This document discusses the origins and definitions of digital rights management (DRM). It begins with examples of how rights to physical goods differ from digital goods. It then covers how new technologies changed rights management and led to the development of DRM systems. The document discusses early DRM systems from the perspectives of business and technology. It also summarizes different definitions of DRM from various researchers and scholars and notes there is ambiguity given the evolving nature of the field. Finally, it outlines some basic functions of a typical DRM system.
The topic of digital rights management technologies becomes more and more important for the modern society. Since technology is constantly developing and the numbers of consumers are growing, it is not surprising that people want and should be more aware of what their rights and obligations in the high-tech world are.
Your Digital Rights Management (DRM) Guide: https://goo.gl/OQb7Nk
Tips and strategies you must know when it comes to using digital
photos, text and videos.
You can find a detailed guide about DRM in this white paper: https://goo.gl/OQb7Nk
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
The topic of digital rights management technologies becomes more and more important for the modern society. Since technology is constantly developing and the numbers of consumers are growing, it is not surprising that people want and should be more aware of what their rights and obligations in the high-tech world are.
Your Digital Rights Management (DRM) Guide: https://goo.gl/OQb7Nk
Tips and strategies you must know when it comes to using digital
photos, text and videos.
You can find a detailed guide about DRM in this white paper: https://goo.gl/OQb7Nk
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
The frequent availability of digital data such as audio, images and videos became possible to the public through the expansion
of the internet. Digital watermarking technology is being adopted to ensure and facilitate data authentication, security and copyright
protection of digital media. It is considered as the most important technology in today’s world, to prevent illegal copying of data. Digital
watermarking can be applied to audio, video, text or images. This paper includes the detail study of watermarking definition and various
watermarking applications and techniques used to enhance data security.
Drm digital rights managment-june2014-tarek gaberTarek Gaber
Digital Rights Management
Dr. Tarek Gaber
Faculty of Computers & Informatics
Suez Canal University , Ismailia, Egypt
and
SRGE (www.scienceegypt.net)
Email: tmgaber@gmail.com
Digital Content and its Characteristics
Before the digital era, one's ability to do various things with content were limited.
The Internet (digital age) makes it possible to nearly do anything with digital content.
Digital Content and its Characteristics
Digital contents, e.g. Music, Movies, documents, are:
very easy and cheap to copy
Essentially no “resistance” from duplication
This led to:
Loss of billion dollars a year for world trade.
Solutions
Cryptographic Techniques could help but not enough
DRM and Copyright Protection
Can content be protected even after its decryption?
Copying by persistent pirate would always be succeed.
Current technology can potentially minimize the scale of copying:
“keeping honest people honest”
Digital Rights Management (DRM) technologies can be help in this issue.
What is DRM?
It is a set of technologies (encryption, watermarking, hash function, signature, etc.) enabling content owners to identify and control:
the access to their content and
the conditions under which this access is given.
What is DRM? Cont.
DRM includes:
Persistent Protection: License to be always checked before using a content
Access tracking: Capability of tracking access to and operations on content
Rights licensing: Capability of defining specific rights to content and making them available by contract
Who Could Use DRM?
DRM System Framework
DRM Benefits
DRM Benefits
DRM can be integrated with content management (collection, managing, and publishing of information in any form or medium) to ensure:
Proper business practices
Implementation of new business models
Compliance with regulatory requirements in industries such as financial services, healthcare, and government
Control Access During Workflow by DRM
The process of drafting a law is circulated among committee members (e.g. judges and lawyers).
Using DRM technology, this becomes a closed circulation.
Also, the drafting law is in a tamper-proof format, with
print-only user-rights,
limited to a pre-determined timeframe, after which the draft is withdrawn and replaced by the final law.
The judges and lawyers can
withdraw, alter, or grant permissions related to the content at any time.
Modification of Rights Over Time by DRM
Systems should be able to update rights and usage as needed to accommodate new distribution models,
E.g. allowing content to be accessed by to 2, 3, or 5 devices
Otherwise cost a lot of money and be a disincentive to customers.
DRM, in such case, can facilitate
collaboration, by creating the ‘trusted environment’
by persiste
Presentation at Digital TV: Beyond HD and HDTV conference, Columbia Institute for Tele-Information, Columbia Business School, November 2007, New York City.
