Abstract
Conventional digital libraries utilize access control and digital watermarking techniques to protect their digital content. These methods, however, have drawbacks. First, after passing the identity authentication process, authorized users can easily redistribute the digital assets. Second, it is impractical to expect a digital watermarking scheme to prevent all kinds of attack. Thus, how to enforce property rights after digital content has been released to authorized users is a crucial and challenging issue. In this paper, we propose a wrapper-based approach to digital content protection that integrates digital watermarking, cryptography, information protection technology, and a rights model. In this rights enforcement environment, the behavior of all content players is monitored and digital content can only be accessed after certain usage rules have been satisfied. Furthermore, the proposed architecture can be easily integrated into any digital content player, or even existing DRM systems in digital libraries. With the protection of the proposed DRM system, the abuse of digital content can be drastically reduced.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Popescu, B.C., Kamperman, F.L.A.J.: A DRM security architecture for home networks. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 1–10 (2004)
Chen, H.Y., Ho, J.-M.: Multimedia Center: A Novel Multimedia File Management System in NDAP. In: The Second Workshop on Digital Archives Technologies, July 22-23, pp. 89–96 (2002)
Hunt, G., Brubacher, D.: Detours: Binary interception of win32 functions. In: Proceed-ings of the 3rd USENIX Windows NT Symposium, pp. 135-143 (July 1999)
Lin, T.-B., Huang, S.-K.: OpenDReaMS: A Generic DRM Wrapper for COTS Readers. In: The Third Workshop on Digital Archives Technologies, August 5-6, pp. 289–295 (2004)
Liu, Q., Reihaneh, S.-N., Sheppard, N.P.: Digital rights management for content distribution. In: Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 (2003)
Nicolakis, T., Pizano, C.E., Prumo, B., Webb, M.: Protecting Digital Archives at the Greek Orthodox Archdiocese of America. In: Proceedings of the 2003 ACM workshop on Digital rights management (October 2003)
Jamkhedkar, P.A., Heileman, G.L.: DRM as a layered system. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 11–21 (2004)
Serrao, C., Marques, J.: DIGIPIPE - a pipeline methodology for digital image production and protection. In: 4th EURASIP-IEEE Region 8 International Symposium on VIPromCom, June 16-19 (2002)
Guth, S.: A Sample DRM System. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol. 2770, pp. 150–161. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hsiao, JH., Wang, JH., Chen, MS., Chen, CS., Chien, LF. (2005). Constructing a Wrapper-Based DRM System for Digital Content Protection in Digital Libraries. In: Fox, E.A., Neuhold, E.J., Premsmit, P., Wuwongse, V. (eds) Digital Libraries: Implementing Strategies and Sharing Experiences. ICADL 2005. Lecture Notes in Computer Science, vol 3815. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599517_43
Download citation
DOI: https://doi.org/10.1007/11599517_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30850-8
Online ISBN: 978-3-540-32291-7
eBook Packages: Computer ScienceComputer Science (R0)