly Amalia Abdullah - Empowering Society through Digital MediaSegitiga.Net
 
[InDMF 2013] Asril F. Syamas - Peran Inkubator Wirausaha dalam Ekosistem Indu...
[InDMF 2013] Asril F. Syamas - Peran Inkubator Wirausaha dalam Ekosistem Indu...[InDMF 2013] Asril F. Syamas - Peran Inkubator Wirausaha dalam Ekosistem Indu...
[InDMF 2013] Asril F. Syamas - Peran Inkubator Wirausaha dalam Ekosistem Indu...Segitiga.Net
 
[InDMF 2013] Indra Purnama - Incubator Role in Startup Industry
[InDMF 2013] Indra Purnama - Incubator Role in Startup Industry[InDMF 2013] Indra Purnama - Incubator Role in Startup Industry
[InDMF 2013] Indra Purnama - Incubator Role in Startup IndustrySegitiga.Net
 
[InDMF 2013] Arief Widhiyasa - Asosiasi Game Indonesia
[InDMF 2013] Arief Widhiyasa - Asosiasi Game Indonesia[InDMF 2013] Arief Widhiyasa - Asosiasi Game Indonesia
[InDMF 2013] Arief Widhiyasa - Asosiasi Game IndonesiaSegitiga.Net
 
[InDMF 2013] Sweta Kartika - Membangun Industri Kreatif Indonesia Berbasis IP
[InDMF 2013] Sweta Kartika - Membangun Industri Kreatif Indonesia Berbasis IP[InDMF 2013] Sweta Kartika - Membangun Industri Kreatif Indonesia Berbasis IP
[InDMF 2013] Sweta Kartika - Membangun Industri Kreatif Indonesia Berbasis IPSegitiga.Net
 
BlackBerry Jam Asia 2013 - Take Your Apps and Games Social with BBM and Score...
BlackBerry Jam Asia 2013 - Take Your Apps and Games Social with BBM and Score...BlackBerry Jam Asia 2013 - Take Your Apps and Games Social with BBM and Score...
BlackBerry Jam Asia 2013 - Take Your Apps and Games Social with BBM and Score...Segitiga.Net
 
BlackBerry Jam Asia 2013 - Gaming on BlackBerry
BlackBerry Jam Asia 2013 - Gaming on BlackBerryBlackBerry Jam Asia 2013 - Gaming on BlackBerry
BlackBerry Jam Asia 2013 - Gaming on BlackBerrySegitiga.Net
 
Dicky Sukmana: Create Online Campaign [Prototype Day #7]
Dicky Sukmana: Create Online Campaign [Prototype Day #7]Dicky Sukmana: Create Online Campaign [Prototype Day #7]
Dicky Sukmana: Create Online Campaign [Prototype Day #7]Segitiga.Net
 
Laporan Acara Gamechanics Talk
Laporan Acara Gamechanics TalkLaporan Acara Gamechanics Talk
Laporan Acara Gamechanics TalkSegitiga.Net
 
Gamechanics Talk - Joddy Hernady
Gamechanics Talk - Joddy HernadyGamechanics Talk - Joddy Hernady
Gamechanics Talk - Joddy HernadySegitiga.Net
 
Gamechanics Talk - Indrawan Nugroho
Gamechanics Talk - Indrawan NugrohoGamechanics Talk - Indrawan Nugroho
Gamechanics Talk - Indrawan NugrohoSegitiga.Net
 
Gamechanics Talk - Abang Edwin Syarif Agustin
Gamechanics Talk - Abang Edwin Syarif AgustinGamechanics Talk - Abang Edwin Syarif Agustin
Gamechanics Talk - Abang Edwin Syarif AgustinSegitiga.Net
 
Gamechanics Talk - Cahyana Ahmadjayadi
Gamechanics Talk - Cahyana AhmadjayadiGamechanics Talk - Cahyana Ahmadjayadi
Gamechanics Talk - Cahyana AhmadjayadiSegitiga.Net
 
