hey FLX! tHnX 4 the material!
g e a r w h o r
e
reprazent! reprazent!
reprazent! reprazent! reprazent! reprazent! reprazent!
reprazent! reprazent! reprazent!
reprazent! reprazent! reprazent! reprazent!
reprazent! reprazent! reprazent! reprazent! reprazent!
reprazent! reprazent!
reprazent! reprazent! reprazent!
reprazent! reprazent! reprazent! reprazent!
----- Original Message ----- From:
"Felix Stalder" < stalder@fis.utoronto.ca> To:
<nettime-l@bbs.thing.net> Sent:
Saturday, April 28, 2001 5:43 PM Subject: <nettime> Lessons from the
SDMI Challenge
> > [Context: SDMI (Secure Digital Music
Initiative [http://www.sdmi.org]) > issued a public challenge to break
their watermarking technology intended > to protect copyrights of
digital music files. Some academics took up the > challenge and broke
the code. Now SDMI and RIAA (Recording Industry > Association of
America) are trying to prevent the academics from > publishing the
results of the contest they created in the first place. > Here some of
the exchanges between the academics and the lawyers, as well > as the
contentious paper itself. To get all the figures, go to the source: >
http://cryptome.org/sdmi-attack.htm
] > > > > 26 April 2001: > > Date: Thu, 26
Apr 2001 08:51:31 -0400 > From: "Edward W. Felten" <felten@CS.Princeton.EDU> >
To: sdmi-paper-info@CS.Princeton.EDU> Subject: Reading Between the Lines: Lessons from the SDMI
Challenge > > The following statement was read by Edward W. Felten
today at the Fourth > International Information Hiding Workshop, in
Pittsburgh. > > =============== > > On behalf of the
authors of the paper "Reading Between the Lines: Lessons > from the SDMI
Challenge," I am disappointed to tell you that we will not be >
presenting our paper today. > > Our paper was submitted via the
normal academic peer-review process. The > reviewers, who were chosen
for their scientific reputations and > credentials, enthusiastically
recommended the paper for publication, due to > their judgment of the
paper's scientific merit. > > Nevertheless, the Recording Industry
Association of America, the SDMI > Foundation, and the Verance
Corporation threatened to bring a lawsuit if we > proceeded with our
presentation or the publication of our paper. Threats > were made
against the authors, against the conference organizers, and > against
their respective employers. > > Litigation is costly,
time-consuming, and uncertain, regardless of the > merits of the other
side's case. Ultimately we, the authors, reached a > collective decision
not to expose ourselves, our employers, and the > conference organizers
to litigation at this time. > > We remain committed to free speech
and to the value of scientific debate to > our country and the world.
We believe that people benefit from learning the > truth about the
products they are asked to buy. We will continue to fight > for these
values, and for the right to publish our paper. > > We look
forward to the day when we can present the results of our research > to
you, our colleagues, through the normal scientific publication
process, > so that you can judge our work for
yourselves. > > >
-------------------------------------------------------- > > 25
April 2001: > > Date: Wed, 25 Apr 2001 14:43:09 -0400
(EDT) > From: Jeremy A Erwin <jerwin@osf1.gmu.edu> > To:
dvd-discuss@eon.law.harvard.edu> Subject: [dvd-discuss] SDMI Challenge
Information > > The Secure Internet Programming Laboratory >
(http://www.cs.princeton.edu/sip/) > posted this on their website > (http://www.cs.princeton.edu/sip/sdmi/) > > Update: Wednesday April 25, 2001, 1:30 PM
EDT > > No decision has yet been announced regarding whether our
presentation at > the Pittsburgh conference will go ahead. The
presentation is scheduled for > 10:00 AM on Thursday. We will post any
updated information here, as it > becomes available. We have created a
mailing list for people who are > interested in receiving any
announcements relating to the status of our > paper and presentation. To
subscribe, send email to > majordomo@cs.princeton.edu; the
message body should contain the line > "subscribe
sdmi-paper-info". > > > 20 April 2001. Thanks to
Anonymous > >
------------------------------------------------------------------------ > >
[Letter, 3 pp.] > > MATTHEW J. OPPENHEIM, ESQ. > Address
illegible > > RIAA > > > April 9,
2001 > > Professor Edward Felten > Department of Computer
Science > Princeton University > Princeton, NJ
08544 > > Dear Professor Felten, > > We understand
that in conjunction with the 4th International Information > Hiding
Workshop to be held April 25-29, 2001, you and your colleagues who >
participated in last year's Secure Digital Music Initiative
("SDMI") Public > Challenge are planning to publicly release
information concerning the > technologies that were included in that
challenge and certain methods you > and your colleagues developed as
part of your participation in the > challenge. On behalf of the SDMI
Foundation, I urge you to reconsider your > intentions and to refrain
from any public disclosure of confidential > information derived from
the Challenge and instead engage SDMI in a > constructive dialogue on
how the academic aspects of your research can be > shared without
