22
ICEC 2002 ICEC 2002 A Watermarking A Watermarking Infrastructure for Infrastructure for Digital Rights Digital Rights Protection Protection Presenter Presenter S.C. Cheung S.C. Cheung scc scc @ @ cs cs . . ust ust . . hk hk Department of Computer Science Department of Computer Science Hong Kong University of Science and Hong Kong University of Science and Technology Technology Co-authors Co-authors Hanif Curreem Hanif Curreem [email protected] [email protected] Dickson K.W. Chiu Dickson K.W. Chiu [email protected] [email protected]

ICEC 2002 A Watermarking Infrastructure for Digital Rights Protection Presenter S.C. Cheung [email protected] [email protected] Department of Computer Science

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

ICEC 2002ICEC 2002A Watermarking Infrastructure for A Watermarking Infrastructure for

Digital Rights ProtectionDigital Rights Protection

Presenter Presenter S.C. Cheung S.C. Cheung sccscc@@cscs..ustust..hkhk

Department of Computer ScienceDepartment of Computer ScienceHong Kong University of Science and TechnologyHong Kong University of Science and Technology

Co-authors Co-authors Hanif Curreem Hanif Curreem [email protected]@cs.ust.hk

Dickson K.W. Chiu Dickson K.W. Chiu [email protected]@cse.cuhk.hk

22ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

OutlineOutline

Watermarking InfrastructureWatermarking Infrastructure

Research IssuesResearch Issues

Three Phases of Watermarking ProtocolThree Phases of Watermarking Protocol Watermark AcquisitionWatermark Acquisition Purchase TransactionsPurchase Transactions Dispute ResolutionDispute Resolution

Watermarking Protocol Meeting ebXMLWatermarking Protocol Meeting ebXML

Conclusion & Future WorkConclusion & Future Work

33ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

IntroductionIntroduction

Digital rights enforcement has drawn much attention Digital rights enforcement has drawn much attention latelylately Billions of dollars are lost annuallyBillions of dollars are lost annually P2P applications promote unauthorized copyingP2P applications promote unauthorized copying

Why?Why? Digital contents are easy to duplicate without loss Digital contents are easy to duplicate without loss

in qualityin quality Availability of powerful compression techniques Availability of powerful compression techniques

that can reduce file size effectively (MP3, DivX)that can reduce file size effectively (MP3, DivX)

44ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Introduction (con’t)Introduction (con’t)

Two copyrights protection approaches:Two copyrights protection approaches: CryptographyCryptography

Transform digital contents into unperceivable formatTransform digital contents into unperceivable format

Provides effective access controlProvides effective access control

Decrypted content is vulnerable to recordingDecrypted content is vulnerable to recording Digital WatermarkingDigital Watermarking

Hide the copyright control information into digital Hide the copyright control information into digital content by modification the content itselfcontent by modification the content itself

Watermarks are difficult to be removed from contents Watermarks are difficult to be removed from contents without the knowledge of the insertion key. without the knowledge of the insertion key.

55ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Introduction (con’t)Introduction (con’t)

Application of digital watermarking to Application of digital watermarking to manage digital rights in order to:manage digital rights in order to:

Identify and claim the copyrights ownershipIdentify and claim the copyrights ownership

Identify the origin of illegal distribution Identify the origin of illegal distribution

66ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Digital Watermarking is originated from Steganography

77ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Digital WatermarkingDigital Watermarkinginsertion detection

88ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Watermarking InfrastructureWatermarking Infrastructure

PurchaseTransaction

Request and generate

watermark certificate

Buyer

WatermarkCertification

Authority

Get watermarkedcontents

Merchant Content Provider

Submit evidence of digital rights violation

Judge

99ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Research Issues in Watermarking ProtocolResearch Issues in Watermarking Protocol

PhasesPhases IssuesIssues

Watermark acquisitionWatermark acquisition - Secrecy of watermarks- Secrecy of watermarks

Purchase transactionsPurchase transactions - Buyers cannot be trustedBuyers cannot be trusted- Merchants cannot be trustedMerchants cannot be trusted

Dispute resolutionDispute resolution - Buyers cannot be trustedBuyers cannot be trusted- Merchants cannot be trustedMerchants cannot be trusted- Judge cannot be trustedJudge cannot be trusted

1010ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

ProblemProblem

Identify the origin of illegal distributionIdentify the origin of illegal distribution Buyer of the origin is liableBuyer of the origin is liable Buyer watermark are analogous to a Buyer watermark are analogous to a

private keyprivate key Could we protect buyer’s watermark in a Could we protect buyer’s watermark in a

purchase transaction to prevent merchants purchase transaction to prevent merchants and content distributors from abusing the and content distributors from abusing the watermark?watermark?

1111ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Solution SketchSolution Sketch

Buyers need not release their watermarksBuyers need not release their watermarks

Instead, buyers release an encrypted version Instead, buyers release an encrypted version of their watermarksof their watermarks

So, how does a merchant or content So, how does a merchant or content distributor validate an encrypted watermark?distributor validate an encrypted watermark?

