ima - digital libraries february 13, 2001 slide 1 multimedia security: is their hope in securing our...

28
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email: [email protected] http://www.ece.purdue.edu/~ace http://www.ima.umn.edu/~delp

Upload: osborne-wheeler

Post on 27-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

IMA - Digital Libraries February 13, 2001 Slide 1

Multimedia Security: Is Their Hope In Securing Our Digital Future?

Edward J. Delp

Purdue University School of Electrical and Computer Engineering

Video and Image Processing Laboratory (VIPER)West Lafayette, Indiana

email: [email protected] http://www.ece.purdue.edu/~ace

http://www.ima.umn.edu/~delp

IMA - Digital Libraries February 13, 2001 Slide 2

Outline

• Problem Overview

• What are the Issues?

• Is Their Hope?

IMA - Digital Libraries February 13, 2001 Slide 3

Multimedia Security

• “Everything” is digital these days - a copy of a digital media element is identical to the original

• How can an owner protect their content?

• Are images still “fossilized light”? (Can you believe something unless you see it or hear it in real-time?)

• What does all of this mean in terms of law?

• Does any security system really work or does it just make us feel good!

IMA - Digital Libraries February 13, 2001 Slide 4

Media Elements

• Audio

• Images

• Video

• Documents (including HTML documents)

• Graphics

• Graphic or Scene Models

• Programs (executable code)

IMA - Digital Libraries February 13, 2001 Slide 5

Attitude Problem

• People are giving up on content protection - we all need to think differently! “Information needs to be free”

– would you take something from my house?

• Napster

• DivX

• what does it mean to own “bits”?

A massive assault on copyright occurred at universities this past Fall!!! (ABC Nightline - February 9, 2001)

IMA - Digital Libraries February 13, 2001 Slide 6

Attitude Problem

“Information may want to be free as long as it does not belong to you”

– should your personal information be “free” or just information that has a copyright?

– “I have the right to take this information because the owner is greedy and makes too much money!”

– not all users of file sharing programs share

IMA - Digital Libraries February 13, 2001 Slide 7

IMA - Digital Libraries February 13, 2001 Slide 8

IMA - Digital Libraries February 13, 2001 Slide 9

IMA - Digital Libraries February 13, 2001 Slide 10

IMA - Digital Libraries February 13, 2001 Slide 11

IMA - Digital Libraries February 13, 2001 Slide 12

IMA - Digital Libraries February 13, 2001 Slide 13

Digital Communication System

IMA - Digital Libraries February 13, 2001 Slide 14

Typical Network System:Trusted Users

Source UserInsecure Channel

Attacker Is this a pirate?

IMA - Digital Libraries February 13, 2001 Slide 15

Network System:User Not Trusted

Source UserInsecure Channel

Authentication

IMA - Digital Libraries February 13, 2001 Slide 16

Multimedia Security Applications

• Privacy

• Authentication

• Access Control

• Forgery Detection

• Copyright Protection

• Proof of Purchase (non-deniable)

• Proof of Delivery (non-deniable)

• Audit Trails

• Intruder Detection

IMA - Digital Libraries February 13, 2001 Slide 17

What Do We Want From a Multimedia Security System?

• Access Control

• Copy Control

• Auditing (fingerprinting)

– Who did what and when?

Playback Control

Record Control

Generation Control

IMA - Digital Libraries February 13, 2001 Slide 18

Multimedia Security - Tools Set

• Encryption

• Authentication

• Hashing

• Time-stamping

• Watermarking

SYSTEM

IMA - Digital Libraries February 13, 2001 Slide 19

Results - Girls

Original “Girls”

Altered “Girls”

IMA - Digital Libraries February 13, 2001 Slide 20

IMA - Digital Libraries February 13, 2001 Slide 21

New Applications

• Home Networks

• Streaming Media

• Digital Cinema

• Wireless

• e-books

IMA - Digital Libraries February 13, 2001 Slide 22

Digital Data in the Home

DigitalTelevision

Server

Satellite

ComputerDVD PlayerAudioTelephone

Home IPNetwork

Broadcast

MediaProvider

IMA - Digital Libraries February 13, 2001 Slide 23

Streaming: Unicast

IMA - Digital Libraries February 13, 2001 Slide 24

Streaming: Multicast

IMA - Digital Libraries February 13, 2001 Slide 25

What is Needed?

• Models of complex end-to-end systems with to respect to security (this is very difficult)

• Cryptography in a noisy channel - can one still recover something?

• Models of watermarking/data hiding - model as a channel coding problem with side information

• How can one authenticate in a portable and/or wireless environment?

IMA - Digital Libraries February 13, 2001 Slide 26

What Is Needed?

• Renewable systems - if the system is “broken” can it be fixed without “product recall”

• The security system should exploit the unique properties of the media element with respect to how it is represented and transported (for example multicast)

• The security “features” should survive signal processing operations and conversion to analog

• Cryptography is not enough and certainly watermarking is not enough - must take a system approach - must understand the application

IMA - Digital Libraries February 13, 2001 Slide 27

Digital Millennium Copyright Act

• What does it mean to own bits?

• Will it be illegal to remove a security feature from a multimedia element?

IMA - Digital Libraries February 13, 2001 Slide 28

Conclusion

• We need to think differently about our attitudes towards “copyright” - particularly in how we train our students

• New “paying models” need to be developed

• We need to take a system approach - this is difficult