A novel approach to rights sharing-enabling digital rights management for mobile multimedia
- 349 Downloads
Aiming at protecting the copyrights of audio, video and multimedia in mobile consumer electronics, a novel digital rights management (DRM) approach based on mobile Android terminal was proposed. Firstly, the solution adopted AES encryption and decryption algorithm to package multimedia contents, and meanwhile bound digital license to the hardware of the terminal device, as achieved the usage control and secure playback for mobile multimedia contents. Secondly, the license was written with Extensible Markup Language (XML), and especially a digital rights sharing between terminal devices was supported in the scheme. Thirdly, the times of reading and writing were reduced in the process of encrypting and decrypting multimedia contents by the way of introducing the appropriate size of the buffer, which effectively improved the encryption and decryption speed, and shortened the response time of the system. Finally, a prototype indicated that the solution has significant features of high security and faster cryptographic computation speed meeting the practical requirements for digital rights management and sharing by Android platforms.
KeywordsMultimedia Security Digital Rights Management Smart Mobile Rights Sharing
The work was sponsored by National Natural Science Foundation of China (Grant No. 61370220), Plan for Scientific Innovation Talent of Henan Province (Grant No. 134100510006), Program for Science & Technology Innovation Talents in Universities of Henan Province (Grant No. 2011HASTIT015), and Key Program for Basic Research of The Education Department of Henan Province (Grant No.13A520240, No.14A520048). We give thanks to the reviewers and editors for their valuable comments, questions, and suggestions.
- 3.Chuang CY, Wang YC, Lin YB (2010) Digital right management and software protection on Android phones. In Proceedings of IEEE 71st Vehicular Technology Conference, May 16–19, Taipei, Taiwan, China:1–5Google Scholar
- 6.Feng X, Tang Z, Yu Y (2009) An efficient contents sharing method for DRM. In Proceedings of 6th IEEE Consumer Communications & Networking Conference, Jan 10–13, Las Vegas, Nevada, USA: 1–5Google Scholar
- 8.Lee J, Jeong Y, Yoon K, Park J (2009) DRM applied contents share in digital home. In Proceedings of IEEE 13th International Symposium on Consumer Electronics, May 25–28, Kyoto, Japan: 64–66Google Scholar
- 13.Ma G, Pei Q, Wang Y, Jiang X (2011) A General Sharing Model Based on Proxy Re-encryption. In Proceedings of 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Oct 14–16, Dalian, China: 248–251Google Scholar
- 14.Open Mobile Alliance™ (2008) OMA DRM Requirements Candidate Version 2.0.1. http://technical.openmobilealliance.org/Technical/release_program/docs/DRM/V2_0_2-20080723-A
- 15.Sachan A, Emmanuel S, Kankanhalli MS (2009) Efficient license validation in MPML DRM architecture. In Proceedings of the 9th ACM workshop on Digital rights management, Nov 9–13, Chicago, IL, USA: 73–82Google Scholar
- 17.Toma C, Boja C (2009) Survey of mobile digital rights management platforms. J Mob, Embed Distrib Syst 1(1):32–42Google Scholar
- 20.Yan XX, Ma ZF, Yang YX, Niu XX (2012) Identity-based domain key distribution protocol in the E-document security management. J Commun 33(5):12–20Google Scholar
- 21.Ye C, Ling H, Zou F, Liu C (2012) Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain. In Proceedings of 20th ACM International Conference on Multimedia, Oct 29-Nov 2, Nara, Japan:1117–1120Google Scholar
- 23.Zhang ZY (2012) Security, trust and risk in digital rights management ecosystem. Science Press, BeijingGoogle Scholar