ECAKP: Encrypt Collect Authenticate Kill Play
ECAKP: Encrypt Collect Authenticate Kill Play
4, November 2011
Abstract
We are taught from a young age that plagiarism (copying other's work) is wrong. However, the problem of Illegal copies of multimedia data is exacerbated by the widespread availability of circumvention devices, which enable people to make infringing copies of multimedia data. Recently, Joint Video Compression and Encryption (JVCE) has gained increased attention to reduce the computational complexity of video compression, as well as provide encryption of multimedia data. In this paper, a novel protection method for multimedia data (ECAKP) is proposed. It combines encryption process and compression with authenticating process. The method had been implemented and the results are discussed in detail.
Keywords
Multimedia encryption, authentication, protection, video, security.
1. INTRODUCTION
According to the Business Software Alliance about 35% of the global software market, worth $141 Billion, is counterfeit. Most of the counterfeit software is distributed in the form of a compact disc (CD) or a digital video disc (DVD) which is easily copied and sold in street corners all around the world but mostly in developing countries [1]. The current e-learning global market size is over $20 billion grown ten-fold since 2000 [2]. E-learning market is expected to surpass $52.6 billion by 2010. Online tutoring is a $4 billion industry and is growing at a rate of 10% 15% per annum. Today, Universities become producers of electronic contents such as copyrighted videos, CD-ROMs, websites and courseware [3]. Also, some multimedia data in politics, economics or militaries are necessary to be protected. In the past decade, some multimedia encryption algorithms have been reported. According to the relationship between encryption process and compression process, these algorithms can be classified into two types: the first one encrypts the compressed data completely or partially; the second one encrypts the data during compression [4].
The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.4, November 2011
and Green respectively). Thus, a one hour video at 30 frames per second will require 144 GB of space in hard disk and is impossible to transmit it over any practical communication channel. It is compressed to around 500- 600 MB by the use of MPEG-2 [5] compression format. Tseng, et al. [6] gave a good summary of recent advances in multimedia compression [7].
1.4 DRM
Short for digital rights management, a system for protecting the copyrights of data circulated via the Internet or other digital media by enabling secure distribution and/or disabling illegal distribution of the data. Typically, a DRM system protects intellectual property by either encrypting the data so that it can only be accessed by authorized users or marking the content with a digital watermark or similar method so that the content can not be freely distributed (http://www.webopedia.com/TERM/D/DRM.html).
The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.4, November 2011
which is sent to the user and read by the application each time it runs. These approaches have a number of disadvantages. Dongles require the distribution of the hardware, with all that entails in ber material cost, shipping cost, delivery times and management by the vendor. Product activation systems therefore meet the software vendors' need to protect against piracy, offer a range of against license models, and automate operations, but remove many of the inconveniences and costs of older license management systems [15].
2. PROPOSED ECAKP
The primary goals of ECAKP are to protect multimedia files from being copied illegally, and to do it with on-shelf tools available for most people. ECAKP has four phases; first it encrypts the shelf original multimedia data to unrecognized format and compresses it. At second phase, it collects some non personal data from the customer's computer set during his/her installation the program. Third phase is authentication one, in which, comparison between collected data and the list of authorized customers who purchased the original copies took place, then it decompresses the place, encrypted multimedia file. Final phase has two steps: (a) it kills recording program running on . programs the computer, (b) disconnects internet connection (science some portable programs can record the computer's screen, and therefore can get illegal copy). For notation see Table 1. Figure 1 shows efore copy) the processes of ECAKP .
The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.4, November 2011
2. U installs I on the PC, then I prompts the user to input IDM and the user's e-mail. 3.I invokes C , which uses a snapshot of the end customer's PC to create a system identity. Activation uniquely associates the software license with this system identity the license can only be unlocked on the system with the associated identity. This hardware fingerprinting is a sophisticated technique for tying an application to a specific computer. As a result, users who update their hardware or operating systems won't need to obtain a new activation code and re-activate their license.
