This document proposes a digital rights management (DRM) system for protecting multimedia files. It discusses existing DRM technologies for different media like films, broadcast TV, e-books, games and music. It then describes the proposed DRM framework which includes a DRM server to manage user rights and a DRM client to enforce them. Content can be consumed online by authenticating with the server or offline by storing an encrypted license locally. The framework aims to provide flexibility, efficiency, usability and security for digital content distribution and consumption.
Chapter Nine : IBM
In 1980, IBM was in a hurry to introduce a personal computer. When personal computers first began to emerge at the end of the 1970s,the idea that individuals would want personal computers on their desks seemed ludicrous.
What is DRM?
DRM standards
Microsoft Playready , Apple FairPlay , OMA DRM
DRM Techniques
Streaming standards
HTTP live stream, MPEG DASH etc.
DRM content playback
Silverlight, Flash, HTML5 Premium Video Extensions
In the current Internet, digital entertainment contents, such as video or audio files, are easily
accessible due to the new multimedia technologies and to broadband network connections. This cause is
considerable economic loss to global media players since digital contents, once legitimately obtained, can
be illegitimately shared through file sharing services on the Internet. Digital Rights Management (DRM)
systems have been proposed to support the protection of copyrighted digital contents. Even though such
systems have been widely adopted and promoted by global media players, they are based on proprietary
mechanisms that usually work only in closed, monolithic environments. In this regard, systems based on
watermarking technologies appear more suited to protect digital copyrighted content. This paper describes
the implementation scheme of a DRM system able to ensure the copyright protection of digital content
according to an innovative buyer-friendly watermarking protocol. The DRM system has been implemented
by exploiting a cloud environment in order to improve the overall performance of the system. In particular,
cloud behaves as a service infrastructural provider, since the content provider involved in the watermarking
protocol uses cloud to speed up the watermark embedding process and to save storage and bandwidth
costs needed to store and to deliver protected contents.
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
The frequent availability of digital data such as audio, images and videos became possible to the public through the expansion
of the internet. Digital watermarking technology is being adopted to ensure and facilitate data authentication, security and copyright
protection of digital media. It is considered as the most important technology in today’s world, to prevent illegal copying of data. Digital
watermarking can be applied to audio, video, text or images. This paper includes the detail study of watermarking definition and various
watermarking applications and techniques used to enhance data security.
Chapter Nine : IBM
In 1980, IBM was in a hurry to introduce a personal computer. When personal computers first began to emerge at the end of the 1970s,the idea that individuals would want personal computers on their desks seemed ludicrous.
What is DRM?
DRM standards
Microsoft Playready , Apple FairPlay , OMA DRM
DRM Techniques
Streaming standards
HTTP live stream, MPEG DASH etc.
DRM content playback
Silverlight, Flash, HTML5 Premium Video Extensions
In the current Internet, digital entertainment contents, such as video or audio files, are easily
accessible due to the new multimedia technologies and to broadband network connections. This cause is
considerable economic loss to global media players since digital contents, once legitimately obtained, can
be illegitimately shared through file sharing services on the Internet. Digital Rights Management (DRM)
systems have been proposed to support the protection of copyrighted digital contents. Even though such
systems have been widely adopted and promoted by global media players, they are based on proprietary
mechanisms that usually work only in closed, monolithic environments. In this regard, systems based on
watermarking technologies appear more suited to protect digital copyrighted content. This paper describes
the implementation scheme of a DRM system able to ensure the copyright protection of digital content
according to an innovative buyer-friendly watermarking protocol. The DRM system has been implemented
by exploiting a cloud environment in order to improve the overall performance of the system. In particular,
cloud behaves as a service infrastructural provider, since the content provider involved in the watermarking
protocol uses cloud to speed up the watermark embedding process and to save storage and bandwidth
costs needed to store and to deliver protected contents.
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
The frequent availability of digital data such as audio, images and videos became possible to the public through the expansion
of the internet. Digital watermarking technology is being adopted to ensure and facilitate data authentication, security and copyright
protection of digital media. It is considered as the most important technology in today’s world, to prevent illegal copying of data. Digital
watermarking can be applied to audio, video, text or images. This paper includes the detail study of watermarking definition and various
watermarking applications and techniques used to enhance data security.
This was a presentation at an event sponsored by the Center for Content Protection at the Asia TV Forum 2008 in Singapore. This was a public event while i worked at MSTV.
