Milan Lukic on Sat, 28 Apr 2001 19:50:41 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
[Nettime-bold] Re: <nettime> Lessons from the SDMI Challenge |
hey
FLX! tHnX 4 the material! g e a r w h o r e
reprazent! reprazent! reprazent! reprazent! reprazent! reprazent! reprazent! reprazent! reprazent! reprazent! reprazent!
reprazent! reprazent! reprazent!
reprazent! reprazent! reprazent! reprazent! reprazent!
reprazent! reprazent!
reprazent! reprazent! reprazent! reprazent!
reprazent! reprazent! reprazent!
----- Original Message ----- From: "Felix Stalder" <stalder@fis.utoronto.ca> To: <nettime-l@bbs.thing.net> Sent: Saturday, April 28, 2001 5:43 PM Subject: <nettime> Lessons from the SDMI Challenge > > [Context: SDMI (Secure Digital Music Initiative [http://www.sdmi.org]) > issued a public challenge to break their watermarking technology intended > to protect copyrights of digital music files. Some academics took up the > challenge and broke the code. Now SDMI and RIAA (Recording Industry > Association of America) are trying to prevent the academics from > publishing the results of the contest they created in the first place. > Here some of the exchanges between the academics and the lawyers, as well > as the contentious paper itself. To get all the figures, go to the source: > http://cryptome.org/sdmi-attack.htm ] > > > > 26 April 2001: > > Date: Thu, 26 Apr 2001 08:51:31 -0400 > From: "Edward W. Felten" <felten@CS.Princeton.EDU> > To: sdmi-paper-info@CS.Princeton.EDU > Subject: Reading Between the Lines: Lessons from the SDMI Challenge > > The following statement was read by Edward W. Felten today at the Fourth > International Information Hiding Workshop, in Pittsburgh. > > =============== > > On behalf of the authors of the paper "Reading Between the Lines: Lessons > from the SDMI Challenge," I am disappointed to tell you that we will not be > presenting our paper today. > > Our paper was submitted via the normal academic peer-review process. The > reviewers, who were chosen for their scientific reputations and > credentials, enthusiastically recommended the paper for publication, due to > their judgment of the paper's scientific merit. > > Nevertheless, the Recording Industry Association of America, the SDMI > Foundation, and the Verance Corporation threatened to bring a lawsuit if we > proceeded with our presentation or the publication of our paper. Threats > were made against the authors, against the conference organizers, and > against their respective employers. > > Litigation is costly, time-consuming, and uncertain, regardless of the > merits of the other side's case. Ultimately we, the authors, reached a > collective decision not to expose ourselves, our employers, and the > conference organizers to litigation at this time. > > We remain committed to free speech and to the value of scientific debate to > our country and the world. We believe that people benefit from learning the > truth about the products they are asked to buy. We will continue to fight > for these values, and for the right to publish our paper. > > We look forward to the day when we can present the results of our research > to you, our colleagues, through the normal scientific publication process, > so that you can judge our work for yourselves. > > > -------------------------------------------------------- > > 25 April 2001: > > Date: Wed, 25 Apr 2001 14:43:09 -0400 (EDT) > From: Jeremy A Erwin <jerwin@osf1.gmu.edu> > To: dvd-discuss@eon.law.harvard.edu > Subject: [dvd-discuss] SDMI Challenge Information > > The Secure Internet Programming Laboratory > (http://www.cs.princeton.edu/sip/) > posted this on their website > (http://www.cs.princeton.edu/sip/sdmi/) > > Update: Wednesday April 25, 2001, 1:30 PM EDT > > No decision has yet been announced regarding whether our presentation at > the Pittsburgh conference will go ahead. The presentation is scheduled for > 10:00 AM on Thursday. We will post any updated information here, as it > becomes available. We have created a mailing list for people who are > interested in receiving any announcements relating to the status of our > paper and presentation. To subscribe, send email to > majordomo@cs.princeton.edu; the message body should contain the line > "subscribe sdmi-paper-info". > > > 20 April 2001. Thanks to Anonymous > > ------------------------------------------------------------------------ > > [Letter, 3 pp.] > > MATTHEW J. OPPENHEIM, ESQ. > Address illegible > > RIAA > > > April 9, 2001 > > Professor Edward Felten > Department of Computer Science > Princeton University > Princeton, NJ 08544 > > Dear Professor Felten, > > We understand that in conjunction with the 4th International Information > Hiding Workshop to be held April 25-29, 2001, you and your colleagues who > participated in last year's Secure Digital Music Initiative ("SDMI") Public > Challenge are planning to publicly release information concerning the > technologies that were included in that challenge and certain methods you > and your colleagues developed as part of your participation in the > challenge. On behalf of the SDMI Foundation, I urge you to reconsider your > intentions and to refrain from any public disclosure of confidential > information derived from the Challenge and instead engage SDMI in a > constructive dialogue on how the academic aspects of your research can be > shared without jeopardizing the commercial interests of the owners of the > various technologies. > > As