SlideShare une entreprise Scribd logo
1  sur  9
DIGITAL CINEMA
BASICS
Digitaalisen elokuvan teoreettiset
perusteet
• Digitaalinen elokuva on tiedostopakkaus, joka sisältää elokuvan
JPEG-kuvina
• Tästä tiedostopakkauksesta käytetään nimeä DCP
• DCP:ssä on mukana
• Elokuva JPEG-kuvina
• Ääniraita (Tekstitys)
• Composition PlayList eli CPL tiedosto
DCP - Paketin sisältö
• DCP = 1 CPL + n MXF + (1 Supplemental Package) -> Elokuva
• Digital Cinema Package = Composition PlayList + Material eXhange
Format
• Jos yksikin elementti puuttuu niin ei toimi
Miten elokuva toistuu?
CPL-tiedosto
• Sisältää tiedot virtuaalisista ”keloista” joina elokuva on koodattu
• DCP-paketissa kuva, ääni ja tekstitykset ovat sekaisin
osarullissa jotka
CPL-tiedosto liittää toisiinsa
1.Oikeassa ”yliheitto” järjestyksessä
2.Yhdistää oikeat ääni,-kuva,- ja teksityskelat toisiinsa
CPL-tiedosto
MIKSI NÄIN ???
Miksi vanhat filmit olivat monella kelalla?
Key Delivery Message KDM
• KDM sisältää esityksen salauksen purkuun tarvittavan avaimen
• Toimitetaan yleensä erikseen sähköpostilla, josta siirretään
muistitikulle
• Joskus mukana siirtokiintolevyllä, jolloin otettava mukaan sieltä
Miten KDM toimii?• We suppose that we are trying to distribute a DCP to Alice's cinema, without a
troublemaker called Mallory being able to watch it himself.
• There are two main families of encryption techniques. The first, symmetric-key
encryption, allows us to encode some data using some numeric key. After
encoding, no-one can decode the data unless they know the key.
• The first step in a DCP encryption is to encode its data with some key using
symmetric-key encryption. The encrypted DCP can then be sent anywhere, safe
in the knowledge that even if Mallory got hold of a copy, he could not decrypt it.
• Alice, however, needs to know the key so she can play the DCP in her cinema.
A simple approach might be for us to send Alice the key. However, if Mallory
can intercept the DCP, he might also be able to intercept our communication of
the key to Alice. Furthermore, if Alice happened to know Mallory, she could just
send him a copy of the key.
Miten KDM toimii?• The clever bit in DCP encryption requires the use of public-key encryption.
With this technique we can encrypt a block of data using some ‘public’ key.
• That data can then only be decrypted using a different ‘private’ key. The
private and public keys are related mathematically, but it is extremely
hard (or rather, virtually impossible) to derive the private key from the
public key.
• We take our DCP's symmetric key and encrypt it using the public key of
Alice's projector. We send the result to Alice over email (using a format
called a Key Delivery Message, or KDM). Her projector then decrypts our
message using its private key, yielding the magic symmetric key which can
decrypt the DCP.
• If is fine if Mallory intercepts our email to Alice, since the only key which can
decrypt the message is the private key buried inside Alice's projector. The
projector manufacturer is very careful that no-one ever finds out what this

Contenu connexe

En vedette

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

En vedette (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Digital Cinema

  • 2. Digitaalisen elokuvan teoreettiset perusteet • Digitaalinen elokuva on tiedostopakkaus, joka sisältää elokuvan JPEG-kuvina • Tästä tiedostopakkauksesta käytetään nimeä DCP • DCP:ssä on mukana • Elokuva JPEG-kuvina • Ääniraita (Tekstitys) • Composition PlayList eli CPL tiedosto
  • 3. DCP - Paketin sisältö • DCP = 1 CPL + n MXF + (1 Supplemental Package) -> Elokuva • Digital Cinema Package = Composition PlayList + Material eXhange Format • Jos yksikin elementti puuttuu niin ei toimi
  • 5. CPL-tiedosto • Sisältää tiedot virtuaalisista ”keloista” joina elokuva on koodattu • DCP-paketissa kuva, ääni ja tekstitykset ovat sekaisin osarullissa jotka CPL-tiedosto liittää toisiinsa 1.Oikeassa ”yliheitto” järjestyksessä 2.Yhdistää oikeat ääni,-kuva,- ja teksityskelat toisiinsa
  • 6. CPL-tiedosto MIKSI NÄIN ??? Miksi vanhat filmit olivat monella kelalla?
  • 7. Key Delivery Message KDM • KDM sisältää esityksen salauksen purkuun tarvittavan avaimen • Toimitetaan yleensä erikseen sähköpostilla, josta siirretään muistitikulle • Joskus mukana siirtokiintolevyllä, jolloin otettava mukaan sieltä
  • 8. Miten KDM toimii?• We suppose that we are trying to distribute a DCP to Alice's cinema, without a troublemaker called Mallory being able to watch it himself. • There are two main families of encryption techniques. The first, symmetric-key encryption, allows us to encode some data using some numeric key. After encoding, no-one can decode the data unless they know the key. • The first step in a DCP encryption is to encode its data with some key using symmetric-key encryption. The encrypted DCP can then be sent anywhere, safe in the knowledge that even if Mallory got hold of a copy, he could not decrypt it. • Alice, however, needs to know the key so she can play the DCP in her cinema. A simple approach might be for us to send Alice the key. However, if Mallory can intercept the DCP, he might also be able to intercept our communication of the key to Alice. Furthermore, if Alice happened to know Mallory, she could just send him a copy of the key.
  • 9. Miten KDM toimii?• The clever bit in DCP encryption requires the use of public-key encryption. With this technique we can encrypt a block of data using some ‘public’ key. • That data can then only be decrypted using a different ‘private’ key. The private and public keys are related mathematically, but it is extremely hard (or rather, virtually impossible) to derive the private key from the public key. • We take our DCP's symmetric key and encrypt it using the public key of Alice's projector. We send the result to Alice over email (using a format called a Key Delivery Message, or KDM). Her projector then decrypts our message using its private key, yielding the magic symmetric key which can decrypt the DCP. • If is fine if Mallory intercepts our email to Alice, since the only key which can decrypt the message is the private key buried inside Alice's projector. The projector manufacturer is very careful that no-one ever finds out what this