The rise of digital media and modern technologies has vastly raised the copyright-owning concerns of organisations and individuals. In just a few clicks of a mouse, many copyrighted images, videos and audio files get downloaded or shared without prior permission. Modern techniques and tools have made it easy to convert media into various digital forms for easy portability and sharing
Zip Mass-An Revolutionary Video Compression TechnologySunnySheng
The file size of a 1080P HD movie is only 300M after Zip-Mass compression, of which the original file is usually 26G. It can run fluently by any home computers without special hardware demands.
Digital Rights Management - securing digital content to prevent piracy and unauthorized use.
This Presentation is based on What is DRM how it works and a few interesting facts!
Are you a Operators, Broadcasters and Content Owners Looking for DRM?
Try VDRM from Mobiotics
This was a presentation at an event sponsored by the Center for Content Protection at the Asia TV Forum 2008 in Singapore. This was a public event while i worked at MSTV.
The rise of digital media and modern technologies has vastly raised the copyright-owning concerns of organisations and individuals. In just a few clicks of a mouse, many copyrighted images, videos and audio files get downloaded or shared without prior permission. Modern techniques and tools have made it easy to convert media into various digital forms for easy portability and sharing
Zip Mass-An Revolutionary Video Compression TechnologySunnySheng
The file size of a 1080P HD movie is only 300M after Zip-Mass compression, of which the original file is usually 26G. It can run fluently by any home computers without special hardware demands.
Digital Rights Management - securing digital content to prevent piracy and unauthorized use.
This Presentation is based on What is DRM how it works and a few interesting facts!
Are you a Operators, Broadcasters and Content Owners Looking for DRM?
Try VDRM from Mobiotics
This presentation was prepared and presented by me during last year of our Graduation, in the State Level Paper Presentation Competition, in which, I stood 1st.
This presentation focuses on the basic concepts of Digital Right Management,its life cycle,working and examples. The core objective of this presentation was to create awareness about Digital Right Management among the audience.
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Editor IJMTER
Due to the increasing popularity of video services application in recent days, it is
undesirable to prevent the content leakage on the trusted video delivery and piracy prevention has
been indeed, become critical. In order to preserve content leakage and prevent piracy,
conventional system addressed the issue by proposing the method based on the observation of
streamed traffic throughout the network .Also piracy has hindered the use of open peer to peer
networks for commercial content delivery. Hence the basic idea is to propose an enhanced
dynamic content leakage detection scheme that is robust to the variation of the video lengths. It
enhances the detection performances even in the environment subjected to variation in length of
videos. To detect pirates, identity-based signature and time stamped token have been generated. It
helps to solve piracy without affecting P2P clients so that colluder cannot download the secured
videos. The advantage lies mainly in advanced content availability, low cost and copyright
agreements in protecting the secured videos.
The topic of digital rights management technologies becomes more and more important for the modern society. Since technology is constantly developing and the numbers of consumers are growing, it is not surprising that people want and should be more aware of what their rights and obligations in the high-tech world are.
Similar to digital rights management for multimedia files (20)
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Gen AI Study Jams _ For the GDSC Leads in India.pdf
digital rights management for multimedia files
1. DIGITAL RIGHTS
MANAGEMENT SYSTEM FOR
MULTIMEDIA FILES
Shivam Mittal#1
, Apurva Vyas@2
, K.Marimuthu*3
#
Computerscience engineering,VIT Univesity,
KatpadiRoad,Vellore Tamilnadu India
1
shivam.mittal2017@vitstudent.ac.in
2
apurva.vyas2017@vitstudent.ac.in
3
k.marimuthu@vit.ac.in
Abstract— Copying orpiracy ofdigital data may be a one of
the toughest challenge that is faced by content publishers and
coding vendors recently. Digital piracy is unauthorized
repetition and/ordistributionofcodingsystem,music orfilms.
Pirated package hurts everyonefrompackagedevelopers tothe
other digital content publisher. Moreover, the smuggled
duplication and distribution of package contains a major
impact on the economy. Piracy exists at intervals the domain
of music, videos, games and package. Fully completely
different solutions exist for music and video antipiracy and
package, games antipiracy. The DRM framework uses
cryptologic techniques and supports protection of digital
contentviz.,audio files by implementing userrights like scan,
copy,play orprint asapplicable.Theplanningis alsoextended
to protection to varied file formats with a DRM license which
is able to be upgraded forextra rights orbe revived to induce
associate extended validity. The DRM framework in addition
accommodates offline use of protected content by a one-time
(initial) setupanda userlicense hold onregionally.Finally,the
paper analyzes the planning for DRM’s crucial requirements
like security,flexibility, potencyand ability.