Gamechanics Talk - Lolly Amalia Abdullah
Gamechanics Talk - Lolly Amalia AbdullahGamechanics Talk - Lolly Amalia Abdullah
Gamechanics Talk - Lolly Amalia AbdullahSegitiga.Net
 
Gamechanics Talk - Eko Nugroho
Gamechanics Talk - Eko NugrohoGamechanics Talk - Eko Nugroho
Gamechanics Talk - Eko NugrohoSegitiga.Net
 
20th Anniversary AON Indonesia
20th Anniversary AON Indonesia20th Anniversary AON Indonesia
20th Anniversary AON IndonesiaSegitiga.Net
 
Board Game Session: Open House Goethe
Board Game Session: Open House GoetheBoard Game Session: Open House Goethe
Board Game Session: Open House GoetheSegitiga.Net
 

More from Segitiga.Net (19)

Presentasi Plenary Studi dan Perencanaan Pengembangan Ekonomi Kreatif Indones...
Presentasi Plenary Studi dan Perencanaan Pengembangan Ekonomi Kreatif Indones...Presentasi Plenary Studi dan Perencanaan Pengembangan Ekonomi Kreatif Indones...
Presentasi Plenary Studi dan Perencanaan Pengembangan Ekonomi Kreatif Indones...
 
Daus Gonia: Imaji dan Nasi [Prototype Day]
Daus Gonia: Imaji dan Nasi [Prototype Day]Daus Gonia: Imaji dan Nasi [Prototype Day]
Daus Gonia: Imaji dan Nasi [Prototype Day]
 
[InDMF 2013] Lolly Amalia Abdullah - Empowering Society through Digital Media
[InDMF 2013] Lolly Amalia Abdullah - Empowering Society through Digital Media[InDMF 2013] Lolly Amalia Abdullah - Empowering Society through Digital Media
[InDMF 2013] Lolly Amalia Abdullah - Empowering Society through Digital Media
 
[InDMF 2013] Asril F. Syamas - Peran Inkubator Wirausaha dalam Ekosistem Indu...
[InDMF 2013] Asril F. Syamas - Peran Inkubator Wirausaha dalam Ekosistem Indu...[InDMF 2013] Asril F. Syamas - Peran Inkubator Wirausaha dalam Ekosistem Indu...
[InDMF 2013] Asril F. Syamas - Peran Inkubator Wirausaha dalam Ekosistem Indu...
 
[InDMF 2013] Indra Purnama - Incubator Role in Startup Industry
[InDMF 2013] Indra Purnama - Incubator Role in Startup Industry[InDMF 2013] Indra Purnama - Incubator Role in Startup Industry
[InDMF 2013] Indra Purnama - Incubator Role in Startup Industry
 
[InDMF 2013] Arief Widhiyasa - Asosiasi Game Indonesia
[InDMF 2013] Arief Widhiyasa - Asosiasi Game Indonesia[InDMF 2013] Arief Widhiyasa - Asosiasi Game Indonesia
[InDMF 2013] Arief Widhiyasa - Asosiasi Game Indonesia
 
[InDMF 2013] Sweta Kartika - Membangun Industri Kreatif Indonesia Berbasis IP
[InDMF 2013] Sweta Kartika - Membangun Industri Kreatif Indonesia Berbasis IP[InDMF 2013] Sweta Kartika - Membangun Industri Kreatif Indonesia Berbasis IP
[InDMF 2013] Sweta Kartika - Membangun Industri Kreatif Indonesia Berbasis IP
 
BlackBerry Jam Asia 2013 - Take Your Apps and Games Social with BBM and Score...
BlackBerry Jam Asia 2013 - Take Your Apps and Games Social with BBM and Score...BlackBerry Jam Asia 2013 - Take Your Apps and Games Social with BBM and Score...
BlackBerry Jam Asia 2013 - Take Your Apps and Games Social with BBM and Score...
 