These slides were presented by David King, CTO Logica, at Digital London 2012. David talked about using technology to deliver information, growth, innovation and transformation. David also demonstrated how organisations are using cloud technology to share information and collaborate - leading to significant business growth. www.logica.com/cloud
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
The frequent availability of digital data such as audio, images and videos became possible to the public through the expansion
of the internet. Digital watermarking technology is being adopted to ensure and facilitate data authentication, security and copyright
protection of digital media. It is considered as the most important technology in today’s world, to prevent illegal copying of data. Digital
watermarking can be applied to audio, video, text or images. This paper includes the detail study of watermarking definition and various
watermarking applications and techniques used to enhance data security.
Drm digital rights managment-june2014-tarek gaberTarek Gaber
Digital Rights Management
Dr. Tarek Gaber
Faculty of Computers & Informatics
Suez Canal University , Ismailia, Egypt
and
SRGE (www.scienceegypt.net)
Email: tmgaber@gmail.com
Digital Content and its Characteristics
Before the digital era, one's ability to do various things with content were limited.
The Internet (digital age) makes it possible to nearly do anything with digital content.
Digital Content and its Characteristics
Digital contents, e.g. Music, Movies, documents, are:
very easy and cheap to copy
Essentially no “resistance” from duplication
This led to:
Loss of billion dollars a year for world trade.
Solutions
Cryptographic Techniques could help but not enough
DRM and Copyright Protection
Can content be protected even after its decryption?
Copying by persistent pirate would always be succeed.
Current technology can potentially minimize the scale of copying:
“keeping honest people honest”
Digital Rights Management (DRM) technologies can be help in this issue.
What is DRM?
It is a set of technologies (encryption, watermarking, hash function, signature, etc.) enabling content owners to identify and control:
the access to their content and
the conditions under which this access is given.
What is DRM? Cont.
DRM includes:
Persistent Protection: License to be always checked before using a content
Access tracking: Capability of tracking access to and operations on content
Rights licensing: Capability of defining specific rights to content and making them available by contract
Who Could Use DRM?
DRM System Framework
DRM Benefits
DRM Benefits
DRM can be integrated with content management (collection, managing, and publishing of information in any form or medium) to ensure:
Proper business practices
Implementation of new business models
Compliance with regulatory requirements in industries such as financial services, healthcare, and government
Control Access During Workflow by DRM
The process of drafting a law is circulated among committee members (e.g. judges and lawyers).
Using DRM technology, this becomes a closed circulation.
Also, the drafting law is in a tamper-proof format, with
print-only user-rights,
limited to a pre-determined timeframe, after which the draft is withdrawn and replaced by the final law.
The judges and lawyers can
withdraw, alter, or grant permissions related to the content at any time.
Modification of Rights Over Time by DRM
Systems should be able to update rights and usage as needed to accommodate new distribution models,
E.g. allowing content to be accessed by to 2, 3, or 5 devices
Otherwise cost a lot of money and be a disincentive to customers.
DRM, in such case, can facilitate
collaboration, by creating the ‘trusted environment’
by persiste
Presentation at Digital TV: Beyond HD and HDTV conference, Columbia Institute for Tele-Information, Columbia Business School, November 2007, New York City.
These slides were presented by David King, CTO Logica, at Digital London 2012. David talked about using technology to deliver information, growth, innovation and transformation. David also demonstrated how organisations are using cloud technology to share information and collaborate - leading to significant business growth. www.logica.com/cloud
In any SME manufacturing organizations, one of the major causes for low plant utilization is changeover loss.In this presentation, using SMED methodology, step by step process is given to reduce the changeover loss.Also shared the real examples of changeover loss reduction in various manufacturing industries using SMED concept.Hope this is useful for any organization struggling with low plant utilisation due to changeover loss..
The rise of digital media and modern technologies has vastly raised the copyright-owning concerns of organisations and individuals. In just a few clicks of a mouse, many copyrighted images, videos and audio files get downloaded or shared without prior permission. Modern techniques and tools have made it easy to convert media into various digital forms for easy portability and sharing
Introduction to DRM and how it affects our conception of what ownership is, what you can do with the materials you buy and (to a lesser degree), how it affects work in libraries.
Descibes the limitations of the current copyright systms, why todays DRM technologys and approaches don't work, that the law is an ass in regards to copyrigh, a potential solution called SeDiCi being created at DERI @ NUI Galway. Presented at a conference on Intellectual Property in Ireland, Feb 18, 2009
digital rights management for multimedia filesApurva Vyas
— Copying or piracy of digital data may be a one of the toughest challenge that is faced by content publishers and coding vendors recently. Digital piracy is unauthorized repetition and/or distribution of coding system, music or films. Pirated package hurts everyone from package developers to the other digital content publisher. Moreover, the smuggled duplication and distribution of package contains a major impact on the economy. Piracy exists at intervals the domain of music, videos, games and package. Fully completely different solutions exist for music and video antipiracy and package, games antipiracy. The DRM framework uses cryptologic techniques and supports protection of digital content viz., audio files by implementing user rights like scan, copy, play or print as applicable. The planning is also extended to protection to varied file formats with a DRM license which is able to be upgraded for extra rights or be revived to induce associate extended validity. The DRM framework in addition accommodates offline use of protected content by a one-time (initial) setup and a user license hold on regionally. Finally, the paper analyzes the planning for DRM’s crucial requirements like security, flexibility, potency and ability.
In the current Internet, digital entertainment contents, such as video or audio files, are easily
accessible due to the new multimedia technologies and to broadband network connections. This cause is
considerable economic loss to global media players since digital contents, once legitimately obtained, can
be illegitimately shared through file sharing services on the Internet. Digital Rights Management (DRM)
systems have been proposed to support the protection of copyrighted digital contents. Even though such
systems have been widely adopted and promoted by global media players, they are based on proprietary
mechanisms that usually work only in closed, monolithic environments. In this regard, systems based on
watermarking technologies appear more suited to protect digital copyrighted content. This paper describes
the implementation scheme of a DRM system able to ensure the copyright protection of digital content
according to an innovative buyer-friendly watermarking protocol. The DRM system has been implemented
by exploiting a cloud environment in order to improve the overall performance of the system. In particular,
cloud behaves as a service infrastructural provider, since the content provider involved in the watermarking
protocol uses cloud to speed up the watermark embedding process and to save storage and bandwidth
costs needed to store and to deliver protected contents.
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
Building Your Employer Brand with Social MediaLuanWise
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement – helping to position your organization as an employer of choice in today's competitive talent landscape.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
1. Digital Rights Management
(DRM)
ISA 767, Secure Electronic Commerce
Xinwen Zhang, xzhang6@gmu.edu
George Mason University
Reference
Digital Rights Management: Business
and Technology. New York: Hungry
Minds/John Wiley & Sons, 2001.
2
2. An example
Buy a book in bookstore:
you get the right to read the book for as long and
as many times as you want, and you can give,
sell, or lend it to someone.
you can't legally make copies of it, change it, or
embed parts of it in other works.
3
Changing of DRM
New Technologies changes the rights management:
Digital format, easy to copy and manipulate
Internet-based distribution, cheap and instantaneous
New mechanisms for payment
New business models:
dynamic pricing
permission to view content in exchange for user info (e.g.,
demographics)
syndicating content to other web sites
Other value-added service
DRM: controlling and managing rights digital objects
Mostly IP objects
4
3. DRM Origin: Business
Perspectives
Super-distribution by Mori, 1983.
Consumer’s further Distribution to other consumers
Digital objects are freely available to public in
protected manner and only authorized users are
allowed to use the objects
Can increase revenues by providing an opportunity to
experience digital objects
DRM first appeared in mid 90s for controlling
distribution of consumer media
5
DRM Enforcement Tech
Legally, through registration forms, license
1.
agreements, and copyright laws.
Legally with an audit trail, such as copyright
2.
notices or watermarks (identifiers
embedded permanently in the content).
Technologically, using encryption and user
3.
authentication to protect content and only
make it accessible under strictly specified
conditions.
6
4. DRM Origin: Technology
Perspectives (1)
As part of access control discipline
Since the advent of timesharing system (70’s)
Multi-user OS
Need to share computing resource and information
resource
Shift from mainframe to client-server and P2P
Needs to control digital objects even after distributions
Originator control policy in open environment
Originator’s control at the outside of system
7
DRM Origin: Technology Perspectives
(2) – by Rosenblatt et al.
Software distribution
Availability of cheap Floppy disks, CD-RWs, DVD-
RWs
Needs Protection schemes to prevent illegal copies
Warning message, product ID, activation, dongles
Software license admin in LAN
Encrypted content distribution
Simple encryption scheme: Password, zip, etc.
Type fonts. Fonts are used to be expensive
Encrypt files on CD-ROMs
8
5. DRM Origin: Commercial History
(1) – by Rosenblatt et al.
