Techniques and Applications of Digital Watermarking and Content Protection Wolthusen Wolthusen-FM May 30, 2003 9:54
Total Page:16
File Type:pdf, Size:1020Kb
Wolthusen Wolthusen-FM May 30, 2003 9:54 Techniques and Applications of Digital Watermarking and Content Protection Wolthusen Wolthusen-FM May 30, 2003 9:54 For quite a long time, computer security was a rather narrow field of study that was populated mainly by theoretical computer scientists, electrical engineers, and applied mathematicians. With the proliferation of open systems in general, and of the Internet and the World Wide Web (WWW) in particular, this situation has changed fundamentally. Today, computer and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to electronic commerce. Against this background, the field of computer security has become very broad and includes many topics of interest. The aim of this series is to publish state-of-the-art, high standard technical books on topics related to computer security. Further information about the series can be found on the WWW at the following URL: http://www.esecurity.ch/serieseditor.html Also, if you’d like to contribute to the series by writing a book about a topic related to computer security, feel free to contact either the Com- missioning Editor or the Series Editor at Artech House. For a listing of recent titles in the Artech House Computer Security Series, turn to the back of this book. Wolthusen Wolthusen-FM May 30, 2003 9:54 Techniques and Applications of Digital Watermarking and Content Protection Michael Arnold Martin Schmucker Stephen D. Wolthusen Artech House Boston • London www.artechhouse.com Wolthusen Wolthusen-FM May 30, 2003 9:54 Library of Congress Cataloging-in-Publication Data Arnold, Michael (Michael Konrad), 1964– Techniques and applications of digital watermarking and content protection / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen. p. cm.—(Artech House computer security series) Includes bibliographical references and index. ISBN 1-58053-111-3 (alk. paper) 1. Computer security. 2. Digital watermarking. 3. Data protection. I. Schmucker, Martin. II. Wolthusen, Stephen D. III. Title. QA76.9.A25A76 2003 005.8—dc21 2003049577 British Library Cataloguing in Publication Data Arnold, Michael Techniques and applications of digital watermarking and content protection.— (Artech House computer security series) 1. Digital watermarking I. Title II. Schmucker, Martin III. Wolthusen, Stephen D. 005.8 ISBN 1-58053-111-3 Cover design by Yekaterina Ratner c 2003 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-111-3 Library of Congress Catalog Card Number: 2003049577 10987654321 Wolthusen Wolthusen-FM May 30, 2003 9:54 To our parents Wolthusen Wolthusen-FM May 30, 2003 9:54 Wolthusen Wolthusen-FM May 30, 2003 9:54 Contents Preface....................................................xiii Acknowledgments .........................................xv 1 Introduction .................................................1 1.1 The origins of copyright protection 3 1.2 The protection of intellectual property through technical means 5 1.3 Integrity and authenticity 11 References 12 2 Digital watermarking ......................................15 2.1 Rationale 15 2.2 Digital watermarking and cryptography 16 2.2.1 Steganography 16 2.2.2 Digital watermarking 19 2.3 First generation approaches 19 2.3.1 Basic principles of watermarking 20 2.3.2 Terminology 21 2.3.3 First methods 23 2.4 Beyond the first generation 32 References 35 3 Applications of digital watermarking ......................39 3.1 Usage-specific requirements 39 3.2 Copyright protection 40 3.2.1 Misappropriation by other content providers 41 3.2.2 Illicit use by end users 44 vii Wolthusen Wolthusen-FM May 30, 2003 9:54 viii Contents 3.3 Annotation watermarking 46 3.4 Fingerprinting 48 3.5 Automatic playlist generation for rights verification 49 3.6 Multimedia authentication 50 3.7 Watermarking for copy protection 51 References 53 4 Digital watermarking for still images ......................55 4.1 Classification and application requirements 55 4.2 Photographic and photorealistic images 56 4.2.1 Traditional watermarking methods 56 4.2.2 Watermarking methods dealing with geometric distortions 63 4.2.3 Content-based watermarking methods 65 4.3 Binary and halftoned images 67 4.4 Summary 69 References 69 5 Digital watermarking for audio data .......................75 5.1 Requirements and design 75 5.1.1 Removal manipulations and attacks 76 5.1.2 Misalignment manipulations and attacks 76 5.2 Psychoacoustic facts and models 77 5.2.1 Critical bands 78 5.2.2 Masking effects 79 5.2.3 Psychoacoustic model MPEG 1 layers I and II 81 5.3 Perceptual audio watermarking 88 5.3.1 Spectral weighting 89 5.4 Algorithms 90 5.4.1 