Skip to main content

Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring

  • Conference paper
Book cover Multimedia Content Analysis and Mining (MCAM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4577))

Included in the following conference series:

  • 1507 Accesses

Abstract

By reviewing DRMs up to now and two typical examples – AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical and social viewpoints. Not only it is difficult to deploy and update content encryption and security infrastructure, but also the content diffusion is limited and Fair Use is affected. The new schema for DRM should be content monitoring system in public space that prevents illegal diffusion of content in copyright but permits content being used freely in private space or for social liberty. The traditional rights in analog times will fluently move to digital space under the proposed schema.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The U.S. Copyright Office. The Digital Millennium Copyright Act (1998), http://www.copyright.gov/legislation/dmca.pdf

  2. Fernando, G., Jacobs, T., et al.: Project DreaM: An Architectural Overview. Sun Microsystems White paper (September 2005)

    Google Scholar 

  3. Jobs, S.: Thoughts on Music (February 6, 2007), http://www.apple.com/hotnews/thoughtsonmusic/

  4. China national standard GB/T 20090.2. Advanced Audio and Video coding Part 2: Video (2006)

    Google Scholar 

  5. Tie-jun, H., Yongliang, L.: Basic Considerations on AVS DRM Architecture. J. of Computer Science and Technology 21.3, 366–369 (2006)

    Google Scholar 

  6. The Digital Media Manifesto (2003/09/30), http://www.dmpf.org/manifesto/dmm.htm

  7. Digital Media Project, http://www.dmpf.org/

  8. Eugene, T.L., Ahmet, M.E., Rgginald, L.L., Edward, J.D.: Advances in Digital Video Content Protection. Proceedings of the IEEE 93, 171–183 (2005)

    Article  Google Scholar 

  9. Doërr, G., Dugelay, J.-L.: A guide tour of video watermarking. Signal Process. Image Commun. 18(4), 263–282 (2003)

    Article  Google Scholar 

  10. Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco,CA (2002)

    Google Scholar 

  11. Wagner, N.R.: Fingerprinting. In: Proceedings of IEEE Symp. Security and Privacy, pp. 18–22 (1983)

    Google Scholar 

  12. Hill Slowinski, F.: What Consumers Want in Digital Rights Management (DRM): Making Content as Widely Available as Possible in Ways that Satisfy Consumer Preferences. AAP/ALA White Paper (March 2003), http://dx.doi.org/10.1003/whitepaper

  13. DMP0270. Collection of TRU templates (November 11, 2004), http://www.dmpf.org/open/dmp0270.zip

  14. Kalker, T., Haitsma, J.A., Oostveen, J.: Issues with digital watermarking and perceptual hashing. In: Proceedings of SPIE 4518, Multimedia Systems and Applications IV (2001)

    Google Scholar 

  15. Du, R., Fridrich, J.: Lossless Authentication of MPEG-2 Video. In: Proceedings of 2002 International Conference on Image Processing, vol. 2, pp. 893–896 (2002)

    Google Scholar 

  16. Pröfrock, D., Richter, H. Schlauweg, M., et al.: H.264/AVC video authentication using skipped macroblocks for an erasable watermark. In: Proceedings of Vision Communication and Image Processing, pp. 1480–1490 (2005)

    Google Scholar 

  17. Queluz, M.P.: Towards robust, content based techniques for image authentication. In: Proceedings of the 2nd Workshop on Multimedia Signal Processing, pp. 297–302 (1998)

    Google Scholar 

  18. Lin, C.-Y., Chang, S.-F.: Issues and solutions for authenticating MPEG video. In: Proceedings of SPIE Storage and Retrieval for Image and Video Databases, San Jose, CA, USA (1999)

    Google Scholar 

  19. Martinian, E., Wornell, G.W., Chen, B.: Authentication with Distortion Criteria. IEEE Transactions on Information Theory 52(7), 2523–2542 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Nicu Sebe Yuncai Liu Yueting Zhuang Thomas S. Huang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Huang, T. (2007). Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring. In: Sebe, N., Liu, Y., Zhuang, Y., Huang, T.S. (eds) Multimedia Content Analysis and Mining. MCAM 2007. Lecture Notes in Computer Science, vol 4577. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73417-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73417-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73416-1

  • Online ISBN: 978-3-540-73417-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics