55
Techniques for Copyright Techniques for Copyright Protection Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Embed Size (px)

Citation preview

Page 1: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Techniques for Copyright Techniques for Copyright ProtectionProtection

Dr. Alessandro Piva

Department of Electronics and telecommunications University of Florence,

Florence Italy

Page 2: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

OverviewOverview

The main aspects of protection of Cultural The main aspects of protection of Cultural heritage contents on the Web are considered.heritage contents on the Web are considered.

Technological solutions related to IPR protection Technological solutions related to IPR protection are presentedare presented

– with particular reference to Digital Rights Management with particular reference to Digital Rights Management Systems (DRMS). Systems (DRMS).

Data hiding technologies and Business Models for Data hiding technologies and Business Models for the protection of Cultural Heritage data are also the protection of Cultural Heritage data are also described.described.

Page 3: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

IntroductionIntroduction

The advancement of information processing and The advancement of information processing and communication technologies encourages the creation communication technologies encourages the creation of large libraries of multimedia digital objects carrying of large libraries of multimedia digital objects carrying news, artistic, scientific and entertainment information, news, artistic, scientific and entertainment information, that are owned by a variety of different subjects. that are owned by a variety of different subjects.

– TV broadcasters, press & photographic agencies, TV broadcasters, press & photographic agencies, newspapers & journals, Institutions for Cultural Heritage newspapers & journals, Institutions for Cultural Heritage management and preservation. management and preservation.

– minor subjects collecting smaller archives of various kinds of minor subjects collecting smaller archives of various kinds of multimedia materials.multimedia materials.

Page 4: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

IntroductionIntroduction

The access to this kind of archives is limited to The access to this kind of archives is limited to the internal purposes of the owner;the internal purposes of the owner;

the exploitation of contents by a second party the exploitation of contents by a second party typically passes through centralized and long-typically passes through centralized and long-term agreements, referred to the overall archive term agreements, referred to the overall archive or to large portions of it, often implying an or to large portions of it, often implying an exclusive partnership policy. exclusive partnership policy.

Page 5: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

IntroductionIntroduction

This appears as a main limitation in the evolution of This appears as a main limitation in the evolution of the information marketplace. the information marketplace.

– opening digital archives to the access of a large variety of opening digital archives to the access of a large variety of parties could support their economic exploitation and parties could support their economic exploitation and create opportunities for the sector of multimedia services create opportunities for the sector of multimedia services and editorial production. and editorial production.

– This has even more relevance in the Internet context, This has even more relevance in the Internet context, which supports worldwide search and acquisition of which supports worldwide search and acquisition of multimedia materials, and promotes the production and multimedia materials, and promotes the production and distribution of specialised information through thematic distribution of specialised information through thematic channels. channels.

Page 6: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

In the framework of IST V Programme, EC is funding the In the framework of IST V Programme, EC is funding the MINERVA (MInisterial NEtwoRk for Valorising Activities in MINERVA (MInisterial NEtwoRk for Valorising Activities in digitisation) Project. digitisation) Project.

– It is a network of member states’ ministries to discuss, correlate It is a network of member states’ ministries to discuss, correlate and harmonise activities carried out in digitisation of cultural and and harmonise activities carried out in digitisation of cultural and scientific content; scientific content;

MINERVA ProjectMINERVA Project

Page 7: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

MINERVA Working Groups:MINERVA Working Groups:

WP2: Benchmarking framework WP2: Benchmarking framework

WP3: Inventories, discovery of digitised content, WP3: Inventories, discovery of digitised content, multilingual issuesmultilingual issues

WP4: Interoperability, Service Provision & IPRWP4: Interoperability, Service Provision & IPR

WP5: Identification of WP5: Identification of user needs, contents and user needs, contents and quality frameworkquality framework

WP6: Good Practices & Competence CentresWP6: Good Practices & Competence Centres

Page 8: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Sub-Working Group on IPRSub-Working Group on IPR

In the framework of the WP4, on Interoperability, In the framework of the WP4, on Interoperability, Service Provision & IPR, a Sub-Working Group on Service Provision & IPR, a Sub-Working Group on Intellectual Property Right (IPR) has been created. Intellectual Property Right (IPR) has been created.

– The Workgroup´s activity has as its main objective the The Workgroup´s activity has as its main objective the editing of a draft of recommendations on accessibility editing of a draft of recommendations on accessibility and the protection of data and rights. and the protection of data and rights.

– In particular, the Italian Workgroup is working in the In particular, the Italian Workgroup is working in the drafting of a paper on “Data Protection and Intellectual drafting of a paper on “Data Protection and Intellectual Property Rights in Relation to On Line Accessibility of Property Rights in Relation to On Line Accessibility of Cultural Heritage”. Cultural Heritage”.