Early commercial systems (beginning in 1994)
IBM infoMarket
All software-based
Cryptolope and a set of software for web-based
marketplaces
Electronic Publishing Resources (EPR) later named
as InterTrust
Originally an entire end-to-end system with hardware-
based devices (including client-side hardware devices)
Later developed software-based systems
Now patent-based licensing, DRM interoperability
9
DRM Origin: Commercial History
(2) – by Rosenblatt et al.
Xerox PARC research labs
A new paradigm of DRM and Trusted
Systems discussed in “letting loose the
light” by Mark Stefik
in essence, it should always be possible to
strictly define and control who can do what to a
piece of content, when, on what devices, and
for how much money or other form of
consideration.
Based on trusted system
Digital Property Rights Language (DPRL)
by Mark Stefik 10
6. DRM Origin: Commercial History
(2) – by Rosenblatt et al.
ContentGuard’s XrML
Trusted Computing
Smart card, music player, etc
Intel LaGrande, TCG’s NGSCB
Watermarking Technologies
DigiMarc, …..
11
Scenario 1
MP3 file
Alice Bob
Undesirable distribution
Alice sent her song to Bob for review
Chris
Alice doesn’t want Chris to listen the song
12
7. Scenario 2
Digital Book
Alice Bob
Desirable distribution
Alice sold her e-book to Bob
Chris
Alice wants Bob to distribute his copy to Chris so he can read part
of the book and become a potential customer (super-distribution)
13
Problems
Unauthorized distribution & Use
Reproduction of a digital object does not reduce
its quality or value
Unauthorized person can access exactly same
digital objects as the original copy
Commercially, unauthorized dissemination and use
of digital object may cause revenue loss
Unauthorized dissemination and use of sensitive
information causes information leakage (e.x.
intelligence community, health care)
14
8. DRM in Nutshell
It’s a system, a technology, a service, an application
software, and a solution
No concrete definition.
Many interests groups, many vendors, many solutions, but no
standards
Little interoperability
Controlling and tracking access to and usage (including
dissemination) of digital information objects
Securing digital object itself, not the transmission
By using cryptographic, and watermarking technologies
Business perspectives
Not just for protections, but new business models
Increased revenue
15
Variations of DRM definition
Originally,
to capture a set of new technologies that
enables controlling use of digital contents
after the contents are distributed to clients.
Today,
vary by different researchers and scientists
unclear what should be included in DRM
boundary and what DRM is capable of.
16
9. DRM Definition - Rosenblatt et al.
2002
In their book, Rosenblatt et al. refers DRM as
controlling and managing legal, transactional,
and implicit rights to digital intellectual
property.
Legal: Rights that you get either automatically
under law (such as inherent copyright) or by some
legal procedure (such as applying for a patent)
Transactional: Rights that you get or give up by
buying or selling them, such as buying a book or
selling a manuscript to a publisher
Implicit: Rights defined by the medium that the
information is in
17
DRM Definition – Robson 2003
In his article “The TEACH Act and The MPEG
Rights Expression Language”, Robson defines
DRM is a technology that restricts or prevents the
unauthorized use of digital contents in accordance
with defined rights and conditions.
DRM is the process of defining, tracking and
enforcing permissions and conditions through
electronic means.
18
10. DRM Definition – Iannella
2001
In “DRM architectures”, d-lib, Iannella tries
to capture the evolution of DRM definitions by
saying that
DRM focused on security and encryption as a
means of solving the issue of unauthorized
copying, that is, lock the content and limit its
distribution to only those who pay. This was the
first-generation of DRM.
The second-generation of DRM covers the
description, identification, trading, protection,
monitoring and tracking of all forms of rights
usages over both tangible and intangible assets
including management of rights holders
relationships. 19
DRM Definition –various
scopes
Rosenblatt tries to include more than
technologies within DRM scope (such as
business and legal issues)
Robson tries to include only technological
issues (specifically, emphasizing both
protections and tracking) within DRM
definition.
Iannella tries to capture wide range
technologies
20
11. DRM Definition - Ambiguity
many researchers and scientists tried to
define the meaning and scope of DRM
Still ambiguous in its definition, scope,
and meaning.
The references in previous slides show
that there is no airtight, single definition
of DRM.
DRM technologies vs. DRM applications
21
Basic functions of a DRM
system
Basic functions:
Systems that content providers can use internally for
defining, organizing, and managing contents and rights
Systems for distributing content to consumers in a controlled
way
Systems for managing usage to content
Systems for licensing and distributing content to other
publishers in a controlled way
Systems for measuring content usage
Payment systems
…
Functions can be integrated or separated.