you are aware, at least one of the technologies that was the subject of > the Public Challenge, the Verance Watermark, is already in commercial use > and the disclosure of any information that might assist others to remove > this watermark would seriously jeopardize the technology and the content it > protects.1 Other technologies that were part of the Challenge are either > likewise in commercial use or could be could be utilized in this capacity > in the near future. Therefore, any disclosure of information that would > allow the defeat of those technologies would violate both the spirit and > the terms of the Click-Through Agreement (the "Agreement"). In addition, > any disclosure of information gained from participating in the Public > Challenge would be outside the scope of activities permitted by the > Agreement and couldsubject you and your research team to actions under the > Digital Millennium Copyright Act ("DCMA"). > > ____________________ > > 1 The Verance Watermark is currently used for DVD-Audio and SDMI Phase I > products and certain portions of that technology are trade secrets. > > > We appreciate your position, as articulated in the Frequently Asked > Questions document, that the purpose of releasing your research is not > designed to "help anyone impose or steal anything." Further more, you > participation in the Challenge and your contemplated disclosure appears to > be motivated by a desire to engage in scientific research that will ensure > that SDMI does not deploy a flawed system. Unfortunately, the disclosure > that you are contemplating could result in significantly broader > consequences and could directly lead to the illegal distribution of > copyrighted material. Such disclosure is not authorized in the Agreement, > would constitute a violation of the Agreement and would subject your > research team to enforcement actions under the DMCA and possibly other > federal laws. > > As you are aware, the Agreement covering the Public challenge narrowly > authorizes participants to attack the limited number of music samples and > files that were provided by SDMI. The specific purpose of providing these > encoded files and for setting up the Challenge was to assist SDMI in > determining which of the proposed technologies are best suited to protect > content in Phase II products. The limited waiver of rights (including > possible DMCA claims) that was contained in the Agreement specifically > prohibits participants from attacking content protected by SDMI > technologies outside the Public Challenge. If your research is released to > the public this is exactly what could occur. In short, you would be > facilitating and encouraging the attack of copyrighted content outside the > limited boundaries of the Public Challenge and thus places you and your > researchers in direct violation of the Agreement. > > In addition, because public disclosure of your research would be outside > the limited authorization of the Agreement, you could be subject to > enforcement actions under federal law, including the DMCA. The Agreement > specifically reserves any rights that proponents of the technology being > attacked may have "under any applicable law, including, without limitation, > the U.S. Digital Millennium Copyright Act, for any acts not expressly > authorized by their Agreement." The Agreement simply does not "expressly > authorize" participants to disclose information and research developed > through participating in the Public challenge and such disclosure could be > the subject of a DMCA action. > > We recognize and appreciate your position, made clear throughout this > process, that it is not your intention to engage in any illegal behavior or > to otherwise jeopardize the legitimate commercial interests of others. We > are concerned that your actions are outside the peer review process > established by the Public Challenge and setup by engineers and other > experts to ensure the academic integrity of this project. With these facts > in mind, we invite you to work with the SDMI Foundation to find a way for > you to share the academic components of your research while remaining true > to your intention to not violate the law or the Agreement. In the meantime, > we urge you to withdraw the paper submitted for the upcoming Information > Hiding Workshop, assure that it is removed from the Workshop distribution > materials and destroyed, and avoid a public discussion of confidential > information. > > Sincerely, > > [Signature] > > Matthew Oppenheim, Secretary > The SDMI Foundation > > cc: Mr. Ira S. Moskowitz, Program Chair, Information Hiding Workshop, Naval > Research Laboratory > Cpt. Douglas S. Rau, USN, Commanding Officer, Naval Research Laboratory > Mr. Howard Ende, General Counsel of Princeton > Mr. Edward Dobkin, Computer Science Department Head of Princeton > > ------------------------------------------------------------------------ > > [Paper, 15 pp.] > > > Reading Between the Lines: > Lessons from the SDMI Challenge > > > Scott A. Craver1, John R McGregor1, Min Wu1, Bede Liu1, > Adam Stubblefield2, Ben Swartzlander2, Dan S. Wallach2, > Drew Dean3, and Edward W. Felten4 > > 1 Dept. of Electrical Engineering, Princeton University > 2 Dept. of Computer Science, Rice University > 3 Computer Science Laboratory, Xerox Palo Alto Research Center > 4 Dept. of Computer Science, Princeton University > > Abstract. The Secure Digital Music Initiative is a consortium of parties > interested in preventing piracy of digital music, and to this end they are > developing architectures for content protection on untrusted platforms. > SDMI recently held a challenge to test the strength of 4 watermarking > technologies, and 2 other security technologies. No documentation explained > the implementations of the technologies, and neither watermark embedding > nor detecting software was directly accessible to challenge participants. > We nevertheless accepted the challenge, and learned a great deal about the > inner workings of the technologies. We report on our results here. > > 1 Introduction > > The Secure Digital Music Initiative (SDMI), a consortium of music-industry > companies, is working to develop and standardize technologies that give > music publishers more control over what consumers can do with recorded > music that they buy. SDMI has been a somewhat secretive organization, > releasing little information to the public about its goals, deliberations, > and technology. > > In September 2000, SDMI announced a "public challenge" in which it invited > members of the public to try to break certain data-encoding technologies > that SDMI had developed [3]. The challenge offered a valuable window into > SDMI, not only into its technologies but also into its plans and goals. We > decided to use the challenge to learn as much as we could about SDMI. This > paper is the result of our study.1 Section 2 presents an overview of the > HackSDMI challenge. Section 3 analyzes the watermark challenges. Section 4 > analyzes the non-watermark challenges. Finally, we present our conclusions > in section 5. > > ____________________ > > 1 The SDMI challenge offered a small cash payment to be shared among > everyone who broke at least one of the technologies and was willing to sign > a confidentiality agreement giving up all rights to discuss their findings. > The cash prize amounted to the price of a few days of time from a skilled > computer security consultant, and it was to be split among all successful > entrants, a group that we suspected might be significant in size. We chose > to forgo the payment and retain our right to publish this paper. > > > 2 The SDMI Challenge > > The SDMI challenge extended over roughly a three-week period, from > September 15, 2000 until October 8, 2000. The challenge actually consisted > of six sub-challenges, named with the letters A through F, each involving a > different technology developed by SDMI. We believe these challenges > correspond to submissions to the SDMI's Call for Proposals for Phase II > Screening Technology [4]. According to this proposal, the watermark's > purpose is to restrict an audio clip which is compressed or has previously > been compressed. That is, if the watermark is present an audio clip may yet > be admitted into an SDMI device, but only if it has not been degraded by > compression. For each challenge, SDMI provided some information about how a > technology worked, and then challenged the public to create an object with > a certain property. The exact information provided varied among the > challenges. We note, though, that in all six cases SDMI provided less > information than a music pirate would have access to in practice. > > 2.1 Watermark Challenges > > Four of the challenges (A, B, C, and F), involved watermarking > technologies, in which subtle modifications are made to an audio file, to > encode copyright control information without perceptible change in how the > file sounds. Watermarks can be either robust or fragile. Robust watermarks > are designed to survive common transformations like digital-to-audio > conversion, compression and decompression, and the addition of small > amounts of noise to the file. Fragile watermarks do not survive such > transformations, and are used to indicate modification of the file. For > each of the four watermark challenges, SDMI provided three files: > > - File 1: an unwatermarked song; > > - File 2: File 1, with a watermark added; and > > - File 3: another watermarked song. > > The challenge was to produce a file that sounded just like File 3 but did > not have a watermark -- in other words, to remove the watermark from File > 3. > > SDMI provided an on-line "oracle" for each challenge. Entrants could email > a file to the oracle, and the oracle would tell them whether their > submission satisfied the challenge, that is, whether it contained no > detectable watermark while still sounding like File 3. Entrants were given > no information about how watermark information was stored in the file or > how the oracle detected watermarks, beyond the information that could be > deduced from inspection of the three provided files. > > 2.2 Challenges D and E > > Challenge D concerned a technology designed to prevent a song from being > separated from the album in which it was issued. Normally, every Compact > Disc contains a table of contents, indicating the offsets and lengths of > each audio track, followed by the audio data itself. Challenge D adds an > "authenticator" track (approximately 50ms of very quiet audio,) a digital > signature derived from the table of contents, which is supposed to be > difficult to compute for an arbitrary CD. Challenge D is discussed in more > detail in Section 4.1. > > Challenge E involved a technology similar to D, but one which would be > immune the obvious attack on technology D, in which one compiled an > unauthorized CD with the same table of contents as an authorized one, for > which the authenticator track is given. Unfortunately, this challenge was > constructed in a way that made it impossible to even start analyzing the > technology. SDMI provided an oracle for this challenge, but unfortunately > provided no music samples of any kind, so there was no way to determine > what the oracle might be testing for. > > Given these facts, we decided not to analyze Challenge E. It is discussed > briefly in Section 4.2. > > 3 The Watermarking Schemes > > In this section, we describe our attack(s) on each of the four watermark > challenges (A,B,C,F). Our success was confirmed by emails received from > SDMI's oracles. > > > > Fig. 1. The SDMI watermark attack problem. For each of the four watermark > challenges, Sample-1, sample-2, and sample-3 are provided by SDMI sample-4 > is generated by participants in the challenge and submitted to SDMI oracle > for testing. > > Figure 1 provides an overview of the challenge goal. As mentioned earlier, > there are three audio files per watermark challenge: an original and > watermarked version of one clip, and then a watermarked version of a second > clip, from which the mark is to be removed. All clips were 2 minutes long, > sampled at 44.1kHz with 16-bit precision. > > The reader should note one serious flaw with this challenge arrangement. > The goal is to remove a robust mark, while these proposals appear to be > Phase II watermark screening technologies [4]. As we mentioned earlier, a > Phase II screen is intended to reject audio clips if they have been > compressed, and presumably compression degrades a fragile component of the > watermark. An attacker need not remove the robust watermark to foil the > Phase II screen, but could instead repair the modified fragile component in > compressed audio. This attack was not possible under the challenge setup. > > 3.1 Attack and Analysis of Technology A > > A reasonable first step in analyzing watermarked content with original, > unmarked samples is differencing the original and marked versions in some > way. Initially, we used sample-by-sample differences in order to determine > roughly what kinds of watermark- ing methods were taking place. > Unfortunately, technology A involved a slowly varying phase distortion > which masked any other cues in a sample-by-sample difference. We ultimately > decided this distortion was a pre-processing separate from the watermark, > in part because undoing the distortion alone did not foil the oracle. > > The phase distortion nevertheless led us to attempt an attack in which both > the phase and magnitude change between sample 1 and sample 2 is applied to > sample 3. This attack was confirmed by SDMI's oracle as successful, and > illustrates the general attack approach of imposing the difference in an > original-watermark pair upon another media clip. Here, the "difference" is > taken in the FFT domain rather than the time domain, based on our > suspicions regarding the domain of embedding. Note that this attack did not > require much information about the watermarking scheme itself, and > conversely did not provide much extra insight into its workings. > > A next step, then, is to compute the frequency response H(w) = W(w)/O(w) of > the watermarking process for segments of audio, and observe both |H(w)| and > the corresponding impulse response h(t). If the watermark is based on some > kind of linear filter, whose properties change slowly enough relative to > the size of a frame of samples, then this approach is ideal. > > Figure 2 illustrates one frequency response and impulse response about 0.3 > seconds into the music. These responses are based on FFTs of 882 samples, > or one fiftieth second of music. As can be clearly seen, a pair of > sinusoidal ripples are present within a certain frequency band, > approximately 8-16Khz. Ripples in the frequency domain are indicative of > echoes in the time domain, and a sum of sinusoids suggested the presence of > multiple echoes. The corresponding impulse response h(t) confirms this. > This pattern of ripples changes quite rapidly from frame to frame. > > Thus, we had reason to suspect a complex echo hiding system, involving > multiple time-varying echoes. It was at this point that we considered a > patent search, knowing enough about the data hiding method that we could > look for specific search terms, and we were pleased to discover that this > particular scheme appears to be listed as an alternative embodiment in US > patent number 05940135, awarded to Aris corporation, now part of Verance > [5]. This provided us with little more detail than we had already > discovered, but confirmed that we were on the right track, as well as > providing the probable identity of the company which developed the scheme. > It also spurred no small amount of discussion of the validity of > Kerckhoffs's criterion, the driving principle in security that one must not > rely upon the obscurity of an algorithm. This is, surely, doubly true when > the algorithm is patented. > > > > Fig. 2. A short-term complex echo. Above, the frequency response between > the watermarked and original music, taken over 1/50 second, showing a > sinusoidal ripple between 8 and 16 KHz. Below, the corresponding impulse > response. The sinusoidal pattern in the frequency domain corresponds to a > pair of echoes in the time domain. > > The most useful technical detail provided by the patent was that the "delay > hopping" pattern was likely discrete rather than continuous, allowing us to > search for appropriate frame sizes during which the echo parameters were > constant. Data collection from the first second of audio showed a frame > size of approximately 882 samples, or 1/50 second. We also observed that > the mark did not begin until 10 frames after the start of the music, and > that activity also existed in a band of lower frequency, approximately 4-8 > Khz. This could be the same echo obscured by other operations, or could be > a second band used for another component in the watermarking scheme. A very > clear ripple in this band, indicating a single echo with a delay of about > 34 samples, appears shortly before the main echo-hopping pattern begins. > > The next step in our analysis was the determination of the delay hopping > pattern used in the watermarking method, as this appeared to be the "secret > key" of the data embedding scheme. It is reasonable to suspect that the > pattern repeats itself in short order, since a watermark detector should be > able to find a mark in a subclip of music, without any assistance initially > aligning the mark with the detector's hopping pattern. Again, an analysis > of the first second revealed a pattern of echo pairs that appeared to > repeat every 16 frames, as outlined in figure 3. The delays appear to fall > within six general categories, each delay approximately a multiple of 1/4 > millisecond. The exact values of the delays vary slightly, but this could > be the result of the phase distortion present in the music. > > > > Fig. 3. The hypothesized delay hopping pattern of technology A. Here two > stretches of 16 frames are illustrated side-by-side, with observed echoes > in each frame categorized by six distinct delays: 2, 3, 4, 5, 6 or 7 times > 0.00025 sec. Aside from several missing echoes, a pattern appears to repeat > every 16 frames. Note also that in each frame the echo gain is the same for > both echoes. > > The reader will also note that in apparently two frames there is only one > echo. If this pattern were the union of two pseudorandom patterns chosen > from six possible delay choices, two "collisions" would be within what is > expected by chance. > > Next, there is the issue of the actual encoded bits. Further work shows the > sign of the echo gain does not repeat with the delay-hopping pattern, and > so is likely at least part of an embedded message. Extracting such data > without the help of an original can be problematic, although the patent, of > course, outlines numerous detector structors which can be used to this end. > We developed several tools for cepstral analysis to assist us in the > process. See [2] for in introduction to cepstral analysis; Anderson and > Petitcolas [1] illustrate its use in attacks on echo hiding watermark > systems. > > With a rapidly changing delay, normal cepstral analysis does not seem a > good choice. However, if we know that the same echo is likely to occur at > multiples of 16/50 of a second, we can improve detector capability by > combining the information of multiple liftered2 log spectra. > > ____________________ > > 2 in accordance with the flopped vocabulary used with cepstral analysis, > "liftering" refers to the process of filtering data in the frequency domain > rather than the time domain. Similarly, "quefrencies" are frequencies of > ripples which occur in the frequency domain rather than the time domain. > > > Three detector structures are shown in figure 4. In all three, a collection > of frames are selected for which the echo delays are believed to be the > same. For each, the liftered log of an FFT or PSD of the frame is taken. In > the first two structures, we compute a cepstrum, for each frame, then > either average their squared magnitudes, or simply their squares, in hopes > that a spike of the appropriate quefrency will be clear in the combination. > The motivation for merely squaring the spectral coefficients comes from the > observation that a spike due to an echo will either possess a phase of > theta or theta + pi for some value theta. Squaring without taking > magnitudes can cause the echo phases to reinforce, whilst still permitting > other elements to combine destructively. > > > > Fig. 4. Three cepstral detector structures. In each case we have a > collection of distinct frames, each believed to possess echoes of the same > delay. The first two compute cepstral data for each frame, and sum their > squares (or squared magnitudes) to constructively combine the echo signal > in all frames. The third structure illustrates a method for testing a > hypothesized pattern of positive and negative gains, possibly useful for > brute-forcing or testing for the presence of a known "ciphertext." > > In the final structure, one cepstrum. is taken using a guess of the gain > sign for each suspect frame. With the correct guess, the ripple should be > strongest, resulting in the largest spike from the cepstral detector. > Figure 5 shows the output of this detector on several sets of suspect > frames. While this requires an exponential amount of work for a given > amount of frames, it has a different intended purpose: this is a > brute-forcing tool, a utility for determining the most probable among a set > of suspected short strings of gain signs as an aid to extracting possible > ciphertext values. > > > > Fig. 5. Detection of an echo. A screenshot of our CepstroMatic utility > shows