A watermarking method that relies on informed coding and informed embedding is presented. Our method uses a subset of various codewords to represent the 0 and 1 message bits to be embedded. We propose a codeword generation scheme that keeps control of the distance between codewords in order to secure fidelity and robustness of the watermark. When compared to existing video watermarking schemes, our method yields superior robustness to video compression.
{"title":"A robust content-dependent algorithm for video watermarking","authors":"Lino Coria-Mendoza, P. Nasiopoulos, R. Ward","doi":"10.1145/1179509.1179528","DOIUrl":"https://doi.org/10.1145/1179509.1179528","url":null,"abstract":"A watermarking method that relies on informed coding and informed embedding is presented. Our method uses a subset of various codewords to represent the 0 and 1 message bits to be embedded. We propose a codeword generation scheme that keeps control of the distance between codewords in order to secure fidelity and robustness of the watermark. When compared to existing video watermarking schemes, our method yields superior robustness to video compression.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matias Madou, Bertrand Anckaert, B. D. Sutter, K. D. Bosschere
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual property violations, against which the software needs to be protected. The intellectual property that needs to be protected can take on different forms. The software might, e.g., consist itself of proprietary algorithms and datastructures or it could provide controlled access to copyrighted material. Therefore, in recent years, a number of techniques have been explored to protect software. Many of these techniques provide a reasonable level of security against static-only attacks. Many of them however fail to address the problem of dynamic or hybrid static-dynamic attacks. While this type of attack is already commonly used by black-hats, this is one of the first scientific papers to discuss the potential of these attacks through which an attacker can analyze, control and modify a program extensively. The concepts are illustrated through a case study of a recently proposed algorithm for software watermarking [6].
{"title":"Hybrid static-dynamic attacks against software protection mechanisms","authors":"Matias Madou, Bertrand Anckaert, B. D. Sutter, K. D. Bosschere","doi":"10.1145/1102546.1102560","DOIUrl":"https://doi.org/10.1145/1102546.1102560","url":null,"abstract":"Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual property violations, against which the software needs to be protected. The intellectual property that needs to be protected can take on different forms. The software might, e.g., consist itself of proprietary algorithms and datastructures or it could provide controlled access to copyrighted material. Therefore, in recent years, a number of techniques have been explored to protect software. Many of these techniques provide a reasonable level of security against static-only attacks. Many of them however fail to address the problem of dynamic or hybrid static-dynamic attacks. While this type of attack is already commonly used by black-hats, this is one of the first scientific papers to discuss the potential of these attacks through which an attacker can analyze, control and modify a program extensively. The concepts are illustrated through a case study of a recently proposed algorithm for software watermarking [6].","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133674059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Jackson, Supriya Singh, J. Beekhuyzen, Jenny Waycott
There is a mismatch between the law relating to fair use, personal use and copying; the central thrust of Digital Rights Management (DRM) and users' behavior relating to the listening and sharing of music. This paper reports on the different copyright regimes in the United States and Australia. It describes some of the current DRM systems. Against this background, the paper draws on a qualitative study to explore Australian users' experience of listening to and sharing music. A design for a good DRM has to take into account the schism between the copyright regimes and users' sharing behavior.
{"title":"DRMs, fair use and users' experience of sharing music","authors":"M. Jackson, Supriya Singh, J. Beekhuyzen, Jenny Waycott","doi":"10.1145/1102546.1102549","DOIUrl":"https://doi.org/10.1145/1102546.1102549","url":null,"abstract":"There is a mismatch between the law relating to fair use, personal use and copying; the central thrust of Digital Rights Management (DRM) and users' behavior relating to the listening and sharing of music. This paper reports on the different copyright regimes in the United States and Australia. It describes some of the current DRM systems. Against this background, the paper draws on a qualitative study to explore Australian users' experience of listening to and sharing music. A design for a good DRM has to take into account the schism between the copyright regimes and users' sharing behavior.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The problem addressed in this paper is that of DRM interoperability. The term DRM interoperability, as used here, refers to approaches that provide for the transfer, from one "upstream" DRM system to another "downstream" DRM system, of DRM protected content and an associated license. We introduce the concept of a Rights Issuer Module (RIM) that is functionally situated in the home network between the upstream device (which includes an upstream-DRM agent) and downstream devices (which each include a downstream-DRM agent). The novelty of our approach lies in the way the RIM handles significant aspects of the translation operations, potentially leaving the upstream and downstream DRM agents intact. Security and implementation advantages of the RIM are discussed. The tradeoffs involved with different RIM implementations are examined.
