skip to main content
10.1145/2382336.2382367acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimcsConference Proceedingsconference-collections
research-article

A legally-admissible copyrights ownership identification protocol for digital works

Authors Info & Claims
Published:09 September 2012Publication History

ABSTRACT

Easy duplication and distribution of digital works on Internet has facilitated copyright infringement problems in many ways. It's impossible to prevent illegal replication of the decrypted content just using content encryption and access control technologies. A novel copyright ownership identification protocol is proposed. Anyone can register as an author and embed the copyright watermarks into the original digital works on the trusted authority center before disseminating them. Once a digital work is found pirated, the author (or other authorized copyright holders) can apply for the copyright ownership identification service. The proposed protocol has no restrictions for the buyers and the copyright holders don't have to interact with the consumers. It's much more suitable for the large-scale distributed anonymous network applications. Since the copyright watermark is embedded by a trusted authority center, and the registration is timestamped by the reliable time stamp center, the identification results could be used as legally admissible evidence.

References

  1. D. Bradbury. Decoding digital rights management. Computers & Security, 26(1):31--33, February 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. L. Chen. A secure and traceable e-drm system based on mobile device. Expert Systems with Applications, 35(3):878--886, October 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. H. Chena and G. Horngb. A lightweight and anonymous copyright-protection protocol. Computer Standards & Interfaces, 29(2):229--237, February 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H.-h. Chu, L. Qiao, K. Nahrstedt, H. Wang, and R. Jain. A secure multicast protocol with copyright protection. SIGCOMM Comput. Commun. Rev., 32(2):42--60, April 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. D. Clercq. Windows Server 2003 Security Infrastructures. Digital Press, Burlington, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Craig and R. Graham. Rights management in the digital world. Computer Law & Security Review, 19(5):356--362, September 2003.Google ScholarGoogle ScholarCross RefCross Ref
  7. Y. Gasmi and A.-R. e. a. Sadeghi. Flexible and secure enterprise rights management based on trusted virtual domains. In Proceedings of the 3rd ACM workshop on Scalable trusted computing, pages 71--80. ACM, October 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. N. Haidar and A. E. Abdallah. Formal modelling of pki based authentication. Electronic Notes in Theoretical Computer Science, 235:55--70, April 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Hunt. Technological infrastructure for pki and digital certification. Computer Communications, 24(14):1460--1471, September 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Irwin. Digital rights management: The open mobile alliance drm specifications. Information Security Technical Report, 9(4):22--31, December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Jain and U. Uludag. Multimedia Security Technologies for Digital Rights Management. Academic Press, Burlington, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. A. Jamkhedkar and G. L. Heileman. Digital rights management architectures. Computers & Electrical Engineering, 35(2):376--394, March 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Kun and W. Xiaoming. Anonymous and traceable copyright protection protocol based on mobile devices. Computer Science, 39(4):71--74, April 2012.Google ScholarGoogle Scholar
  14. Microsoft. {ms-drm}: Digital rights management license protocol specification. http://msdn.microsoft.com, 2008Google ScholarGoogle Scholar
  15. OMA. Digital rights management v2.1. http://www.openmobilealliance.org/, 2008.Google ScholarGoogle Scholar
  16. R. C.-W. Phan, B.-M. Goi, G.-S. Poh, and J. Kim. Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents. Wireless Personal Commun., 56(1):73--83, January 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. H. Shao. A privacy-preserving buyer-seller watermarking protocol with semi-trust third party. In Trust, Privacy and Security in Digital Business, pages 44--53. Springer Berlin/Heidelberg, March 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. P. Sheppard. On implementing mpeg-21 intellectual property management and protection. In Proceedings of the 2007 ACM workshop on Digital Rights Management, pages 10--22. ACM, October 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Zhang, W. Kou, and K. Fan. Secure buyer-seller watermarking protocol. Information Security, IEEE Proceedings, 153(1):15--18, March 2006.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A legally-admissible copyrights ownership identification protocol for digital works

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICIMCS '12: Proceedings of the 4th International Conference on Internet Multimedia Computing and Service
            September 2012
            243 pages
            ISBN:9781450316002
            DOI:10.1145/2382336

            Copyright © 2012 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 9 September 2012

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate163of456submissions,36%
          • Article Metrics

            • Downloads (Last 12 months)5
            • Downloads (Last 6 weeks)1

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader