Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism

Pablo Antón del Pino, Antoine Monsifrot, Charles Salmon-Legagneur, Gwenaël Doërr

2014

Abstract

Content protection relies on several security mechanisms: (i) encryption to prevent access to the content during transport, (ii) trusted computation environment to prevent access during decoding, and we can also add (iii) forensic watermarking to deter content re-acquisition at rendering. With the advent of next generation video and the ever increasing popularity of embedded devices for content consumption, there is a need for new content protection solutions that rely less on hardware. In this context, we propose an architecture that combines the ARM TrustZone technology, an hypervised environment built on Genode and a bit stream watermarking algorithm that inserts serialization marks on the fly in an embedded device. As a result, an attacker cannot get access to video assets in clear form and not watermarked. Reported performances measurements indicate that the induced computational overhead is reasonable.

References

  1. Arbaugh, W. A., Farber, D. J., and Smith, J. M. (1997). A secure and reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Security and Privacy, pages 65-71.
  2. ARM (2009). ARM security technology - Building a secure system using TrustZone technology. Technical report.
  3. Behrang (2013). A software level analysis of TrustZone OS and trustlets in Samsung Galaxy phone.
  4. Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., and Kalker, T. (2007). Digital Watermarking and Steganography. 2nd edition.
  5. Discretix (2011). DRM, Ensuring secure content protection solutions for next generation consumer device. Technical report.
  6. EDCINE (2007). European Digital Cinema Security White Book.
  7. GlobalPlatform (2010). GlobalPlatform device technology - TEE client API specification. Technical report.
  8. Jarnikov, D. and Doumen, J. M. (2011). Watermarking for adaptive streaming protocols. In Proceedings of Secure Data Management, volume 6933 of LNCS, pages 101-113.
  9. Jin, H., Lotspiech, J., and Nusser, S. (2004). Traitor tracing for prerecorded and recordable media. In Proceedings of the 4th ACM Workshop on Digital Rights Management, pages 83-90.
  10. Lange, M., Liebergeld, S., Lackorzynski, A., Warg, A., and Peter, M. (2011). L4Android: A generic operating system framework for secure smartphones. In Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, pages 39-50.
  11. Microsoft (2010). Robustness rules for PlayReady final products. Technical report.
  12. Microsoft (2013). Compliance rules for PlayReady final products. Technical report.
  13. MovieLabs (2013). MovieLabs specifications for next generation of video and enhanced content protection. Technical report.
  14. OMA (2008). DRM architecture. Technical report.
  15. PRIMA Cinema (2013). http://primacinema.com.
  16. Robert, A. and Doërr, G. (2013). Impact of content mastering on the throughput of a bit stream video watermarking system. In Proceedings of the IEEE International Conference on Image Processing, pages 4532-4535.
  17. Rosenblatt, B. (2011). The new technologies for pay TV content security. Technical report.
  18. Sierraware (2012). overview.
  19. Zou, D. and Bloom, J. A. (2008). H.264/AVC stream replacement technique for video watermarking. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pages 1749-1752.
  20. Zou, D. and Bloom, J. A. (2010). H.264 stream replacement watermarking with CABAC encoding. In Proceedings of the IEEE International Conference on Multimedia and Expo, pages 117-121.
Download


Paper Citation


in Harvard Style

Antón del Pino P., Monsifrot A., Salmon-Legagneur C. and Doërr G. (2014). Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 253-260. DOI: 10.5220/0005042502530260


in Bibtex Style

@conference{secrypt14,
author={Pablo Antón del Pino and Antoine Monsifrot and Charles Salmon-Legagneur and Gwenaël Doërr},
title={Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={253-260},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005042502530260},
isbn={978-989-758-045-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism
SN - 978-989-758-045-1
AU - Antón del Pino P.
AU - Monsifrot A.
AU - Salmon-Legagneur C.
AU - Doërr G.
PY - 2014
SP - 253
EP - 260
DO - 10.5220/0005042502530260