Digital Rights Management:Model,Technology and Application

被引:5
作者
Zhaofeng Ma
机构
[1] SchoolofCyberspaceSecurity,BeijingUniversityofPostsandTelecommunications
关键词
digital rights management; drm security infrastructure; encryption; watermark; usage control; drm-free;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.
引用
收藏
页码:156 / 167
页数:12
相关论文
共 10 条
[1]   Improving Image Copy-Move Forgery Detection with Particle Swarm Optimization Techniques [J].
SHI Wenchang ;
ZHAO Fei ;
QIN Bo ;
LIANG Bin .
中国通信, 2016, 13 (01) :139-149
[2]  
A network based document management model to prevent data extrusion[J] . Kamran Morovati,Ali Ghorbani,Sanjay Kadam. Computers & Security . 2016
[3]  
A survey on data leakage prevention systems[J] . Sultan Alneyadi,Elankayer Sithirasenan,Vallipuram Muthukkumarasamy. Journal of Network and Computer Applications . 2016
[4]   A proposal of digital rights management based on incomplete cryptography using invariant Huffman code length feature [J].
Ta Minh Thanh ;
Iwakiri, Munetoshi .
MULTIMEDIA SYSTEMS, 2014, 20 (02) :127-142
[5]  
CoBAn: A context based model for data leakage prevention[J] . Gilad Katz,Yuval Elovici,Bracha Shapira. Information Sciences . 2013
[6]  
DRM, law and technology: an American perspective[J] . Bill Rosenblatt. Online Information Review . 2007 (1)
[7]   DRM and public policy [J].
Felten, EW .
COMMUNICATIONS OF THE ACM, 2005, 48 (07) :112-112
[8]  
Fair use, DRM, and trusted computing[J] . John S. Erickson. Communications of the ACM . 2003 (4)
[9]   Encouraging recognition of fair uses in DRM systems [J].
Fox, BL ;
LaMacchia, BA .
COMMUNICATIONS OF THE ACM, 2003, 46 (04) :61-63
[10]  
Digital Rights Management .2 http://www.acm.org/sigs/sigsac/ccs/CCS2003/drm.html .