“Securing Digital Video” is now available!

My book, “Securing Digital Video: Techniques for DRM and Content Protection” is now available on sale.   It can be found directly at Springer (about one week delay), from US amazon (2-4 weeks delay) and from French Amazon (available only in August).

This is the last step of a long process.  I hope that the reader will enjoy it and that it will be useful to the community.   More details on the book are available here.

I would be glad to hear your suggestions, appreciations (even negative ones), and answer any question.  For that, use preferably the address book@eric-diehl.com.  I will always answer.

My book

A new step in the creation of my book “Securing Digital Video”. The typesetting phase has started. In other words, Springer’s team is making the final layout of the book. Soon available in bookstores.

 

Securing Digital Video: the text is final and frozen

About one year ago, I informed you that the final draft of my book was sent to Springer, my editor.  Today, a new step:  after several copy edit rounds, the text is final.   We enter now the final stage:  layout and printing.  In other words, the book should be now soon available in the stores (before end of this quarter).

The book will have inserts entitled “Devil’s in the Details”.  These short sections will deeply dive in some naughty details highlighting the difference between theoretical schemes and actual robust security.  For instance, you will learn some details on the Black Sunday, or on how AACS was hacked.

I will keep you informed about the next steps.

Online video security 101

Brightcove proposes an interesting whitepaper describing the spectrum of solutions available to secure video. The section describing the security spectrum is a good high-level introduction to the existing problems. It tackles:

  • Unlimited access
  • Watermarking (both visible burn-in and invisible forensics watermark)
  • Geo-restriction; you limit the geographical zone where your content may be viewed. This is why non-US residents cannot access the free episodes on sites such as ABC
  • Domain restriction
  • IP restriction
  • RTMPE for protecting video during transfer
  • Protected page; the usual restriction by an access control to the web page
  • SWF restriction; this is a characteristics of Flash Access, Adobe’s DRM, where you can define the list of AIR players allowed to access a content
  • Anonymous DRM; using a dedicated mode of Flash Access
  • Advanced DRM; using more complex features of Flash Access
  • Secure HLS; the format defined by Apple to securely stream content to an iOS device.
  • User authentication

The beginning of the list is well done. They are generic enough to be able to extrapolate to other solutions than the ones proposed by Brightcove. The last ones (in italic in this post) are very specific either to a solution, or to the offer of Brightcove. They are mostly based on the use of Adobe Flash Access for non-Apple devices, and HLS for Apple devices.

The last section, Security across channels, is not focusing on security challenges in the different environments and may be confusing for the non-specialists.

The document is available here and requires registration.

Security Newsletter 21

The 21rst Technicolor security newsletter is now available. Molva Refik (Eurecom) is our guest. The news that did trigger our interest were some consequences of the patriot act versus the cloud, an attack on Internet ads, TOR used by pedophiles, a weakness in XML encryption and of course Duqu. Patrice analyzes the attack on WPS, while Stéphane explores the Carrier IQ disaster. And a very deep dive in the protection of 3D CGI objects (encryption, watermark…)

I hope you will enjoy reading it. if you want to subscribe, send an email at security.newsletter@technicolor.com.

Past issues are available here.

PST 2012

Usually, I do not make advertisement for conference and call for papers.  But for Privacy Security & Trust 2012 (PST 2012), I will make an exception.  If you go on the site, you will understand easily why  :Wink:

The preferred topics are:

  • Privacy Preserving / Enhancing Technologies
  • Critical Infrastructure Protection
    Network and Wireless Security
    Operating Systems Security
    Intrusion Detection Technologies
    Secure Software Development and Architecture
    PST Challenges in e-Services, e.g. e-Health, e-Government, e-Commerce
    Network Enabled Operations
    Digital forensics
    Information Filtering, Data Mining and Knowledge from Data
    National Security and Public Safety
    Security Metrics
    Recommendation, Reputation and Delivery Technologies
    Continuous Authentication
    Trust Technologies, Technologies for Building Trust in e-Business Strategy
    Observations of PST in Practice, Society, Policy and Legislation
    Digital Rights Management
    Identity and Trust management
    PST and Cloud Computing
    Human Computer Interaction and PST
    Implications of, and Technologies for, Lawful Surveillance
    Biometrics, National ID Cards, Identity Theft
    PST and Web Services / SOA
    Privacy, Traceability, and Anonymity
    Trust and Reputation in Self-Organizing Environments
    Anonymity and Privacy vs. Accountability
    Access Control and Capability Delegation
    Representations and Formalizations of Trust in Electronic and Physical Social Systems

The submission deadline is 18 March 2012.