| 
   
     
  hey FLX! tHnX 4 the material!  
  g e a r w h o r 
  e 
   reprazent! reprazent! 
  reprazent! reprazent! reprazent! reprazent! reprazent! 
  reprazent! reprazent! reprazent! 
  reprazent! reprazent! reprazent! reprazent! 
  reprazent! reprazent! reprazent! reprazent! reprazent! 
  reprazent! reprazent! 
  reprazent! reprazent! reprazent! 
  reprazent! reprazent! reprazent! reprazent! 
    
    
    
   ----- Original Message ----- From: 
  "Felix Stalder" < stalder@fis.utoronto.ca> To: 
  <nettime-l@bbs.thing.net> Sent: 
  Saturday, April 28, 2001 5:43 PM Subject: <nettime> Lessons from the 
  SDMI Challenge
 
  > > [Context: SDMI (Secure Digital Music 
  Initiative [http://www.sdmi.org]) > issued a public challenge to break 
  their watermarking technology intended > to protect copyrights of 
  digital music files. Some academics took up the > challenge and broke 
  the code. Now SDMI and RIAA (Recording Industry > Association of 
  America) are trying to prevent the academics from > publishing the 
  results of the contest they created in the first place. > Here some of 
  the exchanges between the academics and the lawyers, as well > as the 
  contentious paper itself. To get all the figures, go to the source: > 
  http://cryptome.org/sdmi-attack.htm 
  ] > > > > 26 April 2001: > > Date: Thu, 26 
  Apr 2001 08:51:31 -0400 > From: "Edward W. Felten" <felten@CS.Princeton.EDU> > 
  To: sdmi-paper-info@CS.Princeton.EDU> Subject: Reading Between the Lines: Lessons from the SDMI 
  Challenge > > The following statement was read by Edward W. Felten 
  today at the Fourth > International Information Hiding Workshop, in 
  Pittsburgh. > > =============== > > On behalf of the 
  authors of the paper "Reading Between the Lines: Lessons > from the SDMI 
  Challenge," I am disappointed to tell you that we will not be > 
  presenting our paper today. > > Our paper was submitted via the 
  normal academic peer-review process. The > reviewers, who were chosen 
  for their scientific reputations and > credentials, enthusiastically 
  recommended the paper for publication, due to > their judgment of the 
  paper's scientific merit. > > Nevertheless, the Recording Industry 
  Association of America, the SDMI > Foundation, and the Verance 
  Corporation threatened to bring a lawsuit if we > proceeded with our 
  presentation or the publication of our paper. Threats > were made 
  against the authors, against the conference organizers, and > against 
  their respective employers. > > Litigation is costly, 
  time-consuming, and uncertain, regardless of the > merits of the other 
  side's case. Ultimately we, the authors, reached a > collective decision 
  not to expose ourselves, our employers, and the > conference organizers 
  to litigation at this time. > > We remain committed to free speech 
  and to the value of scientific debate to > our country and the world. 
  We believe that people benefit from learning the > truth about the 
  products they are asked to buy. We will continue to fight > for these 
  values, and for the right to publish our paper. > > We look 
  forward to the day when we can present the results of our research > to 
  you, our colleagues, through the normal scientific publication 
  process, > so that you can judge our work for 
  yourselves. > > > 
  -------------------------------------------------------- > > 25 
  April 2001: > > Date: Wed, 25 Apr 2001 14:43:09 -0400 
  (EDT) > From: Jeremy A Erwin <jerwin@osf1.gmu.edu> > To: 
  dvd-discuss@eon.law.harvard.edu> Subject: [dvd-discuss] SDMI Challenge 
  Information > > The Secure Internet Programming Laboratory > 
  (http://www.cs.princeton.edu/sip/) > posted this on their website > (http://www.cs.princeton.edu/sip/sdmi/) > > Update: Wednesday April 25, 2001, 1:30 PM 
  EDT > > No decision has yet been announced regarding whether our 
  presentation at > the Pittsburgh conference will go ahead. The 
  presentation is scheduled for > 10:00 AM on Thursday. We will post any 
  updated information here, as it > becomes available. We have created a 
  mailing list for people who are > interested in receiving any 
  announcements relating to the status of our > paper and presentation. To 
  subscribe, send email to > majordomo@cs.princeton.edu; the 
  message body should contain the line > "subscribe 
  sdmi-paper-info". > > > 20 April 2001. Thanks to 
  Anonymous > > 
  ------------------------------------------------------------------------ > > 
  [Letter, 3 pp.] > > MATTHEW J. OPPENHEIM, ESQ. > Address 
  illegible > > RIAA > > > April 9, 
  2001 > > Professor Edward Felten > Department of Computer 
  Science > Princeton University > Princeton, NJ 
  08544 > > Dear Professor Felten, > > We understand 
  that in conjunction with the 4th International Information > Hiding 
  Workshop to be held April 25-29, 2001, you and your colleagues who > 
  participated in last year's Secure Digital Music Initiative 
  ("SDMI") Public > Challenge are planning to publicly release 
  information concerning the > technologies that were included in that 
  challenge and certain methods you > and your colleagues developed as 
  part of your participation in the > challenge. On behalf of the SDMI 
  Foundation, I urge you to reconsider your > intentions and to refrain 
  from any public disclosure of confidential > information derived from 
  the Challenge and instead engage SDMI in a > constructive dialogue on 
  how the academic aspects of your research can be > shared without 
