Cybersecurity Awareness Training Presentation v2024.03
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
1. Digital Security, Authentication & Copyright Protection
Evolution of Copyright Protection
Technology
John CHOI (Professor, STEI)
Nov 25 2013
2. Digital Security, Authentication & Copyright Protection
Agenda
1
From DRM to Watermarking
Watermarking for Copyright Protection
2
3
Other Applications of Watermarking
2
3. I. DRM: prevention technology
Digital Security, Authentication & Copyright Protection
DRM: based on encryption and access control
User C
Payment
Print
Server
Save
Networks
Copy
User A
Screen
Capture
Encryption and
Access Control
User B
Use(Play, V
iewing, etc.
)
4. I. DRM: prevention technology
Digital Security, Authentication & Copyright Protection
Enterprise DRM: extend Content DRM to Enterprise
Access Control based on POSITION, Department, Job assigned.
5. I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection
1) Image Watermarking
5
6. I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection
Click the [Open Image]
File Dialog pops up for file selection
MAIM supports various file format
: BMP, JPG, PNG, GIF, TIFF
MAIM special version supports
satellite image, JBIG, G4FAX format
Select the file Click [Open]
Markany
00009440.jpg + ****************
Select Key Embedding and change
Intensity. If you select hilevel, Watermark is very strong but
some noise added Type Watermark
Key
Click [Run] for embedding
Click [Save] for saving the watermarked Image
If you click the image pane, original size image
appears
Original Image
6
Watermarked Image
7. I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection
Robustness
Data amount embedded
1
Filtering (LPF, HPF, Median, Mean, etc)
O
2
Cropping
O
3
Translation
O
4
Added noise
O
5
Compression Attacks : JPEG,
JPEG2000
O
-90o
~
90o (Support
360o
6
Rotation :
)
7
Scaling : 50 % ~ 200 %
Format Convert : JPEG, TIFF, BMP, etc
O
256 x 256 pixel
Data capacity
48 bits(Extendable)
Detection probability per WMS(1)
> 90%
False positive probability per WMS
< 10-5 (Extendable)
Error-free payload probability per WMS
> 1 - 10-5
speed
O
8
Watermark Minimum Segment (WMS)
O
Environments
Embedding
40 msec
Intel® CPU i5-2430M 2.40GHz, 4 GB RAM
Extracting
< image>
Processing time
350 msec
Windows 7 SP1, 1024 x 1024 resolution
Watermark info
watermark
embedder
Secret key
Original Image (512x512 pixels, Color)
< watermarked image >
8. I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection
8
9. I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection
Select [Key Mark] radio button Click
[Original Audio]
Select the original audio file Click [Open]
Click the play button to listen
Type the watermark key
Click the [Run] for watermark embedding
Embedding File : TEST3.WAV
Click the play button to listen to the
watermarked audio file
Click the [Save] for saving the watermarked
file
Type filename Click [Save]
9
Markany1
10. I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection
2. 오디오워터마킹 스펙 – MAO™ v3.5
robustness
Amount embedded
speed
Original Audio
Watermarked Audio
11. I. watermark: tracing technology
Digital Security, Authentication & Copyright Protection
3) Video Watermarking -MAVI™ v3.5
robustness
삽입정보량
처리속도
< image>
Watermark info
watermark
embedder
Secret key
< watermarked image >
12. Digital Security, Authentication & Copyright Protection
Agenda
1
From DRM to Watermarking
2
3
Watermarking for Copyright Protection
Other Applications of Watermarking
12
13. II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection
1) Copyright Protection – MBC, EBS, KERIS, Kwangwon Province, etc
WM Embedding Sys.
