Online Media - Publish.com
Publish.com Ziff-Davis Enterprise  
SEARCH · ONLINE MEDIA · MOBILE · WEB DESIGN · GRAPHICS TOOLS · PRINTING · PHOTO · TIPS · OPINIONS
Home arrow Online Media arrow Security and Digital Cinema: The Last Big Question
Security and Digital Cinema: The Last Big Question
By Kathy White

Rate This Article:
Add This Article To:
As with any digital format, the question of piracy looms large for digital cinema, but the answers are finally coming clear.

When a digital film is sent and received in an encrypted fashion, there have to be methods of delivering and utilizing decryption keys to unlock the content.

A part of the key exchange is DRM (digital rights management), which establishes the rules for using the content. All of today's key management systems use some form of DRM to control access and use of the encrypted content. A DRM system allows the owners to distribute their films in a controlled way.

The owner specifies in which ways and under which conditions each cinematic asset may be accessed (digital rights, licensing), and the DRM system will try to ensure that each asset can only be accessed as specified by the owner.

The same DRM system can also be used to distribute films over the Internet. For example, a film studio may specify that each film may be shown in a licensed cinema for a given period starting at a given time.

"It's a difficult issue," said Walt Ordway, chief technology officer for the Digital Cinema Initiatives, a limited liability company that was established in March 2002 and whose members include Disney, 20th Century Fox, MGM, Paramount, Sony Pictures Entertainment, Universal and Warner Bros.

DCI just completed its final draft of standards in March of this year. This document establishes and documents specifications for an open architecture for digital cinema components that ensures a uniform and high level of technical performance, reliability and quality control, as well as addressing security concerns for this digital medium.

"This biggest issues now are over fingerprinting and watermarking, and we need to be careful. How do we set those standards without telling the bad guy how to do it?" Ordway added.

Click here to read more about the state of digital cinema on the eve of the release of Star Wars Episode III.

Fingerprints are used to enforce content copyright by enabling the copyright owner to trace back the source of a piracy act. An example would be that all users are given different copies of the content, such as now via a hard drive sent to the theater, where each copy contains a fingerprint—a user-specific watermark. If an unauthorized client redistributes the fingerprinted content, its uniqueness is used to trace back to the offending exhibitor.

Ordway declined to talk specifics about what is in the proposed standards but, according to other sources, the main topics around security that will be addressed are:

    • Having security managers at the theaters
    • Forensic features to help trace illegal use of content
    • Requirements for distribution—link encryption
    • Requirements for equipment implementation
    • Encryption keys that work on a permission basis with time/date stamps and the management of all those encryption, decryption keys.

Right now, AES-128, the same encryption that banks use for online transfer of information, is what distributors use to secure the digital movie, according to Brian Claypool, senior product manager of cinema for Christi Digital Systems, maker of digital projectors used in about two-thirds of digital cinemas in the United States today.

Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), is an approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192 and 256 bits.

What makes this encryption more impressive for films is that each frame is encrypted, according to Claypool. "Every frame is encrypted, so if somebody were to get lucky even once on the encryption, they'd only get one frame of the movie," Claypool said. "At the theaters, all they have is an encryption key that allows them to tell the hard drive it's OK to play the movie via the projector. It's just impossible to steal a movie."

Technicolor Digital Cinema, the company responsible for the distribution of Star Wars Episode III: Revenge of the Sith, is handling all content preparation for the movie, including the encryption.

The film is shipped to a theater on a hard drive, according to Technicolor Digital Cinema President Ahmad Ouri. Once it's been confirmed that the theater has received the encrypted film and loaded it onto a server, the encryption key is then delivered separately. "The film is useless without the key, and the key just tells the projector it's OK to show the film." In other words, it does not allow the movie to be copied in any way off the server."

Next Page: Security is high-priority issue for the studios.

The DCI addresses the issue of security and encryption but does not allow any details of standards in this area to be published.

"The less people know, the better," Claypool pointed out. "But the encryption used today for both transferring the digital film and showing it is pretty sophisticated." And, according to sources, will get much more so under the DCI standards that are proposed.

"The questions will be around, Who is going to certify a system?" Ordway said. "How can we be sure a vendor is supplying a DCI-compliant machine that meets all these requirements?"

"Studios are spending so much time and money to figure out these questions," said David Hancock, analyst for London-based Global Media Intelligence's Screen Digest.

Adding to the security dilemma is the low-tech dilemma of stopping those with camcorders from just sitting through a film and recording it. This week at the Cannes Film Festival, Thomson, parent company for Technicolor Digital Systems, will be demonstrating a new anti-piracy technology designed to scramble the quality of images illegally recorded with a camcorder during digital cinema screenings.

It will be completely unnoticeable to the theater viewer, according to Thomson, but will be strong enough to stop would-be hackers.

Security is the last of the big questions remaining for digital cinema, and finally the answers are starting to arrive.


Discuss Security and Digital Cinema: The Last Big Question
 
>>> Be the FIRST to comment on this article!
 

 
 
>>> More Online Media Articles          >>> More By Kathy White
 


Buyer's Guide
Explore hundreds of products in our Publish.com Buyer's Guide.
Web design
Content management
Graphics Software
Streaming Media
Video
Digital photography
Stock photography
Web development
View all >

ADVERTISEMENT


FREE ZIFF DAVIS ENTERPRISE ESEMINARS AT ESEMINARSLIVE.COM
  • Dec 10, 4 p.m. ET
    Eliminate the Drawbacks of Traditional Backup/Replication for Linux
    with Michael Krieger. Sponsored by InMage
  • Dec 11, 1 p.m. ET
    Data Modeling and Metadata Management with PowerDesigner
    with Joel Shore. Sponsored by Sybase
  • Dec 12, 12 p.m. ET
    Closing the IT Business Gap: Monitoring the End-User Experience
    with Michael Krieger. Sponsored by Compuware
  • Dec 12, 2 p.m. ET
    Enabling IT Consolidation
    with Michael Krieger. Sponsored by Riverbed & VMWare
  • VTS
    Join us on Dec. 19 for Discovering Value in Stored Data & Reducing Business Risk. Join this interactive day-long event to learn how your enterprise can cost-effectively manage stored data while keeping it secure, compliant and accessible. Disorganized storage can prevent your enterprise from extracting the maximum value from information assets. Learn how to organize enterprise data so vital information assets can help your business thrive. Explore policies, strategies and tactics from creation through deletion. Attend live or on-demand with complimentary registration!
    FEATURED CONTENT
    IT LINK DISCUSSION - MIGRATION
    A Windows Vista® migration introduces new and unique challenges to any IT organization. It's important to understand early on whether your systems, hardware, applications and end users are ready for the transition.
    Join the discussion today!



    .NAME Charging For Whois
    Whois has always been a free service, but the .NAME registry is trying to change that.
    Read More >>

    Sponsored by Ziff Davis Enterprise Group

    NEW FROM ZIFF DAVIS ENTERPRISE


    Delivering the latest technology news & reviews straight to your handheld device

    Now you can get the latest technology news & reviews from the trusted editors of eWEEK.com on your handheld device
    mobile.eWEEK.com

     


    RSS 2.0 Feed


    internet
    rss graphic Publish.com
    rss graphic Google Watch

    Video Interviews


    streaming video
    Designing Apps for Usability
    DevSource interviews usability pundit Dr. Jakob Nielsen on everything from the proper attitude for programmers to the importance of prototyping in design to the reasons why PDF, Flash and local search engines can hurt more than they help.
    ADVERTISEMENT