Top Banner
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI
23

Applying Digital Watermarking Technology to Control CD copying

Jan 23, 2016

Download

Documents

BERTHA GUZMAN

Applying Digital Watermarking Technology to Control CD copying. BY CHAYAN RATTANAVIJAI. Problem Descriptions. Software piracy Software industry lost billions of dollars each year Discourages individuals and businesses to create innovative software - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Applying Digital Watermarking Technology to Control CD copying

Applying Digital Watermarking Technology to Control CD

copyingBY

CHAYAN RATTANAVIJAI

Page 2: Applying Digital Watermarking Technology to Control CD copying

Problem Descriptions

• Software piracy

• Software industry lost billions of dollars each year

• Discourages individuals and businesses to create innovative software

• Discourages technology transfers between nations

Source:SIIA’s Report on Global Software Piracy 2000

Page 3: Applying Digital Watermarking Technology to Control CD copying

Motivations of pirates• Low cost of reproduction

• Price of CD writer is about $200• Price of CD-Duplicator is about $2000

• Easily access to tools• CD-R, CD-RW, CD-Duplicator

• Take short time• Take about 7 mins with speed of 8x CD-R to copy• Take less than 1 min to copy with CD-Duplicator

• Ineffective of intellectual property law• Not enough law enforcement

• High Demand

Page 4: Applying Digital Watermarking Technology to Control CD copying

Ordinary Pirates

• You make copies of a software to your three best friends

• Each of your best friends make copies of the software to his three best friends

Page 5: Applying Digital Watermarking Technology to Control CD copying

Exponential Growth of three

Exponential Growth (3^x)

0

200000

400000

600000

800000

1000000

1200000

1400000

1600000

1800000

1 2 3 4 5 6 7 8 9 10 11 12 13

Times

Un

its

Page 6: Applying Digital Watermarking Technology to Control CD copying

Objectives

• To review the components that are being built in to consumer devices

• To study how the components are working

• To study how to apply the components to software industry

Page 7: Applying Digital Watermarking Technology to Control CD copying

Goal

• To help reduce the number of software piracy

Page 8: Applying Digital Watermarking Technology to Control CD copying

Basic idea of Watermarking

Page 9: Applying Digital Watermarking Technology to Control CD copying

What is Digital Watermarking?

• A digital watermark is a piece of information embedded inside a digital object.

• It is either visible or invisible.

Page 10: Applying Digital Watermarking Technology to Control CD copying

Digital marks can be used to:

1. Identify the origin of the data or uniquely establish ownership

2. Identify the recipient of the data

3. Check integrity of the data

Page 11: Applying Digital Watermarking Technology to Control CD copying

Terminology

• Content Scrambling System (CSS) developed by Matsushita, a device requires a pair of keys, is used to descramble data.

• Secure Transmission System provides a mechanism for pair of compliant devices on a computer bus to exchange keys.

Page 12: Applying Digital Watermarking Technology to Control CD copying

Terminology (continues)

• Copy Generation Management System (CGMS) is simply a pair of bits in the header of data stream that encode one of three possible rules for copying: “copy-always”, “copy-never”, “copy-once”.

Page 13: Applying Digital Watermarking Technology to Control CD copying

Terminology (continues)

• Analog Protection System (APS) , developed by Macrovision, is a method of modifying NTSC signals so that they can be displayed on television, but cannot be recorded on VCR’s

Page 14: Applying Digital Watermarking Technology to Control CD copying

CD copy protection without watermarking

• Legal disks will be scrambled with CSS and can be played only on compliant devices. Bit-for-bit copies of these disks won’t be playable on any devices, because they won’t contain the descrambling keys. This in ensured by storing the keys on the lead-in area of the legal disk, which is only read by compliant drives.

Page 15: Applying Digital Watermarking Technology to Control CD copying

CD copy protection without watermarking

Page 16: Applying Digital Watermarking Technology to Control CD copying

Problem

1. CGMS in intended to prevent illegal copies, however a non compliant player may strip out these copy control bits from the header, leaving the data unprotected.

2. APS works only when the display device is a compliant. A pirate can simply route it into an appropriate non-compliant recorder and make an unencrypted copy. Such a copy would not contain the CGMS bits.

Page 17: Applying Digital Watermarking Technology to Control CD copying

CD copy protection with watermarking

• Record control takes over the job of CGMS. It works regardless of how the data reaches the compliant recorder, since the watermark that contains the CGMS data is never removed by normal processing.

Page 18: Applying Digital Watermarking Technology to Control CD copying

CD copy protection with watermarking

Page 19: Applying Digital Watermarking Technology to Control CD copying

Purpose of introducing watermarking into the system

• To improve the protection provided by CGMS by making the copy control information harder to remove

• To make unencrypted copies unplayable on compliant devices

Page 20: Applying Digital Watermarking Technology to Control CD copying

Facilities & Resources

• Need a laboratory

• Need experts to help implement the prototype

• Need the special hardware and technology

Page 21: Applying Digital Watermarking Technology to Control CD copying

Future implementation

• The watermark system requires enforcement to the device manufacturers to implement watermark detectors in their products

• Better encryption algorithm in the watermark (IBM-Data Hiding)

Page 22: Applying Digital Watermarking Technology to Control CD copying

Conclusion

• This research shows how to apply the watermarking to make it harder to reproduce the illegal software

• The experiment from the laboratory will give us the result.

• The prototype may be developed to help reduce the numbers of software piracy.

Page 23: Applying Digital Watermarking Technology to Control CD copying

THE END