Keywords— cryptologic techniques, digital right
management,piracy
I. INTRODUCTION
In this digital time, data sharing and unauthorized
distribution of virtual content material has grown
tremendously. The new wave of social networking websites
augmented byusinghand-held deviceslike clevertelephones,
have brought to the complexity. Content publishers and
software programcarriers locate it more and tougherto defend
theircontentandcopyrights.E-booksandmultimedia files are
freely disbursed over net and software cracks are created to
pass supplier’s regulations.Software providers are compelled
to conform sturdy anti-piracy enforcement techniques and
technologyto prevent suchrisks and testintellectualassets
(IP) infringements. Digital rights management (DRM), as a
group of get entry to manipulate technologies can be utilized
by copyright holders, publishers and hardware producers to
restrict using virtual content material and gadgets. Virtual
content material may be inside the form of files, e-books,
audio, video and video games. Virtual rights management
controls the get admission to touchy content by means of
including statistics approximately the userrights ofthe content
within the shape ofa license.Such rights include information
on the period of the record to be accessedand permissionsto
study or print the content. A consumer license to that impact
is issued to the consumer for consumption of the content.
However,software licensing solutions are used to manipulate
ordictate permissions relatedto softwareprogram.A software
programlicense may include a time restrict for the usage of
software. Diverse control strategies are instilled to prevent
unauthorized duplication and use of software. One such
approach is to offer a hardware dongle for software program
interlock. Majority of software program dispensed in CD-
ROM required for the person to enter a valid key or client
identification code before putting in the software. Yet some
other approach calls for registering the software with the
manufacturer to acquire an operational code necessary to
install the software.Some software licensing answersrequire
the stop consumer to activate her subscription on net or
cellphone thatunits the validitydateon the serverhosted with
the aid of the vendor.The set up purchasersoftware program
communicates periodically with theserverto make certain that
the subscription is valid. These solutions are designed for
legitimate use of software. But, opposite engineering of
software programlibraries facilitate the attackers to acquire
sensitive statistics through disassembling and studying the
design of system additives. This reasons sizeable loss to
software program carriers from copyright and IP
infringements. Maximum of the reverse engineering
techniques are used to apprehend software architecture, ward
off software programrestrictions and access source code
2. II. Recent and Existing Technologies
Within the beyond decade, many DRM technology have
been evolved within theindustry,but only a fewhave survived
through the years. At its center, designing a DRM device is
hard; the essential project lies inside the fact that the system
should exist on top of the media layout itself. Unique media
formats have hugely special distribution, content material
advent, metadata and scopes of permissions. They pose
exclusive demanding situationsin very one-of-a-kind domains.
We are able to examine some of the maximum popular
industrialDRM schemes in film, broadcast tv,e-books,games
and music.
A. Film Media
Within the early daysofDVDtechnologies,a DRM system
known as contentScrambling machine (CSS) become evolved
with the aid ofthe DVD forumon film DVDs. It makes use of
a simple encryption scheme designedtosaveyoubyte-for-byte
copying ofa MPEG(digitalvideo)stream.The important thing
for the encryption is split and one at a time saved within the
lead-in place ofthe restrictedDVDand the DVD poweritself,
and the encryption set of rules employs a proprietary 40-bit
move cipher [Schneier99]. The technology turned into first
delivered in 1996, and changed into compromised in 1999 by
means of a brute pressure attack. Like many other encryption
algorithms before it at the time, the weak point ofthe scheme
became blamed at the guidelines locatedon anyexportation of
cryptographic structures from America which constrained
structures to apply keys of no extra than forty-bit long.
Recently, due to the fast adoption of new media technology
including HD-DVD and Blu-ray, new DRM structures
nowadaysproblemby and large with those platforms.
B. Broadcast TV
In the US the FCC ruled in " digital Broadcast tv
Redistribution manipulate"that" No birthday celebration shall
promote or distribute in interstate trade a protected
Demodulator Product that doesn't follow the Demodulator
Compliance requirements" [DMCA05] , and that hardware
should put into effect capability to "actively thwart piracy."
New tv receivers after July 1, 2005 using the ATSC popular
were alleged to contain the printed flag - a hard and fast of
reputation bitsindicating thepermissionstatusofthe circulate
[Lening05]. Afternumerousstruggleswith the best courtroom,
the FCC in the end removed the broadcast flag on August 22,
2011 [FCC11]. Meanwhile,the DVB project,an international
enterprise consortium with extra than 270 contributors, had
been developing a hard and fast ofacross the world universal
open standardsknownas digitalVideo Broadcasting (DVB).
