[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3658664.3659663acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
keynote

Digital Flamenco with Video Pirates

Published: 24 June 2024 Publication History

Abstract

Despite major breakthroughs in multimedia security over the last three decades, video piracy is still striving. Sport leagues are pirated during major live competitions; popular TV shows and series are redistributed on illegal platforms; Hollywood movies are leaked prior to theatrical releases, etc. Similarly to traditional flamenco dancers, one step from service providers to improve the protection of their video platforms leads to another step from the pirates to circumvent such protection.
The fight against piracy is multi-faceted and goes well beyond technical solutions only. It includes for instance international laws that regulate how digital entertainment content might be used, as well as educational campaigns to inform end-users about the impact of piracy. On another hand, technical protection measures such as digital rights management and conditional access system have been introduced to prevent piracy. In his keynote talk, we will focus on a technology named digital watermarking which modifies the digital representation of a media item in an imperceptible manner to convey information that can be reliably recovered even if the content has been modified afterwards. Forensic watermarking refers to a specific application use case of this technology wherein the watermark signal encodes information about the entity to whom a piece of content has been delivered, thereby providing means to trace back the source of piracy.
The use of forensic watermarking has been limited in its early age to post-production ecosystems, e.g. to prevent leaks prior to official content release, and to well-defined market segments, e.g. the digital cinema or the hospitality market. However, the development of mobile devices to consume video as well as the ever increasing quality of video content have led the movie industry to mandate the use of forensic watermarking for D2C video delivery. Moreover, the rapid transition to OTT delivery and its pervasive use of open devices fundamentally changed the trust model of watermarking systems and called for new template blueprints.
In this context, an industry standard, routinely referred to as A/B watermarking nowadays, gradually emerged. The baseline principle is to segment a video asset, and to generate pre-watermarked A&B variants of each segment using off-the-shelf watermarking technologies. Forensic watermarking then reduces to delivering a unique sequence of A/B pre-watermarked segments to each individual user. This approach has the virtue to perform all security-sensitive operations outside of the end-user device. Moreover, it is naturally fitted to modern segmented delivery protocols such as HLS or DASH. While early generations of such systems relied on playlist/manifest manipulation, the rapid development of CDN edge compute capabilities led to more scalable designs where requests from the end-users are redirected to their A or B variants at the edge. The industry is now engaged in a standardization effort to facilitate interoperability across the ecosystem.
In the meantime, pirates did not stand still, watching their operations being interrupted more and more frequently thanks to improved forensic capabilities. For instance, findings from successful police raids clearly revealed that collusion attacks are not an academic mind game but can be applied at industrial scale. This has been most notably exemplified by beoutQ piracy in the MENA region during the 2018 FIFA World Cup and is now a routine piracy practice.
Collusion refers to the process of combining several watermarked copies of the same asset in an attempt to confuse the forensic tracking engine. The academic response to such threat models led to the design of anti-collusion codes whose length scales with the square of the number of colluders. While advances have been made to reduce the length of these codes, they can rapidly become unusable in practice. It is therefore worth revisiting some of the underlying assumptions that underpin these anti-collusion codes to explore if trade-offs can emerge. End of the day, the business expectation is to be able to shut down a pirate before the end of the match.
On another front, OTT delivery has introduced its own set of vulnerabilities that pirates took no time to exploit. In broadcast, service providers make significant initial investments to deploy their delivery infrastructure. However, once the system is deployed, the operating cost is fixed regardless of the number of end users. In contrast, OTT operating costs scale with the number of end-users actively using the infrastructure in a "pay as much as you use" manner, which rather appealing as long as the end-users are active subscribers of your service. Unfortunately, today, leveraging some know weaknesses of DRM systems, pirate providers are able deploy pirate services that leverages the OTT delivery infrastructure of the legitimate service providers. In other words, the service provider is paying for the pirate traffic, a new form of piracy routinely referred to as CDN leeching.
This issue calls for new protection mechanism to shield the CDN from such vampire traffic. The industry consensus is currently to use a crypto-protected token to grant access to CDN resources or not. While simple token strategies may offer a first layer of protection, it is necessary to anticipate the next moves of the pirates and to devise means to prevent token sharing, which might prove easier said than done in heavily distributed infrastructures.

References

[1]
Streaming Video Technical Alliance. 2018. Forensic Watermarking Implementation Considerations for Streaming Media. SVTA5009.
[2]
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, and Ton Kalker. 2007. Digital Watermarking and Steganography 2nd ed.). Morgan Kaufmann.
[3]
DASH Industry Forum. 2023. Forensic A/B Watermarking -- An Interoperable Watermarking Integration Schema. ETSI TS 104 002 V1.1.1.
[4]
Ultra HD Forum. 2021. Watermark API for Encoder Integration. Rev. 1.0.1.
[5]
Teddy Furon and Gwenaël Doërr. 2010. Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread. IEEE Security & Privacy, Vol. 8, 5 (October 2010), 69--71.
[6]
Dmitri Jarnikov, Erik Hietbrink, Mark Arana, and Jeroen M. Doumen. 2014. A Watermarking System for Adaptive Streaming. In Proceedings of the IEEE International Conference on Consumer Electronics. 375--377.
[7]
Motion Picture Laboratories. 2020. MovieLabs Specification for Enhanced Content Protection. version 1.3.
[8]
CTA Wave. 2024. Common Access Token. (Draft). io

Cited By

View all
  • (2024)Minimally Intrusive Access Management to Content Delivery Networks Based on Performance Models and Access PatternsCyber Security, Cryptology, and Machine Learning10.1007/978-3-031-76934-4_12(178-189)Online publication date: 12-Dec-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security
June 2024
305 pages
ISBN:9798400706370
DOI:10.1145/3658664
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 June 2024

Check for updates

Author Tags

  1. anti-collusion codes
  2. cdn access token
  3. cdn leeching
  4. forensic watermarking
  5. traitor tracing
  6. video piracy

Qualifiers

  • Keynote

Conference

IH&MMSEC '24
Sponsor:

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)41
  • Downloads (Last 6 weeks)9
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Minimally Intrusive Access Management to Content Delivery Networks Based on Performance Models and Access PatternsCyber Security, Cryptology, and Machine Learning10.1007/978-3-031-76934-4_12(178-189)Online publication date: 12-Dec-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media