: : ,
(2) (3)
4. I sends both program's ID and PC's ID from (2) through the following message to S.
5. At S, there are several pre-defined policies that can use to manage licenses. This is a per-product setting. Monitor only mode. In this mode S will not block any activation requests. It will simply log the requests and record the statistics. Massive fraud prevention only. This mode will only refuse to give the activation code after a fair amount of activations is made from different computers. Such registration number will then be marked as stolen and invalid. License terms enforcement fair use. In this mode S would only allow a fair number of complimentary activations per purchased copy. A fair use for a general purpose program would be single additional activation per copy (say, business & home, or stationary & laptop computers). Strict license terms enforcement. An activation code will be issued for a single PC only; re-activation will succeed on the same PC but fail on a different one. Then, S generates the license file and forwards it to I
(4)
6. I decrypts from (1) using to recover V(RE). Then I displays success or failure to U. In case of success U can play V,
(5)
The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.4, November 2011
FileStream source1 = File.OpenRead(Form1.CdPath + dataGridView1.SelectedRows[0].Cells[0].Value.ToString()); GZipStream gZip1 = new GZipStream(source1, CompressionMode.Decompress); FileStream Decompressed = new FileStream(Environment.GetFolderPath(Environment.SpecialFolder.System) + @"/Temp"+x,FileMode.Create); int b1 = gZip1.ReadByte(); while (b1 != -1) { Decompressed.WriteByte((byte)b1); b1 = gZip1.ReadByte(); } gZip1.Close(); Decompressed.Close(); source1.Close(); gZip1.Dispose(); Decompressed.Dispose(); source1.Dispose(); LessonPath = Environment.GetFolderPath(Environment.SpecialFolder.System) + @"/Temp"+x; Frm_Player frm = new Frm_Player(); frm.ShowDialog(); frm.Dispose(); File.Delete(LessonPath); x++;
7. I invokes K. To ensure multimedia contents will not be recorded during lunching the
software. K prevents the following programs to work during playing: Virtual CD programs Internet connection (except when activate the program) Video recording programs
The following code is used to list some processes that allowed running during playing the multimedia.
void ClosePrograms() {aa.Add("svchost"); aa.Add("lsass"); aa.Add("services"); aa.Add("winlogon"); aa.Add("csrss"); aa.Add("smss"); aa.Add("System"); aa.Add("notepad"); aa.Add("Idle"); aa.Add("spoolsv"); aa.Add("alg"); aa.Add("WINWORD"); aa.Add("AcroRd32"); aa.Add("explorer"); aa.Add("devenv"); aa.Add("sqlservr"); foreach (Process var in Process.GetProcesses()) {if (aa.Contains(var.ProcessName) == false) {if (var.ProcessName != Process.GetCurrentProcess().ProcessName) { try { var.Kill();} Catch {continue;}}}} Counter = Process.GetProcesses().Length;}
8. I plays D.
3. CASE STUDY
The programming language course at Faculty of Science, Helwan University is presented through one hour lectures and one hour lab per week for one semester. The lectures are conducted with the entire enrollment in a large lecture hall. Laboratory sections are divided into 18 groups of 30
23
The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.4, November 2011
students each. Attendance at the laboratory sections is highly recommended, but not required. This "open" laboratory policy permitted students to use their home computers for the required assignments, as well as the computers in the programming laboratory. The course is required for all second year students (total number of students is 540 students).
24
The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.4, November 2011
b) Cost benefit: science producing one protected CD is much cheaper than printing one textbook. c) Improve learning by providing video materials as well as text materials. d) Provokes university to continue to prioritize e-learning.
N Access course video materials Test out their knowledge and receive feedback using the quiz facility Time and place flexibility Access course materials prior to lectures Qualitatively different learning opportunities Locate other learning resources via links provided 172 46 35 12 11 6
4. CONCLUSION
For multimedia systems, users authentication is most essential in association with the access control of the multimedia system. At activation process over the Internet, additional data encryptions are also adopted in protection of the multimedia. In this paper, ECAKP is presented. According to ECAKP, the encryption scheme combined with compression process is not only practical but also secure by choosing a suitable encryption algorithm and activation over the internet. ECAKP deters software piracy and offers cost efficiency for producer avoiding the cost of providing users with expensive protection software or hardware tokens (as well as the token maintenance cost).Case study showed how ECAKP is effectively used to protect multimedia CD contents, and therefore, protect intellectual property of the author. ECAKP processes are simple, less cost than commercial encryption software (or even has no cost, if the beneficiary will implement it by himself). In the future work, selected parts of the multimedia data will only be encrypted during compression process to speed up the runtime decryption process.
ACKNOWLEDGMENTS
This study was supported by Quality System company (www.quality-sys.com). I would like to acknowledge the support of Mr. Abd Allah Abd El Aleem who helped in developing the various activities to create the CDs for this course.
REFERENCES
[1] Ghaith H., Aykutlu D. & Berk S (2009). CDs Have Fingerprints Too. Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, Switzerland, Pp.348 362, ISBN:978-3-642-04137-2. Jayanthi C., Reema Jose (2008), Investing in e-learning proves to be lucrative http://www.financialexpress.com/news/investing-in-elearning-proves-to-be-lucrative/314400/0
[2]
[3] Nisachol Channgern & Settapong Malisuwan, Proceedings of the Second International Conference on eLearning for Knowledge-Based Society, August 4-7, 2005, Bangkok, Thailand. 25
The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.4, November 2011 [4] Dengpan Ye & Shiguo Lian, (2009). "Novel encryption model for multimedia data", Journal of Systems Engineering and Electronics, Vol. 20, No. 5, pp. 1081-1085. [5] Barry G. Haskell, A. P. and Netravali, A. N. (1999). Digital Video: An Introduction to MPEG2.Springer. [6] Tseng, P., Chang, Y., Huang, Y., Fang, H., Huang, C., and Chen, L. (2005). Advances in Hardware Architectures for Image and Video Coding - A Survey. Proc. IEEE, 93(1):184197.
[7] Amit Pande (2010). Algorithms and architectures for secure embedded multimedia systems, PhD thesis, Iowa State University, Ames, Iowa. [8] Ci Wang, Hong-Bin Yu, and Meng Zheng (2003). A DCT-based MPEG-2 transparent scrambling algorithm," IEEE Transactions on Consumer Electronics, vol. 49, no.4, pp. 1208-1213. [9] Guo-Sheng Gu and Guo-Qiang Han (2006). "The Application of Chaos and DWT in Image Scrambling," in 2006 International Conference on Machine Learning and Cybernetics, pp. 37293733.
[10] Joan Daemen and Vincent Rijmen (2000). "The Block Cipher Rijndael," in Proceedings of the The International Conference on Smart Card Research and Applications: Springer-Verlag. [11] M. Grangetto, E. Magli, and G. Olmo (2006). "Multimedia Selective Encryption by Means of Randomized Arithmetic Coding," IEEE Transactions on Multimedia, vol. 8, no. 5, pp. 905-917. [12] Mohamed Amin and Ahmed A. Abd El-Latif (2010). "Efficient modified RC5 based on chaos adapted to image encryption," Journal of Electronic Imaging, vol. 19, no. 1, pp. 013012-10. [13] Rong-Jian Chen and Jui-Lin Lai (2007). "Image security system using recursive cellular automata substitution," Pattern Recognition, vol. 40, no. 5, pp. 1621-1631. [14] Yicong Zhou, (2010). Multimedia Security System for Security and Medical Applications, PhD thesis, TUFTS University. [15] http://www.articlesbase.com/programming-articles/why-product-activation-for-software-is-becomingwidespread-913435.html [16] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein (2001). Introduction to Algorithms, Second Edition. MIT Press and McGraw-Hill, ISBN 0-262-03293-7. Section 16.3, pp. 385392.
Author
Assistant Professor Mahmoud Mohamed El-Khouly received his BSc degree in Mathematics from Helwan University in 1983, his first Master Degree from the same University / Egypt (1994), his second Master Degree from Cairo University in computer sciences/ Egypt (1995), and his Doctorate of Philosophy from Saitama University in computer sciences/ Japan (2000). Assistant Professor El-Khouly helds different academic positions at Temple University Japan (TUJ) (2001). Lecturer in Helwan University (2001-2005). Visiting Professor at Qatar University (20032004). He acted as Cultural Attache' in Egyptian Embassy London (20052008). He is now working as assistant professor at Faculty of Computer and Information, Helwan University Egypt.
26