LSB coding 91 5.4.2 Embedding watermarks into the phase 91 5.4.3 Echo hiding 96 5.4.4 Watermarking of compressed audio data 99 5.4.5 Spread-spectrum audio watermarking 102 Wolthusen Wolthusen-FM May 30, 2003 9:54 Contents ix 5.4.6 Audio watermarking via the patchwork technique 106 5.4.7 Mechanisms against desynchronization manipulations 107 References 111 6 Digital watermarking for other media ....................115 6.1 Digital watermarking for video data 115 6.1.1 Application requirements 115 6.1.2 Algorithms 117 6.2 Digital watermarking for three-dimensional data 121 6.2.1 Application requirements 121 6.2.2 Data representation 122 6.2.3 Operations and attacks 124 6.2.4 Algorithms 125 6.2.5 Quality 135 6.3 Digital watermarking for two-dimensional geometry data 136 6.4 Digital watermarking for formatted text 136 6.4.1 Application requirements 137 6.4.2 Algorithms 137 6.5 Music scores 138 6.5.1 Application requirements 138 6.5.2 Algorithms 139 References 140 7 Attacks and benchmarks of digital watermarking systems ...................................147 7.1 Threats and risk analysis 148 7.2 Attacks 149 7.2.1 Classification of attacks 149 7.2.2 Removal attacks and manipulations 151 7.2.3 Desynchronization attacks 159 7.2.4 Embedding attacks 164 7.2.5 Detection attacks 168 7.3 Quality evaluation of watermarked objects 168 7.3.1 Psychophysical methods 169 Wolthusen Wolthusen-FM May 30, 2003 9:54 x Contents 7.3.2 Audio data 172 7.3.3 Image data 176 7.3.4 Video data 177 7.4 Benchmarking 178 7.4.1 Concepts 180 7.4.2 Automatic evaluation of watermarking algorithms 181 References 187 8 Other content protection mechanisms....................193 8.1 Copy and usage protection schemes 193 8.2 Analog media protection 197 8.2.1 Fingerprinting 200 8.3 Off-line digital content protection 201 8.3.1 Cryptographic mechanisms 204 References 208 9 Integrated content protection solutions ..................211 9.1 Digital rights management 211 9.1.1 The Digital Transmission Content Protection Specification 216 9.1.2 The Trusted Computing Platform Alliance System architecture 218 9.1.3 The CIPRESS system 221 9.1.4 Pragmatic aspects of digital rights management 225 9.2 Tamper protection 228 9.2.1 Techniques for software tamper protection 228 9.2.2 Techniques for hardware tamper protection 230 References 237 10 Conclusion ...............................................245 10.1 Digital rights management systems 245 10.1.1 Privacy, competition, and freedom of speech 246 10.1.2 DRM in commercial environments 248 10.2 Digital watermarking 250 Wolthusen Wolthusen-FM May 30, 2003 9:54 Contents xi 10.3 Outlook 251 References 252 Glossary .................................................255 List of acronyms ..........................................257 About the authors ........................................263 Index.....................................................265 Wolthusen Wolthusen-FM May 30, 2003 9:54 Wolthusen Wolthusen-FM May 30, 2003 9:54 Preface ew research subjects in computer science are as inextricably linked with F problems from other disciplines, ranging from economic theory to intel- lectual property law and even politics, as the study of protection mechanisms for intellectual property. The present book therefore not only introduces a number of techniques for such mechanisms (primarily focused on digital watermarking but also including other mechanisms). Rather, it strives to place these techniques into a context provided by application scenarios and their requirements, as well as the legal and—to a modest extent—ethical contexts all such research and development must be conducted in. Given this premise, particular attention is paid to clearly showing the limits of the currently known techniques and algorithms within the particular context of intellectual property protection. The book itself is structured in such a way that it can be read both in sequence and in a topical fashion. Chapter 1 discusses the legal background and historical origins of intellectual property and forms the basis for the remainder of the book, which consists of two logical segments. The first and larger segment is dedicated to digital watermarking. Here, Chapter 2 provides an introduction to general concepts while Chapter 3 describes application scenarios for digital watermarking. Following this general introduction, three separate chapters introduce media-specific techniques: Chapter 4 for still images, Chapter 5 for audio data, and finally Chapter 6 for several other media types, including video and formatted text, but with an emphasis on three-dimensional data sets. Based on this exposition, Chapter 7 concludes the discussion of digital wa- termarking with a detailed analysis of attack mechanisms and benchmarking approaches.