BlackBerry Jam Asia 2013 - Gaming on BlackBerry
BlackBerry Jam Asia 2013 - Gaming on BlackBerryBlackBerry Jam Asia 2013 - Gaming on BlackBerry
BlackBerry Jam Asia 2013 - Gaming on BlackBerry
 
Dicky Sukmana: Create Online Campaign [Prototype Day #7]
Dicky Sukmana: Create Online Campaign [Prototype Day #7]Dicky Sukmana: Create Online Campaign [Prototype Day #7]
Dicky Sukmana: Create Online Campaign [Prototype Day #7]
 
Laporan Acara Gamechanics Talk
Laporan Acara Gamechanics TalkLaporan Acara Gamechanics Talk
Laporan Acara Gamechanics Talk
 
Gamechanics Talk - Joddy Hernady
Gamechanics Talk - Joddy HernadyGamechanics Talk - Joddy Hernady
Gamechanics Talk - Joddy Hernady
 
Gamechanics Talk - Indrawan Nugroho
Gamechanics Talk - Indrawan NugrohoGamechanics Talk - Indrawan Nugroho
Gamechanics Talk - Indrawan Nugroho
 
Gamechanics Talk - Abang Edwin Syarif Agustin
Gamechanics Talk - Abang Edwin Syarif AgustinGamechanics Talk - Abang Edwin Syarif Agustin
Gamechanics Talk - Abang Edwin Syarif Agustin
 
Gamechanics Talk - Cahyana Ahmadjayadi
Gamechanics Talk - Cahyana AhmadjayadiGamechanics Talk - Cahyana Ahmadjayadi
Gamechanics Talk - Cahyana Ahmadjayadi
 
Gamechanics Talk - Lolly Amalia Abdullah
Gamechanics Talk - Lolly Amalia AbdullahGamechanics Talk - Lolly Amalia Abdullah
Gamechanics Talk - Lolly Amalia Abdullah
 
Gamechanics Talk - Eko Nugroho
Gamechanics Talk - Eko NugrohoGamechanics Talk - Eko Nugroho
Gamechanics Talk - Eko Nugroho
 
20th Anniversary AON Indonesia
20th Anniversary AON Indonesia20th Anniversary AON Indonesia
20th Anniversary AON Indonesia
 
Board Game Session: Open House Goethe
Board Game Session: Open House GoetheBoard Game Session: Open House Goethe
Board Game Session: Open House Goethe
 

Recently uploaded

PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 

Recently uploaded (20)

PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 

[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology

  • 1. Digital Security, Authentication & Copyright Protection Evolution of Copyright Protection Technology John CHOI (Professor, STEI) Nov 25 2013
  • 2. Digital Security, Authentication & Copyright Protection Agenda 1 From DRM to Watermarking Watermarking for Copyright Protection 2 3 Other Applications of Watermarking 2
  • 3. I. DRM: prevention technology Digital Security, Authentication & Copyright Protection DRM: based on encryption and access control User C Payment Print Server Save Networks Copy User A Screen Capture Encryption and Access Control User B Use(Play, V iewing, etc. )
  • 4. I. DRM: prevention technology Digital Security, Authentication & Copyright Protection Enterprise DRM: extend Content DRM to Enterprise Access Control based on POSITION, Department, Job assigned.
  • 5. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection 1) Image Watermarking 5
  • 6. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection Click the [Open Image] File Dialog pops up for file selection MAIM supports various file format : BMP, JPG, PNG, GIF, TIFF MAIM special version supports satellite image, JBIG, G4FAX format Select the file  Click [Open] Markany 00009440.jpg + **************** Select Key Embedding and change Intensity. If you select hilevel, Watermark is very strong but some noise added  Type Watermark Key Click [Run] for embedding Click [Save] for saving the watermarked Image If you click the image pane, original size image appears Original Image 6 Watermarked Image
  • 7. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection Robustness Data amount embedded 1 Filtering (LPF, HPF, Median, Mean, etc) O 2 Cropping O 3 Translation O 4 Added noise O 5 Compression Attacks : JPEG, JPEG2000 O -90o ~ 90o (Support 360o 6 Rotation : ) 7 Scaling : 50 % ~ 200 % Format Convert : JPEG, TIFF, BMP, etc O 256 x 256 pixel Data capacity 48 bits(Extendable) Detection probability per WMS(1) > 90% False positive probability per WMS < 10-5 (Extendable) Error-free payload probability per WMS > 1 - 10-5 speed O 8 Watermark Minimum Segment (WMS) O Environments Embedding 40 msec Intel® CPU i5-2430M 2.40GHz, 4 GB RAM Extracting < image> Processing time 350 msec Windows 7 SP1, 1024 x 1024 resolution Watermark info watermark embedder Secret key Original Image (512x512 pixels, Color) < watermarked image >
  • 8. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection 8
  • 9. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection Select [Key Mark] radio button  Click [Original Audio] Select the original audio file  Click [Open] Click the play button to listen Type the watermark key Click the [Run] for watermark embedding Embedding File : TEST3.WAV Click the play button to listen to the watermarked audio file Click the [Save] for saving the watermarked file Type filename  Click [Save] 9 Markany1
  • 10. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection 2. 오디오워터마킹 스펙 – MAO™ v3.5 robustness Amount embedded speed Original Audio Watermarked Audio
  • 11. I. watermark: tracing technology Digital Security, Authentication & Copyright Protection 3) Video Watermarking -MAVI™ v3.5 robustness 삽입정보량 처리속도 < image> Watermark info watermark embedder Secret key < watermarked image >
  • 12. Digital Security, Authentication & Copyright Protection Agenda 1 From DRM to Watermarking 2 3 Watermarking for Copyright Protection Other Applications of Watermarking 12
  • 13. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 1) Copyright Protection – MBC, EBS, KERIS, Kwangwon Province, etc WM Embedding Sys. 1 UCI UCI Meta Data Transfer WM Embedding UCI generation/ registration Transcoder /Encoder Transfer Manager Content Conversion UCI UCI based Mobile Service Content Transfer Digital Content Distribution (Contents Gateway) UCI based distribution Info UCI based Integrated Distribution MGT Web service UCI 2 UCI based content Integrated Distribution Service System
  • 14. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 1) Pre-release It took 2 months from first report (2009.7.17) to capture (2009.9.17) Illegally distributed at 160 web hard sites Business Loss 18 million USD + social cost
  • 15. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 1) Embed user info and distribute to pre-release organization • police report: “movie of „Chun Woo Chi‟ is illegally distributed in web hard site (2010.3.16) •Universal Music (UMI), SONY/BMG, Warner Brothers, EMI in Hollywood (Audio WM) •A Studio in Hollywood in testing Video WM Leakage site was identified in 2 hours after report
  • 16. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 2. IPTV/CATV - KT OllehTV, SKB Btv Illegal copy and distribution from user device (STB) : Analog Hall TV User Network Content Delivery External Output CAS/DRM On-line Service Platform (IPTV / VoD) distribution chance: security hall  It is possible to obtain High Quality Content through Analog Hole Illegal Distribution Channel  In content service process, exists illegal Analog Hole C C Camcording SD quality C C Capture Device: Component, Composite, S-VHS Illegal User – NTSC Signal Capturing SD quality C C TV Encoder: VGA, SVHS Illegal User – Analog Signal Capturing SD급 품질 (고품질)
