Multimedia Tools and Applications

, Volume 74, Issue 16, pp 6255–6271 | Cite as

A novel approach to rights sharing-enabling digital rights management for mobile multimedia

  • Zhiyong ZhangEmail author
  • Zhen Wang
  • Danmei Niu


Aiming at protecting the copyrights of audio, video and multimedia in mobile consumer electronics, a novel digital rights management (DRM) approach based on mobile Android terminal was proposed. Firstly, the solution adopted AES encryption and decryption algorithm to package multimedia contents, and meanwhile bound digital license to the hardware of the terminal device, as achieved the usage control and secure playback for mobile multimedia contents. Secondly, the license was written with Extensible Markup Language (XML), and especially a digital rights sharing between terminal devices was supported in the scheme. Thirdly, the times of reading and writing were reduced in the process of encrypting and decrypting multimedia contents by the way of introducing the appropriate size of the buffer, which effectively improved the encryption and decryption speed, and shortened the response time of the system. Finally, a prototype indicated that the solution has significant features of high security and faster cryptographic computation speed meeting the practical requirements for digital rights management and sharing by Android platforms.


Multimedia Security Digital Rights Management Smart Mobile Rights Sharing 



The work was sponsored by National Natural Science Foundation of China (Grant No. 61370220), Plan for Scientific Innovation Talent of Henan Province (Grant No. 134100510006), Program for Science & Technology Innovation Talents in Universities of Henan Province (Grant No. 2011HASTIT015), and Key Program for Basic Research of The Education Department of Henan Province (Grant No.13A520240, No.14A520048). We give thanks to the reviewers and editors for their valuable comments, questions, and suggestions.


  1. 1.
    Barhoush M, Atwood JW (2010) Requirements for enforcing digital rights management in multicast content distribution. Telecommun Syst 45(1):3–20CrossRefGoogle Scholar
  2. 2.
    Bhatt S, Sion R, Carbunar B (2009) A personal mobile drm manager for smartphones. Compu Secur 28(6):327–340CrossRefGoogle Scholar
  3. 3.
    Chuang CY, Wang YC, Lin YB (2010) Digital right management and software protection on Android phones. In Proceedings of IEEE 71st Vehicular Technology Conference, May 16–19, Taipei, Taiwan, China:1–5Google Scholar
  4. 4.
    Diaz-Sanchez D, Almenarez F, Marín A, Proserpio D, Arias Cabarcos P (2011) Media cloud: an open cloud computing middleware for content management. IEEE Trans Consum Electron 57(2):970–978CrossRefGoogle Scholar
  5. 5.
    Fan YC, Shen JH (2009) DFT-based SoC/VLSI IP protection and digital rights management platform. IEEE Trans Instrum Meas 58(6):2026–2033MathSciNetCrossRefGoogle Scholar
  6. 6.
    Feng X, Tang Z, Yu Y (2009) An efficient contents sharing method for DRM. In Proceedings of 6th IEEE Consumer Communications & Networking Conference, Jan 10–13, Las Vegas, Nevada, USA: 1–5Google Scholar
  7. 7.
    Koushanfar F (2012) Provably secure active IC metering techniques for piracy avoidance and digital rights management. IEEE Transac Inf Forensic Secur 7(1):51–63CrossRefGoogle Scholar
  8. 8.
    Lee J, Jeong Y, Yoon K, Park J (2009) DRM applied contents share in digital home. In Proceedings of IEEE 13th International Symposium on Consumer Electronics, May 25–28, Kyoto, Japan: 64–66Google Scholar
  9. 9.
    Lee S, Kim J, Hong SJ (2009) Redistributing time-based rights between consumer devices for content sharing in DRM system. Int J Inf Secur 8(4):263–273MathSciNetCrossRefGoogle Scholar
  10. 10.
    Lee S, Lee HR, Lee S, Kim J (2012) DRMFS: A file system layer for transparent access semantics of DRM-protected contents. J Syst Softw 85(5):1058–1066CrossRefGoogle Scholar
  11. 11.
    Lian S, Chen X (2010) Secure and traceable multimedia distribution for convergent Mobile TV services. Comput Commun 33(14):1664–1673CrossRefGoogle Scholar
  12. 12.
    Lian S, Chen X, Wang J (2012) Content distribution and copyright authentication based on combined indexing and watermarking. Multimedia Tools Appl 57(1):49–66CrossRefGoogle Scholar
  13. 13.
    Ma G, Pei Q, Wang Y, Jiang X (2011) A General Sharing Model Based on Proxy Re-encryption. In Proceedings of 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Oct 14–16, Dalian, China: 248–251Google Scholar
  14. 14.
    Open Mobile Alliance™ (2008) OMA DRM Requirements Candidate Version 2.0.1.
  15. 15.
    Sachan A, Emmanuel S, Kankanhalli MS (2009) Efficient license validation in MPML DRM architecture. In Proceedings of the 9th ACM workshop on Digital rights management, Nov 9–13, Chicago, IL, USA: 73–82Google Scholar
  16. 16.
    Thomas T, Emmanuel S, Subramanyam AV, Kankanhalli MS (2009) Joint watermarking scheme for multiparty multilevel DRM architecture. IEEE Trans Inf Forensic Secur 4(4):758–767CrossRefGoogle Scholar
  17. 17.
    Toma C, Boja C (2009) Survey of mobile digital rights management platforms. J Mob, Embed Distrib Syst 1(1):32–42Google Scholar
  18. 18.
    Win LL, Thomas T, Emmanuel S (2012) Secure interoperable digital content distribution mechanisms in a multi-domain architecture. Multimedia Tools Appl 60(1):97–128CrossRefGoogle Scholar
  19. 19.
    Wu CC, Lin CC, Chang CC (2010) Digital rights management for multimedia content over 3G mobile networks. Expert Syst Appl 37(10):6787–6797CrossRefGoogle Scholar
  20. 20.
    Yan XX, Ma ZF, Yang YX, Niu XX (2012) Identity-based domain key distribution protocol in the E-document security management. J Commun 33(5):12–20Google Scholar
  21. 21.
    Ye C, Ling H, Zou F, Liu C (2012) Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain. In Proceedings of 20th ACM International Conference on Multimedia, Oct 29-Nov 2, Nara, Japan:1117–1120Google Scholar
  22. 22.
    Zhang ZY (2011) Digital rights management ecosystem and its usage controls: a survey. Int J Digit Content Technol Appl 5(3):255–272CrossRefGoogle Scholar
  23. 23.
    Zhang ZY (2012) Security, trust and risk in digital rights management ecosystem. Science Press, BeijingGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Information Engineering CollegeHenan University of Science and TechnologyLuoyangPeople’s Republic of China
  2. 2.School of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingPeople’s Republic of China

Personalised recommendations