Catálogo de publicaciones - libros
Digital Rights Management: Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31: November 2, 2005. Revised Selected Papers
Reihaneh Safavi-Naini ; Moti Yung (eds.)
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Data Encryption; Computer Communication Networks; Operating Systems; Computers and Society; Legal Aspects of Computing; Management of Computing and Information Systems
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-35998-2
ISBN electrónico
978-3-540-35999-9
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Cobertura temática
Tabla de contenidos
doi: 10.1007/11787952_1
A Novel Framework for Multiple Creatorship Protection of Digital Movies
Yu-Quan Zhang; Sabu Emmanuel
A digital movie can be created jointly under the cooperation of many creators. It is then necessary to provide protection to the creatorship of each participating creator. In this paper, we propose a framework for providing the creatorship protection of multiple creators involved in creating the object-based digital movie. The proposed framework makes use of digital watermarking techniques and cryptographic protocols to achieve the creatorship protection purpose. Object-based movie may consist of several audio and video objects, which may be created by different creators. The proposed framework embeds different watermarks in different video/audio objects in such a way that each creator can show the joint-creatorship of the movie; as well as each creator can prove his/her creatorship of video/audio object he/she created.
- Assurance and Authentication Issues | Pp. 1-12
doi: 10.1007/11787952_2
TIVA: Trusted Integrity Verification Architecture
Mahadevan Gomathisankaran; Akhilesh Tyagi
We are moving towards the era of pervasive computing. The embedded computing devices are everywhere and they need to interact in many insecure ways. Verifying the integrity of the software running on these devices in such a scenario is an interesting and difficult problem. The problem is simplified if the verifying entity has access to the original binary image. However, the verifier itself may not be trusted with the intellectual property built into the software. Hence an acceptable and practical solution would not reveal the intellectual property (IP) of the verified software, and yet must verify its integrity. We propose one such novel solution, TIVA, in this paper.
- Assurance and Authentication Issues | Pp. 13-31
doi: 10.1007/11787952_3
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
Brian Fitzgerald
This chapter overviews the legal issues arising from the modification of the Sony PlayStation console under Australian Copyright Law – the so called anti-circumvention provisions. It will explain how these provisions have been interpreted by the courts and focus on the very recent decision of the Australian High Court. The article concludes by examining the extent to which the Australia-US Free Trade Agreement (AUSFTA) will impact upon this area of law.
- Legal and Related Issues | Pp. 32-51
doi: 10.1007/11787952_4
Downloading vs Purchase: Music Industry vs Consumers
Supriya Singh; Margaret Jackson; Jenny Waycott; Jenine Beekhuyzen
The music industry argues that unauthorised downloading of music is detrimentally affecting the industry; a breach of copyright that needs to be stopped. The industry has taken many actions to stamp out unauthorised music downloading, including prosecution of peer-to-peer software users for breach of copyright and against peer-to-peer software suppliers for contributory copyright infringement. Industry commentators have questioned this line of reasoning particularly as there is now significant revenue from legal music downloads in the United States and Europe. This paper draws on a qualitative study of music consumers in Australia to show there is not a clear dichotomy between down- loading and purchase. It is more of a continuum. From the users’ perspective, downloading is transformed to the activity of accessing and exploring music. The industry could more fruitfully focus on satisfying this basic aspect of the listening experience in DRM systems in order to work together with their customers.
- Legal and Related Issues | Pp. 52-65
doi: 10.1007/11787952_5
Digital Rights Management: Merging Contract, Copyright and Criminal Law
Yee Fen Lim
This paper examines the impact of digital rights management systems on the copyright regime. It argues that digital rights management systems in effect bestow copyright owners with more rights and control than what is stated in the copyright legislation. The end result is a regime that bears a remarkable resemblance to tangible property and which in some sense, is more powerful than tangible property.
- Legal and Related Issues | Pp. 66-74
doi: 10.1007/11787952_6
User-Attributed Rights in DRM
Milan Petković; R. Paul Koster
Current Digital Rights Management (DRM) systems lack a functionality that allows a user to have more control over his content licenses to preserve his privacy or otherwise protect his interests. This paper presents an approach to increasing user’s control of domain-based protected content without sacrificing content owner’s control. The proposed method is based on a specific form of a delegation license and an activation mechanism. The paper also discusses a practical realization of the proposed concept as well as its cryptographic enforcement, architectural aspects and system complexity. The effectiveness and simplicity of the approach are illustrated by a practical realization of several motivating examples.
- Expressing Rights and Management | Pp. 75-89
doi: 10.1007/11787952_7
AVS-REL—A New Right Expression Language
Ying Sha
Advanced Audio Video Coding Standard (AVS) Workgroup was established to provide the standards for compression, decompression, manipulation and display in digital audio and video multimedia equipment and system. In order to provide a flexible and interoperable rights expression mechanism for trade, distribution and usage on digital audio and video resources, AVS DRM subgroup develops a new right expression language (AVS-REL) to describe rights on digital resources under condition and permission. The new features of AVS-REL are illustrated in details in this paper, including data model, data structure, the usage of scenario and the management process of rights.
- Expressing Rights and Management | Pp. 90-101
doi: 10.1007/11787952_8
A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights
K. Bhoopalam; K. Maly; R. Mukkamala; M. Zubair; D. Agrawal; D. Kaminsky
One of the goals of Digital Rights Management Systems is the provision of a flexible access rights management system to specify and enforce digital rights. Policy-based access control is an important feature of flexible access management systems as it facilitates changes in access control with minimum or no changes to the system it protects. Two prominent policy based access specification models (and languages) are the Policy Core Information Model (PCIM) and the eXtensible Access Control Markup Language (XACML). In this paper we analyze and compare the two specification models for their suitability in building access rights for Digital Rights Management Systems.
- Expressing Rights and Management | Pp. 102-112
doi: 10.1007/11787952_9
The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks
Yanjun Hu; Xiaoping Ma; Linming Dou; Ying Chen
Watermarking capacity determines how much information can be carried in an image. Shannon formula is usually used to calculate it. While in this paper, it is considered that the watermarking capacity relies directly on the fidelity measure function. After the watermarking embedding process model is discussed, watermarking capacity formula and maximum watermarking capacity formula are proposed. Then, the watermarking capacity using PSNR as fidelity measure function is discussed. The conclusion that PSNR is not suitable to evaluate watermarked image is obtained.
- Watermarking | Pp. 113-122
doi: 10.1007/11787952_10
A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream
Hongmei Liu; Fenglian Shao; Jiwu Huang
Some requirements for MPEG-2 video watermarking, such as invisibility, robustness, unchanged bitstream size and real time processing, are desirable. We firstly apply a DC-based embedding strategy to MPEG-2 compressed domain and embed the watermark by modifying the DC coefficients. The strategy has three advantages over the AC-based one. Then a MPEG-2 bitstream video watermarking scheme is proposed. The watermark is embedded in DC coefficients in I frames. Because these DC coefficients are differentially coded, error caused by watermark embedding will be propagated. In order to decrease the distortion to video quality caused by error propagation, we develop a compensation algorithm worked in bit-stream, which improves the quality of the watermarked video effectively. We also give a simple control scheme to ensure that the MPEG-2 bitstream keeps its original size after watermarking. The experimental results show that the watermark is robust while guaranteeing the invisibility and real-time processing.
- Watermarking | Pp. 123-134