  jeopardizing the commercial interests of the owners of the > various 
  technologies. > > As you are aware, at least one of the 
  technologies that was the subject of > the Public Challenge, the Verance 
  Watermark, is already in commercial use > and the disclosure of any 
  information that might assist others to remove > this watermark would 
  seriously jeopardize the technology and the content it > protects.1 
  Other technologies that were part of the Challenge are either > likewise 
  in commercial use or could be could be utilized in this capacity > in 
  the near future. Therefore, any disclosure of information that would > 
  allow the defeat of those technologies would violate both the spirit 
  and > the terms of the Click-Through Agreement (the "Agreement"). In 
  addition, > any disclosure of information gained from participating in 
  the Public > Challenge would be outside the scope of activities 
  permitted by the > Agreement and couldsubject you and your research team 
  to actions under the > Digital Millennium Copyright Act 
  ("DCMA"). > > ____________________ > > 1 The Verance 
  Watermark is currently used for DVD-Audio and SDMI Phase I > products 
  and certain portions of that technology are trade 
  secrets. > > > We appreciate your position, as articulated 
  in the Frequently Asked > Questions document, that the purpose of 
  releasing your research is not > designed to "help anyone impose or 
  steal anything." Further more, you > participation in the Challenge and 
  your contemplated disclosure appears to > be motivated by a desire to 
  engage in scientific research that will ensure > that SDMI does not 
  deploy a flawed system. Unfortunately, the disclosure > that you are 
  contemplating could result in significantly broader > consequences and 
  could directly lead to the illegal distribution of > copyrighted 
  material. Such disclosure is not authorized in the Agreement, > would 
  constitute a violation of the Agreement and would subject your > 
  research team to enforcement actions under the DMCA and possibly other > 
  federal laws. > > As you are aware, the Agreement covering the 
  Public challenge narrowly > authorizes participants to attack the 
  limited number of music samples and > files that were provided by SDMI. 
  The specific purpose of providing these > encoded files and for setting 
  up the Challenge was to assist SDMI in > determining which of the 
  proposed technologies are best suited to protect > content in Phase II 
  products. The limited waiver of rights (including > possible DMCA 
  claims) that was contained in the Agreement specifically > prohibits 
  participants from attacking content protected by SDMI > technologies 
  outside the Public Challenge. If your research is released to > the 
  public this is exactly what could occur. In short, you would be > 
  facilitating and encouraging the attack of copyrighted content outside 
  the > limited boundaries of the Public Challenge and thus places you and 
  your > researchers in direct violation of the Agreement. > > 
  In addition, because public disclosure of your research would be 
  outside > the limited authorization of the Agreement, you could be 
  subject to > enforcement actions under federal law, including the DMCA. 
  The Agreement > specifically reserves any rights that proponents of the 
  technology being > attacked may have "under any applicable law, 
  including, without limitation, > the U.S. Digital Millennium 
  Copyright Act, for any acts not expressly > authorized by their 
  Agreement." The Agreement simply does not "expressly > authorize" 
  participants to disclose information and research developed > through 
  participating in the Public challenge and such disclosure could be > the 
  subject of a DMCA action. > > We recognize and appreciate your 
  position, made clear throughout this > process, that it is not your 
  intention to engage in any illegal behavior or > to otherwise 
  jeopardize the legitimate commercial interests of others. We > are 
  concerned that your actions are outside the peer review process > 
  established by the Public Challenge and setup by engineers and other > 
  experts to ensure the academic integrity of this project. With these 
  facts > in mind, we invite you to work with the SDMI Foundation to find 
  a way for > you to share the academic components of your research while 
  remaining true > to your intention to not violate the law or the 
  Agreement. In the meantime, > we urge you to withdraw the paper 
  submitted for the upcoming Information > Hiding Workshop, assure that it 
  is removed from the Workshop distribution > materials and destroyed, and 
  avoid a public discussion of confidential > information. > > 
  Sincerely, > > [Signature] > > Matthew Oppenheim, 
  Secretary > The SDMI Foundation > > cc: Mr. Ira S. 
  Moskowitz, Program Chair, Information Hiding Workshop, Naval > 
  Research Laboratory > Cpt. Douglas S. Rau, USN, Commanding Officer, 
  Naval Research Laboratory > Mr. Howard Ende, General Counsel of 
  Princeton > Mr. Edward Dobkin, Computer Science Department Head of 
  Princeton > > 
  ------------------------------------------------------------------------ > > 
  [Paper, 15 pp.] > > > Reading Between the Lines: > 
  Lessons from the SDMI Challenge > > > Scott A. Craver1, John 
  R McGregor1, Min Wu1, Bede Liu1, > Adam Stubblefield2, Ben 
  Swartzlander2, Dan S. Wallach2, > Drew Dean3, and Edward W. 