a combination of 4 separate frames of music, each a fiftieth of a > second long, in which the same echo delay was believed to exist. Their > combination shows a very clear ripple on the right, corresponding to a > clear cepstral spike on the left. This is a single echo at a delay of 33 > samples, the delay suggested for these intervalus by the hypothesized > delay-hopping pattern. > > Finally, there is the issue of what this embedded watermark means. Again, > we are uncertain about a possible signalling band below 8Khz. This could be > a robust mark, signalling presence of a fragile mark of echoes between 8 > and 16 KHz. The 8-16KHz band does seem like an unusual place to hide robust > data, unless it does indeed extend further down, and so this could very > easily be hidden information whose degredation is used to determine if > music has already been compressed. > > Of course, knowledge of either the robust or fragile component of the mark > is enough for an attacker to circumvent the scheme, because one can either > remove the robust mark, or repair or reinstate the fragile mark after > compression has damaged it. As mentioned earlier, this possible attack of > repairing the fragile component appears to have been ruled out by the > nature of the SDMI challenge oracles. One must wait and see if real-world > attackers will attempt such an approach, or resort to more brute methods or > oracle attacks to remove the robust component. > > 3.2 Attack on Challenge B > > We analyzed samp1b.wav and samp2b.wav using short-time FFT. Shown in Fig. 6 > are the two FFT magnitudes for 1000 samples at 98.67 sec. Also shown is the > difference of the two magnitudes. A spectrum notch around 2800Hz is > observed for some segments of samp2b.wav and another notch around 3500Hz is > observed for some other segments of samp2b.wav. Similar notches are > observed in samp3b.wav. The attack fills in those notches of samp3b.wav > with random but bounded coefficient values. We also submitted a variation > of this attack involving different parameters for notch description. Both > attacks were confirmed by SDMI oracle as successful. > > > > Fig. 6. Technology-B: FFT magnitudes of samp1b.wav and samp2b.wav and their > difference for 1000 samples at 98.67 sec. > > 3.3 Attacks on Challenge C > > By taking the difference of samp1c.wav and samp2c.wav, bursts of narrowband > signal are observed, as shown in Fig. 7. These narrow band bursts appear to > be centered around 1350 Hz. Two different attacks were applied to Challenge > C. In the first at- tack, we shifted the pitch of the audio by about a > quartertone. In the second attack, we passed the signal through a bandstop > filter centered around 1350Hz. Our submissions were confirmed by SDMI > oracle as successful. In addition, the perceptual quality of both attacks > has passed the "golden ear" testing conducted by SDMI after the 3-week > challenge. > > > > Fig. 7. Challenge-C: Waveform of the difference between samp1c.wav and > samp2c.wav. > > 3.4 Attack on Challenge F > > For Challenge F, we warped the time axis, by inserting a periodically > varying delay. The delay function comes from our study on Technology-A, and > was in fact initially intended to undo the phase distortion applied by > technology A. Therefore the perceptual quality of our attacked audio is > expected to be better than or comparable to that of the audio watermarked > by Technology-A. We also submitted variations of this at- tack involving > different warping parameters and different delay function. They were > confirmed by SDMI oracle as successful. > > 4 The Non-Watermark Technologies > > The HackSDMI challenge contained two "non-watermark" technologies. > Together, they appear to be intended to prevent the creation of "mix" CDs, > where a consumer might compile audio files from various locations to a > writable CD. This would be enforced by universally embedding SMDI logic > into consumer audio CD players. > > 4.1 Technology D > > According to SDMI, Technology D was designed to require "the presence of a > CD in order to 'rip' or extract a song for SDMI purposes." The technology > aimed to accomplish this by adding a 53.3 ms audio track (four blocks of CD > audio), which we will refer to as the authenticator, to each CD. The > authenticator, combined with the CD's table of contents (TOC), would allow > a SDMI device to recognize SDMI compliant CDs. For the challenge, SDMI > provided 100 different "correct" TOC-authenticator pairs as well as 20 > "rogue tracks". A rogue track is a track length that does not match any of > the track lengths in the 100 provided TOCs. The goal of the challenge was > to submit to the SDMI oracle a correct authenticator for a TOC that > contained at least one of the rogue tracks. > > The oracle for Technology D allowed several different query types. In the > first type, an SDMI provided TOC-authenticator combination is submitted so > a that user can "understand and verify the Oracle." According to SDMI, the > result of this query should either be "admit" for a correct pair or > "reject" for an incorrect pair. When we attempted this test a SDMI-provided > pair, the oracle responded that the submission was "invalid." After > verifying that we had indeed submitted a correct pair, we attempted several > other submissions using different TOC-authenticator pairs as well as > different browsers and operating systems3. We also submitted some pairs > that the oracle should