Page 9: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

SIGECSIGEC

the Central Institute for the Catalogue and the Central Institute for the Catalogue and Documentation (ICCD) of the Ministry of Culture Documentation (ICCD) of the Ministry of Culture (MiBAC) has realised, in close coordination with (MiBAC) has realised, in close coordination with the Territorial Departments for fine Arts and the Territorial Departments for fine Arts and Monuments, the General Informative System of Monuments, the General Informative System of the Catalogue of Cultural Heritage (SIGEC)the Catalogue of Cultural Heritage (SIGEC)

– with the outlook of guaranteeing interoperability with with the outlook of guaranteeing interoperability with the information systems of other administrations (for the information systems of other administrations (for example Regions and Local Entities) and the example Regions and Local Entities) and the reciprocal exchange of data.reciprocal exchange of data.

Page 10: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

SIGECSIGEC

– The information collected in the Catalogue of The information collected in the Catalogue of environmental, architectural, archaeological, artistic, environmental, architectural, archaeological, artistic, historical and folkloric heritage regards both public and historical and folkloric heritage regards both public and private property assets and contains personal data. private property assets and contains personal data.

– MiBAC, as a public entity, is allowed to treat such data MiBAC, as a public entity, is allowed to treat such data in order to carry out its institutional functions , respecting in order to carry out its institutional functions , respecting the requirements and limits of the legislation in force. the requirements and limits of the legislation in force.

– Moreover, the access and exchange of data with local Moreover, the access and exchange of data with local bodies, regions, and other public entities, is permitted in bodies, regions, and other public entities, is permitted in accordance with the regulations .accordance with the regulations .

Page 11: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

SIGECSIGEC

However, access to Cultural Heritage information also However, access to Cultural Heritage information also interests other users:interests other users:

– Universities, Research Institutes, Ecclesiastical Bodies, the Universities, Research Institutes, Ecclesiastical Bodies, the Center for Artistic Heritage protection of Italian military police Center for Artistic Heritage protection of Italian military police force, as well as individual users: scholars, researchers, force, as well as individual users: scholars, researchers, educators etc.. educators etc..

– the legislation in force establishes that the diffusion of data is the legislation in force establishes that the diffusion of data is admitted only if provided for by law or by regulation. admitted only if provided for by law or by regulation.

– The lack of such a regulation nowadays makes it very The lack of such a regulation nowadays makes it very difficult to diffuse the information on Cultural Heritage difficult to diffuse the information on Cultural Heritage managed by the SIGEC.managed by the SIGEC.

Page 12: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

IPR issuesIPR issues

– It is urgent, therefore, to address the question of a It is urgent, therefore, to address the question of a regulation of the criteria for access and exchange of data regulation of the criteria for access and exchange of data with other public bodies, in all the cases in which the with other public bodies, in all the cases in which the treatment of that data is not retraceable to their institutional treatment of that data is not retraceable to their institutional functions, and the communication to single users.functions, and the communication to single users.

– To safeguard rights on line, it is above all appropriate to To safeguard rights on line, it is above all appropriate to adopt elementary precautions: adopt elementary precautions:

a "copyright notice" to the publication of contents on line, that clearly a "copyright notice" to the publication of contents on line, that clearly explains the rights and their holders and which treatments of the explains the rights and their holders and which treatments of the information are allowed; information are allowed;

for images it can be limited to on line publication of low resolution for images it can be limited to on line publication of low resolution copies.copies.

Page 13: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

IPR issuesIPR issues

IPR can be further protected by using IPR can be further protected by using technological measures, subject to approval of technological measures, subject to approval of the procedures from the holders of the rights. the procedures from the holders of the rights.

In the following current technological solutions, In the following current technological solutions, which are designed, implemented and applied which are designed, implemented and applied through Cultural Applications, European through Cultural Applications, European projects, etc., are presented.projects, etc., are presented.

Page 14: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Technological SolutionsTechnological Solutions

Currently the set of systems in charge of Currently the set of systems in charge of managing all the issues related to IPR protection managing all the issues related to IPR protection are referred as Digital Rights Management are referred as Digital Rights Management Systems (DRMS)Systems (DRMS)

the definition of digital rights management the definition of digital rights management system is not yet unequivocal.system is not yet unequivocal.