1
UCI
UCI
Meta Data Transfer
WM Embedding
UCI generation/
registration
Transcoder
/Encoder
Transfer
Manager
Content
Conversion
UCI
UCI based
Mobile Service
Content Transfer
Digital Content Distribution
(Contents Gateway)
UCI based
distribution Info
UCI based
Integrated
Distribution MGT
Web service
UCI
2
UCI based content Integrated Distribution Service System
14. II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection
1) Pre-release
It took 2 months from first report (2009.7.17) to capture (2009.9.17)
Illegally distributed at 160 web hard sites
Business Loss 18 million USD + social cost
15. II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection
1) Embed user info and distribute to pre-release organization
• police report: “movie of „Chun Woo
Chi‟ is illegally distributed in web hard
site (2010.3.16)
•Universal Music (UMI), SONY/BMG,
Warner Brothers, EMI in Hollywood
(Audio WM)
•A Studio in Hollywood in testing
Video WM
Leakage site was identified in 2 hours after report
16. II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection
2. IPTV/CATV - KT OllehTV, SKB Btv
Illegal copy and distribution from user device (STB) : Analog Hall
TV
User Network
Content Delivery
External Output
CAS/DRM
On-line Service Platform
(IPTV / VoD)
distribution chance: security hall
It is possible to obtain High Quality Content
through Analog Hole
Illegal Distribution Channel
In content service process, exists illegal
Analog Hole
C
C
Camcording
SD quality
C
C
Capture Device: Component,
Composite, S-VHS
Illegal User –
NTSC Signal Capturing
SD quality
C
C
TV Encoder: VGA, SVHS
Illegal User –
Analog Signal Capturing
SD급 품질
(고품질)
17. II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection
2. IPTV/CATV– KT OllehTV, SKB Btv
When service provider sends contents, automatically embeds user info into the contents
Illegal Copy Found
User “A” compromised
Watermark
Detector
Owner
Illegal Distribution from “A”
A
< Illegal User >
Front-End
Service System
< User “A” or STB “A” Domain >
A
Fingerprinting Control Unit
Video
Decoder
CA/DRM
De-Packager
Video
Watermarking
Audio
Decoder
UniCast
Audio
Watermarking
Splitter
< User “B” or STB “B” Domain >
Video
Decoder
Audio
Watermarking
Splitter
< User “C” or PC “C” Domain >
Fingerprinting Control Unit
Download
Service
Video
Decoder
IP Network
Video
Watermarking
Audio
Decoder
CA/DRM
De-Packager
Legal
Copy
Video
Watermarking
Audio
Decoder
CA/DRM
De-Packager
Back-End
System
B
Fingerprinting Control Unit
MultiCast
Legal
Copy
Audio
Watermarking
Splitter
C
Legal
Copy
18. II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection
3.Digital Cinema Tracing – Forensic watermarking
ETM
DCP
Storage
Auditorium 1
ETM + ITM (Security Network)
SMS
Media
SPB 2
Security Manager (A)
SPB 1
Media
Decryption
ETM
ETM
Plain
Text
Media
Decoding
Project
Forensic
Marking
Integrated Projection System
TMS
ETM
ETM + ITM (Security Network)
SMS
Auditorium 2
Theater Network
Security Manager (B)
SPB 1
Media
Decryption
Media
Decoding
Forensic
Marking
Image Media Block
Link
Encryption
Projection System
19. II. Watermarking for Copyright Protection
Digital Security, Authentication & Copyright Protection
4. OTT Service Tracing– Irdeto(ND), MSI(USA), Korea Movie Promotion
Two ways of embedding: (1)real-time embedding at service platform (2) embed user info at user
terminal when downloaded
Service system
Content Delivery System
Digital Rights Management
System
PC /
User Player
VOD/스트리밍
서비스
Device /
exclusive Player
Illegal distribution channel
Device based FM system
Legacy System
User & Device Management
System
Platform based FM systems
Content Management
System
User terminal (device)
Web ahrd
불법 유출
P2P
Portal site
monitoring
FM Tracker
Refer tracking info
2. Service based FM
1. Device based FM
20. II. Diversified Copyright Protection Technologies
Digital Security, Authentication & Copyright Protection
Recent trends: many more technologies are applied
(1) Fingerprinting:
Automatic Content Recognition technology
Recognize using pattern matching (extraction of prespecified signal patterns and search Database)
Accuracy lower, Gracenote leads the market
(2) SINBAD:
Search the internet for non-authorized books and
displays developed by Flemish book publishers
Webcrawler
21. Digital Security, Authentication & Copyright Protection
Agenda
1
From DRM to Watermarking
2
3
Watermarking for Copyright Protection
Other Applications of Watermarking
21
22. III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection
Tracing Technology
Micro Devices
Prevention
Technology
Smart phones
Lap-top-computer
Desk-top-computer
Evolution of Internal Security Technology
time
23. III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection
Multi screen: desktop, tablet, smart phone, smart TV,
automobile, refrigerator, etc..
Smartphone becomes a security headache
New devices: Google “Glass” computer, iWatch
Micro Devices: Ball Pen camcoder, USB camcode
N-Screen
Mobile Office
Micro Devices
24. III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection
Wholesale - Discreet OL Glasses Digital
Video Recorder with 8G Memory Built-in,
Digital Voice Recorder, Hidden C
25. III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection
Tracing : audio watermarking technology
extracting tracing info
(when, where, etc.)
< security area – confidential meeting >
Tracing info
generator
Tracing info signal
(when, where, etc.)
checking
Leaked out
Recording
Meeting voice
meeting
Recorded file
extractor
26. III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection
Alarm!!
27. IV. Prevention of Illegal Modification
Digital Security, Authentication & Copyright Protection
Semi-fragile watermark – Picaso Info, EwahTron, Multivia etc.
Fragile Watermarking: broken when modified, but robust to conversion.
Applied to DVR (Surveillance System) to collect digital evidence
Fragile & Robust Watermarking:
Info. For Integrity Test, Location Info, Time Info.
Surveillance System
Camera
DVR
-Compression
-Realtime
Watermarking
Storage
Original
Material
Malicious
Tamper
Tampered
Material
Integrity Verification:
Court
Detector
-Watermark Detector
-Tamper Proofing/Detect Frouds
: Normal
: Illegal
28. III. Watermarking for Cyber Security
Digital Security, Authentication & Copyright Protection
Semi-Fragile Watermarking
Generate signature from original contents and then verify illegal modification for fame-unit, slice unit, block unit.
Watermark embedded
원영상
photo
Modified photo
위변조된 영상
Identify
위변조 검출
modified parts