have rejected; these submissions were also declared > "invalid." Though we alerted SDMI to this problem during the challenge, the > oracle was never repaired. For this reason, our analysis of Technology D is > incomplete and we lack definitive proof that it is correct. That having > been said, we think that what we learned about this technology, even > without the benefit of a correctly functioning oracle, is interesting. > > ____________________ > > 3 Specifically, Netscape Navigator and Mozilla under Linux, Netscape > Navigator under Windows NT, and Internet Explorer under Windows 98 and > 2000. > > > Analyzing the Signal Upon examination of the authenticator audio files, we > discovered several patterns. First, the left and right channels contain the > same information. The two channels differ by a "noise vector" u, which is a > vector of small integer values that range from -8 and 8. Since the > magnitude of the noise is so small, the noise vector does not significantly > affect the frequency characteristics of the signal. The noise values appear > to be random, but the noise vector is the same for each of the 100 provided > authenticator files. In other other words, in any authenticator file, the > difference between the left and right channels of the ith sample is a > constant fixed value u[i]. This implies that the noise vector u does not > encode any TOC-specific information. > > Second, the signal repeats with a period of 1024 samples. Because the full > signal is 2352 samples long, the block repeats approximately 1.3 times. > Similarly to the left and right channels of the signal, the first two > iterations of the repeating signal differ by a constant noise vector v. The > difference between the ith sample of the first iteration and the ith sample > of the second iteration differ by a small (and apparently random) integer > value v[i] ranging from -15 to 15. In addition, v is the same for each of > the provided authenticator files, so v does not encode any TOC-specific > information. > > Third, the first 100 samples and last 100 samples of the full signal are > faded in and faded out, respectively. This is illustrated in Figure 8. The > fade-in and fade-out are meaningless, however, because they simply destroy > data that is repeated in the middle of the file. We conjecture that this > fade-in and fade-out are included so that the audio signal does not sound > offensive to a human ear. > > > > Fig. 8. In a Technology D Authenticator, the signal fades in, repeats, and > fades out. > > Extracting the Data Frequency analysis on the 1024 sample block shows that > almost all of the signal energy is concentrated in the 16-20kHz range, as > shown in Figure 9. We believe this range was chosen because these > frequencies are less audible to the human ear. Closer examination shows > that this l6-20kHz range is divided up into 80 discrete bins, each of which > appears to carry one bit of information. As shown in Figure 10, these bits > can be manually counted by a human using a graph of the magnitude of signal > in the frequency domain. > > > > Fig. 9. Magnitude vs. Frequency of Technology D Authenticator > > > > > Fig. 10. Individual Bits >From a Technology D Authenticator > > Close inspection and pattern matching on these 80 bits of information > reveals that there are only 16 bits of information repeated 5 times using > different permutations. using the letters A-P to symbolize the 16 bits, > these 5 permutations are described in Figure 11. > > ABCDEFGHIJKLMNOP > OMILANHGPBDCKJFE > PKINHODFMJBCAGLE > FCKLGMEPNOADJBHI > PMGHLECAKDONIFJB > > Fig. 11. The encoding of the 16 bits of data in Technology D > > Because of the malfunctioning oracle, we were unable to determine the > function used to map TOCs to authenticators, but given an actual SDMI > device, it would be trivial to brute force all 216 possibilities. Likewise, > without the oracle, we could not determine if there was any other signal > present in the authenticator (e.g., in the phase of the frequency > components with nonzero magnitude). > > For the moment, let us assume that the hash function used in Technology D > has only 16 bits of output. Given the number of distinct CDs available, an > attacker should be able to acquire almost, if not all, of the > authenticators. We note that at 9 kilobytes each, a collection of 65,536 > files would fit nicely on a single CD. Many people have CD collections of > 300+ discs, which by the birthday paradox makes it more likely than not > that there is a hash collision among their own collection. > > Our results indicated that the hash function used in Technology D could be > weak or may have less than 16 bits of output. In the 100 authenticator > samples provided in the Technology D challenge, there were 2 pairs of > 16-bit hash collisions. We will not step through the derivation here, but > the probability of two or more collisions occurring in n samples of X > equally likely possibilities is: > > If the 16-bit hash function output has 16 bits of entropy, the probability > of 2 collisions occurring in n = 100 samples of X = 216 possibilities is > 0.00254 (by the above 1.5 equation). If X ~ 211.5, the chances of two > collisions occurring is about even. This suggests that either 4 bits of the > 16-bit hash output may be outputs of functions of the other 12 bits or the > hash function used to generate the 16-bit signature is weak. It is also > possible that the challenge designers