Page 15: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Technological SolutionsTechnological Solutions

Systems for the digital administration of rights: Systems for the digital administration of rights:

– it is the definition officially adopted by the W3Cit is the definition officially adopted by the W3C

– it corresponds to the more recent generation of it corresponds to the more recent generation of DRMS, which do not limit themselves to controlling DRMS, which do not limit themselves to controlling the security aspects concerning accesses or illegal the security aspects concerning accesses or illegal duplications, but also supervise the description, duplications, but also supervise the description, identification, commerce, protection, checking and identification, commerce, protection, checking and tracing of all the forms of transfer of rights to the use tracing of all the forms of transfer of rights to the use of a specific contentof a specific content

Page 16: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

DRMSDRMS

DRMS, once it has identified the IPR of DRMS, once it has identified the IPR of multimedia content, and defined the rules of use, multimedia content, and defined the rules of use, operates to guarantee the application of those operates to guarantee the application of those rules by way of an enduring protection that lasts rules by way of an enduring protection that lasts for the “life” of the content. for the “life” of the content.

The protection of a DRMS goes further than the The protection of a DRMS goes further than the simple control of access to content by authorised simple control of access to content by authorised users, being extended to the respect of the users, being extended to the respect of the restrictions of use of content by the end user. restrictions of use of content by the end user.

Page 17: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Technical Protection Technical Protection Means Means

A DRMS system provides for a set of A DRMS system provides for a set of technological measures for the protection of technological measures for the protection of IPRs, the integrity of the digital items, and the IPRs, the integrity of the digital items, and the control of their use that in the technical field are control of their use that in the technical field are defined as Technical Protection Means (TPM) or defined as Technical Protection Means (TPM) or Digital Rights Enforcement (DRE). Digital Rights Enforcement (DRE).

Presently, the TPM implemented in the various Presently, the TPM implemented in the various research Projects and sector industries use the research Projects and sector industries use the following technologies:following technologies:

Page 18: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Technical Protection Technical Protection MeansMeans– Systems to control access to the operating systems and Systems to control access to the operating systems and

the computer network ;the computer network ;

– Encoding of the data transmitted, in such a way as to Encoding of the data transmitted, in such a way as to make it unusable by a non-authorised user;make it unusable by a non-authorised user;

– Digital watermarking of multimedia content to embed Digital watermarking of multimedia content to embed inside the content some information that is useful in the inside the content some information that is useful in the protection of IPR and the control of the use made of the protection of IPR and the control of the use made of the item;item;

– Systems that control the use made of the protected Systems that control the use made of the protected content, called self-protecting digital containers, allowing content, called self-protecting digital containers, allowing the use of content while maintaining it in a protected form.the use of content while maintaining it in a protected form.

Page 19: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

What makes a TPM What makes a TPM successful?successful?

Usability. Usability. A difficult to use system may discourage users.A difficult to use system may discourage users.

Appropriateness to the content. Appropriateness to the content. The cost of designing, developing, and deploying the system has to be in The cost of designing, developing, and deploying the system has to be in

harmony with the type of the content. harmony with the type of the content.

Appropriateness to the threat. Appropriateness to the threat. Preventing honest customers from making copies may require nothing more Preventing honest customers from making copies may require nothing more

that a reasonably priced product, a good distribution system, and a clear set of that a reasonably priced product, a good distribution system, and a clear set of instructions. instructions.

Preventing “theft” of extremely valuable content requires a very sophisticated Preventing “theft” of extremely valuable content requires a very sophisticated TPM.TPM.

Cost-benefit analysis, difficult but necessary.Cost-benefit analysis, difficult but necessary.

Page 20: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Electronic watermarkingElectronic watermarking

A new solution for copyright protection of A new solution for copyright protection of multimedia data envisages the electronic multimedia data envisages the electronic watermarking of multimedia works to allow their watermarking of multimedia works to allow their dissemination to be tracked.dissemination to be tracked.

Electronic watermarking can provideElectronic watermarking can provide

– an additional layer of protection after decryptionan additional layer of protection after decryption

– data authentication and integritydata authentication and integrity

Page 21: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

A watermarkA watermark

A watermark is embedded into a banknote directly A watermark is embedded into a banknote directly during the papermaking process, and is therefore during the papermaking process, and is therefore very difficult to forge.very difficult to forge.

It is hidden from view during normal use, only becoming It is hidden from view during normal use, only becoming visible as a result of a special viewing process (holding the visible as a result of a special viewing process (holding the bill up to the light).bill up to the light).

It carries information about the object in which it is hidden It carries information about the object in which it is hidden (it indicates the authenticity of the bill).(it indicates the authenticity of the bill).

Page 22: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Electronic WatermarkElectronic Watermark

An electronic watermark is a message An electronic watermark is a message permanently embedded into data that can be permanently embedded into data that can be detected or extracted later to make an assertion detected or extracted later to make an assertion about the data.about the data.

The watermark is hidden in the host data (cover The watermark is hidden in the host data (cover work) so that it is inseparable from the datawork) so that it is inseparable from the data

It can resist to many operations not degrading It can resist to many operations not degrading the host document. the host document.

Page 23: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

WatermarkingWatermarking

To embed watermark in host data, embedding To embed watermark in host data, embedding techniques apply minor modifications to the host techniques apply minor modifications to the host data in a perceptually invisible mannerdata in a perceptually invisible manner

The modifications are related to the watermark The modifications are related to the watermark information.information.

The watermark information can be retrieved The watermark information can be retrieved afterwards from the watermarked data by afterwards from the watermarked data by detecting the presence of these modifications.detecting the presence of these modifications.

Page 24: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Watermarked / Original Watermarked / Original WorkWork

Page 25: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Absolute difference (x 32)Absolute difference (x 32)

Page 26: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Digital WatermarkingDigital Watermarking

Watermarking techniques are based on Watermarking techniques are based on concepts belonging to:concepts belonging to:

– cryptographycryptography is the art-science, of keeping messages secret is the art-science, of keeping messages secret

– steganographysteganography is the art-science of communicating hiding the existence of is the art-science of communicating hiding the existence of

the communicationthe communication

– communication theorycommunication theory

– signal processingsignal processing

Page 27: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

SteganographySteganography

Steganography is a term derived from the Greek Steganography is a term derived from the Greek words words steganossteganos (which means “covered”) and (which means “covered”) and graphiagraphia (meaning “writing”). (meaning “writing”).

Steganography is the art-science of Steganography is the art-science of communicating hiding the existence of the communicating hiding the existence of the communication.communication.

Page 28: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Cryptography-Cryptography-SteganographySteganography

In cryptography the enemy is allowed to In cryptography the enemy is allowed to intercept and modify messages without being intercept and modify messages without being able to violate the message content.able to violate the message content.

The goal of steganography is to hide messages The goal of steganography is to hide messages inside other harmless messages in a way that inside other harmless messages in a way that does not allow any enemy to even detect the does not allow any enemy to even detect the presence of a second secret message.presence of a second secret message.

Page 29: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Histories ofHistories of Herodotus Herodotus

The noble Histiæus shaved the head of his slave The noble Histiæus shaved the head of his slave and tattooed it with a message which and tattooed it with a message which disappeared after the hair had regrown. disappeared after the hair had regrown.

The slave went to Miletus and, upon arriving, The slave went to Miletus and, upon arriving, shaved his head revealing the message sent to shaved his head revealing the message sent to the city’s regent Aristagoras.the city’s regent Aristagoras.

Page 30: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Histories ofHistories of Herodotus Herodotus

Demeratus, a Greek at the Persian court, Demeratus, a Greek at the Persian court, warned Sparta of the intention of invasion by warned Sparta of the intention of invasion by the king Xerxes: the king Xerxes:

he removed the wax from a writing tablet, wrote he removed the wax from a writing tablet, wrote his message on the wood underneath and then his message on the wood underneath and then covered the message with wax.covered the message with wax.

The tablet looked exactly like a blank one and The tablet looked exactly like a blank one and arrived in Greece.arrived in Greece.

Page 31: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

W

Watermark W

Original content

Watermarked content

encoder

key

Sandro Filipepi, called il Botticelli, La nascita di Venere, Firenze, Galleria degli Uffizi, a part

Applications - Applications - WatermarkingWatermarking

Page 32: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Sandro Filipepi, called il Botticelli, La nascita di Venere, Firenze, Galleria degli Uffizi, a part

Original content

W

Content users

AttackerAttacked content

Pirate product

Applications - Applications - WatermarkingWatermarking

Page 33: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Sandro Filipepi, called il Botticelli, La nascita di Venere, Firenze, Galleria degli Uffizi, a part

Decoder response:The watermark W is

present ?YES/NOT

Pirate product Decoder

Watermark W

Key

Applications - Applications - WatermarkingWatermarking

Page 34: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Parameters for watermark embedding

Applications - Applications - WatermarkingWatermarking

Page 35: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Watermark embeddingWatermark embedding

Page 36: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Watermark embeddingWatermark embedding

Page 37: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Watermark detectionWatermark detection

Page 38: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Watermark detectionWatermark detection

Page 39: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Tuscany & Gifu Art GalleryTuscany & Gifu Art Gallery

An art gallery with watermarked images An art gallery with watermarked images representing works of art of Tuscany (Italy) and representing works of art of Tuscany (Italy) and Gifu (Japan) artists has been created by LCI and Gifu (Japan) artists has been created by LCI and ManART. ManART.