  Felten4 > > 1 Dept. of Electrical Engineering, Princeton 
  University > 2 Dept. of Computer Science, Rice University > 3 
  Computer Science Laboratory, Xerox Palo Alto Research Center > 4 Dept. 
  of Computer Science, Princeton University > > Abstract. The Secure 
  Digital Music Initiative is a consortium of parties > interested in 
  preventing piracy of digital music, and to this end they are > 
  developing architectures for content protection on untrusted 
  platforms. > SDMI recently held a challenge to test the strength of 4 
  watermarking > technologies, and 2 other security technologies. No 
  documentation explained > the implementations of the technologies, 
  and neither watermark embedding > nor detecting software was directly 
  accessible to challenge participants. > We nevertheless accepted the 
  challenge, and learned a great deal about the > inner workings of the 
  technologies. We report on our results here. > > 1 
  Introduction > > The Secure Digital Music Initiative (SDMI), a 
  consortium of music-industry > companies, is working to develop and 
  standardize technologies that give > music publishers more control over 
  what consumers can do with recorded > music that they buy. SDMI has been 
  a somewhat secretive organization, > releasing little information to the 
  public about its goals, deliberations, > and technology. > > 
  In September 2000, SDMI announced a "public challenge" in which it 
  invited > members of the public to try to break certain data-encoding 
  technologies > that SDMI had developed [3]. The challenge offered a 
  valuable window into > SDMI, not only into its technologies but also 
  into its plans and goals. We > decided to use the challenge to learn as 
  much as we could about SDMI. This > paper is the result of our study.1 
  Section 2 presents an overview of the > HackSDMI challenge. Section 3 
  analyzes the watermark challenges. Section 4 > analyzes the 
  non-watermark challenges. Finally, we present our conclusions > in 
  section 5. > > ____________________ > > 1 The SDMI 
  challenge offered a small cash payment to be shared among > everyone who 
  broke at least one of the technologies and was willing to sign > a 
  confidentiality agreement giving up all rights to discuss 
  their findings. > The cash prize amounted to the price of a few days 
  of time from a skilled > computer security consultant, and it was to be 
  split among all successful > entrants, a group that we suspected might 
  be significant in size. We chose > to forgo the payment and retain our 
  right to publish this paper. > > > 2 The SDMI 
  Challenge > > The SDMI challenge extended over roughly a 
  three-week period, from > September 15, 2000 until October 8, 2000. The 
  challenge actually consisted > of six sub-challenges, named with the 
  letters A through F, each involving a > different technology 
  developed by SDMI. We believe these challenges > correspond to 
  submissions to the SDMI's Call for Proposals for Phase II > Screening 
  Technology [4]. According to this proposal, the watermark's > purpose is 
  to restrict an audio clip which is compressed or has previously > been 
  compressed. That is, if the watermark is present an audio clip 
  may yet > be admitted into an SDMI device, but only if it has not 
  been degraded by > compression. For each challenge, SDMI provided some 
  information about how a > technology worked, and then challenged the 
  public to create an object with > a certain property. The exact 
  information provided varied among the > challenges. We note, though, 
  that in all six cases SDMI provided less > information than a music 
  pirate would have access to in practice. > > 2.1 Watermark 
  Challenges > > Four of the challenges (A, B, C, and F), involved 
  watermarking > technologies, in which subtle modifications are made to 
  an audio file, to > encode copyright control information without 
  perceptible change in how the > file sounds. Watermarks can be either 
  robust or fragile. Robust watermarks > are designed to survive common 
  transformations like digital-to-audio > conversion, compression and 
  decompression, and the addition of small > amounts of noise to the file. 
  Fragile watermarks do not survive such > transformations, and are used 
  to indicate modification of the file. For > each of the four watermark 
  challenges, SDMI provided three files: > > - File 1: an 
  unwatermarked song; > > - File 2: File 1, with a watermark added; 
  and > > - File 3: another watermarked song. > > The 
  challenge was to produce a file that sounded just like File 3 but did > 
  not have a watermark -- in other words, to remove the watermark from 
  File > 3. > > SDMI provided an on-line "oracle" for each 
  challenge. Entrants could email > a file to the oracle, and the oracle 
  would tell them whether their > submission satisfied the challenge, that 
  is, whether it contained no > detectable watermark while still sounding 
  like File 3. Entrants were given > no information about how watermark 
  information was stored in the file or > how the oracle detected 
  watermarks, beyond the information that could be > deduced from 
  inspection of the three provided files. > > 2.2 Challenges D and 
  E > > Challenge D concerned a technology designed to prevent a 
  song from being > separated from the album in which it was issued. 
  Normally, every Compact > Disc contains a table of contents, indicating 
  the offsets and lengths of > each audio track, followed by the audio 
  data itself. Challenge D adds an > "authenticator" track (approximately 
  50ms of very quiet audio,) a digital > signature derived from the table 
  of contents, which is supposed to be > difficult to compute for an 
  arbitrary CD. Challenge D is discussed in more > detail in Section 
  4.1. > > Challenge E involved a technology similar to D, but one 
  which would be > immune the obvious attack on technology D, in which one 
  compiled an > unauthorized CD with the same table of contents as an 
  authorized one, for > which the authenticator track is given. 
