A DRM Model for Copyrights Protection based on Hiding Information

نویسندگان

  • Deok Gyu Lee
  • Jianhua Ma
چکیده

There have been researches into digital watermarking technology or Fingerprinting vigorously to safeguard 'Protective rights for knowledge and poverty' for digital contents. DRM, Digital Rights Management, is not only 'Protective rights for knowledge and poverty', but also management and systems that are necessary to put out, circulate and use for contents. This technology, DRM, encrypts contents to protect digital contents and they are sold users on. Sellers transmit contents with 'Usage Right' and a license including a key of encryption. The key of encryption decodes encoded files. The right of usage restricts users' application of contents. Even if digital contents that are applied the DRM are coped illegally and circulated, contents will be protected from that because a player of DRM checks existence of licenses and allows contents to be restored. However, this method might cause users to feel inconvenient since the users can only restore contents through the licenses offered by a player or a Smartcard. If radio as well as cable is used popularly in the future, there will be a lot of limits to use those kinds of players. In the method of that, the method using players need different players in order to work successfully in wired and wireless environment. In the case of using Smartcards, there might be a dangerous situation when the Smartcards disappeared. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently. Keyword: DRM, Hiding Information

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Compression and Hiding using Improved Vector Quantization Techniques

Generally, Embedding of needful information in a host signal without any loss of host information is required for copyrights protection. Customer identification can be embedded directly into multimedia files, this guide to a number of definite requirements with respect to robustness, simplicity and complexity. In early stages, data hiding can be processed based on vector quantization (VQ) compr...

متن کامل

Towards an Engineering Framework for Usage Control and Digital Rights Management

The recent popularity of digital information sharing through networking requires new technologies to protect intellectual property rights or digital copyrights. The concept of digital rights management (DRM) has been introduced in this arena. DRM is largely focused on payment-based controls for digital information dissemination and its use. The principal motivation is generation and protection ...

متن کامل

A Novel Invisible and Blind Watermarking Scheme For Copyright Protection of Digital Images

Nowadays, the issue of protecting copyrights of digital contents has become very much critical owing to the swift growth of the Internet. Protecting the high-value digital assets and controlling the distribution and usage of those digital assets are the tasks of the Digital Rights Management (DRM) system. Watermarking technologies are being looked upon as promising means to safe guard the copyr...

متن کامل

A Special Section of Intelligent Automation and Soft computing - Soft Computing For Copyright Protection

In today's digital age, the creation, transmission and manipulation of digital media content, such as images, audios and videos, are made simply through digital processing tools that are easily and widely available. As a consequence, piracy that copies, tampers and retransmits the media content is becoming increasingly easier and more popular now. This eventually concurs a great deal of loss to...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008