首页 > 最新文献

ACM Digital Rights Management Workshop最新文献

英文 中文
A robust content-dependent algorithm for video watermarking 一种鲁棒的视频水印算法
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179528
Lino Coria-Mendoza, P. Nasiopoulos, R. Ward
A watermarking method that relies on informed coding and informed embedding is presented. Our method uses a subset of various codewords to represent the 0 and 1 message bits to be embedded. We propose a codeword generation scheme that keeps control of the distance between codewords in order to secure fidelity and robustness of the watermark. When compared to existing video watermarking schemes, our method yields superior robustness to video compression.
提出了一种基于知情编码和知情嵌入的水印方法。我们的方法使用各种码字的子集来表示要嵌入的0和1消息位。为了保证水印的保真度和鲁棒性,提出了一种控制码字间距的码字生成方案。与现有的视频水印方案相比,我们的方法对视频压缩具有更好的鲁棒性。
{"title":"A robust content-dependent algorithm for video watermarking","authors":"Lino Coria-Mendoza, P. Nasiopoulos, R. Ward","doi":"10.1145/1179509.1179528","DOIUrl":"https://doi.org/10.1145/1179509.1179528","url":null,"abstract":"A watermarking method that relies on informed coding and informed embedding is presented. Our method uses a subset of various codewords to represent the 0 and 1 message bits to be embedded. We propose a codeword generation scheme that keeps control of the distance between codewords in order to secure fidelity and robustness of the watermark. When compared to existing video watermarking schemes, our method yields superior robustness to video compression.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Hybrid static-dynamic attacks against software protection mechanisms 针对软件防护机制的静态-动态混合攻击
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102560
Matias Madou, Bertrand Anckaert, B. D. Sutter, K. D. Bosschere
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual property violations, against which the software needs to be protected. The intellectual property that needs to be protected can take on different forms. The software might, e.g., consist itself of proprietary algorithms and datastructures or it could provide controlled access to copyrighted material. Therefore, in recent years, a number of techniques have been explored to protect software. Many of these techniques provide a reasonable level of security against static-only attacks. Many of them however fail to address the problem of dynamic or hybrid static-dynamic attacks. While this type of attack is already commonly used by black-hats, this is one of the first scientific papers to discuss the potential of these attacks through which an attacker can analyze, control and modify a program extensively. The concepts are illustrated through a case study of a recently proposed algorithm for software watermarking [6].
逆向工程和程序分析的进步使软件极易受到恶意主机攻击。这些攻击通常采取侵犯知识产权的形式,软件需要受到保护。需要保护的知识产权可以有不同的形式。例如,软件本身可能由专有算法和数据结构组成,或者它可以提供对受版权保护的材料的受控访问。因此,近年来,人们探索了许多保护软件的技术。这些技术中的许多都提供了合理的安全级别,以防止仅静态攻击。然而,它们中的许多都不能解决动态或静态-动态混合攻击的问题。虽然这种类型的攻击已经被黑帽经常使用,但这是第一批讨论这些攻击潜力的科学论文之一,攻击者可以通过这些攻击广泛地分析、控制和修改程序。通过最近提出的软件水印算法的案例研究来说明这些概念[6]。
{"title":"Hybrid static-dynamic attacks against software protection mechanisms","authors":"Matias Madou, Bertrand Anckaert, B. D. Sutter, K. D. Bosschere","doi":"10.1145/1102546.1102560","DOIUrl":"https://doi.org/10.1145/1102546.1102560","url":null,"abstract":"Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual property violations, against which the software needs to be protected. The intellectual property that needs to be protected can take on different forms. The software might, e.g., consist itself of proprietary algorithms and datastructures or it could provide controlled access to copyrighted material. Therefore, in recent years, a number of techniques have been explored to protect software. Many of these techniques provide a reasonable level of security against static-only attacks. Many of them however fail to address the problem of dynamic or hybrid static-dynamic attacks. While this type of attack is already commonly used by black-hats, this is one of the first scientific papers to discuss the potential of these attacks through which an attacker can analyze, control and modify a program extensively. The concepts are illustrated through a case study of a recently proposed algorithm for software watermarking [6].","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133674059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
DRMs, fair use and users' experience of sharing music drm,合理使用和用户分享音乐的体验
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102549
M. Jackson, Supriya Singh, J. Beekhuyzen, Jenny Waycott
There is a mismatch between the law relating to fair use, personal use and copying; the central thrust of Digital Rights Management (DRM) and users' behavior relating to the listening and sharing of music. This paper reports on the different copyright regimes in the United States and Australia. It describes some of the current DRM systems. Against this background, the paper draws on a qualitative study to explore Australian users' experience of listening to and sharing music. A design for a good DRM has to take into account the schism between the copyright regimes and users' sharing behavior.
有关合理使用、个人使用和复制的法律之间存在不匹配;数字版权管理(DRM)的核心内容以及与音乐聆听和分享相关的用户行为。本文报道了美国和澳大利亚不同的版权制度。它描述了一些当前的DRM系统。在此背景下,本文采用定性研究的方法探讨澳大利亚用户的音乐聆听和分享体验。一个好的DRM设计必须考虑到版权制度和用户共享行为之间的分裂。
{"title":"DRMs, fair use and users' experience of sharing music","authors":"M. Jackson, Supriya Singh, J. Beekhuyzen, Jenny Waycott","doi":"10.1145/1102546.1102549","DOIUrl":"https://doi.org/10.1145/1102546.1102549","url":null,"abstract":"There is a mismatch between the law relating to fair use, personal use and copying; the central thrust of Digital Rights Management (DRM) and users' behavior relating to the listening and sharing of music. This paper reports on the different copyright regimes in the United States and Australia. It describes some of the current DRM systems. Against this background, the paper draws on a qualitative study to explore Australian users' experience of listening to and sharing music. A design for a good DRM has to take into account the schism between the copyright regimes and users' sharing behavior.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Achieving media portability through local content translation and end-to-end rights management 通过本地内容翻译和端到端权限管理实现媒体可移植性
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102552
D. W. Kravitz, T. S. Messerges
The problem addressed in this paper is that of DRM interoperability. The term DRM interoperability, as used here, refers to approaches that provide for the transfer, from one "upstream" DRM system to another "downstream" DRM system, of DRM protected content and an associated license. We introduce the concept of a Rights Issuer Module (RIM) that is functionally situated in the home network between the upstream device (which includes an upstream-DRM agent) and downstream devices (which each include a downstream-DRM agent). The novelty of our approach lies in the way the RIM handles significant aspects of the translation operations, potentially leaving the upstream and downstream DRM agents intact. Security and implementation advantages of the RIM are discussed. The tradeoffs involved with different RIM implementations are examined.
本文讨论的问题是DRM互操作性问题。此处使用的术语DRM互操作性指的是提供从一个“上游”DRM系统向另一个“下游”DRM系统传输受DRM保护的内容和相关许可证的方法。我们介绍了权利发行者模块(RIM)的概念,它在功能上位于上游设备(包括上游drm代理)和下游设备(每个设备都包括下游drm代理)之间的家庭网络中。我们方法的新颖之处在于RIM处理翻译操作的重要方面的方式,可能会使上游和下游DRM代理保持完整。讨论了RIM的安全性和实现优势。研究了不同RIM实现所涉及的权衡。
{"title":"Achieving media portability through local content translation and end-to-end rights management","authors":"D. W. Kravitz, T. S. Messerges","doi":"10.1145/1102546.1102552","DOIUrl":"https://doi.org/10.1145/1102546.1102552","url":null,"abstract":"The problem addressed in this paper is that of DRM interoperability. The term DRM interoperability, as used here, refers to approaches that provide for the transfer, from one \"upstream\" DRM system to another \"downstream\" DRM system, of DRM protected content and an associated license. We introduce the concept of a Rights Issuer Module (RIM) that is functionally situated in the home network between the upstream device (which includes an upstream-DRM agent) and downstream devices (which each include a downstream-DRM agent). The novelty of our approach lies in the way the RIM handles significant aspects of the translation operations, potentially leaving the upstream and downstream DRM agents intact. Security and implementation advantages of the RIM are discussed. The tradeoffs involved with different RIM implementations are examined.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129412138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Statistical audio watermarking algorithm based on perceptual analysis 基于感知分析的统计音频水印算法
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102565
Xiaomei Quan, Hongbin Zhang
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the perceptual significant portions in wavelet packet domain by a statistical method. Watermark detection can be done without access to the original signal. Experimental results show the proposed scheme can survive common signal manipulations and malicious attacks.