{"title":"Achieving media portability through local content translation and end-to-end rights management","authors":"D. W. Kravitz, T. S. Messerges","doi":"10.1145/1102546.1102552","DOIUrl":"https://doi.org/10.1145/1102546.1102552","url":null,"abstract":"The problem addressed in this paper is that of DRM interoperability. The term DRM interoperability, as used here, refers to approaches that provide for the transfer, from one \"upstream\" DRM system to another \"downstream\" DRM system, of DRM protected content and an associated license. We introduce the concept of a Rights Issuer Module (RIM) that is functionally situated in the home network between the upstream device (which includes an upstream-DRM agent) and downstream devices (which each include a downstream-DRM agent). The novelty of our approach lies in the way the RIM handles significant aspects of the translation operations, potentially leaving the upstream and downstream DRM agents intact. Security and implementation advantages of the RIM are discussed. The tradeoffs involved with different RIM implementations are examined.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129412138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the perceptual significant portions in wavelet packet domain by a statistical method. Watermark detection can be done without access to the original signal. Experimental results show the proposed scheme can survive common signal manipulations and malicious attacks.
{"title":"Statistical audio watermarking algorithm based on perceptual analysis","authors":"Xiaomei Quan, Hongbin Zhang","doi":"10.1145/1102546.1102565","DOIUrl":"https://doi.org/10.1145/1102546.1102565","url":null,"abstract":"In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the perceptual significant portions in wavelet packet domain by a statistical method. Watermark detection can be done without access to the original signal. Experimental results show the proposed scheme can survive common signal manipulations and malicious attacks.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122072457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents an efficient blind watermark detection/decoding scheme for spread spectrum (SS) based watermarking, exploiting the fact that in SS-based embedding schemes the embedded watermark and the host signal are mutually independent and obey non-Gaussian distribution. The proposed scheme employs the theory of independent component analysis (ICA) and posed the watermark detection as a blind source separation problem. The proposed ICA-based blind detection/decoding scheme has been simulated using real-world audio clips. The simulation results show that the ICA-based detector can detect and decode watermark with extremely low decoding bit error probability (less than 0.01) against common watermarking attacks and benchmark degradations.
{"title":"Improved watermark detection for spread-spectrum based watermarking using independent component analysis","authors":"Hafiz Malik, A. Khokhar, R. Ansari","doi":"10.1145/1102546.1102564","DOIUrl":"https://doi.org/10.1145/1102546.1102564","url":null,"abstract":"This paper presents an efficient blind watermark detection/decoding scheme for spread spectrum (SS) based watermarking, exploiting the fact that in SS-based embedding schemes the embedded watermark and the host signal are mutually independent and obey non-Gaussian distribution. The proposed scheme employs the theory of independent component analysis (ICA) and posed the watermark detection as a blind source separation problem. The proposed ICA-based blind detection/decoding scheme has been simulated using real-world audio clips. The simulation results show that the ICA-based detector can detect and decode watermark with extremely low decoding bit error probability (less than 0.01) against common watermarking attacks and benchmark degradations.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of the state-of-the-art watermarking techniques raise doubts about applicability of watermarking to ownership problem. With this perspective, we address the security weaknesses common to most watermarking techniques and assess the role of watermarking in construction of ownership assertion systems. We identify the requirements of a watermarking based ownership assertion system. Also, we provide a basic functional outline of a practical version of such a system and identify its potential vulnerabilities. To mitigate these vulnerabilities, we aim at reducing the false positive rate of the watermark detection scheme. For this purpose, we propose embedding multiple watermarks as opposed to single watermark embedding while constraining the embedding distortion. The crux of the proposed method lies in watermark generation which deploys a family of one-way functions. We incorporate the multiple watermark embedding idea with the additive watermarking technique [1] and present results to illustrate the potential of this approach in reducing the false-positive rate of the watermark detection scheme.
{"title":"Watermarking and ownership problem: a revisit","authors":"H. Sencar, N. Memon","doi":"10.1145/1102546.1102563","DOIUrl":"https://doi.org/10.1145/1102546.1102563","url":null,"abstract":"Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of the state-of-the-art watermarking techniques raise doubts about applicability of watermarking to ownership problem. With this perspective, we address the security weaknesses common to most watermarking techniques and assess the role of watermarking in construction of ownership assertion systems. We identify the requirements of a watermarking based ownership assertion system. Also, we provide a basic functional outline of a practical version of such a system and identify its potential vulnerabilities. To mitigate these vulnerabilities, we aim at reducing the false positive rate of the watermark detection scheme. For this purpose, we propose embedding multiple watermarks as opposed to single watermark embedding while constraining the embedding distortion. The crux of the proposed method lies in watermark generation which deploys a family of one-way functions. We incorporate the multiple watermark embedding idea with the additive watermarking technique [1] and present results to illustrate the potential of this approach in reducing the false-positive rate of the watermark detection scheme.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114993594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P), resilient (O(P) is resilient against attacks), and effective (O(P) is not too much slower than P). In this paper we describe the design of an obfuscator which consists of two parts. The first part extracts the control flow information from the program and saves it in another process named Monitor-process. The second part protects Monitor-process converting it into an Aucsmith like self-modifying version. We prove the correctness of the obfuscation scheme. We assess its resilience and efficiency to show that both are This supports the claim that our approach is practical.