Trusted Watermark Certification AuthorityTrusted Watermark Certification Authority

Use watermark certificate to protect the Use watermark certificate to protect the integrity of encrypted watermarkintegrity of encrypted watermark

1212ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Enhanced Watermarking InfrastructureEnhanced Watermarking Infrastructure

PurchaseTransaction

Request and generate

watermark certificate

Buyer

WatermarkCertification

Authority

Get watermarkedcontents

Merchant Content Provider

Submit evidence of digital rights violation

Judge

1313ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Data Structure of Watermark CertificateData Structure of Watermark Certificate

Watermark Certificate Response

Watermark Certificate (WCertB)

Watermark(W)

EncryptedWatermark

EKB(W)

Watermark Certificate

Request

PKI Certificate (CertB)

Public Key (KB)

Buyer1

1

1

1

1 1

1

1

Watermark Certification

Authority

1

generated by1 *

refers to refers to

refers to

Sign(WCertB)

encrypt

1

aggregation binary association

ternary associationproduces

1414ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

apply for watermark certificate

Watermark Certificate

Requestgenerate watermark

Watermark Certificate

WCertB

obtain PKI certificate

store certificate

BuyerWatermark Certification

Authority

Watermark AcquisitionWatermark Acquisition

1515ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

forward certificateWatermark Certificate

WCertB

decrypt contents

Encrypted Watermarked Contents EKB(X’ σW)

place order

Buyer Merchant Content ProviderWatermark Certificate

WCertB

verify

generate transaction identifier (V)

update license database with V

encrypt contents

insert encrypted watermark

EncryptedContents EKB(X’)

deliver contents

Decrypted Watermarked

Contents(X’ σW)

Encrypted Watermarked

Contents EKB(X’ σW)

permutate watermark

Permutated Watermark

EKB(σW)

Purchase TransactionPurchase Transaction

1616ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Dispute ResolutionDispute Resolution

encrypt X” by EKB

Evidence Response

(σ, WCertB)

discover a suspected content (X”)

Law Enforcer / Judge Content Provider

retrieve the transaction identifier (V) from X”

lookup permutation function σ and watermark certificate (WCertB) from database

send evidence σ & WCertB

Encrypted DocumentEKB(X”)

data objects

activities

Evidence Request (X”)

submit X”

retrieve public key EKB retrieve encrypted

watermark EKB(W)

apply permutationfunction σ

Permutated Encrypted Watermark

EKB(σW)

detect existence of EKB(σW) in EKB(X”)

[no]

X” originates from theend user of WCertB

[yes]

1717ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Watermarking Protocol Meeting ebXMLWatermarking Protocol Meeting ebXML

1818ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

ConclusionConclusionWe have proposed a watermarking We have proposed a watermarking protocol infrastructure thatprotocol infrastructure that supports three common roles in B2C e-supports three common roles in B2C e-

commerce model: customers, merchants and commerce model: customers, merchants and content providers;content providers;

does not require trusts on these parties in the does not require trusts on these parties in the protection of watermarks; protection of watermarks;

assumes a trusted watermark certification assumes a trusted watermark certification authority and the use of watermark certificatesauthority and the use of watermark certificates

1919ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Future WorkFuture WorkStudy the effectiveness of our protocol with respect Study the effectiveness of our protocol with respect to various watermarking schemesto various watermarking schemes

Adapt the techniques to digital contents in Adapt the techniques to digital contents in JPEG2000 formatJPEG2000 format

Study the integration of watermarking protocols and Study the integration of watermarking protocols and payment protocolspayment protocols

Studies are being carried out to apply watermarking Studies are being carried out to apply watermarking protocol for enterprise document management protocol for enterprise document management (preliminary results to appear in HICSS-36)(preliminary results to appear in HICSS-36)

Questions and AnswersQuestions and Answers

[email protected]@cs.ust.hk

[email protected]@cse.cuhk.hk

2121ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Supplementary Slides (Q&A)Supplementary Slides (Q&A)Permutation functionPermutation functionvoid permutefunc(VLONG wmark[], int size, int seed)void permutefunc(VLONG wmark[], int size, int seed){{

int i, index1, index2;int i, index1, index2;srand(seed);srand(seed);for (i=0; i < rand() % 100 + 50)for (i=0; i < rand() % 100 + 50) // min. 50 times, max 150 times// min. 50 times, max 150 times{{

VLONG tmp;VLONG tmp;index1=rand()%size;index1=rand()%size;index2=rand()%size;index2=rand()%size;// swap the two watermark coefficient// swap the two watermark coefficienttmp = wmark[index1];tmp = wmark[index1];wmark[index1]=wmark[index2];wmark[index1]=wmark[index2];wmark[index2]=tmp;wmark[index2]=tmp;

}}} }

2222ICEC2002 - sccICEC2002 - scc A Watermarking Infrastructure for DigitA Watermarking Infrastructure for Digital Rights Protectional Rights Protection

Supplementary Slides (Q&A)Supplementary Slides (Q&A)

Watermark generation and insertion Watermark generation and insertion Privacy homomorphismPrivacy homomorphism

If the watermark insertion operation is:If the watermark insertion operation is: XXW = { xW = { x11(1+αw(1+αw11), x), x22(1+αw(1+αw22),…, x),…, x10001000(1+αw(1+αw10001000)})}

Then we have,Then we have, (E(E((xx)) E E((yy)) mod n = )) mod n = EE((x x y y) )

Therefore we can insert watermark in the Therefore we can insert watermark in the encrypted domain:encrypted domain:

EEKBKB(X’(X’σ(W)) = Eσ(W)) = EKBKB(X’) (X’) σ(Eσ(EKBKB(W)) (W))