Abstract
Digitalization of content is both a blessing and a curse. While it allows for efficient transmission and consumption, the ease of copying and sharing digital content has resulted in rampant piracy. Digital Rights Management (DRM) has emerged as a multidisciplinary measure to protect the copyright of content owners and to facilitate the consumption of digital content. In this paper, we survey the technological aspects of DRM. We present a discussion of DRM definitions, formulate a general DRM model and specify its various DRM components. We also evaluated emerging trends such as the use of P2P in DRM and DRM for personal access control, some noteworthy issues such as content reuse and granularity, as well as citing some future directions such as frequent content key upgrades.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking schemes provably secure against copy and ambiguity attacks. In: Proceedings of the 2003 ACM workshop on Digital rights management, pp. 111–119 (2003)
Allamanche, E., Herre, J., Helmuth, O., Frba, B., Kasten, T., Cremer, M.: Content-Based Identification of Audio Material Using MPEG-7 Low Level Description. In: Proceedings of the International Symposium of Music Information Retrieval (2001)
Barni, M., Bartolini, F.: Data hiding for fighting piracy, Signal Processing Magazine, March 2, vol. 21(2), pp. 28–39. IEEE, Los Alamitos (2004)
Cano, P., Batlle, E., Gmez, E., Gomes, L., De, C.T., Bonnet, M.: Audio fingerprinting: concepts and applications. In: Proceedings of 1st International Conference on Fuzzy Systems and Knowledge Discovery, Singapore (November 2002)
Cano, P., Batlle, E., Kalker, T., Haitsma, J.: A review of algorithms for audio fingerprinting. In: Proceedings of International Workshop on Multimedia Signal Processing, US Virgin Islands (December 2002)
Chi, C.H., Wang, H., Ku, W.: Proxy-Cache Aware Object Bundling for Web Access Acceleration. In: Proceedings of Eighth International Workshop on Web Content Caching and Distribution (2003)
Conrado, C., Kamperman, F., Schrijen, G.J., Jonker, W.: Privacy in an identity-based DRM system. In: Proceedings of 14th International Workshop on Database and Expert Systems Applications 2003, September 1-5, pp. 389–395 (2003)
DOI.: The Digital Object Identifier (DOI) System, http://www.doi.org/
Erickson, J., Iannella, R., Wenning, R.: 2001. Workshop Report, W3C Workshop on Digital Rights Management for the Web, 22-23 January (2001)
Goodrich, M.T., Shin, M., Straub, C.D., Tamassia, R.: Distributed data authentication. In: Proceedings of DARPA Information Survivability Conference and Exposition 2003, April 22-24, vol. 2, pp. 58–59 (2003)
Hartung, F., Ramme, F.: Digital rights management and watermarking of multimedia content for m-commerce applications. IEEE Communications Magazine 38(11), 78–84 (2000)
Iannella, R.: Digital Rights Management (DRM) Architectures. D-Lib Magazine 7(6) (2001), http://www.dlib.org/dlib/june01/iannella/06iannella.html ISSN 1082-9873
Iannella, R., Higgs, P.: Driving Content Management with Digital Rights Management (April 2003), http://www.iprsystems.com/whitepapers/CM-DRM-WP.pdf
INDECS. The <indecs> framework, http://www.indecs.org
Iwata, T., Abe, T., Ueda, Y., Sunaga, H.: A DRM system suitable for P2P content delivery and the study on its implementation. In: Proceedings of The 9th Asia- Pacific Conference on Communications, APCC 2003, September 21-24, vol. 2, pp. 806–811 (2003)
Kang, Y.K., Kim, M.H.: Real-time fingerprints recognition mechanism-based digital contents protection system for interaction on the Web. In: Proceedings of Pacific Rim International Symposium on Dependable Computing 2001, December 17-19, pp. 304–309 (2001)
Mori, R., Kawahara, M.: Superdistribution: the concept and the architecture. Technical Report 7, Inst. of Inf. Sci. & Electron (Japan), Tsukuba Univ., Japan (July 1990)
MihçAk, K., Venkatesan, R.: New Iterative Geometric Methods for Robust Perceptual Image Hashing, Security and Privacy in Digital Rights Management. In: Proceedings of ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, pp. 13–24 (2001)
MPEG-21. MPEG-21, http://www.chiariglione.org/mpeg/standards/mpeg-21/mpeg-21.htm
Nutzel, J., Grimm, R.: Potato System and signed media format - an alternative approach to online music business. In: Proceedings of Third International Conference on Web Delivering of Music, September 15-17. WEDELMUSIC, pp. 23–26 (2003)
OASIS. OASIS Rights Language Technical Committee http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=rights
ODRL. Open Digital Rights Language (ODRL), http://www.odrl.net/
OEBF. Open eBook Forum, http://www.openebook.org/
OMA. Open Mobile Alliance (OMA), http://www.openmobilealliance.org/
Ortega-Garcia, J., Bigun, J., Reynolds, D., Gonzalez-Rodriguez, J.: Authentication gets personal with biometrics, Signal Processing Magazine, March 2004, vol. 21(2), pp. 50–62. IEEE, Los Alamitos (2004)
Pestoni, F., Lotspiech, J.B., Nusser, S.: xCP: Peer-to-Peer content protection, Signal Processing Magazine, vol. 21(2), pp. 71–81. IEEE, Los Alamitos (2004)
Rosenblatt, B., Trippe, B., Mooney, S.: Digital Rights Management: Business and Technology. John Wiley & Sons, Chichester (2001) ISBN 0764548891
Rump, N.: Definition, Aspects, and Overview. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol. 2770, pp. 3–15. Springer, Heidelberg (2003)
Screamer, B.: Beale Screamer’s crack of Microsoft DRM Version 2 (2001), http://cryptome.org/ms-drm.htm
Uzuner, Ö., Davis, R.: Content and expression-based copy recognition for intellectual property protection. In: Proceedings of the 2003 ACM workshop on Digital rights management, pp. 103–110 (2003)
Venkatachalam, V., Cazzanti, L., Dhillon, N., Wells, M.: Automatic identification of sound recordings, Signal Processing Magazine, March 2004, vol. 21(2), pp. 92–99. IEEE, Los Alamitos (2004)
Walker, J., Morris, O.J., Marusic, B.: Share it! - the architecture of a rights-managed network of peer-to-peer set-top-boxes, EUROCON 2003. In: Computer as a Tool. The IEEE Region 8, September 22-24, vol. 1, pp. 251–255 (2003)
Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion-Resistant Fingerprinting for Multimedia, Signal Processing Magazine, March 2004, vol. 21(2), pp. 15–27. IEEE, Los Alamitos (2004)
XRML. eXtensible rights Markup Language (XrML), http://www.xrml.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ku, W., Chi, CH. (2004). Survey on the Technological Aspects of Digital Rights Management. In: Zhang, K., Zheng, Y. (eds) Information Security. ISC 2004. Lecture Notes in Computer Science, vol 3225. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30144-8_33
Download citation
DOI: https://doi.org/10.1007/978-3-540-30144-8_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23208-7
Online ISBN: 978-3-540-30144-8
eBook Packages: Springer Book Archive