22
12. Understanding DRM
Some of DRM aspects
Dissemination Scale
Small, medium, and large scale
Dissemination Environment
Closed, federated, open, and p2p environment
Payment-based vs. Payment-free
Prevention vs. Detection & Tracking
23
Dissemination Scale
Small Scale Dissemination
1 item 1 to 100 recipients
Much less tolerance for leakage
B2B Business transaction, Intelligence community
Medium Scale Dissemination
1 item 103 to 105 recipients
Textbook publishing, technical journals
Large Scale Dissemination
1 item 106 to 108 recipients
Some leakage is acceptable or even desirable
Music, popular books
24
13. Dissemination Environment
Closed Environment Dissemination
Internal distribution (commercial and Intelligence)
Easy to customize client-side systems (both S/W & H/W)
Federated Environment Dissemination
Limited number of organizations are involved
B2B, B2G and G2G dissemination
Limited administrative control over recipients
Open Environment Dissemination
B2B and B2C dissemination
Hard to customize client-side system
P2P Environment Dissemination
25
Two Types of Dissemination
Payment-Based Type (PBT)
Payment is required in order to access digital
content
B2C mass distribution e-commerce system
Payment-Free Type (PFT)
Payment is not required
Dissemination must be controlled for
confidentiality or other security requirements
B2B Hub System, G2G, Intelligence Community
26
14. Characteristics of PBT & PFT
Payment-Based
A small amount of information leakage is acceptable
and even desired
The number of legitimate copies of a single digital item
is usually greater than that of PFT
The objective in PBT is to distribute as many copies as
possible and extract payment
Payment-Free
Information leakage is not acceptable
The number of legitimate copies of a single digital item
is less than that of PBT
It is the distribution itself which needs to be limited
The security requirements are likely to be more
stringent than that of PBT 27
Prevention vs. Detection
Prevention
Leakage “cannot” occur
Detection & Tracking
Leakage can occur but can be detected
and tracked to re-distributor
Both solutions can/must coexist
28
15. Commercial Interest
Prevent vs.
Payment Scale Environment
Detect
Open
Major Large
Commercial Yes Federated Both
Medium
Interest Closed
Open
Less Both
Medium
Commercial No Federated (Prevention
Small
Interest emphasis)
Closed
29
DRM systems overview
Heterogonous
requirements
Many techniques
Huge number of providers
Comparing the Usage of Digital Rights. Management Systems
30
in the Music, Film, and Print, Fetscherin & Schmid, 2003
16. DRM Overview
Objectives:
Mainly for technical objectives
Models:
access control or usage control model
Architectures:
Distribution architectures
Enforcement architectures
Other supported architectures
Mechanisms:
Mechanisms to control the distribution/dissemination
Mechanisms to control the usage
Payment mechanisms
31
DRM objectives
Mainly for protection of intellectual property
rights and copyrights
Also detection and tracking of (unauthorized)
usage
Controlling and tracking usage of digital
objects even after distribution
Originator control in non-closed environment
Broader scope includes
business, legal, social issues, etc.
Content creation, management, re-distribution, etc
32
17. Access Control in DRM
Payment based access control
Authorization is based on payment
Most of commercial solutions
Non-payment based access control
Little studies on this for DRM
MAC, DAC, RBAC, ORCON
Non-commercial (e.g., intelligence community, health care)
UCON can be used as model for DRM systems
ORCON can be viewed as the core policy for many DRM
systems.
UCON can support ORCON policy
33
Access Control Model in DRM
Entity Model(by Iannella)
Users:
owner, distributor, consumer
Objects: digital assets with values
Security sensitive
Privacy sensitive
Rights: usage permissions
need to be modeled
Each entity should be identified and described
with metadata.
User attributes
Object identifies
Rights descriptions 34
18. Access control Model in DRM
Content model: (by Iannella)
35
Access Control Model in DRM
Right Model (by
Iannella)
DRM is
generally
closed system
36
19. Usage Rights in DRM by Stefik
Render Rights
View, play, print
Transport Rights
Copy, move, loan
Derivative Work Rights
Extract, edit, embed
File management rights (backup, restore, etc.)
Configuration rights (install, uninstall)
37
Usage Rights
38
20. Usage controls in DRM
Mainly payment-based (can be viewed as
authorization or obligation)
Paid download, pay-per-view/listen, subscription,
metered payment
Payment-free is possible
Authorization-based (ID, role, membership-based)
Obligation-based (e.g., parental control, by providing
personal info, license agreement)
condition-based ( e.g., location, time, security status
(normal, high-alert), system load, etc.