jeopardizing the commercial interests of the owners of the > various
technologies. > > As you are aware, at least one of the
technologies that was the subject of > the Public Challenge, the Verance
Watermark, is already in commercial use > and the disclosure of any
information that might assist others to remove > this watermark would
seriously jeopardize the technology and the content it > protects.1
Other technologies that were part of the Challenge are either > likewise
in commercial use or could be could be utilized in this capacity > in
the near future. Therefore, any disclosure of information that would >
allow the defeat of those technologies would violate both the spirit
and > the terms of the Click-Through Agreement (the "Agreement"). In
addition, > any disclosure of information gained from participating in
the Public > Challenge would be outside the scope of activities
permitted by the > Agreement and couldsubject you and your research team
to actions under the > Digital Millennium Copyright Act
("DCMA"). > > ____________________ > > 1 The Verance
Watermark is currently used for DVD-Audio and SDMI Phase I > products
and certain portions of that technology are trade
secrets. > > > We appreciate your position, as articulated
in the Frequently Asked > Questions document, that the purpose of
releasing your research is not > designed to "help anyone impose or
steal anything." Further more, you > participation in the Challenge and
your contemplated disclosure appears to > be motivated by a desire to
engage in scientific research that will ensure > that SDMI does not
deploy a flawed system. Unfortunately, the disclosure > that you are
contemplating could result in significantly broader > consequences and
could directly lead to the illegal distribution of > copyrighted
material. Such disclosure is not authorized in the Agreement, > would
constitute a violation of the Agreement and would subject your >
research team to enforcement actions under the DMCA and possibly other >
federal laws. > > As you are aware, the Agreement covering the
Public challenge narrowly > authorizes participants to attack the
limited number of music samples and > files that were provided by SDMI.
The specific purpose of providing these > encoded files and for setting
up the Challenge was to assist SDMI in > determining which of the
proposed technologies are best suited to protect > content in Phase II
products. The limited waiver of rights (including > possible DMCA
claims) that was contained in the Agreement specifically > prohibits
participants from attacking content protected by SDMI > technologies
outside the Public Challenge. If your research is released to > the
public this is exactly what could occur. In short, you would be >
facilitating and encouraging the attack of copyrighted content outside
the > limited boundaries of the Public Challenge and thus places you and
your > researchers in direct violation of the Agreement. > >
In addition, because public disclosure of your research would be
outside > the limited authorization of the Agreement, you could be
subject to > enforcement actions under federal law, including the DMCA.
The Agreement > specifically reserves any rights that proponents of the
technology being > attacked may have "under any applicable law,
including, without limitation, > the U.S. Digital Millennium
Copyright Act, for any acts not expressly > authorized by their
Agreement." The Agreement simply does not "expressly > authorize"
participants to disclose information and research developed > through
participating in the Public challenge and such disclosure could be > the
subject of a DMCA action. > > We recognize and appreciate your
position, made clear throughout this > process, that it is not your
intention to engage in any illegal behavior or > to otherwise
jeopardize the legitimate commercial interests of others. We > are
concerned that your actions are outside the peer review process >
established by the Public Challenge and setup by engineers and other >
experts to ensure the academic integrity of this project. With these
facts > in mind, we invite you to work with the SDMI Foundation to find
a way for > you to share the academic components of your research while
remaining true > to your intention to not violate the law or the
Agreement. In the meantime, > we urge you to withdraw the paper
submitted for the upcoming Information > Hiding Workshop, assure that it
is removed from the Workshop distribution > materials and destroyed, and
avoid a public discussion of confidential > information. > >
Sincerely, > > [Signature] > > Matthew Oppenheim,
Secretary > The SDMI Foundation > > cc: Mr. Ira S.
Moskowitz, Program Chair, Information Hiding Workshop, Naval >
Research Laboratory > Cpt. Douglas S. Rau, USN, Commanding Officer,
Naval Research Laboratory > Mr. Howard Ende, General Counsel of
Princeton > Mr. Edward Dobkin, Computer Science Department Head of
Princeton > >
------------------------------------------------------------------------ > >
[Paper, 15 pp.] > > > Reading Between the Lines: >
Lessons from the SDMI Challenge > > > Scott A. Craver1, John
R McGregor1, Min Wu1, Bede Liu1, > Adam Stubblefield2, Ben
Swartzlander2, Dan S. Wallach2, > Drew Dean3, and Edward W.
