Digital Watermarking: Rob Farraher Ken Pickering Lim Vu

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 18

Digital Watermarking

Rob Farraher Ken Pickering Lim Vu

Big Brother Industries

1984

Joe Wahoo decides to be a law abiding citizen and purchase music online from Big Brother Industries
Joe Wahoo

Big Brother Industries

1984

He purchases licenses to listen the mp3s he has downloaded He also owns the latest SDMI mp3 player

SDMI?

Secure Digital Music Initiative Who: Conglomerate of world-wide recording, consumer electronic, and information technology corporations Purpose: To design and implement a copyright protection scheme for music How: Digital Watermarking

MP3 Nirvana?

Joes friend, Dave, sends him a new NSync mp3 Joe loves the song and wants to listen to it on his new mp3 player But a slight problem arises

Rejection

Daves mp3 turns out to be watermarked only for his use Joes mp3 player rejects Daves NSync mp3 because it detects the mp3 watermark registered to Dave

Breakin the Law

Joe decides to hack and remove the watermark on Daves mp3 so his mp3 player will play the song He uses the attacks described in a research paper released by Princetons professor Felton

What Is Watermarking?

Digital information embedded within any digital media that can later be detected and extracted Characteristics

Perceptible or Imperceptible Robust or Fragile

Watermarking Applications

Applications include

Authentication and verification Fingerprinting Ownership Assertion Content labeling Usage Control

Authentication and Verification

Use of any type of watermark to authenticate files and digital media Verification allow users to download files in an insecure channel Similar to a cryptographic hash sent with a file but much more difficult for an attacker to forge and insert a correct watermark

Fingerprinting

Imperceptible watermarks used to label content for identification purposes If content is copied and improperly used, the watermark can be viewed and the source of the copying can be found If Joe Wahoo distributes music with his watermark embedded, any authority with the watermark directory can track him down

Ownership Assertion

A watermark can be placed in a music document to declare who owns/ produces the music This is basically used to remove the value of the data, in a lot of circumstances since it asserts it as the owners intellectual property or copyright

Content Labeling

Involves using watermarks to carry and deliver data on the media they are embedded within Uses within databases and search engines Advantage in that description of data is internally stored within file

Usage Control

A proposed use for watermarking could be to control accessing and copying music. The theory is that when a copy is made, some counter in the file is decremented. This requires a monopoly on copying.

Problems with Watermarking

Must not be audible and change little content of MP3 file Plain text to message will always be available Must be universally accepted by software developers that make encoding software and players

Plaintext/Ciphertext Attacks

The plaintext is always available for the MP3 file so, therefore, any attackers can see the additions the watermark makes (and remove them) Ease of removal is variable, depending on the algorithm used

Universal Acceptance

As long as users can rip MP3s without watermarks, piracy will always proliferate If the MP3 players and portable devices play unwatermarked MP3s, theres no point in having the system in place at all

Conclusion

Watermarking is useful in a lot of circumstances. Digital music isnt one of them. If someone wants to remove music watermarking, with all current algorithms, they will be able to. RIP Napster. Well miss you.

You might also like