  Unfortunately, this challenge was > constructed in a way that made it 
  impossible to even start analyzing the > technology. SDMI provided an 
  oracle for this challenge, but unfortunately > provided no music samples 
  of any kind, so there was no way to determine > what the oracle might be 
  testing for. > > Given these facts, we decided not to analyze 
  Challenge E. It is discussed > briefly in Section 4.2. > > 3 
  The Watermarking Schemes > > In this section, we describe our 
  attack(s) on each of the four watermark > challenges (A,B,C,F). Our 
  success was confirmed by emails received from > SDMI's 
  oracles. > > > > Fig. 1. The SDMI watermark attack 
  problem. For each of the four watermark > challenges, Sample-1, 
  sample-2, and sample-3 are provided by SDMI sample-4 > is generated by 
  participants in the challenge and submitted to SDMI oracle > for 
  testing. > > Figure 1 provides an overview of the challenge goal. 
  As mentioned earlier, > there are three audio files per watermark 
  challenge: an original and > watermarked version of one clip, and then a 
  watermarked version of a second > clip, from which the mark is to be 
  removed. All clips were 2 minutes long, > sampled at 44.1kHz with 16-bit 
  precision. > > The reader should note one serious flaw with this 
  challenge arrangement. > The goal is to remove a robust mark, while 
  these proposals appear to be > Phase II watermark screening technologies 
  [4]. As we mentioned earlier, a > Phase II screen is intended to reject 
  audio clips if they have been > compressed, and presumably compression 
  degrades a fragile component of the > watermark. An attacker need not 
  remove the robust watermark to foil the > Phase II screen, but could 
  instead repair the modified fragile component in > compressed audio. 
  This attack was not possible under the challenge setup. > > 3.1 
  Attack and Analysis of Technology A > > A reasonable first step in 
  analyzing watermarked content with original, > unmarked samples is 
  differencing the original and marked versions in some > way. Initially, 
  we used sample-by-sample differences in order to determine > roughly 
  what kinds of watermark- ing methods were taking place. > Unfortunately, 
  technology A involved a slowly varying phase distortion > which masked 
  any other cues in a sample-by-sample difference. We ultimately > 
  decided this distortion was a pre-processing separate from the 
  watermark, > in part because undoing the distortion alone did not foil 
  the oracle. > > The phase distortion nevertheless led us to 
  attempt an attack in which both > the phase and magnitude change 
  between sample 1 and sample 2 is applied to > sample 3. This attack was 
  confirmed by SDMI's oracle as successful, and > illustrates the general 
  attack approach of imposing the difference in an > original-watermark 
  pair upon another media clip. Here, the "difference" is > taken in the 
  FFT domain rather than the time domain, based on our > suspicions 
  regarding the domain of embedding. Note that this attack did not > 
  require much information about the watermarking scheme itself, and > 
  conversely did not provide much extra insight into its 
  workings. > > A next step, then, is to compute the frequency 
  response H(w) = W(w)/O(w) of > the watermarking process for segments 
  of audio, and observe both |H(w)| and > the corresponding impulse 
  response h(t). If the watermark is based on some > kind of linear 
  filter, whose properties change slowly enough relative to > the size of 
  a frame of samples, then this approach is ideal. > > Figure 2 
  illustrates one frequency response and impulse response about 0.3 > 
  seconds into the music. These responses are based on FFTs of 882 
  samples, > or one fiftieth second of music. As can be clearly seen, a 
  pair of > sinusoidal ripples are present within a certain frequency 
  band, > approximately 8-16Khz. Ripples in the frequency domain are 
  indicative of > echoes in the time domain, and a sum of sinusoids 
  suggested the presence of > multiple echoes. The corresponding 
  impulse response h(t) confirms this. > This pattern of ripples changes 
  quite rapidly from frame to frame. > > Thus, we had reason to 
  suspect a complex echo hiding system, involving > multiple time-varying 
  echoes. It was at this point that we considered a > patent search, 
  knowing enough about the data hiding method that we could > look for 
  specific search terms, and we were pleased to discover that this > 
  particular scheme appears to be listed as an alternative embodiment in 
  US > patent number 05940135, awarded to Aris corporation, now part of 
  Verance > [5]. This provided us with little more detail than we had 
  already > discovered, but confirmed that we were on the right track, as 
  well as > providing the probable identity of the company which developed 
  the scheme. > It also spurred no small amount of discussion of the 
  validity of > Kerckhoffs's criterion, the driving principle in security 
  that one must not > rely upon the obscurity of an algorithm. This is, 
  surely, doubly true when > the algorithm is 
  patented. > > > > Fig. 2. A short-term complex echo. 
  Above, the frequency response between > the watermarked and original 
  music, taken over 1/50 second, showing a > sinusoidal ripple between 8 
  and 16 KHz. Below, the corresponding impulse > response. The sinusoidal 
  pattern in the frequency domain corresponds to a > pair of echoes in the 
  time domain. > > The most useful technical detail provided by the 
  patent was that the "delay > hopping" pattern was likely discrete 
  rather than continuous, allowing us to > search for appropriate frame 
  sizes during which the echo parameters were > constant. Data collection 
  from the first second of audio showed a frame > size of approximately 
  882 samples, or 1/50 second. We also observed that > the mark did not 
  begin until 10 frames after the start of the music, and > that activity 
  also existed in a band of lower frequency, approximately 4-8 > Khz. This 
  could be the same echo obscured by other operations, or could be > a 
  second band used for another component in the watermarking scheme. 