Felten4 > > 1 Dept. of Electrical Engineering, Princeton
University > 2 Dept. of Computer Science, Rice University > 3
Computer Science Laboratory, Xerox Palo Alto Research Center > 4 Dept.
of Computer Science, Princeton University > > Abstract. The Secure
Digital Music Initiative is a consortium of parties > interested in
preventing piracy of digital music, and to this end they are >
developing architectures for content protection on untrusted
platforms. > SDMI recently held a challenge to test the strength of 4
watermarking > technologies, and 2 other security technologies. No
documentation explained > the implementations of the technologies,
and neither watermark embedding > nor detecting software was directly
accessible to challenge participants. > We nevertheless accepted the
challenge, and learned a great deal about the > inner workings of the
technologies. We report on our results here. > > 1
Introduction > > The Secure Digital Music Initiative (SDMI), a
consortium of music-industry > companies, is working to develop and
standardize technologies that give > music publishers more control over
what consumers can do with recorded > music that they buy. SDMI has been
a somewhat secretive organization, > releasing little information to the
public about its goals, deliberations, > and technology. > >
In September 2000, SDMI announced a "public challenge" in which it
invited > members of the public to try to break certain data-encoding
technologies > that SDMI had developed [3]. The challenge offered a
valuable window into > SDMI, not only into its technologies but also
into its plans and goals. We > decided to use the challenge to learn as
much as we could about SDMI. This > paper is the result of our study.1
Section 2 presents an overview of the > HackSDMI challenge. Section 3
analyzes the watermark challenges. Section 4 > analyzes the
non-watermark challenges. Finally, we present our conclusions > in
section 5. > > ____________________ > > 1 The SDMI
challenge offered a small cash payment to be shared among > everyone who
broke at least one of the technologies and was willing to sign > a
confidentiality agreement giving up all rights to discuss
their findings. > The cash prize amounted to the price of a few days
of time from a skilled > computer security consultant, and it was to be
split among all successful > entrants, a group that we suspected might
be significant in size. We chose > to forgo the payment and retain our
right to publish this paper. > > > 2 The SDMI
Challenge > > The SDMI challenge extended over roughly a
three-week period, from > September 15, 2000 until October 8, 2000. The
challenge actually consisted > of six sub-challenges, named with the
letters A through F, each involving a > different technology
developed by SDMI. We believe these challenges > correspond to
submissions to the SDMI's Call for Proposals for Phase II > Screening
Technology [4]. According to this proposal, the watermark's > purpose is
to restrict an audio clip which is compressed or has previously > been
compressed. That is, if the watermark is present an audio clip
may yet > be admitted into an SDMI device, but only if it has not
been degraded by > compression. For each challenge, SDMI provided some
information about how a > technology worked, and then challenged the
public to create an object with > a certain property. The exact
information provided varied among the > challenges. We note, though,
that in all six cases SDMI provided less > information than a music
pirate would have access to in practice. > > 2.1 Watermark
Challenges > > Four of the challenges (A, B, C, and F), involved
watermarking > technologies, in which subtle modifications are made to
an audio file, to > encode copyright control information without
perceptible change in how the > file sounds. Watermarks can be either
robust or fragile. Robust watermarks > are designed to survive common
transformations like digital-to-audio > conversion, compression and
decompression, and the addition of small > amounts of noise to the file.
Fragile watermarks do not survive such > transformations, and are used
to indicate modification of the file. For > each of the four watermark
challenges, SDMI provided three files: > > - File 1: an
unwatermarked song; > > - File 2: File 1, with a watermark added;
and > > - File 3: another watermarked song. > > The
challenge was to produce a file that sounded just like File 3 but did >
not have a watermark -- in other words, to remove the watermark from
File > 3. > > SDMI provided an on-line "oracle" for each
challenge. Entrants could email > a file to the oracle, and the oracle
would tell them whether their > submission satisfied the challenge, that
is, whether it contained no > detectable watermark while still sounding
like File 3. Entrants were given > no information about how watermark
information was stored in the file or > how the oracle detected
watermarks, beyond the information that could be > deduced from
inspection of the three provided files. > > 2.2 Challenges D and
E > > Challenge D concerned a technology designed to prevent a
song from being > separated from the album in which it was issued.
Normally, every Compact > Disc contains a table of contents, indicating
the offsets and lengths of > each audio track, followed by the audio
data itself. Challenge D adds an > "authenticator" track (approximately
50ms of very quiet audio,) a digital > signature derived from the table
of contents, which is supposed to be > difficult to compute for an
arbitrary CD. Challenge D is discussed in more > detail in Section
4.1. > > Challenge E involved a technology similar to D, but one
which would be > immune the obvious attack on technology D, in which one
compiled an > unauthorized CD with the same table of contents as an
authorized one, for > which the authenticator track is given.