Page 40: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Tuscany & Gifu Art GalleryTuscany & Gifu Art Gallery

Page 41: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Tuscany & Gifu Art GalleryTuscany & Gifu Art Gallery

Page 42: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Tuscany & Gifu Art GalleryTuscany & Gifu Art Gallery

Page 43: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Tuscany & Gifu Art GalleryTuscany & Gifu Art Gallery

Page 44: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Business ModelBusiness Model

For understanding all the issues related to IPR For understanding all the issues related to IPR management, it is convenient to refer to a management, it is convenient to refer to a Business Model, or Reference Model, Business Model, or Reference Model,

it is a model describing all the players involved in it is a model describing all the players involved in the exchange of works as well as the the exchange of works as well as the transactions occurring among them. transactions occurring among them.

IMPRIMATUR Project, TRADEX Project.IMPRIMATUR Project, TRADEX Project.

Page 45: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

IPR-managed Trading ScenarioIPR-managed Trading Scenario

Page 46: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

A Business ModelA Business Model

PlayersPlayers - - Entities. The key entities are:Entities. The key entities are:

– The author, or creator of the copyrighted work.The author, or creator of the copyrighted work.

– The rights-holder (or copyright owner).The rights-holder (or copyright owner).

– The creation provider (or service producer).The creation provider (or service producer).

– The media distributor (or service provider). The media distributor (or service provider).

– The IPR register or database. The IPR register or database.

– The Unique Number issuer.The Unique Number issuer.

– The controller.The controller.

– The certification authority.The certification authority.

– The purchaser.The purchaser.

Page 47: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

A Business ModelA Business Model

The transactions:The transactions: Transfer of the workTransfer of the work: the work object of the trading can : the work object of the trading can

be transferred from the creator, to the creation provider, be transferred from the creator, to the creation provider, then to the media distributor and finally to the purchaser. then to the media distributor and finally to the purchaser.

Transfer of valuesTransfer of values: this is the exchange of money given : this is the exchange of money given for compensating the use of the multimedia work.for compensating the use of the multimedia work.

Assignment of rightsAssignment of rights: the rights on the multimedia : the rights on the multimedia creation can be transferred from the original creator to a creation can be transferred from the original creator to a rights-holder.rights-holder.

Page 48: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

A Business ModelA Business Model

The transactions:The transactions: Assignment of a unique number identifierAssignment of a unique number identifier: this is : this is

requested by the creation provider and provided by the requested by the creation provider and provided by the unique number issuer.unique number issuer.

Transfer of IPR informationTransfer of IPR information: it is usually the rights-holder : it is usually the rights-holder that is charged to upload the correct IPR information into that is charged to upload the correct IPR information into the IPR database, making them available for the other the IPR database, making them available for the other parties.parties.

Page 49: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Media Distributor Web CatalogueMedia Distributor Web Catalogue

Page 50: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Legal NoticeLegal Notice

Page 51: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Certificate RequestCertificate Request

Page 52: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Payment RequestPayment Request

Page 53: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Imprimatur Watermarking ViewerImprimatur Watermarking Viewer

Page 54: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Minerva’s considerations Minerva’s considerations on DRMSon DRMS

Technical measures that restrict access to data and Technical measures that restrict access to data and protect IPRs are an important strategy to help protect IPRs are an important strategy to help guarantee the identity and integrity of digital products.guarantee the identity and integrity of digital products.

DRMS can be valuable tools when certifying the DRMS can be valuable tools when certifying the authenticity of information, as well as in every phase authenticity of information, as well as in every phase of the complicated management of digital resource of the complicated management of digital resource rights. rights.

However, the focus must be shifted from protecting to However, the focus must be shifted from protecting to completely managing rights. completely managing rights.

Page 55: Techniques for Copyright Protection Dr. Alessandro Piva Department of Electronics and telecommunications University of Florence, Florence Italy

Minerva’s considerations Minerva’s considerations on DRMSon DRMS

A valid DRM system must not simply imitate the A valid DRM system must not simply imitate the traditional distribution methods of the physical world. traditional distribution methods of the physical world. It must also be capable of adapting to the It must also be capable of adapting to the numerous ways that digital contents can be numerous ways that digital contents can be licensed.licensed.

Special attention should be paid to system Special attention should be paid to system development, and to the inherent risk in every development, and to the inherent risk in every automated control system, and in monitoring the use automated control system, and in monitoring the use of digital resources to avoid the infringement of the of digital resources to avoid the infringement of the users’ privacy rights.users’ privacy rights.