  A very > clear ripple in this band, indicating a single echo with a 
  delay of about > 34 samples, appears shortly before the main 
  echo-hopping pattern begins. > > The next step in our analysis was 
  the determination of the delay hopping > pattern used in the 
  watermarking method, as this appeared to be the "secret > key" of the 
  data embedding scheme. It is reasonable to suspect that the > pattern 
  repeats itself in short order, since a watermark detector should be > 
  able to find a mark in a subclip of music, without any 
  assistance initially > aligning the mark with the detector's hopping 
  pattern. Again, an analysis > of the first second revealed a pattern of 
  echo pairs that appeared to > repeat every 16 frames, as outlined in 
  figure 3. The delays appear to fall > within six general categories, 
  each delay approximately a multiple of 1/4 > millisecond. The exact 
  values of the delays vary slightly, but this could > be the result of 
  the phase distortion present in the music. > > > > 
  Fig. 3. The hypothesized delay hopping pattern of technology A. Here 
  two > stretches of 16 frames are illustrated side-by-side, with observed 
  echoes > in each frame categorized by six distinct delays: 2, 3, 4, 5, 6 
  or 7 times > 0.00025 sec. Aside from several missing echoes, a pattern 
  appears to repeat > every 16 frames. Note also that in each frame the 
  echo gain is the same for > both echoes. > > The reader 
  will also note that in apparently two frames there is only one > echo. 
  If this pattern were the union of two pseudorandom patterns chosen > 
  from six possible delay choices, two "collisions" would be within what 
  is > expected by chance. > > Next, there is the issue of the 
  actual encoded bits. Further work shows the > sign of the echo gain 
  does not repeat with the delay-hopping pattern, and > so is likely at 
  least part of an embedded message. Extracting such data > without the 
  help of an original can be problematic, although the patent, of > 
  course, outlines numerous detector structors which can be used to 
  this end. > We developed several tools for cepstral analysis to 
  assist us in the > process. See [2] for in introduction to cepstral 
  analysis; Anderson and > Petitcolas [1] illustrate its use in attacks on 
  echo hiding watermark > systems. > > With a rapidly changing 
  delay, normal cepstral analysis does not seem a > good choice. However, 
  if we know that the same echo is likely to occur at > multiples of 16/50 
  of a second, we can improve detector capability by > combining the 
  information of multiple liftered2 log spectra. > > 
  ____________________ > > 2 in accordance with the flopped 
  vocabulary used with cepstral analysis, > "liftering" refers to the 
  process of filtering data in the frequency domain > rather than the 
  time domain. Similarly, "quefrencies" are frequencies of > ripples which 
  occur in the frequency domain rather than the time 
  domain. > > > Three detector structures are shown in figure 
  4. In all three, a collection > of frames are selected for which the 
  echo delays are believed to be the > same. For each, the liftered log of 
  an FFT or PSD of the frame is taken. In > the first two structures, 
  we compute a cepstrum, for each frame, then > either average their 
  squared magnitudes, or simply their squares, in hopes > that a spike of 
  the appropriate quefrency will be clear in the combination. > The 
  motivation for merely squaring the spectral coefficients comes 
  from the > observation that a spike due to an echo will either 
  possess a phase of > theta or theta + pi for some value theta. Squaring 
  without taking > magnitudes can cause the echo phases to reinforce, 
  whilst still permitting > other elements to combine 
  destructively. > > > > Fig. 4. Three cepstral detector 
  structures. In each case we have a > collection of distinct frames, each 
  believed to possess echoes of the same > delay. The first two compute 
  cepstral data for each frame, and sum their > squares (or squared 
  magnitudes) to constructively combine the echo signal > in all frames. 
