If there are
subverted hosts, then content will leak into the darknet. If the darknet is efficient, then content
will be rapidly propagated to all interested peers. In the light of this, technologists are
looking for alternative protection schemes.
In this section we will evaluate watermarking and fingerprinting
technologies.
Watermarking
Watermarking
embeds an “indelible” invisible mark in content. A plethora of schemes exist for audio/video
and still image content and computer programs.
There are a
variety of schemes for exploiting watermarks for content-protection. Consider a rendering device that locates and
interprets watermarks. If a watermark is
found then special action is taken. Two
common actions are:
1)
Restrict behavior: For example, a bus-adapter may refuse to pass
content that has the “copy once” and “already copied once” bits set.
2)
Require a license to play: For example, if a watermark is found
indicating that content is rights-restricted then the renderer may demand a
license indicating that the user is authorized to play the content.
Such systems
were proposed for audio content – for example the secure digital music
initiative (SDMI), and
are under consideration for video by the copy-protection technical working
group (CPTWG) .
There are
several reasons why it appears unlikely that such systems will ever become an
effective anti-piracy technology. From a
commercial point of view, building a watermark detector into a device renders
it strictly less useful for consumers than a competing product that does not.
This argues that watermarking schemes are unlikely to be widely deployed,
unless mandated by legislation. The recently proposed Hollings bill is a step
along these lines.
We contrast watermark-based
policing with classical DRM: If a
general-purpose device is equipped with a classical DRM-system, it can play all
content acquired from the darknet, and
have access to new content acquired through the DRM-channel. This is in stark distinction to reduction of
functionality inherent in watermark-based policing.
Even if
watermarking systems were mandated, this approach is likely to fail due to a
variety of technical inadequacies. The first inadequacy concerns the robustness
of the embedding layer. We are not aware of systems for which simple data
transformations cannot strip the mark or make it unreadable. Marks can be made more robust, but in order
to recover marks after adversarial manipulation, the reader must typically
search a large phase space, and this quickly becomes untenable. In spite of the
proliferation of proposed watermarking schemes, it remains doubtful whether
robust embedding layers for the relevant content types can be found.
A second
inadequacy lies in unrealistic assumptions about key management. Most
watermarking schemes require widely deployed cryptographic keys. Standard watermarking
schemes are based on the normal cryptographic principles of a public algorithm
and secret keys. Most schemes use a shared-key between marker and detector. In
practice, this means that all detectors need a private key, and, typically,
share a single private key. It would be
naïve to assume that these keys will remain secret for long in an adversarial
environment. Once the key or keys are
compromised, the darknet will propagate them efficiently, and the scheme
collapses. There have been proposals for public-key watermarking systems.
However, so far, this work does not seem practical and the corresponding
schemes do not even begin to approach the robustness of the cryptographic
systems whose name they borrow.
A final
consideration bears on the location of mandatory watermark detectors in client
devices. On open computing devices (e.g. personal computers), these detectors
could, in principle, be placed in software or in hardware. Placing detectors in
software would be largely meaningless, as circumvention of the detector would
be as simple as replacing it by a different piece of software. This includes
detectors placed in the operating system, all of whose components can be easily
replaced, modified and propagated over the darknet.
Alternatively,
the detectors could be placed in hardware (e.g. audio and video cards). In the
presence of the problems described this would lead to untenable renewability
problems --- the hardware would be ineffective within days of deployment. Consumers,
on the other hand, expect the hardware to remain in use for many years. Finally, consumers themselves are likely to
rebel against “footing the bill” for these ineffective content protection
systems. It is virtually certain, that
the darknet would be filled with a continuous supply of watermark removal
tools, based on compromised keys and weaknesses in the embedding layer.
Attempts to force the public to “update” their hardware would not only be
intrusive, but impractical.
In summary,
attempts to mandate content protection systems based on watermark detection at
the consumer’s machine suffer from commercial drawbacks and severe technical
deficiencies. These schemes, which aim to provide content protection beyond DRM
by attacking the darknet, are rendered entirely ineffective by the presence of
even a moderately functional darknet.
Fingerprinting
Fingerprint
schemes are based on similar technologies and concepts to watermarking
schemes. However, whereas watermarking
is designed to perform a-priori
policing, fingerprinting is designed to provide a-posteriori forensics.
In the simplest
case, fingerprinting is used for individual-sale content (as opposed to
super-distribution or broadcast – although it can be applied there with some
additional assumptions). When a client
purchases an object, the supplier marks it with an individualized mark that
identifies the purchaser. The purchaser
is free to use the content, but if it appears on a darknet, a policeman can
identify the source of the content and the offender can be prosecuted.
Fingerprinting
suffers from fewer technical problems than watermarking. The main advantage is that no widespread
key-distribution is needed – a publisher can use whatever secret or proprietary
fingerprinting technology they choose, and is entirely responsible for the
management of their own keys.
Fingerprinting
has one problem that is not found in watermarking. Since each fingerprinted copy of a piece of
media is different, if a user can obtain several different copies, he can
launch collusion attacks (e.g. averaging).
In general, such attacks are very damaging to the fingerprint payload.
It remains to
be seen whether fingerprinting will act as a deterrent to theft. There is currently no legal precedent for
media fingerprints being evidence of crime, and this case will probably be hard
to make – after all, detection is a statistical process with false positives,
and plenty of opportunity for deniability.
However, we anticipate that there will be uneasiness in sharing a piece of
content that may contain a person’s identity, and that ultimately leaves that
person’s control.
Note also that with widely distributed watermarking
detectors, it is easy to see whether you have successfully removed a
watermark. There is no such assurance
for determining whether a fingerprint has been successfully removed from an
object because users are not necessarily knowledgeable about the fingerprint
scheme or schemes in use. However, if it
turns out that the deterrence of fingerprinting is small (i.e. everyone shares
their media regardless of the presence of marks), there is probably no
reasonable legal response. Finally,
distribution schemes in which objects must be individualized will be expensive.
0 komentar:
Posting Komentar