ABSTRACT
Easy duplication and distribution of digital works on Internet has facilitated copyright infringement problems in many ways. It's impossible to prevent illegal replication of the decrypted content just using content encryption and access control technologies. A novel copyright ownership identification protocol is proposed. Anyone can register as an author and embed the copyright watermarks into the original digital works on the trusted authority center before disseminating them. Once a digital work is found pirated, the author (or other authorized copyright holders) can apply for the copyright ownership identification service. The proposed protocol has no restrictions for the buyers and the copyright holders don't have to interact with the consumers. It's much more suitable for the large-scale distributed anonymous network applications. Since the copyright watermark is embedded by a trusted authority center, and the registration is timestamped by the reliable time stamp center, the identification results could be used as legally admissible evidence.
- D. Bradbury. Decoding digital rights management. Computers & Security, 26(1):31--33, February 2007.Google ScholarDigital Library
- C. L. Chen. A secure and traceable e-drm system based on mobile device. Expert Systems with Applications, 35(3):878--886, October 2008. Google ScholarDigital Library
- T. H. Chena and G. Horngb. A lightweight and anonymous copyright-protection protocol. Computer Standards & Interfaces, 29(2):229--237, February 2007. Google ScholarDigital Library
- H.-h. Chu, L. Qiao, K. Nahrstedt, H. Wang, and R. Jain. A secure multicast protocol with copyright protection. SIGCOMM Comput. Commun. Rev., 32(2):42--60, April 2002. Google ScholarDigital Library
- J. D. Clercq. Windows Server 2003 Security Infrastructures. Digital Press, Burlington, 2004. Google ScholarDigital Library
- C. Craig and R. Graham. Rights management in the digital world. Computer Law & Security Review, 19(5):356--362, September 2003.Google ScholarCross Ref
- Y. Gasmi and A.-R. e. a. Sadeghi. Flexible and secure enterprise rights management based on trusted virtual domains. In Proceedings of the 3rd ACM workshop on Scalable trusted computing, pages 71--80. ACM, October 2008. Google ScholarDigital Library
- A. N. Haidar and A. E. Abdallah. Formal modelling of pki based authentication. Electronic Notes in Theoretical Computer Science, 235:55--70, April 2009. Google ScholarDigital Library
- R. Hunt. Technological infrastructure for pki and digital certification. Computer Communications, 24(14):1460--1471, September 2001. Google ScholarDigital Library
- J. Irwin. Digital rights management: The open mobile alliance drm specifications. Information Security Technical Report, 9(4):22--31, December 2004. Google ScholarDigital Library
- A. Jain and U. Uludag. Multimedia Security Technologies for Digital Rights Management. Academic Press, Burlington, 2006. Google ScholarDigital Library
- P. A. Jamkhedkar and G. L. Heileman. Digital rights management architectures. Computers & Electrical Engineering, 35(2):376--394, March 2009. Google ScholarDigital Library
- J. Kun and W. Xiaoming. Anonymous and traceable copyright protection protocol based on mobile devices. Computer Science, 39(4):71--74, April 2012.Google Scholar
- Microsoft. {ms-drm}: Digital rights management license protocol specification. http://msdn.microsoft.com, 2008Google Scholar
- OMA. Digital rights management v2.1. http://www.openmobilealliance.org/, 2008.Google Scholar
- R. C.-W. Phan, B.-M. Goi, G.-S. Poh, and J. Kim. Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents. Wireless Personal Commun., 56(1):73--83, January 2011. Google ScholarDigital Library
- M. H. Shao. A privacy-preserving buyer-seller watermarking protocol with semi-trust third party. In Trust, Privacy and Security in Digital Business, pages 44--53. Springer Berlin/Heidelberg, March 2007. Google ScholarDigital Library
- N. P. Sheppard. On implementing mpeg-21 intellectual property management and protection. In Proceedings of the 2007 ACM workshop on Digital Rights Management, pages 10--22. ACM, October 2007. Google ScholarDigital Library
- J. Zhang, W. Kou, and K. Fan. Secure buyer-seller watermarking protocol. Information Security, IEEE Proceedings, 153(1):15--18, March 2006.Google ScholarCross Ref
Index Terms
- A legally-admissible copyrights ownership identification protocol for digital works
Recommendations
Digital Ownership: From Content Consumers to Owners and Traders
Digital content today can be found and accessed almost everywhere--however, not always by its proper owners. Digital rightsmanagement so far has been driven by prohibition and patronization. The authors of this article approach digital rights management ...
Digital Right Management Model Based on Cryptography and Digital Watermarking
CSSE '08: Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 03This paper proposes a Digital Right Management model using both cryptography and digital watermarking technology integratively. This model encrypts digital content with high-performance symmetric key, and uses robust watermarking and fragile ...
Novel robust zero-watermarking scheme for digital rights management of 3D videos
Digital watermarking is an effective technique for the digital rights management (DRM) of three-dimensional (3D) videos, which is still a crucial issue in the field of 3D televisions. The current watermarking schemes for 3D videos can be classified into ...
Comments