A Copy-Protection Technique with Multi-Level Error Coding Chen-Yin - - PowerPoint PPT Presentation

a copy protection technique with multi level error coding
SMART_READER_LITE
LIVE PREVIEW

A Copy-Protection Technique with Multi-Level Error Coding Chen-Yin - - PowerPoint PPT Presentation

A Copy-Protection Technique with Multi-Level Error Coding Chen-Yin Liao, Jen-Wei Yeh and Ming-Seng Kao Department of Communication Engineering National Chiao-Tung University Hsinchu, Taiwan 1 Contents Introduction Coding scheme


slide-1
SLIDE 1

1

A Copy-Protection Technique with Multi-Level Error Coding

Chen-Yin Liao, Jen-Wei Yeh and Ming-Seng Kao Department of Communication Engineering National Chiao-Tung University Hsinchu, Taiwan

slide-2
SLIDE 2

2

Contents

Introduction Coding scheme Analysis results Conclusions

slide-3
SLIDE 3

3

Copy protection of optical disks

No method can absolutely prevent unauthorized

copying of optical disks.

Approach: increase the difficulty of disk copying.

slide-4
SLIDE 4

4

Idea

  • X-bits :

special bits with reflectivity (R) within a specified range.

If the range of R is rather limited, it will be very

difficult to reproduce X-bits.

Challenge:

– limit R to a very small range. – guarantee successful play of authorized disks. – reject unauthorized copies definitely.

slide-5
SLIDE 5

5

X-bits

Normal bits:

with normalized reflectivity equal to 1 or 0.

X-bits:

have reflectivity 0.5- α < R < 0.5+α. (e.g. α=0.01, 0.49 < R < 0.51).

If α is small enough, it will be very difficult to

reproduce X-bits, even for professional pirates.

slide-6
SLIDE 6

6

Double-read process

X-bits appear in the lead-in sector of the disk

  • nly.

X-bits can be detected via double-read process:

– if the outcomes of two reading processes are different, the corresponding bit is assumed to be an X-bit. – Otherwise, it is taken as a normal bit.

The extra time for double-read process is little.

slide-7
SLIDE 7

7

Error probability of X-bits

Pe is a function of αn= α/σn.

(σn

2 : noise variance). Pe is high, with Pe(min) = 0.5. X-bits: used as potential

errors in the disk. λ

slide-8
SLIDE 8

8

Design idea

X-bits :

sets a hardware obstacle to disk copying.

Multi-level error coding :

– limit αn to a very small range (αn < αc, ). – if αn is out of range, the disk content will be lost.

slide-9
SLIDE 9

9

Proposed scheme

The content is scrambled by an encryption key

before stored in the disk.

This key is encoded by the multi-level error

coding plus the X-bit coding.

The encoded key with X-bits is stored in the

lead-in sector of the disk.

On playing the disk, the key should be correctly

decoded so as to de-scramble the content .

slide-10
SLIDE 10

10

Goal of coding scheme

Achieve sharp discrimination of αn .

– if αn < αc , then Pkey→ 1. – if αn > αc , then Pkey→ 0 .

slide-11
SLIDE 11

11

Encoding process

K C

N1 1st-level FC’s 1st-level coding

NL

Lth-level FC’s Lth-level coding

Optical

disk

X-bit coding (n,k) RS-code

slide-12
SLIDE 12

12

Decoding process

K C

N1 1st-level FC’s 1st-level decoding NL Lth-level FC’s Lth-level decoding Optical disk X-bit decoding (n,k) RS-decoder

slide-13
SLIDE 13

13

Detection probability of codewords

slide-14
SLIDE 14

14

Discussion

The detection probability

varies with decoding level.

A sharp cutoff exists in

the detection probability

  • f codewords after the 1st-

level decoding.

slide-15
SLIDE 15

15

Detection probability of the key

slide-16
SLIDE 16

16

Discussion

For authorized disks with αn < αc, successful

playing is guaranteed since Pkey→ 1.

For copied disks with αn > αc, it will have no

chance to be played since Pkey→ 0.

Different RS codes can be used to specify αc.

slide-17
SLIDE 17

17

Discussion

If αc is small enough, X-bits can only be made with

very-high precision machines.

If these machines are controlled by few disk

manufacturers, it will be very difficult and costly to access them.

If double-read process is a standard procedure in

disk players and those high-precision machines are well controlled, professional piracy will be effectively prevented.

slide-18
SLIDE 18

18

Conclusions

A new copy protection technique based on

multi-level error coding is proposed.

The multi-level coding leads to a sharp cutoff in

the detection probability of the encryption key.

This sharp cutoff effect is sued to set a hard

  • bstacle for disk copying.

The proposed scheme is feasible to effectively

prevent professional piracy.

slide-19
SLIDE 19

19

Thank You