C. E-books
The area ofeBookDRM is a most debatedtopic.a fewargue
that DRM makes eBook publishing complicated, at the same
time as others have proven that doing away with or relaxing
DRM might be top financially for the publishers due to the
boomin legitimate buyers outweighing the results of piracy .
There are fourforemost e-bookcodecs to be hadtoday,they're
Mob pocket,Topaz,Epub and PDF. The venture ofenforcing
DRM schemes on e-book formats is complicated with the aid
of the fast adjustments inside the hardware devices that study
them, in addition to the changes in agencies that put
up/promote E-books. As a result, many technologies grow to
be being out ofdate nownot long aftertheymay be followed.
D. Computer Games
It is anticipated that videogame income figures are waiting
for to grow from $66 billion global in 2010 to $81 billion by
means of 2016, and a large element of these income are
happening at the laptop platform. In recent years, computer
video games have visible a shift inside the method of
distribution from retail to digital download [NPD10]. In
conjunction with it, the DRM schemes have tailored or
vanishedto facilitate increase on this good sized marketplace.
The reason oflaptop sport DRM for retail gadgets is typically
to save youcomplete-disc reproductionofthecontentmaterial,
or restriction the number of installations of a sport. The latter
has generated many criticisms both fromplayers andinsidethe
industry because ofa few intense instances wherein the DRM
device rendered a recreation unplayable to the patron after a
time period even on the equal computer. Moreover, many
clients discover the DRM mechanisms intrusive and
burdensome to theirsport play experience.
Many games make use of a few shape of "online DRM,"
wherein players are required tolog in to aninternet carrierwith
their unique account call and password to play their video
games. Every recreation contains an activation serial wide
variety, which when registered, gets delivered to the player's
account completely. This approach works properly for games
with an indispensable multiplayer issue, or games that are
allotted via broadband,inclusive ofonSteam.Forvideo games
distributedon discs,many publishers use SecuRom.
E. Music
The song industry has seen sizeable shift in user adoption
from audio CDs to net tune. One among the sooner and worst
examples of audio CD DRM is Sony BMG's extended replica
protection (XCP) and MediaMax CD-3 software. No longer
handiest became the protection not effective (the audio tracks
3. can stillbe recorded andripped),the protectioninstalls a rootkit
(a software programthat profits general manage of the laptop)
to the machine withoutinforming the user.Moreover,there's no
clean way to uninstallthe software,and seeking to accomplish
that should render the CD pressure inoperable [Borland05].
This sparked huge public outrage,and spawned a class motion
lawsuit in oppositiontoSonyBMGand a subsequentagreement
[EFF].
Today, many online tune shops promote audio files which
have a few DRM that restricts the usage and copy of the files.
However, because of the analog nature of audio, many DRM
schemes can be without difficulty bypassed at the hardware
level. As a result,many shops virtually offerDRM-unfastened
track.
III. DRM FRAMEWORK
The proposedDRM layout consistsofa DRM serverthat is
responsible fordealingwith personrightsand a DRM client to
put into effect personrights.The DRM user may be in on line
or offline mode. The DRM directors can upload, delete and
edit the customers inside the DRM.The customers labeledas
writer have the right to post their content material and assign
rights to others. Clients are given up users of the content
material. To clear up the hassle of unauthorized copying and
limiting the get entry to the rightfulpeople,the digitalcontent
material can be first of all encrypted via the publisher. The
writer who owns the distribution rights(orthe contentmaterial
itself) units the consumer’s rights. Those rights include
permissions which include print, view, execute, and play and
constraints like time restriction or quantity of perspectives.
The encrypted contentis sentto users forintake.We nowtalk
two modes ofoperation forDRM
On this version,the DRM purchaserhasto lookup with the
DRM server to accept the content (Fig. 1). Once linked, the
stop consumer authenticates to the server and receives a
license via a simple session (https). The license that consists
ofthe name ofthe game key (forcontentdecryption) alongside
records on rights is transferred to the client at some stage in
the intake of the content. The DRM consumer decrypts the
content material in the memory and enforces the rights
distinctive in the license. In this situation, neither the
decryptedcontentnorthe DRM license is domestically stored.
Further, the rights granted by means of the writer, for the
person,are fetched fromthe serverand enforced. By means of
changingthe rights data at theserverthe publishercanfurnish
newrights orextend existing privileges to the consumer.This
online version affords the greatest flexibility whilst assigning
rights to any mixture of customers and content material.
Offline DRM version is applicable to the eventualities wherein
the DRM purchaser has limited connectivity to DRM server.
