A DRM Scheme Using File Physical Information

نویسندگان

  • Cheng Qu
  • Yinyan Yu
  • Zhi Tang
  • Xiaoyu Cui
چکیده

* Yinyan Yu is the corresponding author. Abstract—A digital file has both the content and physical information, however the latter was not fully made use of in previous digital rights management (DRM) systems. This paper introduces the idea of making use of file physical information to improve the system security and provides a scheme based on this idea to resist the replay attack in DRM systems. In our scheme, compared to commonly used schemes, we remove the dependency on continuous online connection from the client-side to the server-side or the usage of tamper-proof hardware, such as Trusted Platform Module (TPM). The scheme is appropriate for offline digital content usage. Primary experiments demonstrate that our scheme is secure enough to be put into practice use.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image/message Steganography using LSB insertion Algorithms for DRM system

Digital Rights Management (DRM) system is the effective scheme for digital transactions. The main disadvantage of DRM is that once the content is decrypted, it can be easily copied using widely available utilities. It can be removed by using protection system like steganography. Steganography is the art of communicating in a way which hides a secret message into the main information or cover. T...

متن کامل

Audio watermarking and partial encryption

Today two technologies are applied when protecting audio data in digital rights management (DRM) environments: Encryption and digital watermarking. Encryption renders the data unreadable for those not in the possession of a key enabling decryption. This is especially of interest for access control, as usage of the audio data is restricted to those owning a key. Digital watermarking adds additio...

متن کامل

The Dynamic Replication Mechanism of HDFS Hot File based on Cloud Storage

As an open source cloud storage scheme, HDFS is used by more and more large enterprises and researchers, and is actually applied to many cloud computing systems to deal with huge amounts of data. HDFS has many advantages, but there are some problems such as NameNode single point of failure, small file problem, hot issues, etc. For HDFS hot issues, this paper proposes a dynamic Replication mecha...

متن کامل

Enterprise Digital Rights Management:Solutions against Information Theft by Insiders

Insider attack is one of the most serious cybersecurity threats to corporate America. Among all insider threats, information theft is considered the most damaging in terms of potential financial loss. Moreover, it is also especially difficult to detect and prevent, because in many cases the attacker has the proper authority to access the stolen information. Enterprise Digital Rights Management ...

متن کامل

A Content Creation and Protection Scheme for Medical Images

Medical images contain metadata information on where, when, and how an image was acquired, and the majority of this information is stored as pixel data. Image feature descriptions are often captured only as free text stored in the image file or in the hospital information system. Correlations between the free text and the location of the feature are often inaccurate, making it difficult to link...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013