本文提出了一种新的音频统计水印方案。在掩蔽阈值的控制下,采用统计方法将水印自适应透明地嵌入到小波包域的感知显著部分。水印检测可以在不访问原始信号的情况下完成。实验结果表明,该方案能够抵御常见的信号篡改和恶意攻击。
{"title":"Statistical audio watermarking algorithm based on perceptual analysis","authors":"Xiaomei Quan, Hongbin Zhang","doi":"10.1145/1102546.1102565","DOIUrl":"https://doi.org/10.1145/1102546.1102565","url":null,"abstract":"In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the perceptual significant portions in wavelet packet domain by a statistical method. Watermark detection can be done without access to the original signal. Experimental results show the proposed scheme can survive common signal manipulations and malicious attacks.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122072457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved watermark detection for spread-spectrum based watermarking using independent component analysis 基于独立分量分析的扩频水印改进水印检测
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102564
Hafiz Malik, A. Khokhar, R. Ansari
This paper presents an efficient blind watermark detection/decoding scheme for spread spectrum (SS) based watermarking, exploiting the fact that in SS-based embedding schemes the embedded watermark and the host signal are mutually independent and obey non-Gaussian distribution. The proposed scheme employs the theory of independent component analysis (ICA) and posed the watermark detection as a blind source separation problem. The proposed ICA-based blind detection/decoding scheme has been simulated using real-world audio clips. The simulation results show that the ICA-based detector can detect and decode watermark with extremely low decoding bit error probability (less than 0.01) against common watermarking attacks and benchmark degradations.
利用扩频水印嵌入方案中所嵌入的水印与主信号相互独立且服从非高斯分布的特点,提出了一种有效的扩频水印盲检测/解码方案。该方案采用独立分量分析(ICA)理论,将水印检测作为一个盲源分离问题。提出了基于ica的盲检测/解码方案,并使用真实音频片段进行了仿真。仿真结果表明,在常见的水印攻击和基准降低的情况下,基于ica的水印检测器能够以极低的译码误码率(小于0.01)检测和解码水印。
{"title":"Improved watermark detection for spread-spectrum based watermarking using independent component analysis","authors":"Hafiz Malik, A. Khokhar, R. Ansari","doi":"10.1145/1102546.1102564","DOIUrl":"https://doi.org/10.1145/1102546.1102564","url":null,"abstract":"This paper presents an efficient blind watermark detection/decoding scheme for spread spectrum (SS) based watermarking, exploiting the fact that in SS-based embedding schemes the embedded watermark and the host signal are mutually independent and obey non-Gaussian distribution. The proposed scheme employs the theory of independent component analysis (ICA) and posed the watermark detection as a blind source separation problem. The proposed ICA-based blind detection/decoding scheme has been simulated using real-world audio clips. The simulation results show that the ICA-based detector can detect and decode watermark with extremely low decoding bit error probability (less than 0.01) against common watermarking attacks and benchmark degradations.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Watermarking and ownership problem: a revisit 水印和所有权问题:重访
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102563
H. Sencar, N. Memon
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of the state-of-the-art watermarking techniques raise doubts about applicability of watermarking to ownership problem. With this perspective, we address the security weaknesses common to most watermarking techniques and assess the role of watermarking in construction of ownership assertion systems. We identify the requirements of a watermarking based ownership assertion system. Also, we provide a basic functional outline of a practical version of such a system and identify its potential vulnerabilities. To mitigate these vulnerabilities, we aim at reducing the false positive rate of the watermark detection scheme. For this purpose, we propose embedding multiple watermarks as opposed to single watermark embedding while constraining the embedding distortion. The crux of the proposed method lies in watermark generation which deploys a family of one-way functions. We incorporate the multiple watermark embedding idea with the additive watermarking technique [1] and present results to illustrate the potential of this approach in reducing the false-positive rate of the watermark detection scheme.
水印技术已被设想为建立数字媒体对象所有权的潜在手段。然而,目前最先进的水印技术的可实现的鲁棒性和误报率使人们怀疑水印是否适用于所有权问题。从这个角度来看,我们解决了大多数水印技术常见的安全弱点,并评估了水印在所有权断言系统构建中的作用。我们确定了基于水印的所有权断言系统的要求。此外,我们还提供了这样一个系统的实用版本的基本功能概述,并确定了其潜在的漏洞。为了减少这些漏洞,我们的目标是降低水印检测方案的误报率。为此,我们提出了在约束嵌入失真的同时嵌入多个水印而不是单个水印的方法。该方法的关键在于水印生成,它部署了一组单向函数。我们将多水印嵌入思想与加性水印技术相结合[1],并给出了一些结果来说明这种方法在降低水印检测方案的误报率方面的潜力。
{"title":"Watermarking and ownership problem: a revisit","authors":"H. Sencar, N. Memon","doi":"10.1145/1102546.1102563","DOIUrl":"https://doi.org/10.1145/1102546.1102563","url":null,"abstract":"Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of the state-of-the-art watermarking techniques raise doubts about applicability of watermarking to ownership problem. With this perspective, we address the security weaknesses common to most watermarking techniques and assess the role of watermarking in construction of ownership assertion systems. We identify the requirements of a watermarking based ownership assertion system. Also, we provide a basic functional outline of a practical version of such a system and identify its potential vulnerabilities. To mitigate these vulnerabilities, we aim at reducing the false positive rate of the watermark detection scheme. For this purpose, we propose embedding multiple watermarks as opposed to single watermark embedding while constraining the embedding distortion. The crux of the proposed method lies in watermark generation which deploys a family of one-way functions. We incorporate the multiple watermark embedding idea with the additive watermarking technique [1] and present results to illustrate the potential of this approach in reducing the false-positive rate of the watermark detection scheme.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114993594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Control flow based obfuscation 基于混淆的控制流
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102561
Jun Ge, S. Chaudhuri, A. Tyagi
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P), resilient (O(P) is resilient against attacks), and effective (O(P) is not too much slower than P). In this paper we describe the design of an obfuscator which consists of two parts. The first part extracts the control flow information from the program and saves it in another process named Monitor-process. The second part protects Monitor-process converting it into an Aucsmith like self-modifying version. We prove the correctness of the obfuscation scheme. We assess its resilience and efficiency to show that both are This supports the claim that our approach is practical.
软件混淆器是将源程序P转换为防止恶意逆向工程的程序O。O应该是正确的(O(P)与P具有相同的功能),弹性的(O(P)对攻击具有弹性)和有效的(O(P)不会比P慢太多)。在本文中,我们描述了一个由两部分组成的混淆器的设计。第一部分从程序中提取控制流信息,并将其保存在另一个名为Monitor-process的进程中。第二部分保护Monitor-process,将其转换为类似于Aucsmith的自修改版本。我们证明了该混淆方案的正确性。我们对其弹性和效率进行了评估,以证明两者都是有效的。这支持了我们的方法是实用的说法。
{"title":"Control flow based obfuscation","authors":"Jun Ge, S. Chaudhuri, A. Tyagi","doi":"10.1145/1102546.1102561","DOIUrl":"https://doi.org/10.1145/1102546.1102561","url":null,"abstract":"A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P), resilient (O(P) is resilient against attacks), and effective (O(P) is not too much slower than P). In this paper we describe the design of an obfuscator which consists of two parts. The first part extracts the control flow information from the program and saves it in another process named Monitor-process. The second part protects Monitor-process converting it into an Aucsmith like self-modifying version. We prove the correctness of the obfuscation scheme. We assess its resilience and efficiency to show that both are This supports the claim that our approach is practical.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125593156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Towards multilateral secure digital rights distribution infrastructures 迈向多边安全数字版权分发基础设施
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102556
André Adelsbach, M. Rohe, A. Sadeghi
Digital Rights Management (DRM) systems and applications appear to increasingly attract the interest of e-commerce business developers. DRM systems aim at secure distribution of digital content and commonly comprise a huge variety of different technologies. Current DRM systems focus mainly on right-holder's security needs and commonly neglect those of consumers. In particular, these systems even lack reliable means for users to verify that they purchase usage-rights on works (licenses) from the rightful authors (rights-holder). This seems to be simply achievable in centralistic systems where only global players or a few large collecting societies control the distribution of licenses. However, in a large distributed system with many unknown and potentially untrusted sellers/distributors of digital content it is crucial from the legal and security perspectives that any user/device of the DRM platform can reliably verify that a purchased license is authorised by the rightful author/rights-holder.In this paper we introduce a formal model and the corresponding schemes for establishing a multilateral secure rights-distribution infrastructure. The key features of our proposal are: firstly, consumers can directly verify that a seller is indeed authorised to grant certain usage-rights. Secondly, the authorship and rights licenses are invariant with respect to perceptibly similar works, i.e., they are not only valid for the original work but also for a set of closely related similar works which are modifications of the original work (e.g., different resolutions or encodings of an image or a video). The reason for providing this property is that these works are still considered to be under the copyright of the author.Our scheme provides an enabling technology for decentralised right distribution infrastructures for intellectual property with multilateral security.
数字版权管理(DRM)系统和应用程序越来越引起电子商务业务开发人员的兴趣。DRM系统的目标是数字内容的安全分发,通常包含各种不同的技术。目前的DRM制度主要关注权利人的安全需求,而忽视了消费者的安全需求。特别是,这些系统甚至缺乏可靠的手段来验证用户是否从合法作者(权利持有人)那里购买了作品的使用权(许可)。在只有全球参与者或少数大型收集协会控制许可证分配的集中式系统中,这似乎很容易实现。然而,在一个拥有许多未知和潜在不可信的数字内容销售商/分销商的大型分布式系统中,从法律和安全的角度来看,DRM平台的任何用户/设备都可以可靠地验证所购买的许可证是由合法作者/权利持有人授权的,这一点至关重要。本文介绍了建立多边安全权利分配基础设施的形式化模型和相应的方案。我们的建议的主要特点是:首先,消费者可以直接验证卖家确实被授权授予某些使用权。其次,作者身份和权利许可对于明显相似的作品是不变的,也就是说,它们不仅对原作有效,而且对一组密切相关的类似作品有效,这些作品是对原作的修改(例如,图像或视频的不同分辨率或编码)。提供此属性的原因是,这些作品仍然被认为是在作者的版权之下。我们的方案为具有多边安全的知识产权分散权利分配基础设施提供了一种使能技术。
{"title":"Towards multilateral secure digital rights distribution infrastructures","authors":"André Adelsbach, M. Rohe, A. Sadeghi","doi":"10.1145/1102546.1102556","DOIUrl":"https://doi.org/10.1145/1102546.1102556","url":null,"abstract":"Digital Rights Management (DRM) systems and applications appear to increasingly attract the interest of e-commerce business developers. DRM systems aim at secure distribution of digital content and commonly comprise a huge variety of different technologies. Current DRM systems focus mainly on right-holder's security needs and commonly neglect those of consumers. In particular, these systems even lack reliable means for users to verify that they purchase usage-rights on works (licenses) from the rightful authors (rights-holder). This seems to be simply achievable in centralistic systems where only global players or a few large collecting societies control the distribution of licenses. However, in a large distributed system with many unknown and potentially untrusted sellers/distributors of digital content it is crucial from the legal and security perspectives that any user/device of the DRM platform can reliably verify that a purchased license is authorised by the rightful author/rights-holder.In this paper we introduce a formal model and the corresponding schemes for establishing a multilateral secure rights-distribution infrastructure. The key features of our proposal are: firstly, consumers can directly verify that a seller is indeed authorised to grant certain usage-rights. Secondly, the authorship and rights licenses are invariant with respect to perceptibly similar works, i.e., they are not only valid for the original work but also for a set of closely related similar works which are modifications of the original work (e.g., different resolutions or encodings of an image or a video). The reason for providing this property is that these works are still considered to be under the copyright of the author.Our scheme provides an enabling technology for decentralised right distribution infrastructures for intellectual property with multilateral security.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132726666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
DRM interoperability analysis from the perspective of a layered framework 从分层框架的角度分析DRM互操作性
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102551
G. Heileman, Pramod A. Jamkhedkar
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoperability among DRM systems from the perspective of a layered architectural framework. The advantage of looking at the problem from this point of view is that the layered framework provides a certain amount of structure that is very helpful in guiding those working on DRM interoperability issues. Specifically, the layered framework we describe provides a useful design abstraction along architectural lines. One of the advantages of this perspective is that it allows us to consider the level within computing/communication architectures at which certain functionality should be provided, and then to address how the functionality between layers should interact in order to provide specific DRM capabilities. The communications that occur between layers, both within a single system and between two communicating systems, are the places where protocols can be defined and possibly standardized. Thus, they provide focal points for studying and addressing interoperability in DRM systems.
互操作性目前被视为数字版权管理(DRM)行业面临的最重要问题之一。本文从分层体系结构框架的角度考虑DRM系统之间的互操作性问题。从这个角度看待问题的好处是,分层框架提供了一定数量的结构,这对于指导那些处理DRM互操作性问题的人非常有帮助。具体地说,我们描述的分层框架沿着体系结构路线提供了一个有用的设计抽象。这种视角的优点之一是,它允许我们考虑在计算/通信体系结构中应该提供某些功能的级别,然后处理层之间的功能应该如何交互,以提供特定的DRM功能。发生在层之间的通信,无论是在单个系统内还是在两个通信系统之间,都是可以定义和可能标准化协议的地方。因此,它们为研究和处理DRM系统中的互操作性提供了焦点。
{"title":"DRM interoperability analysis from the perspective of a layered framework","authors":"G. Heileman, Pramod A. Jamkhedkar","doi":"10.1145/1102546.1102551","DOIUrl":"https://doi.org/10.1145/1102546.1102551","url":null,"abstract":"Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoperability among DRM systems from the perspective of a layered architectural framework. The advantage of looking at the problem from this point of view is that the layered framework provides a certain amount of structure that is very helpful in guiding those working on DRM interoperability issues. Specifically, the layered framework we describe provides a useful design abstraction along architectural lines. One of the advantages of this perspective is that it allows us to consider the level within computing/communication architectures at which certain functionality should be provided, and then to address how the functionality between layers should interact in order to provide specific DRM capabilities. The communications that occur between layers, both within a single system and between two communicating systems, are the places where protocols can be defined and possibly standardized. Thus, they provide focal points for studying and addressing interoperability in DRM systems.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130929801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
期刊
ACM Digital Rights Management Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1