  The third structure illustrates a method for testing a > hypothesized 
  pattern of positive and negative gains, possibly useful for > 
  brute-forcing or testing for the presence of a known 
  "ciphertext." > > In the final structure, one cepstrum. is taken 
  using a guess of the gain > sign for each suspect frame. With the 
  correct guess, the ripple should be > strongest, resulting in the 
  largest spike from the cepstral detector. > Figure 5 shows the output of 
  this detector on several sets of suspect > frames. While this requires 
  an exponential amount of work for a given > amount of frames, it has a 
  different intended purpose: this is a > brute-forcing tool, a utility 
  for determining the most probable among a set > of suspected short 
  strings of gain signs as an aid to extracting possible > ciphertext 
  values. > > > > Fig. 5. Detection of an echo. A 
  screenshot of our CepstroMatic utility > shows a combination of 4 
  separate frames of music, each a fiftieth of a > second long, in which 
  the same echo delay was believed to exist. Their > combination shows a 
  very clear ripple on the right, corresponding to a > clear cepstral 
  spike on the left. This is a single echo at a delay of 33 > samples, the 
  delay suggested for these intervalus by the hypothesized > delay-hopping 
  pattern. > > Finally, there is the issue of what this embedded 
  watermark means. Again, > we are uncertain about a possible signalling 
  band below 8Khz. This could be > a robust mark, signalling presence 
  of a fragile mark of echoes between 8 > and 16 KHz. The 8-16KHz band 
  does seem like an unusual place to hide robust > data, unless it does 
  indeed extend further down, and so this could very > easily be hidden 
  information whose degredation is used to determine if > music has 
  already been compressed. > > Of course, knowledge of either the 
  robust or fragile component of the mark > is enough for an attacker to 
  circumvent the scheme, because one can either > remove the robust mark, 
  or repair or reinstate the fragile mark after > compression has damaged 
  it. As mentioned earlier, this possible attack of > repairing the 
  fragile component appears to have been ruled out by the > nature of the 
  SDMI challenge oracles. One must wait and see if real-world > attackers 
  will attempt such an approach, or resort to more brute methods or > 
  oracle attacks to remove the robust component. > > 3.2 Attack on 
  Challenge B > > We analyzed samp1b.wav and samp2b.wav using 
  short-time FFT. Shown in Fig. 6 > are the two FFT magnitudes for 1000 
  samples at 98.67 sec. Also shown is the > difference of the two 
  magnitudes. A spectrum notch around 2800Hz is > observed for some 
  segments of samp2b.wav and another notch around 3500Hz is > observed 
  for some other segments of samp2b.wav. Similar notches are > observed in 
  samp3b.wav. The attack fills in those notches of samp3b.wav > with 
  random but bounded coefficient values. We also submitted a variation > 
  of this attack involving different parameters for notch description. 
  Both > attacks were confirmed by SDMI oracle as 
  successful. > > > > Fig. 6. Technology-B: FFT 
  magnitudes of samp1b.wav and samp2b.wav and their > difference for 
  1000 samples at 98.67 sec. > > 3.3 Attacks on Challenge 
  C > > By taking the difference of samp1c.wav and samp2c.wav, 
  bursts of narrowband > signal are observed, as shown in Fig. 7. These 
  narrow band bursts appear to > be centered around 1350 Hz. Two 
  different attacks were applied to Challenge > C. In the first at- 
  tack, we shifted the pitch of the audio by about a > quartertone. In the 
  second attack, we passed the signal through a bandstop > filter centered 
  around 1350Hz. Our submissions were confirmed by SDMI > oracle as 
  successful. In addition, the perceptual quality of both attacks > has 
  passed the "golden ear" testing conducted by SDMI after the 3-week > 
  challenge. > > > > Fig. 7. Challenge-C: Waveform of 
  the difference between samp1c.wav and > samp2c.wav. > > 3.4 
  Attack on Challenge F > > For Challenge F, we warped the time 
  axis, by inserting a periodically > varying delay. The delay function 
  comes from our study on Technology-A, and > was in fact initially 
  intended to undo the phase distortion applied by > technology A. 
  Therefore the perceptual quality of our attacked audio is > expected to 
  be better than or comparable to that of the audio watermarked > by 
  Technology-A. We also submitted variations of this at- tack involving > 
  different warping parameters and different delay function. They were > 
  confirmed by SDMI oracle as successful. > > 4 The Non-Watermark 
  Technologies > > The HackSDMI challenge contained two 
  "non-watermark" technologies. > Together, they appear to be intended to 
  prevent the creation of "mix" CDs, > where a consumer might compile 
  audio files from various locations to a > writable CD. This would be 
  enforced by universally embedding SMDI logic > into consumer audio CD 
  players. > > 4.1 Technology D > > According to SDMI, 
  Technology D was designed to require "the presence of a > CD in order to 
  'rip' or extract a song for SDMI purposes." The technology > aimed to 
  accomplish this by adding a 53.3 ms audio track (four blocks of CD > 
  audio), which we will refer to as the authenticator, to each CD. The > 
  authenticator, combined with the CD's table of contents (TOC), would 
  allow > a SDMI device to recognize SDMI compliant CDs. For the 
  challenge, SDMI > provided 100 different "correct" TOC-authenticator 
  pairs as well as 20 > "rogue tracks". A rogue track is a track length 
  that does not match any of > the track lengths in the 100 provided TOCs. 
  The goal of the challenge was > to submit to the SDMI oracle a correct 
  authenticator for a TOC that > contained at least one of the rogue 
  tracks. > > The oracle for Technology D allowed several different 
  query types. In the > first type, an SDMI provided TOC-authenticator 
  combination is submitted so > a that user can "understand and verify the 
  Oracle." According to SDMI, the > result of this query should either be 
  "admit" for a correct pair or > "reject" for an incorrect pair. When we 
  attempted this test a SDMI-provided > pair, the oracle responded that 
  the submission was "invalid." After > verifying that we had indeed 
  submitted a correct pair, we attempted several > other submissions 
  using different TOC-authenticator pairs as well as > different browsers 
  and operating systems3. We also submitted some pairs > that the oracle 
  should have rejected; these submissions were also declared > "invalid." 
  Though we alerted SDMI to this problem during the challenge, the > 
  oracle was never repaired. For this reason, our analysis of Technology 
  D is > incomplete and we lack definitive proof that it is correct. 