  • 17. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 2. IPTV/CATV– KT OllehTV, SKB Btv When service provider sends contents, automatically embeds user info into the contents Illegal Copy Found User “A” compromised Watermark Detector Owner Illegal Distribution from “A” A < Illegal User > Front-End Service System < User “A” or STB “A” Domain > A Fingerprinting Control Unit Video Decoder CA/DRM De-Packager Video Watermarking Audio Decoder UniCast Audio Watermarking Splitter < User “B” or STB “B” Domain > Video Decoder Audio Watermarking Splitter < User “C” or PC “C” Domain > Fingerprinting Control Unit Download Service Video Decoder IP Network Video Watermarking Audio Decoder CA/DRM De-Packager Legal Copy Video Watermarking Audio Decoder CA/DRM De-Packager Back-End System B Fingerprinting Control Unit MultiCast Legal Copy Audio Watermarking Splitter C Legal Copy
  • 18. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 3.Digital Cinema Tracing – Forensic watermarking ETM DCP Storage Auditorium 1 ETM + ITM (Security Network) SMS Media SPB 2 Security Manager (A) SPB 1 Media Decryption ETM ETM Plain Text Media Decoding Project Forensic Marking Integrated Projection System TMS ETM ETM + ITM (Security Network) SMS Auditorium 2 Theater Network Security Manager (B) SPB 1 Media Decryption Media Decoding Forensic Marking Image Media Block Link Encryption Projection System
  • 19. II. Watermarking for Copyright Protection Digital Security, Authentication & Copyright Protection 4. OTT Service Tracing– Irdeto(ND), MSI(USA), Korea Movie Promotion Two ways of embedding: (1)real-time embedding at service platform (2) embed user info at user terminal when downloaded Service system Content Delivery System Digital Rights Management System PC / User Player VOD/스트리밍 서비스 Device / exclusive Player Illegal distribution channel Device based FM system Legacy System User & Device Management System Platform based FM systems Content Management System User terminal (device) Web ahrd 불법 유출 P2P Portal site monitoring FM Tracker Refer tracking info 2. Service based FM 1. Device based FM
  • 20. II. Diversified Copyright Protection Technologies Digital Security, Authentication & Copyright Protection Recent trends: many more technologies are applied  (1) Fingerprinting:  Automatic Content Recognition technology  Recognize using pattern matching (extraction of prespecified signal patterns and search Database)  Accuracy lower, Gracenote leads the market  (2) SINBAD:  Search the internet for non-authorized books and displays developed by Flemish book publishers  Webcrawler
  • 21. Digital Security, Authentication & Copyright Protection Agenda 1 From DRM to Watermarking 2 3 Watermarking for Copyright Protection Other Applications of Watermarking 21
  • 22. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection Tracing Technology Micro Devices Prevention Technology Smart phones Lap-top-computer Desk-top-computer Evolution of Internal Security Technology time
  • 23. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection  Multi screen: desktop, tablet, smart phone, smart TV, automobile, refrigerator, etc..  Smartphone becomes a security headache  New devices: Google “Glass” computer, iWatch  Micro Devices: Ball Pen camcoder, USB camcode N-Screen Mobile Office Micro Devices
  • 24. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection Wholesale - Discreet OL Glasses Digital Video Recorder with 8G Memory Built-in, Digital Voice Recorder, Hidden C
  • 25. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection Tracing : audio watermarking technology extracting tracing info (when, where, etc.) < security area – confidential meeting > Tracing info generator Tracing info signal (when, where, etc.) checking Leaked out Recording Meeting voice meeting Recorded file extractor
  • 26. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection Alarm!!
  • 27. IV. Prevention of Illegal Modification Digital Security, Authentication & Copyright Protection Semi-fragile watermark – Picaso Info, EwahTron, Multivia etc. Fragile Watermarking: broken when modified, but robust to conversion. Applied to DVR (Surveillance System) to collect digital evidence Fragile & Robust Watermarking: Info. For Integrity Test, Location Info, Time Info. Surveillance System Camera DVR -Compression -Realtime Watermarking Storage Original Material Malicious Tamper Tampered Material Integrity Verification: Court Detector -Watermark Detector -Tamper Proofing/Detect Frouds : Normal : Illegal
  • 28. III. Watermarking for Cyber Security Digital Security, Authentication & Copyright Protection Semi-Fragile Watermarking Generate signature from original contents and then verify illegal modification for fame-unit, slice unit, block unit. Watermark embedded 원영상 photo Modified photo 위변조된 영상 Identify 위변조 검출 modified parts

Editor's Notes

  1. 30여개 업체들이 영화완성을 위해 협업