Unfortunately, this challenge was > constructed in a way that made it
impossible to even start analyzing the > technology. SDMI provided an
oracle for this challenge, but unfortunately > provided no music samples
of any kind, so there was no way to determine > what the oracle might be
testing for. > > Given these facts, we decided not to analyze
Challenge E. It is discussed > briefly in Section 4.2. > > 3
The Watermarking Schemes > > In this section, we describe our
attack(s) on each of the four watermark > challenges (A,B,C,F). Our
success was confirmed by emails received from > SDMI's
oracles. > > > > Fig. 1. The SDMI watermark attack
problem. For each of the four watermark > challenges, Sample-1,
sample-2, and sample-3 are provided by SDMI sample-4 > is generated by
participants in the challenge and submitted to SDMI oracle > for
testing. > > Figure 1 provides an overview of the challenge goal.
As mentioned earlier, > there are three audio files per watermark
challenge: an original and > watermarked version of one clip, and then a
watermarked version of a second > clip, from which the mark is to be
removed. All clips were 2 minutes long, > sampled at 44.1kHz with 16-bit
precision. > > The reader should note one serious flaw with this
challenge arrangement. > The goal is to remove a robust mark, while
these proposals appear to be > Phase II watermark screening technologies
[4]. As we mentioned earlier, a > Phase II screen is intended to reject
audio clips if they have been > compressed, and presumably compression
degrades a fragile component of the > watermark. An attacker need not
remove the robust watermark to foil the > Phase II screen, but could
instead repair the modified fragile component in > compressed audio.
This attack was not possible under the challenge setup. > > 3.1
Attack and Analysis of Technology A > > A reasonable first step in
analyzing watermarked content with original, > unmarked samples is
differencing the original and marked versions in some > way. Initially,
we used sample-by-sample differences in order to determine > roughly
what kinds of watermark- ing methods were taking place. > Unfortunately,
technology A involved a slowly varying phase distortion > which masked
any other cues in a sample-by-sample difference. We ultimately >
decided this distortion was a pre-processing separate from the
watermark, > in part because undoing the distortion alone did not foil
the oracle. > > The phase distortion nevertheless led us to
attempt an attack in which both > the phase and magnitude change
between sample 1 and sample 2 is applied to > sample 3. This attack was
confirmed by SDMI's oracle as successful, and > illustrates the general
attack approach of imposing the difference in an > original-watermark
pair upon another media clip. Here, the "difference" is > taken in the
FFT domain rather than the time domain, based on our > suspicions
regarding the domain of embedding. Note that this attack did not >
require much information about the watermarking scheme itself, and >
conversely did not provide much extra insight into its
workings. > > A next step, then, is to compute the frequency
response H(w) = W(w)/O(w) of > the watermarking process for segments
of audio, and observe both |H(w)| and > the corresponding impulse
response h(t). If the watermark is based on some > kind of linear
filter, whose properties change slowly enough relative to > the size of
a frame of samples, then this approach is ideal. > > Figure 2
illustrates one frequency response and impulse response about 0.3 >
seconds into the music. These responses are based on FFTs of 882
samples, > or one fiftieth second of music. As can be clearly seen, a
pair of > sinusoidal ripples are present within a certain frequency
band, > approximately 8-16Khz. Ripples in the frequency domain are
indicative of > echoes in the time domain, and a sum of sinusoids
suggested the presence of > multiple echoes. The corresponding
impulse response h(t) confirms this. > This pattern of ripples changes
quite rapidly from frame to frame. > > Thus, we had reason to
suspect a complex echo hiding system, involving > multiple time-varying
echoes. It was at this point that we considered a > patent search,
knowing enough about the data hiding method that we could > look for
specific search terms, and we were pleased to discover that this >
particular scheme appears to be listed as an alternative embodiment in
US > patent number 05940135, awarded to Aris corporation, now part of
Verance > [5]. This provided us with little more detail than we had
already > discovered, but confirmed that we were on the right track, as
well as > providing the probable identity of the company which developed
the scheme. > It also spurred no small amount of discussion of the
validity of > Kerckhoffs's criterion, the driving principle in security
that one must not > rely upon the obscurity of an algorithm. This is,
surely, doubly true when > the algorithm is
patented. > > > > Fig. 2. A short-term complex echo.
Above, the frequency response between > the watermarked and original
music, taken over 1/50 second, showing a > sinusoidal ripple between 8
and 16 KHz. Below, the corresponding impulse > response. The sinusoidal
pattern in the frequency domain corresponds to a > pair of echoes in the
time domain. > > The most useful technical detail provided by the
patent was that the "delay > hopping" pattern was likely discrete
rather than continuous, allowing us to > search for appropriate frame
sizes during which the echo parameters were > constant. Data collection
from the first second of audio showed a frame > size of approximately
882 samples, or 1/50 second. We also observed that > the mark did not
begin until 10 frames after the start of the music, and > that activity
also existed in a band of lower frequency, approximately 4-8 > Khz. This
could be the same echo obscured by other operations, or could be > a
second band used for another component in the watermarking scheme.