In this example, the consumer can pick out to work offline
after initial connectivityto the DRM server.The DRM server
establishes the agreewith among the client’s workstation,stop
consumer.We nowprovide an explanationforthe fourstages
in offline DRM model. Fig. 2 describes theentities and phases
worried.
The entities involvedare:
• End user, who legally obtains the software or digital
contentforuse.
• Publisher, who distributes the content and is responsible
for managing userrights.
• DRM client, which authenticates to DRM server and
requests access to specific contentordigitalobject.
• DRM server,which holds the content decryptionkeys and
rights information and distributes themto clients in the form
of a license Notations.
4. In Fig. 3,we have illustrated the diverse entitiesworried and
the collection of interactions between them. An offline DRM
version uses asymmetric and symmetric cryptographic
mixture of keys and DRM licenses. First difference between
offline and online version is inside the license format and its
transport mechanism. In offline version, the content material
decryption key in the license is wrapped with client’s public
key and this license can be stored regionally. Offline DRM
licenses also are certain to unique customers.
a Registration phase
An existing DRM (online) user needs to accomplish
certificate registration to work in offline mode. In this phase,
the user acquires machine certificate and a user certificate to
establish a trust between DRM server and the user’s
workstation.
Step 1.UserU authenticatesto servervictimization Uid and
Upwd and requestsmachine certificate (by assignedappletor
a trustworthy application like the DRM shopper itself) from
DRM server.
Step 2.Server validates the hid of the shopperby causinga
sample programand checkits output.
b. Publication phase
In this part, the publisheruploads the content to the DRM
serverand encryptsit with a randomkey referred to as content
key. The content keys additionalprotected and keep in DRM
server’s information. Once userrequestsaccessto a particular
content,the content key and appropriate data is transferredto
the user within the sort of a tamperproof DRM license.
Publisher P uploads a digital content C, and encrypts it
victimizations the cryptography operate E and a randomkey
k to create EC.
c. ConsumptionPhase
Consumption part during this part, the DRM consumer
enforces the user rights for consumption of the content. One
DRM consumer will render multiple file formats supported
file kind
Step 1. To figure in offline mode, user must request the
license file UL from the DRM server.UL may be sent by the
publisher.
Step 2. Server generates the specified license file UL to
access encrypted content EC. The license file UL contains
contentkey encryptedwith user’spublic key Upub.
Step 3. DRM consumer stores the encrypted file EC and
corresponding license ULin its native information.
Step 4. Once usertries toaccessa file fromhernative DRM
consumer, the middle from the machine certificate Mcert is
matched with current machine ID. The integrity of the
corresponding license file UL is additionally verified.
Step 5. The DRM consumerdecrypts the encryptedcontent
world organization,and renders the content whenapplyingthe
rights.
IV.ANALYSIS
In this section, we have a tendency to analyze our design of
the DRM necessities like flexibility, efficiency, ability and
security supportedourobservations.
A. Flexibility Content format:
It’s potential to safeguard multiple formats (theoretically any
sort ofcontent)with the DRM server.Such formats Text,PDF,
image, audio, video, etc. Assignment of rights is versatile.
Permissions andconstraints may be enforcedat granularlevel,
for selected user, on selected content. Revocation of rights is
additionally easy. Approved customers will consume the
contenton any machine exploitationthe DRM consumer.The
framework is transportable to multiple platforms.
B. lustiness
The design is strong to support load reconciliation and
clump. Just in case of any failure at primary server,a backup
server will take over. The user load may be distributed on to
multiple DRM servers.
C. Quality
The model is fairly easy and might be simply enforced. In
offline model, key and certificate management is that the
overheadforthe advantageofoffline consumptionofcontent.
D. Handiness
The protectedcontentis offered to any orallthe legitimate
users fromthe server. If a license file is lost, a backup copy
may be obtained. If there is two publishers, say A and B,
publisherA cannot grant any rights on the content printedby
B similar applies to generationofDRM licenses.In Multi-user
atmosphere, users have to be compelled to attest to DRM
server for winning licenses. In offline model, the licenses of
two measure guaranteed to specific users on specific
machines. Repetition license files or sealed objects fromone
machine to different cannot breakthe DRM protection.
E. Security
All the communications from DRM consumer to server
happen over SSL/https. Each time the content must be
consumed,userauthenticationto serveroverhttps is required.
Therefore eavesdropping and man-in-the middle sort of
attacks aren'tpotential. Within theeventofa tamperedlicense,
the DRM consumerwon't settle forthelicense file.The license
file carries the DRM server’s digitalsignature to facilitate the
detection of change of state. All the crypto logical keys