1 / 22

Philips Digital and Analog Protection System (Philips DNA)

Philips Digital and Analog Protection System (Philips DNA). Michael Epstein Raymond Krasinski Martin Rosner October 22-23, 2003. Outline. Problem Statement D-A-D of video content Special case: Broadcast content Solution Concept Two proposals A and B

abel-spence
Télécharger la présentation

Philips Digital and Analog Protection System (Philips DNA)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Philips Digital and Analog Protection System (Philips DNA) Michael Epstein Raymond Krasinski Martin Rosner October 22-23, 2003

  2. Outline • Problem Statement • D-A-D of video content • Special case: Broadcast content • Solution Concept • Two proposals A and B • Proposal B is the simples subset of proposal A • Other subsets or combinations are possible • Tools • Watermarking • Zone coding • Re-conversion detection • Remote verification • Summary

  3. Problem Statement • D-A-D conversion carriage of content protection states • Prevent the copying of “copy never” (CN) content • Prevent improper copying of “one generation” content (COG) • Prevent the Internet re-transmission to the public (NIR) • To allow personal use when appropriate

  4. Features • Prevents redistribution of video content via the Internet • Preserves compatibility with legacy equipment • Permits reasonable transmission of content over the Internet between appropriate locations • Provides protection after content is placed on the Internet without authorization • Does not fail catastrophically after secured content is compromised • Permits manufacture of computers free of any legal mandate • Becomes more effective with the passage of time, as the population of compliant equipment grows

  5. Solution Concept • Encryption systems • Protect content insides a compliant world • When content is lost to the non-compliant world • Content is played in the non-compliant world • Content is played in the compliant world • DNA system – a holistic solution • Assume that content will leak to the non-compliant world • Assume content will want/need to return to the compliant world • This will work for all types of content (CN, COG, NIR) STOP CONTENT FROM RETURNING TO THE COMPLIANT WORLD

  6. Assumptions • It remain difficult to transmit video across the Internet without using lossey compression technologies • It will be desirable to use compliant devices to record/play/watch video

  7. Watermark Detection • Watermark detectors will exist in: • Optical/magnetic player or recording drives which will check well known video formats on command • Video generators • e.g. computer graphics cards • Displays • Televisions or monitors

  8. Tools • Watermarks • Base watermark • Remark • Zone coding • Tagging content with geographic information • Reconversion detection • Detect D-A-D • Detect compression • Remote verification • Information at one device aids in decisions of a second device

  9. Watermark Fundamentals • An indelible mark that carries information • Typically applied by the owner/distributor of content • Does not interfere with the use of content • Should be difficult to remove • Without destroying the content • Should be difficult to write • Should be inexpensive to find • If you know the secrets • A remark is a watermark that is applied by consumer equipment according to certain rules

  10. Zone Coding • Zone coding for NIR and COG content • Set at the broadcast station • Internal Zone code set in devices by inputs • Quick reset allowed once in a while • Devices play content that matches the internally stored zone • Adjacent zones are also allowed • Boundary areas

  11. DVD Recorder Display Zone Coding NIR-B NIR content zone B Internet NIR content zone A D/A NIR-A Unregulated Demodulator Computer zone A zone B

  12. End Proposal B-Simplified Proposal • Protects only NIR content • Prevents retransmission to remote locations • Most basic proposal using our tools • Zone coding is a portion of the A proposal • Combining zone coding with reconversion detection provides a more complete approach to NIR content

  13. Reconversion Detection • Hash the bits of a “sector” and use the hash to construct a watermark (or remark) for a subsequent “sector” • Verify content against the watermark (or remark) • If the content changes verification will fail • D-A-D conversion inevitably changes content • So does compression

  14. Reconversion Detection-Recording Content 1 2 3 4 5 6 mark mark mark mark mark HASH HASH HASH HASH HASH 1 2 3 4 5 6 Recorded Content

  15. Reconversion Detection-Checking mark equal? mark equal? mark equal? mark equal? mark equal? HASH HASH HASH HASH HASH 1 2 3 4 5 6 Recorded Content

  16. DVD Recorder DVD Recorder DVD Player Television Receiver NIR Example – Hashed Remark NIR NIR-RM NIR – No Internet Retransmission to public NIR-RM – NIR-remarked NIR-RM

  17. DVD Recorder DVD Player DVD Player Non-compliant DVD Recorder Failure to Traverse the Internet Internet A/D NIR-Altered content NIR-RM (compression) NIR-RM – NIR-remarked NIR-Altered content

  18. Remote Verification • There will be situations where content is altered prior to watermark detection for valid reasons • e.g. software sharpening • Content source sends verification data to the watermark detecting device • e.g. graphics card works with DVD drive • Checking device uses source-generated verification data in conjunction with the detected watermark

  19. Display Remote Verification Computer Verification request Video Generator Drive Content + verification data content NIR-RM

  20. Mandates • All displays must have a watermark detector • Video generators with uni-directional outputs must have a watermark detector • e.g. analog outputs or DVI • Video generators with bi-directional outputs may license a watermark detector • Disk drives (magnetic/optical) may license a watermark detector • Thus, a computer that has only bi-directional outputs need have no watermark detectors at all • but such a computer will not be able to play marked content

  21. Summary • Prevent improper content from coming into the compliant world • It is a given that content will leak from the compliant world to the non-compliant world • Attach rights to content • Pervasive protection • More compliant equipment increases the efficacy of the solution • But increases or maintains consumer functionality

More Related