A very > clear ripple in this band, indicating a single echo with a
delay of about > 34 samples, appears shortly before the main
echo-hopping pattern begins. > > The next step in our analysis was
the determination of the delay hopping > pattern used in the
watermarking method, as this appeared to be the "secret > key" of the
data embedding scheme. It is reasonable to suspect that the > pattern
repeats itself in short order, since a watermark detector should be >
able to find a mark in a subclip of music, without any
assistance initially > aligning the mark with the detector's hopping
pattern. Again, an analysis > of the first second revealed a pattern of
echo pairs that appeared to > repeat every 16 frames, as outlined in
figure 3. The delays appear to fall > within six general categories,
each delay approximately a multiple of 1/4 > millisecond. The exact
values of the delays vary slightly, but this could > be the result of
the phase distortion present in the music. > > > >
Fig. 3. The hypothesized delay hopping pattern of technology A. Here
two > stretches of 16 frames are illustrated side-by-side, with observed
echoes > in each frame categorized by six distinct delays: 2, 3, 4, 5, 6
or 7 times > 0.00025 sec. Aside from several missing echoes, a pattern
appears to repeat > every 16 frames. Note also that in each frame the
echo gain is the same for > both echoes. > > The reader
will also note that in apparently two frames there is only one > echo.
If this pattern were the union of two pseudorandom patterns chosen >
from six possible delay choices, two "collisions" would be within what
is > expected by chance. > > Next, there is the issue of the
actual encoded bits. Further work shows the > sign of the echo gain
does not repeat with the delay-hopping pattern, and > so is likely at
least part of an embedded message. Extracting such data > without the
help of an original can be problematic, although the patent, of >
course, outlines numerous detector structors which can be used to
this end. > We developed several tools for cepstral analysis to
assist us in the > process. See [2] for in introduction to cepstral
analysis; Anderson and > Petitcolas [1] illustrate its use in attacks on
echo hiding watermark > systems. > > With a rapidly changing
delay, normal cepstral analysis does not seem a > good choice. However,
if we know that the same echo is likely to occur at > multiples of 16/50
of a second, we can improve detector capability by > combining the
information of multiple liftered2 log spectra. > >
____________________ > > 2 in accordance with the flopped
vocabulary used with cepstral analysis, > "liftering" refers to the
process of filtering data in the frequency domain > rather than the
time domain. Similarly, "quefrencies" are frequencies of > ripples which
occur in the frequency domain rather than the time
domain. > > > Three detector structures are shown in figure
4. In all three, a collection > of frames are selected for which the
echo delays are believed to be the > same. For each, the liftered log of
an FFT or PSD of the frame is taken. In > the first two structures,
we compute a cepstrum, for each frame, then > either average their
squared magnitudes, or simply their squares, in hopes > that a spike of
the appropriate quefrency will be clear in the combination. > The
motivation for merely squaring the spectral coefficients comes
from the > observation that a spike due to an echo will either
possess a phase of > theta or theta + pi for some value theta. Squaring
without taking > magnitudes can cause the echo phases to reinforce,
whilst still permitting > other elements to combine
destructively. > > > > Fig. 4. Three cepstral detector
structures. In each case we have a > collection of distinct frames, each
believed to possess echoes of the same > delay. The first two compute
cepstral data for each frame, and sum their > squares (or squared
magnitudes) to constructively combine the echo signal > in all frames.
The third structure illustrates a method for testing a > hypothesized
pattern of positive and negative gains, possibly useful for >
brute-forcing or testing for the presence of a known
"ciphertext." > > In the final structure, one cepstrum. is taken
using a guess of the gain > sign for each suspect frame. With the
correct guess, the ripple should be > strongest, resulting in the
largest spike from the cepstral detector. > Figure 5 shows the output of
this detector on several sets of suspect > frames. While this requires
an exponential amount of work for a given > amount of frames, it has a
different intended purpose: this is a > brute-forcing tool, a utility
for determining the most probable among a set > of suspected short
strings of gain signs as an aid to extracting possible > ciphertext
values. > > > > Fig. 5. Detection of an echo. A
screenshot of our CepstroMatic utility > shows a combination of 4
separate frames of music, each a fiftieth of a > second long, in which
the same echo delay was believed to exist. Their > combination shows a
very clear ripple on the right, corresponding to a > clear cepstral
spike on the left. This is a single echo at a delay of 33 > samples, the
delay suggested for these intervalus by the hypothesized > delay-hopping
pattern. > > Finally, there is the issue of what this embedded
watermark means. Again, > we are uncertain about a possible signalling
band below 8Khz. This could be > a robust mark, signalling presence
of a fragile mark of echoes between 8 > and 16 KHz. The 8-16KHz band
does seem like an unusual place to hide robust > data, unless it does
indeed extend further down, and so this could very > easily be hidden
information whose degredation is used to determine if > music has
already been compressed. > > Of course, knowledge of either the
robust or fragile component of the mark > is enough for an attacker to
circumvent the scheme, because one can either > remove the robust mark,
or repair or reinstate the fragile mark after > compression has damaged
it. As mentioned earlier, this possible attack of > repairing the
fragile component appears to have been ruled out by the > nature of the
SDMI challenge oracles. One must wait and see if real-world > attackers
will attempt such an approach, or resort to more brute methods or >
oracle attacks to remove the robust component. > > 3.2 Attack on
Challenge B > > We analyzed samp1b.wav and samp2b.wav using
short-time FFT. Shown in Fig. 6 > are the two FFT magnitudes for 1000
samples at 98.67 sec. Also shown is the > difference of the two
magnitudes. A spectrum notch around 2800Hz is > observed for some
segments of samp2b.wav and another notch around 3500Hz is > observed
for some other segments of samp2b.wav. Similar notches are > observed in
samp3b.wav. The attack fills in those notches of samp3b.wav > with
random but bounded coefficient values. We also submitted a variation >
of this attack involving different parameters for notch description.
Both > attacks were confirmed by SDMI oracle as
successful. > > > > Fig. 6. Technology-B: FFT
magnitudes of samp1b.wav and samp2b.wav and their > difference for
1000 samples at 98.67 sec. > > 3.3 Attacks on Challenge
C > > By taking the difference of samp1c.wav and samp2c.wav,
bursts of narrowband > signal are observed, as shown in Fig. 7. These
narrow band bursts appear to > be centered around 1350 Hz. Two
different attacks were applied to Challenge > C. In the first at-
tack, we shifted the pitch of the audio by about a > quartertone. In the
second attack, we passed the signal through a bandstop > filter centered
around 1350Hz. Our submissions were confirmed by SDMI > oracle as
successful. In addition, the perceptual quality of both attacks > has
passed the "golden ear" testing conducted by SDMI after the 3-week >
challenge. > > > > Fig. 7. Challenge-C: Waveform of
the difference between samp1c.wav and > samp2c.wav. > > 3.4
Attack on Challenge F > > For Challenge F, we warped the time
axis, by inserting a periodically > varying delay. The delay function
comes from our study on Technology-A, and > was in fact initially
intended to undo the phase distortion applied by > technology A.
Therefore the perceptual quality of our attacked audio is > expected to
be better than or comparable to that of the audio watermarked > by
Technology-A. We also submitted variations of this at- tack involving >
different warping parameters and different delay function. They were >
confirmed by SDMI oracle as successful. > > 4 The Non-Watermark
Technologies > > The HackSDMI challenge contained two
"non-watermark" technologies. > Together, they appear to be intended to
prevent the creation of "mix" CDs, > where a consumer might compile
audio files from various locations to a > writable CD. This would be
enforced by universally embedding SMDI logic > into consumer audio CD
players. > > 4.1 Technology D > > According to SDMI,
Technology D was designed to require "the presence of a > CD in order to
'rip' or extract a song for SDMI purposes." The technology > aimed to
accomplish this by adding a 53.3 ms audio track (four blocks of CD >
audio), which we will refer to as the authenticator, to each CD. The >
authenticator, combined with the CD's table of contents (TOC), would
allow > a SDMI device to recognize SDMI compliant CDs. For the
challenge, SDMI > provided 100 different "correct" TOC-authenticator
pairs as well as 20 > "rogue tracks". A rogue track is a track length
that does not match any of > the track lengths in the 100 provided TOCs.
The goal of the challenge was > to submit to the SDMI oracle a correct
authenticator for a TOC that > contained at least one of the rogue
tracks. > > The oracle for Technology D allowed several different
query types. In the > first type, an SDMI provided TOC-authenticator
combination is submitted so > a that user can "understand and verify the
Oracle." According to SDMI, the > result of this query should either be
"admit" for a correct pair or > "reject" for an incorrect pair. When we
attempted this test a SDMI-provided > pair, the oracle responded that
the submission was "invalid." After > verifying that we had indeed
submitted a correct pair, we attempted several > other submissions
using different TOC-authenticator pairs as well as > different browsers
and operating systems3. We also submitted some pairs > that the oracle
should have rejected; these submissions were also declared > "invalid."
Though we alerted SDMI to this problem during the challenge, the >
oracle was never repaired. For this reason, our analysis of Technology
D is > incomplete and we lack definitive proof that it is correct.