  That having > been said, we think that what we learned about this 
  technology, even > without the benefit of a correctly functioning 
  oracle, is interesting. > > ____________________ > > 3 
  Specifically, Netscape Navigator and Mozilla under Linux, Netscape > 
  Navigator under Windows NT, and Internet Explorer under Windows 98 and > 
  2000. > > > Analyzing the Signal Upon examination of the 
  authenticator audio files, we > discovered several patterns. First, the 
  left and right channels contain the > same information. The two 
  channels differ by a "noise vector" u, which is a > vector of small 
  integer values that range from -8 and 8. Since the > magnitude of the 
  noise is so small, the noise vector does not significantly > affect 
  the frequency characteristics of the signal. The noise 
  values appear > to be random, but the noise vector is the same for 
  each of the 100 provided > authenticator files. In other other words, 
  in any authenticator file, the > difference between the left and right 
  channels of the ith sample is a > constant fixed value u[i]. This 
  implies that the noise vector u does not > encode any TOC-specific 
  information. > > Second, the signal repeats with a period of 1024 
  samples. Because the full > signal is 2352 samples long, the block 
  repeats approximately 1.3 times. > Similarly to the left and right 
  channels of the signal, the first two > iterations of the repeating 
  signal differ by a constant noise vector v. The > difference between 
  the ith sample of the first iteration and the ith sample > of the 
  second iteration differ by a small (and apparently random) integer > 
  value v[i] ranging from -15 to 15. In addition, v is the same for each 
  of > the provided authenticator files, so v does not encode any 
  TOC-specific > information. > > Third, the first 100 samples 
  and last 100 samples of the full signal are > faded in and faded out, 
  respectively. This is illustrated in Figure 8. The > fade-in and 
  fade-out are meaningless, however, because they simply destroy > data 
  that is repeated in the middle of the file. We conjecture that this > 
  fade-in and fade-out are included so that the audio signal does not 
  sound > offensive to a human ear. > > > > Fig. 
  8. In a Technology D Authenticator, the signal fades in, repeats, and > 
  fades out. > > Extracting the Data Frequency analysis on the 1024 
  sample block shows that > almost all of the signal energy is 
  concentrated in the 16-20kHz range, as > shown in Figure 9. We believe 
  this range was chosen because these > frequencies are less audible to 
  the human ear. Closer examination shows > that this l6-20kHz range is 
  divided up into 80 discrete bins, each of which > appears to carry 
  one bit of information. As shown in Figure 10, these bits > can be 
  manually counted by a human using a graph of the magnitude 
  of signal > in the frequency domain. > > > > 
  Fig. 9. Magnitude vs. Frequency of Technology D 
  Authenticator > > > > > Fig. 10. Individual Bits 
  From a Technology D Authenticator > > Close inspection and pattern 
  matching on these 80 bits of information > reveals that there are only 
  16 bits of information repeated 5 times using > different permutations. 
  using the letters A-P to symbolize the 16 bits, > these 5 permutations 
  are described in Figure 11. > > ABCDEFGHIJKLMNOP > 
  OMILANHGPBDCKJFE > PKINHODFMJBCAGLE > FCKLGMEPNOADJBHI > 
  PMGHLECAKDONIFJB > > Fig. 11. The encoding of the 16 bits of data 
  in Technology D > > Because of the malfunctioning oracle, we were 
  unable to determine the > function used to map TOCs to authenticators, 
  but given an actual SDMI > device, it would be trivial to brute force 
  all 216 possibilities. Likewise, > without the oracle, we could not 
  determine if there was any other signal > present in the authenticator 
  (e.g., in the phase of the frequency > components with nonzero 
  magnitude). > > For the moment, let us assume that the hash 
  function used in Technology D > has only 16 bits of output. Given the 
  number of distinct CDs available, an > attacker should be able to 
  acquire almost, if not all, of the > authenticators. We note that at 9 
  kilobytes each, a collection of 65,536 > files would fit nicely on a 
  single CD. Many people have CD collections of > 300+ discs, which by the 
  birthday paradox makes it more likely than not > that there is a hash 
  collision among their own collection. > > Our results indicated 
  that the hash function used in Technology D could be > weak or may have 
  less than 16 bits of output. In the 100 authenticator > samples provided 
  in the Technology D challenge, there were 2 pairs of > 16-bit hash 
  collisions. We will not step through the derivation here, but > the 
  probability of two or more collisions occurring in n samples of X > 
  equally likely possibilities is: > > If the 16-bit hash function 
  output has 16 bits of entropy, the probability > of 2 collisions 
  occurring in n = 100 samples of X = 216 possibilities is > 0.00254 (by 
  the above 1.5 equation). If X ~ 211.5, the chances of two > collisions 
  occurring is about even. This suggests that either 4 bits of the > 
  16-bit hash output may be outputs of functions of the other 12 bits or 
  the > hash function used to generate the 16-bit signature is weak. It is 
  also > possible that the challenge designers purposefully selected TOCs 
  that yield > collisions. The designers could gauge the progress of 
  the contestants by > observing whether anyone submits authenticator A 