{"title":"Control flow based obfuscation","authors":"Jun Ge, S. Chaudhuri, A. Tyagi","doi":"10.1145/1102546.1102561","DOIUrl":"https://doi.org/10.1145/1102546.1102561","url":null,"abstract":"A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P), resilient (O(P) is resilient against attacks), and effective (O(P) is not too much slower than P). In this paper we describe the design of an obfuscator which consists of two parts. The first part extracts the control flow information from the program and saves it in another process named Monitor-process. The second part protects Monitor-process converting it into an Aucsmith like self-modifying version. We prove the correctness of the obfuscation scheme. We assess its resilience and efficiency to show that both are This supports the claim that our approach is practical.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125593156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital Rights Management (DRM) systems and applications appear to increasingly attract the interest of e-commerce business developers. DRM systems aim at secure distribution of digital content and commonly comprise a huge variety of different technologies. Current DRM systems focus mainly on right-holder's security needs and commonly neglect those of consumers. In particular, these systems even lack reliable means for users to verify that they purchase usage-rights on works (licenses) from the rightful authors (rights-holder). This seems to be simply achievable in centralistic systems where only global players or a few large collecting societies control the distribution of licenses. However, in a large distributed system with many unknown and potentially untrusted sellers/distributors of digital content it is crucial from the legal and security perspectives that any user/device of the DRM platform can reliably verify that a purchased license is authorised by the rightful author/rights-holder.In this paper we introduce a formal model and the corresponding schemes for establishing a multilateral secure rights-distribution infrastructure. The key features of our proposal are: firstly, consumers can directly verify that a seller is indeed authorised to grant certain usage-rights. Secondly, the authorship and rights licenses are invariant with respect to perceptibly similar works, i.e., they are not only valid for the original work but also for a set of closely related similar works which are modifications of the original work (e.g., different resolutions or encodings of an image or a video). The reason for providing this property is that these works are still considered to be under the copyright of the author.Our scheme provides an enabling technology for decentralised right distribution infrastructures for intellectual property with multilateral security.
{"title":"Towards multilateral secure digital rights distribution infrastructures","authors":"André Adelsbach, M. Rohe, A. Sadeghi","doi":"10.1145/1102546.1102556","DOIUrl":"https://doi.org/10.1145/1102546.1102556","url":null,"abstract":"Digital Rights Management (DRM) systems and applications appear to increasingly attract the interest of e-commerce business developers. DRM systems aim at secure distribution of digital content and commonly comprise a huge variety of different technologies. Current DRM systems focus mainly on right-holder's security needs and commonly neglect those of consumers. In particular, these systems even lack reliable means for users to verify that they purchase usage-rights on works (licenses) from the rightful authors (rights-holder). This seems to be simply achievable in centralistic systems where only global players or a few large collecting societies control the distribution of licenses. However, in a large distributed system with many unknown and potentially untrusted sellers/distributors of digital content it is crucial from the legal and security perspectives that any user/device of the DRM platform can reliably verify that a purchased license is authorised by the rightful author/rights-holder.In this paper we introduce a formal model and the corresponding schemes for establishing a multilateral secure rights-distribution infrastructure. The key features of our proposal are: firstly, consumers can directly verify that a seller is indeed authorised to grant certain usage-rights. Secondly, the authorship and rights licenses are invariant with respect to perceptibly similar works, i.e., they are not only valid for the original work but also for a set of closely related similar works which are modifications of the original work (e.g., different resolutions or encodings of an image or a video). The reason for providing this property is that these works are still considered to be under the copyright of the author.Our scheme provides an enabling technology for decentralised right distribution infrastructures for intellectual property with multilateral security.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132726666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoperability among DRM systems from the perspective of a layered architectural framework. The advantage of looking at the problem from this point of view is that the layered framework provides a certain amount of structure that is very helpful in guiding those working on DRM interoperability issues. Specifically, the layered framework we describe provides a useful design abstraction along architectural lines. One of the advantages of this perspective is that it allows us to consider the level within computing/communication architectures at which certain functionality should be provided, and then to address how the functionality between layers should interact in order to provide specific DRM capabilities. The communications that occur between layers, both within a single system and between two communicating systems, are the places where protocols can be defined and possibly standardized. Thus, they provide focal points for studying and addressing interoperability in DRM systems.
{"title":"DRM interoperability analysis from the perspective of a layered framework","authors":"G. Heileman, Pramod A. Jamkhedkar","doi":"10.1145/1102546.1102551","DOIUrl":"https://doi.org/10.1145/1102546.1102551","url":null,"abstract":"Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoperability among DRM systems from the perspective of a layered architectural framework. The advantage of looking at the problem from this point of view is that the layered framework provides a certain amount of structure that is very helpful in guiding those working on DRM interoperability issues. Specifically, the layered framework we describe provides a useful design abstraction along architectural lines. One of the advantages of this perspective is that it allows us to consider the level within computing/communication architectures at which certain functionality should be provided, and then to address how the functionality between layers should interact in order to provide specific DRM capabilities. The communications that occur between layers, both within a single system and between two communicating systems, are the places where protocols can be defined and possibly standardized. Thus, they provide focal points for studying and addressing interoperability in DRM systems.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130929801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}