That having > been said, we think that what we learned about this
technology, even > without the benefit of a correctly functioning
oracle, is interesting. > > ____________________ > > 3
Specifically, Netscape Navigator and Mozilla under Linux, Netscape >
Navigator under Windows NT, and Internet Explorer under Windows 98 and >
2000. > > > Analyzing the Signal Upon examination of the
authenticator audio files, we > discovered several patterns. First, the
left and right channels contain the > same information. The two
channels differ by a "noise vector" u, which is a > vector of small
integer values that range from -8 and 8. Since the > magnitude of the
noise is so small, the noise vector does not significantly > affect
the frequency characteristics of the signal. The noise
values appear > to be random, but the noise vector is the same for
each of the 100 provided > authenticator files. In other other words,
in any authenticator file, the > difference between the left and right
channels of the ith sample is a > constant fixed value u[i]. This
implies that the noise vector u does not > encode any TOC-specific
information. > > Second, the signal repeats with a period of 1024
samples. Because the full > signal is 2352 samples long, the block
repeats approximately 1.3 times. > Similarly to the left and right
channels of the signal, the first two > iterations of the repeating
signal differ by a constant noise vector v. The > difference between
the ith sample of the first iteration and the ith sample > of the
second iteration differ by a small (and apparently random) integer >
value v[i] ranging from -15 to 15. In addition, v is the same for each
of > the provided authenticator files, so v does not encode any
TOC-specific > information. > > Third, the first 100 samples
and last 100 samples of the full signal are > faded in and faded out,
respectively. This is illustrated in Figure 8. The > fade-in and
fade-out are meaningless, however, because they simply destroy > data
that is repeated in the middle of the file. We conjecture that this >
fade-in and fade-out are included so that the audio signal does not
sound > offensive to a human ear. > > > > Fig.
8. In a Technology D Authenticator, the signal fades in, repeats, and >
fades out. > > Extracting the Data Frequency analysis on the 1024
sample block shows that > almost all of the signal energy is
concentrated in the 16-20kHz range, as > shown in Figure 9. We believe
this range was chosen because these > frequencies are less audible to
the human ear. Closer examination shows > that this l6-20kHz range is
divided up into 80 discrete bins, each of which > appears to carry
one bit of information. As shown in Figure 10, these bits > can be
manually counted by a human using a graph of the magnitude
of signal > in the frequency domain. > > > >
Fig. 9. Magnitude vs. Frequency of Technology D
Authenticator > > > > > Fig. 10. Individual Bits
From a Technology D Authenticator > > Close inspection and pattern
matching on these 80 bits of information > reveals that there are only
16 bits of information repeated 5 times using > different permutations.
using the letters A-P to symbolize the 16 bits, > these 5 permutations
are described in Figure 11. > > ABCDEFGHIJKLMNOP >
OMILANHGPBDCKJFE > PKINHODFMJBCAGLE > FCKLGMEPNOADJBHI >
PMGHLECAKDONIFJB > > Fig. 11. The encoding of the 16 bits of data
in Technology D > > Because of the malfunctioning oracle, we were
unable to determine the > function used to map TOCs to authenticators,
but given an actual SDMI > device, it would be trivial to brute force
all 216 possibilities. Likewise, > without the oracle, we could not
determine if there was any other signal > present in the authenticator
(e.g., in the phase of the frequency > components with nonzero
magnitude). > > For the moment, let us assume that the hash
function used in Technology D > has only 16 bits of output. Given the
number of distinct CDs available, an > attacker should be able to
acquire almost, if not all, of the > authenticators. We note that at 9
kilobytes each, a collection of 65,536 > files would fit nicely on a
single CD. Many people have CD collections of > 300+ discs, which by the
birthday paradox makes it more likely than not > that there is a hash
collision among their own collection. > > Our results indicated
that the hash function used in Technology D could be > weak or may have
less than 16 bits of output. In the 100 authenticator > samples provided
in the Technology D challenge, there were 2 pairs of > 16-bit hash
collisions. We will not step through the derivation here, but > the
probability of two or more collisions occurring in n samples of X >
equally likely possibilities is: > > If the 16-bit hash function
output has 16 bits of entropy, the probability > of 2 collisions
occurring in n = 100 samples of X = 216 possibilities is > 0.00254 (by
the above 1.5 equation). If X ~ 211.5, the chances of two > collisions
occurring is about even. This suggests that either 4 bits of the >
16-bit hash output may be outputs of functions of the other 12 bits or
the > hash function used to generate the 16-bit signature is weak. It is
also > possible that the challenge designers purposefully selected TOCs
that yield > collisions. The designers could gauge the progress of
the contestants by > observing whether anyone submits authenticator A