  with TOC B to the oracle, > where authenticator A is equal to 
  authenticator B. Besides the relatively > large number of collisions in 
  the provided authenticators, it appears that > there are no strong 
  biases in the authenticator bits such as significantly > more or less 
  1's than 0's. > > 4.2 Technology E > > Technology E is 
  designed to fix a specific bug in Technology D: the TOC > only mentions 
  the length of each song but says nothing about the contents > of that 
  song. As such, an attacker wishing to produce a mix CD would only > need 
  to find a TOC approximately the same as the desired mix CD, then copy > 
  the TOC and authenticator from that CD onto the mix CD. If the TOC 
  does not > perfectly match the CD, the track skipping functionality 
  will still work > but will only get "close" to track boundaries rather 
  than reaching them > precisely. Likewise, if a TOC specified a track 
  length longer than the > track we wished to put there, we could pad the 
  track with digital silence > (or properly SDMI-watermarked silence, 
  copied from another valid track). > Regardless, a mix CD played from 
  start to end would work perfectly. > Technology E is designed to counter 
  this attack, using the audio data > itself as part of the authentication 
  process. > > The Technology E challenge presented insufficient 
  information to be > properly studied. Rather than giving us the original 
  audio tracks (from > which we might study the unspecified watermarking 
  scheme), we were instead > given the tables of contents for 1000 CDs and 
  a simple scripting language > to specify a concatenation of music clips 
  from any of these CDs. 'Me oracle > would process one of these 
  scripts and then state whether the resulting CD > would be 
  rejected. > > While we could have mounted a detailed statistical 
  analysis, submitting > hundreds or thousands of queries to the oracle, 
  we believe the challenge > was fundamentally flawed. In practice, given 
  a functioning SDMI device and > actual SDMI-protected content, we could 
  study the audio tracks in detail > and determine the structure of the 
  watermarking scheme. > > 5 Conclusion > > In this 
  paper, we have presented an analysis of the technology challenges > 
  issued by the Secure Digital Music Initiative. Each technology 
  challenge > described a specific goal (e.g., remove a watermark from an 
  audio track) > and offered a Web-based oracle that would confirm whether 
  the challenge was > successfully defeated. > > We have 
  reverse-engineered and defeated all four of their audio > watermarking 
  technologies. We have studied and analyzed both of their > 
  "non-watermarking" technologies to the best of our abilities given 
  the lack > of information available to us and given a broken oracle 
  in one case. > > Some debate remains on whether our attacks 
  damaged the audio beyond > standards measured by "golden ear" human 
  listeners. Given a sufficient body > of SDMI-protected content using 
  the watermark schemes presented here, we > are confident we could refine 
  our attacks to introduce distortion no worse > than the watermarks 
  themselves introduce to the the audio. Likewise, debate > remains on 
  whether we have truly defeated technologies D and E. Given a > 
  functioning implementation of these technologies, we are confident we 
  can > defeat them. > > Do we believe we can defeat any audio 
  protection scheme? Certainly, the > technical details of any scheme will 
  become known publicly through reverse > engineering. Using the 
  techniques we have presented here, we believe no > public 
  watermark-based scheme intended to thwart copying will succeed. > Other 
  techniques may or may not be strong against attacks. For 
  example, the > encryption used to protect consumer DVDs was easily 
  defeated. Ultimately, > if it is possible for a consumer to hear or see 
  protected content, then it > will be technically possible for the 
  consumer to copy that content. > > References > > 1. 
  R. J. ANDERSON, AND F. A. P. PETITCOLAS. On the limits 
  of steganography. > IEEE Journal of Selected Areas in Communications 
  16,4 (May 1998),474-481. > > 2. R. P. BOGERT, M., AND J. W. TUKEY. 
  The quefrency alanysis of time series > for echoes: Cepstrum, 
  pseudo-autocovariance, cross-ceptsrum and > saphe-cracking. In 
  Proceedings of the Symposium on Time Series Analysis > (Brown 
  University, June 1962), pp. 209-243. > > 3. R. PETROVIC, J. M. 
  WINOGRAD, K., AND E. METOIS. Apparatus and method for > encoding and 
  decoding information in analog signals, Aug. 1999. US Patent > No 
  05940135 http://www.delphion.com/details?pn=US05940135__. > > 4. SECURE DIGITAL MUSIC INITIATIVE. Call for 
  Proposals for Phase II > Screening Technology, Version 1.0, Feb. 
  2000. > http://www.sdmi.org/download/FRWG00022401-Ph2_CFPv1.0.PDF. > > 5. SECURE DIGITAL MUSIC INITIATIVE. SDMI public 
  challenge, Sept. 2000. > http://www.hacksdmi.org. > > 
  ------------------------------------------------------------------------ > > > > > 
  --------------------++----- > Les faits sont faits. > http://www.fis.utoronto.ca/~stalder> > > #  distributed via <nettime>: no 
  commercial use without permission > #  <nettime> is a 
  moderated mailing list for net criticism, > #  collaborative text 
  filtering and cultural politics of the nets > #  more info: 
  majordomo@bbs.thing.net and "info 
  nettime-l" in the msg body > #  archive: http://www.nettime.org contact: 
  nettime@bbs.thing.net> >
    
 |