The Battalion. (College Station, Tex.) 1893-current, April 07, 2004, Image 3

Below is the OCR text representation for this newspapers page. It is also available as plain text as well as XML.

    m
educ!
eh, a
najor.
f e ab.
:realb
I olds
!nCOU[ : ;
styles'
lexpec;
*s in
l maje;
lh stait
h is in;
Sci|Tech
Page 3 ♦ Wednesday, April 7, 2004
tiPflOi
ceofa
Sis to
, “It tat
total-
'age!
cities
vice
credit cs
? e
risssaii
ryane-ts
e
s
are sail
the
;loc
lately t
nmt of m
when im
Digital crackdown
Aggies help combat digital piracy through watermarking technology
By David Barry
THE BATTALION
A :
Greek king, held captive by his enemies in
the fifth century B.C., shaved the head of a
trusted servant and tattooed a secret message
bn his bare scalp. Once the servant’s hair had grown
over the tattoo, the king sent him back to friendly terri-
ory, where his head was once again shaved to reveal the
iecret message. Why the servant didn’t just memorize
iveexd he message is anyone’s guess.
This ancient story, recorded by the Greek historian
iSfBierodotus, is one of the earliest documented uses of a
technique called data-hiding. 2,500 years later, data-hid-
ing has evolved into a high-tech science with enormous
implications for the future of digital technology.
As digital technology has enabled consumers to
freely copy and share copyrighted work, copyright hold
ers have recognized data-hiding as a means of control
ling the distribution of their work.
The hidden data in multimedia files, often called a
sys digital watermark or fingerprint, could act as a virtual
security tag, said Deepa Kundur, assistant electrical
re tile) engineering professor at Texas A&M. One of Kundur’s
’raduate students, William Luh, explained how it works:
‘With fingerprinting, you put an invisible serial number
in the media. If someone makes illegal copies, you can
emaapfjcg where they came from.”
The Motion Picture Association of America, which
claims to lose $3 billion annually to unauthorized copy-
, already uses watermarking to nab digital pirates.
The March 1 issue of Electronic Engineering Times
reported that traceable watermarks were embedded in
each of the DVDs distributed to the nearly 6,000 voters
for this year’s Academy Awards. Several of those copies
surfaced on the Internet earlier this year, including big-
name titles such as “Something’s Gotta Give,” “The Last
Samurai” and “Cold Mountain.” Authorities were able
to arrest an alleged member of an Internet piracy ring by
I Ot B I
itiom il
M
rtierns.
sm
said.*'
ege Sp
r, erp
illowsit
:b site if
laymeitt
(udersi
reading the watermarks on the copied files and tracing
them back to the source.
Widespread use of digital watermarking is not yet a
reality, but the entertainment industry is moving toward
a standard technology that could watermark movies,
music and other digital media.
Even when watermarks are included in digital media,
few people will notice. Watermarks must be invisible to
be successful. To the human ear, a watermarked MP3
file should sound exactly like a file with no watermark
at all. The invisibility of watermarks also means that
hackers will have a difficult time finding and weeding
out the hidden codes.
A typical watermark is a series of a few bits hidden
within a media file that may contain millions of bits.
Kundur compared the watermarking process to hiding a
needle in a haystack.
“You’re making use of the idea of uncertainty,”
she said. “A third party has no clue of where to
begin looking in the haystack. Only an individual
with a secret key will know where to look for the
hidden data.”
Still, watermarks aren’t attack-proof. For example,
a hacker could alter a file in a way that damages the
watermark. Also, since copy-protection watermarks
contain individualized serial numbers, or fingerprints,
hackers could compare two otherwise identical media
files to locate the hidden serial numbers. Luh is look
ing for ways to hide this “fingerprinting” data from
hackers.
The biggest technical challenge, Kundur said, is to
find a balance between security and simplicity. Security
measures like watermarking and encryption must be
small enough to work on portable, battery-operated
devices like MP3 players, yet strong enough to resist the
efforts of hackers.
Overall, digital watermarking appears to be just
another battleground in the war between copyright hold
ers and media pirates. In a 2001 report to the journal
IEEE Multimedia entitled “Spies, Thieves, and Lies:
The Battle for Multimedia in the Digital Era,” Kundur
and two industry scientists wrote that they expected a
continuation of the “cycle of improving and then break
ing improved security.”
“Perfect security will probably not occur,” Kundur said.
Rather, she said, security measures should provide
“an obstacle that most people will not breach.”
Such security measures could pave the way to a sus
tainable business model for digital media commerce, in
which consumers willingly pay to download digital con
tent instead of copying it illegally.
“I don’t think that people by nature want to steal any
thing, and I think it’s more an issue
of expectation. When expecta
tions settle down, it will result in
a business model that is there for
everyone’s benefit,” Kundur said.
Luh gave another perspective.
“Everyone wants free music,”
Luh said.
But he said he thought a busi
ness model for selling
digital multimedia
over the Internet
would be successful if
copyright holders
made their products
cheaper. He suggested
50 cents as a reason
able price for a down
loaded music track.
“There will still
bp hackers who think
everything should be
free,” Luh said. “And
there will be at least
one detennined team
of researchers at
Texas A&M working
to fend them off.
regular houses are boring ... make it a Warehouse.
coming august 200-1
www.warehouseapartments.com
3ft
dspiinl^
ixampe^'
; Send#*
nsiontlW*
ding. *7
itialW 1 * 1
569^
F3>:8'
asii# 1 ®.
$30 f##"
NEED A JOB?
THE KIDS KLUB IS SEEKING
STAFF FOR THE
2004 FALL SEMESTER
AH< >Ut>S
College Station %*££££,
• Are you a fun person?
• Do you enjoy working with kids?
• Looking for valuable work experience?
•Are you available Mon.-Fri., 2:45 p.m. to 6:15 p.m.?
• If you answered yes to any of these questions,
we may have a job for you.
Applications are now being accepted for
the Kids Klub After School Program
at the College Station Conference Center
thru April 26 th at 5 p.m.
Employment to begin August 10, 2004
College Station ISD is an Equal Opportunity Employer
For more information call:
Male & Female
Staff needed!
THE KIDS
KLUB
764-3831
To the 8,700 Aggies that are Graduate and
Professional Students....
Thank You
for all that you do for Texas A&M University!
As part of Graduate and Professional Student Appreciation Week,
graduate and professional students are invited to join us for the
Volleyball Bash Mix n Mingle - Today, April 7th
5:30-7:30pm Rec Center Backyard.
NATIONAL GRADUATE AND PROFESSIONAL
STUDENT APPRECIATION WEEK
APRIL 5 th - APRIL 9 th
l*f! V Ml lit •>» l v
IT MIGHT BE ONE OF
THE LAST THINGS
YOUR PARENTS EVER OFFER
TO PAY FOR.
Diplomaframers.com is your ultimate source for diploma frames in styles to fit every budget. Design and order
your frame online, in minutes, and insert your diploma later. Get hooked up now at www.diplomaframers.com.
FREE shipping through May 15th
OFFICIALLY LICENSED BY TEXAS A&M UNIVERSITY
Diploma
Framers.com