Digital rights management for digital cinema

Abstract.There is a wide consensus among feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, and strong potential for developing new business models. Despite these advantages, the studios are still reluctant to jump into the digital age. An important concern regarding digital and conventional cinema is the danger of widespread piracy. Piracy already costs Hollywood an estimated two billion dollars annually, and digital cinema without proper copyright enforcement could increase this number. In this paper, we present a copyright management system that aims at providing the set of necessary security tools: standard cryptographic primitives and copyright protection mechanisms that enable a reliable and secure feature film delivery system.

[1]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .

[2]  Lev Vaitzblit A High-Resolution Video Server for Cinema of the Future , 1995, IEEE Multim..

[3]  Josh Benaloh,et al.  Key Compression and its Application to Digital Fingerprinting , 2001 .

[4]  Amos Fiat,et al.  Dynamic Traitor Training , 1999, CRYPTO.

[5]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[6]  Sean W. Smith,et al.  Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.

[7]  Ahmed H. Tewfik,et al.  Robust audio watermarking using perceptual masking , 1998, Signal Process..

[8]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[9]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[10]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, CRYPTO.

[11]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[12]  Darko Kirovski,et al.  Robust spread-spectrum audio watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[13]  A. E. Bell The dynamic digital disk , 1999 .

[14]  Edward J. Delp,et al.  An overview of multimedia content protection in consumer electronics devices , 2001, Signal Process. Image Commun..

[15]  Birgit Pfitzmann,et al.  Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.

[16]  Steven A. Morley Making Digital Cinema Actually Happen – What it Takes and Who's Going to Do It , 1998 .

[17]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[18]  Jean-Jacques Quisquater,et al.  Integrated fingerprinting in secure digital cinema projection , 2001, Optics + Photonics.

[19]  Derrick Grover,et al.  The Protection of Computer Software: Its Technology and Application , 1992 .

[20]  J. van Leeuwen,et al.  Information Hiding , 1999, Lecture Notes in Computer Science.

[21]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[22]  Bennet S. Yee,et al.  Using Secure Coprocessors , 1994 .

[23]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[24]  Markus G. Kuhn Attacks on Pay-TV Access Control Systems , 1997 .

[25]  Marcus Peinado Digital Rights Management in a Multimedia Environment , 2002 .

[26]  Xin Wang,et al.  XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.

[27]  Bernd Girod,et al.  Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[28]  Cherié L. Weible,et al.  The Internet Movie Database , 2001 .

[29]  Darko Kirovski,et al.  Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.

[30]  C. Brendan S. Traw Protecting Digital Content within the Home , 2001, Computer.

[31]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[32]  H. V. Trees Detection, Estimation, And Modulation Theory , 2001 .

[33]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[34]  Ioannis Pitas,et al.  Robust audio watermarking in the time domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[35]  Madhu Sudan,et al.  Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..

[36]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[37]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[38]  P. D. Lubell A coming attraction: digital cinema , 2000 .

[39]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[40]  Gregory W. Wornell,et al.  Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[41]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[42]  Avishai Wool Key management for encrypted broadcast , 1998, CCS '98.

[43]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[44]  D. P. Maher,et al.  Music on the Internet and the intellectual property protection problem , 1997, ISIE '97 Proceeding of the IEEE International Symposium on Industrial Electronics.

[45]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[46]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[47]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.

[48]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[49]  T.D.C. Little Multimedia at work: A high-resolution video server for cinema of the future , 1995, IEEE MultiMedia.