purposefully selected TOCs that yield > collisions. The designers could gauge the progress of the contestants by > observing whether anyone submits authenticator A with TOC B to the oracle, > where authenticator A is equal to authenticator B. Besides the relatively > large number of collisions in the provided authenticators, it appears that > there are no strong biases in the authenticator bits such as significantly > more or less 1's than 0's. > > 4.2 Technology E > > Technology E is designed to fix a specific bug in Technology D: the TOC > only mentions the length of each song but says nothing about the contents > of that song. As such, an attacker wishing to produce a mix CD would only > need to find a TOC approximately the same as the desired mix CD, then copy > the TOC and authenticator from that CD onto the mix CD. If the TOC does not > perfectly match the CD, the track skipping functionality will still work > but will only get "close" to track boundaries rather than reaching them > precisely. Likewise, if a TOC specified a track length longer than the > track we wished to put there, we could pad the track with digital silence > (or properly SDMI-watermarked silence, copied from another valid track). > Regardless, a mix CD played from start to end would work perfectly. > Technology E is designed to counter this attack, using the audio data > itself as part of the authentication process. > > The Technology E challenge presented insufficient information to be > properly studied. Rather than giving us the original audio tracks (from > which we might study the unspecified watermarking scheme), we were instead > given the tables of contents for 1000 CDs and a simple scripting language > to specify a concatenation of music clips from any of these CDs. 'Me oracle > would process one of these scripts and then state whether the resulting CD > would be rejected. > > While we could have mounted a detailed statistical analysis, submitting > hundreds or thousands of queries to the oracle, we believe the challenge > was fundamentally flawed. In practice, given a functioning SDMI device and > actual SDMI-protected content, we could study the audio tracks in detail > and determine the structure of the watermarking scheme. > > 5 Conclusion > > In this paper, we have presented an analysis of the technology challenges > issued by the Secure Digital Music Initiative. Each technology challenge > described a specific goal (e.g., remove a watermark from an audio track) > and offered a Web-based oracle that would confirm whether the challenge was > successfully defeated. > > We have reverse-engineered and defeated all four of their audio > watermarking technologies. We have studied and analyzed both of their > "non-watermarking" technologies to the best of our abilities given the lack > of information available to us and given a broken oracle in one case. > > Some debate remains on whether our attacks damaged the audio beyond > standards measured by "golden ear" human listeners. Given a sufficient body > of SDMI-protected content using the watermark schemes presented here, we > are confident we could refine our attacks to introduce distortion no worse > than the watermarks themselves introduce to the the audio. Likewise, debate > remains on whether we have truly defeated technologies D and E. Given a > functioning implementation of these technologies, we are confident we can > defeat them. > > Do we believe we can defeat any audio protection scheme? Certainly, the > technical details of any scheme will become known publicly through reverse > engineering. Using the techniques we have presented here, we believe no > public watermark-based scheme intended to thwart copying will succeed. > Other techniques may or may not be strong against attacks. For example, the > encryption used to protect consumer DVDs was easily defeated. Ultimately, > if it is possible for a consumer to hear or see protected content, then it > will be technically possible for the consumer to copy that content. > > References > > 1. R. J. ANDERSON, AND F. A. P. PETITCOLAS. On the limits of steganography. > IEEE Journal of Selected Areas in Communications 16,4 (May 1998),474-481. > > 2. R. P. BOGERT, M., AND J. W. TUKEY. The quefrency alanysis of time series > for echoes: Cepstrum, pseudo-autocovariance, cross-ceptsrum and > saphe-cracking. In Proceedings of the Symposium on Time Series Analysis > (Brown University, June 1962), pp. 209-243. > > 3. R. PETROVIC, J. M. WINOGRAD, K., AND E. METOIS. Apparatus and method for > encoding and decoding information in analog signals, Aug. 1999. US Patent > No 05940135 http://www.delphion.com/details?pn=US05940135__. > > 4. SECURE DIGITAL MUSIC INITIATIVE. Call for Proposals for Phase II > Screening Technology, Version 1.0, Feb. 2000. > http://www.sdmi.org/download/FRWG00022401-Ph2_CFPv1.0.PDF. > > 5. SECURE DIGITAL MUSIC INITIATIVE. SDMI public challenge, Sept. 2000. > http://www.hacksdmi.org. > > ------------------------------------------------------------------------ > > > > > --------------------++----- > Les faits sont faits. > http://www.fis.utoronto.ca/~stalder > > > # distributed via <nettime>: no commercial use without permission > # <nettime> is a moderated mailing list for net criticism, > # collaborative text filtering and cultural politics of the nets > # more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body > # archive: http://www.nettime.org contact: nettime@bbs.thing.net > > |