a copy protection technique with multi level error coding
play

A Copy-Protection Technique with Multi-Level Error Coding Chen-Yin - PowerPoint PPT Presentation

A Copy-Protection Technique with Multi-Level Error Coding Chen-Yin Liao, Jen-Wei Yeh and Ming-Seng Kao Department of Communication Engineering National Chiao-Tung University Hsinchu, Taiwan 1 Contents Introduction Coding scheme


  1. A Copy-Protection Technique with Multi-Level Error Coding Chen-Yin Liao, Jen-Wei Yeh and Ming-Seng Kao Department of Communication Engineering National Chiao-Tung University Hsinchu, Taiwan 1

  2. Contents � Introduction � Coding scheme � Analysis results � Conclusions 2

  3. Copy protection of optical disks � No method can absolutely prevent unauthorized copying of optical disks. � Approach: increase the difficulty of disk copying. 3

  4. Idea X-bits : � special bits with reflectivity (R) within a specified range. � If the range of R is rather limited, it will be very difficult to reproduce X-bits. � Challenge: – limit R to a very small range. – guarantee successful play of authorized disks. – reject unauthorized copies definitely . 4

  5. X-bits � Normal bits: with normalized reflectivity equal to 1 or 0. � X-bits: have reflectivity 0.5- α < R < 0.5+ α . (e.g. α =0.01, 0.49 < R < 0.51). � If α is small enough, it will be very difficult to reproduce X-bits, even for professional pirates. 5

  6. Double-read process � X-bits appear in the lead-in sector of the disk only. � X-bits can be detected via double-read process: – if the outcomes of two reading processes are different, the corresponding bit is assumed to be an X-bit. – Otherwise, it is taken as a normal bit. � The extra time for double-read process is little. 6

  7. Error probability of X-bits � P e is a function of α n = α / σ n . ( σ n 2 : noise variance). � P e is high, with P e(min) = 0.5. � X-bits: used as potential errors in the disk. λ 7

  8. Design idea � X-bits : sets a hardware obstacle to disk copying . � Multi-level error coding : – limit α n to a very small range ( α n < α c, ). – if α n is out of range, the disk content will be lost. 8

  9. Proposed scheme � The content is scrambled by an encryption key before stored in the disk. � This key is encoded by the multi-level error coding plus the X-bit coding. � The encoded key with X-bits is stored in the lead-in sector of the disk. � On playing the disk, the key should be correctly decoded so as to de-scramble the content . 9

  10. Goal of coding scheme � Achieve sharp discrimination of α n . – if α n < α c , then P key → 1. – if α n > α c , then P key → 0 . 10

  11. Encoding process (n,k) RS-code K C 1st-level coding N 1 1st-level FC’s Lth-level coding X-bit coding N L Optical Lth-level FC’s disk 11

  12. Decoding process Optical X-bit decoding N L disk Lth-level FC’s Lth-level decoding N 1 1st-level FC’s 1st-level decoding (n,k) RS-decoder K C 12

  13. Detection probability of codewords 13

  14. Discussion � The detection probability varies with decoding level. � A sharp cutoff exists in the detection probability of codewords after the 1st- level decoding. 14

  15. Detection probability of the key 15

  16. Discussion � For authorized disks with α n < α c , successful playing is guaranteed since P key → 1. � For copied disks with α n > α c , it will have no chance to be played since P key → 0 . � Different RS codes can be used to specify α c . 16

  17. Discussion � If α c is small enough, X-bits can only be made with very-high precision machines. � If these machines are controlled by few disk manufacturers, it will be very difficult and costly to access them. � If double-read process is a standard procedure in disk players and those high-precision machines are well controlled, professional piracy will be effectively prevented. 17

  18. Conclusions � A new copy protection technique based on multi-level error coding is proposed. � The multi-level coding leads to a sharp cutoff in the detection probability of the encryption key. � This sharp cutoff effect is sued to set a hard obstacle for disk copying. � The proposed scheme is feasible to effectively prevent professional piracy. 18

  19. Thank You 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend