2008 the Fourth International Conference on Information Assurance and Security 2008
DOI: 10.1109/ias.2008.9
|View full text |Cite
|
Sign up to set email alerts
|

Designing a DRM System

Abstract: The Digital Rights Management (DRM) systems aim at protecting and enforcing the legal rights associated with the use of digital content distributed on the Internet. Most of such systems use watermarking techniques to implement the content protection. Although the effectiveness of the implemented protection strictly depends on the adopted watermarking techniques, an important role is also played by watermarking protocols. They define the scheme of the interactions that have to take place among the entities invo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
4

Relationship

2
8

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…This is largely due to the fact that a perfect copy of the distributed content can be reproduced at almost-zero cost. According to Frattolillo and Landolfi (2008), digital piracy results due to the ease by which copying and sharing files on the Internet are done. The emergence of peer-to-peer networks in the beginning of the millennium has led to rapid development of illegal file sharing processes especially touching music and videos (Einhora and Rosenblatt, 2005).…”
Section: Security Resolutionsmentioning
confidence: 99%
“…This is largely due to the fact that a perfect copy of the distributed content can be reproduced at almost-zero cost. According to Frattolillo and Landolfi (2008), digital piracy results due to the ease by which copying and sharing files on the Internet are done. The emergence of peer-to-peer networks in the beginning of the millennium has led to rapid development of illegal file sharing processes especially touching music and videos (Einhora and Rosenblatt, 2005).…”
Section: Security Resolutionsmentioning
confidence: 99%
“…Selected literature in watermarking research, whose scope is more close to the research presented in this paper, is discussed now. In [35,9,18], several software-based DRM and watermarking systems are proposed which are more or less ready-to-use. Visible watermarking algorithms which are absolutely essential for many applications, including protection of publicly available images and video broadcasting, are presented in [2,21,15,25,19,12,36,14,37,4,42,8].…”
Section: State Of the Art Of Digital Watermarkingmentioning
confidence: 99%
“…Others adopt punitive approaches that force third parties, such as Internet Service Providers (ISP), to prevent web users from performing illegal content sharing. Still others exploit the so-called Digital Rights Management (DRM) systems [1][2][3], which are web platforms aiming at enforcing the legal rights associated with the use of copyrighted digital contents by implementing specific services. They usually keep track of content modifications or manage copyright transfers and other transactions related to digital contents distributed on the Internet.…”
Section: Introduction and Motivationsmentioning
confidence: 99%