with TOC B to the oracle, > where authenticator A is equal to
authenticator B. Besides the relatively > large number of collisions in
the provided authenticators, it appears that > there are no strong
biases in the authenticator bits such as significantly > more or less
1's than 0's. > > 4.2 Technology E > > Technology E is
designed to fix a specific bug in Technology D: the TOC > only mentions
the length of each song but says nothing about the contents > of that
song. As such, an attacker wishing to produce a mix CD would only > need
to find a TOC approximately the same as the desired mix CD, then copy >
the TOC and authenticator from that CD onto the mix CD. If the TOC
does not > perfectly match the CD, the track skipping functionality
will still work > but will only get "close" to track boundaries rather
than reaching them > precisely. Likewise, if a TOC specified a track
length longer than the > track we wished to put there, we could pad the
track with digital silence > (or properly SDMI-watermarked silence,
copied from another valid track). > Regardless, a mix CD played from
start to end would work perfectly. > Technology E is designed to counter
this attack, using the audio data > itself as part of the authentication
process. > > The Technology E challenge presented insufficient
information to be > properly studied. Rather than giving us the original
audio tracks (from > which we might study the unspecified watermarking
scheme), we were instead > given the tables of contents for 1000 CDs and
a simple scripting language > to specify a concatenation of music clips
from any of these CDs. 'Me oracle > would process one of these
scripts and then state whether the resulting CD > would be
rejected. > > While we could have mounted a detailed statistical
analysis, submitting > hundreds or thousands of queries to the oracle,
we believe the challenge > was fundamentally flawed. In practice, given
a functioning SDMI device and > actual SDMI-protected content, we could
study the audio tracks in detail > and determine the structure of the
watermarking scheme. > > 5 Conclusion > > In this
paper, we have presented an analysis of the technology challenges >
issued by the Secure Digital Music Initiative. Each technology
challenge > described a specific goal (e.g., remove a watermark from an
audio track) > and offered a Web-based oracle that would confirm whether
the challenge was > successfully defeated. > > We have
reverse-engineered and defeated all four of their audio > watermarking
technologies. We have studied and analyzed both of their >
"non-watermarking" technologies to the best of our abilities given
the lack > of information available to us and given a broken oracle
in one case. > > Some debate remains on whether our attacks
damaged the audio beyond > standards measured by "golden ear" human
listeners. Given a sufficient body > of SDMI-protected content using
the watermark schemes presented here, we > are confident we could refine
our attacks to introduce distortion no worse > than the watermarks
themselves introduce to the the audio. Likewise, debate > remains on
whether we have truly defeated technologies D and E. Given a >
functioning implementation of these technologies, we are confident we
can > defeat them. > > Do we believe we can defeat any audio
protection scheme? Certainly, the > technical details of any scheme will
become known publicly through reverse > engineering. Using the
techniques we have presented here, we believe no > public
watermark-based scheme intended to thwart copying will succeed. > Other
techniques may or may not be strong against attacks. For
example, the > encryption used to protect consumer DVDs was easily
defeated. Ultimately, > if it is possible for a consumer to hear or see
protected content, then it > will be technically possible for the
consumer to copy that content. > > References > > 1.
R. J. ANDERSON, AND F. A. P. PETITCOLAS. On the limits
of steganography. > IEEE Journal of Selected Areas in Communications
16,4 (May 1998),474-481. > > 2. R. P. BOGERT, M., AND J. W. TUKEY.
The quefrency alanysis of time series > for echoes: Cepstrum,
pseudo-autocovariance, cross-ceptsrum and > saphe-cracking. In
Proceedings of the Symposium on Time Series Analysis > (Brown
University, June 1962), pp. 209-243. > > 3. R. PETROVIC, J. M.
WINOGRAD, K., AND E. METOIS. Apparatus and method for > encoding and
decoding information in analog signals, Aug. 1999. US Patent > No
05940135 http://www.delphion.com/details?pn=US05940135__. > > 4. SECURE DIGITAL MUSIC INITIATIVE. Call for
Proposals for Phase II > Screening Technology, Version 1.0, Feb.
2000. > http://www.sdmi.org/download/FRWG00022401-Ph2_CFPv1.0.PDF. > > 5. SECURE DIGITAL MUSIC INITIATIVE. SDMI public
challenge, Sept. 2000. > http://www.hacksdmi.org. > >
------------------------------------------------------------------------ > > > > >
--------------------++----- > Les faits sont faits. > http://www.fis.utoronto.ca/~stalder> > > # distributed via <nettime>: no
commercial use without permission > # <nettime> is a
moderated mailing list for net criticism, > # collaborative text
filtering and cultural politics of the nets > # more info:
majordomo@bbs.thing.net and "info
nettime-l" in the msg body > # archive: http://www.nettime.org contact:
nettime@bbs.thing.net> >
|