39
Traditional Originator Control
(ORCON)
Digital Digital
Object Object
Originator Subject A Subject B
ACL Access Control
Control
Non-
Authority
discretionary ACL
ACLs
Control Domain
40
21. ORCON in Open Environment - An
Example
Digital Object (DO)
Subject
Originator A
License
Control Virtual Machine
License
Center Control Domain
ACL Granting
License DO
Ticket
License
Non- ACL
Subject
discretionary
B
ACLs
Control Domain
41
DRM Architecture by Rosenblatt
et al.
42
22. DRM Architectures by Park et
al.
w/o VM w/ VM
MP ER Fixed CS External CS
VM: Virtual Machine
Embedded CS
CS: Control Set
MP: Message Push NC1 NC2
ER: External Repository MP ER MP ER MP ER
NC1: No control architecture w/ MP FC1 FC2 EC1 EC2 XC1 XC2
NC2: No control architecture w/ ER
FC1: Fixed control architecture w/ MP
FC2: Fixed control architecture w/ ER
EC1: Embedded control architecture w/ MP
EC2: Embedded control architecture w/ ER
XC1: External control architecture w/ MP
XC2: External control architecture w/ ER
43
Content Distribution
Darknet(Biddle et al.):
Small-worlds networks
(a) - “Sneaker Net”
P
C
P
C
Search
P
C
44
23. Content Distribution
Central Internet Servers
(b) - The World Wide Web
Http
Http
FTP
Web
FTP
Search
http
Engine
PC
P
C
PC PC
P
C
45
Content Distribution
1st generation P2P systems
Napster, Gnutella
DHT
P
C
P
C
P
C
P
C
P
C
TCP /
Napster P
C
Search gnutella
Napster
Engine Search
Protocol Engine
TCP/UDP
P
C Gnutella
P
C
Protocol
P
C
P
C
P
C P
C
PC P
C
PC
46
P
C
24. Content Distribution
2nd P2P systems
KaZaA, BitTorrent, Web page with
link to .torrent
Data
file
Web Server Tracker Site
1. Get .torrent file
3.
2. R
G es
et po
-a
ns nn
e- ou
pe nc
er e
lis
t
4. Shake hand
5. Download piece Mi
47
Peer k Peer j
Mechanisms: 7 Key Tech
components (Fetscherin & Schmid)
48
25. DRM Technology Hierarchy
49
Digital Watermarking
Embedding information in information
Mainly for information authenticity (tracking) and
integrity
Watermarking technologies are dependent on the
type of digital information (e.g., text, image,
audio and etc.)
Minimum size of object is required
Difficulty of embedding different watermark
(fingerprint) in each copy of original objects in
case of mass distribution
50
26. Understanding Digital
Watermarking (1)
Visible Watermarking
Watermark is visible (e.g.background logo)
Can be used for sample digital objects to
reduce commercial value on them
Invisible Watermarking
Most of Watermarking belongs here
Digital Watermark can be detected by
special software
51
Understanding Digital
Watermarking (2)
Public Watermarking
Watermark information w/ publicly known key (w/o
any secret key)
Everyone can read watermarked information
In commercial sector, customer can find copyright
owner’s information
Private Watermarking
Only authorized users can detect the watermarks
Good for tracking purpose
52
27. Understanding Digital
Watermarking (3)
Watermark retrieval
Reference-required watermark
The original object or embedded watermark
information is required for comparison
Reference-free watermark
Watermark can be retrieved without the
original document or added information
The mechanism detects specific properties and
patterns from documents
53
Understanding Digital
Watermarking (4)
Different format, different watermarking
text, image, audio, and video
Text Watermarking (Brassil, et al.)
Line-shift coding
Text lines are shifted imperceptibly up and down
Word-shift coding
Words are shifted horizontally
Original un-watermarked documents are required for extracting
watermarked information
Feature coding
Characters are altered (vertical or horizontal)
Least discernible, larger information embedded
54
28. Digital watermarking in DRM
Can be used to embed metadata such
as owner’s info, usage rights, rules, etc.
Can provide tracking capability to illicit
distribution
Fingerprinting for individual tracking
Largely independent from security
architectures
55
Watermarking vs. Encryption in
DRM (1) - Rosenblatt et al.
Both encryption and watermarking can
be used to carry metadata for digital
contents
Using encryption, encapsulate digital
contents together with metadata
Need special rendering application (CRM)
Using watermarking, embed metadata in
digital contents
No protection on digital contents
56
29. Watermarking and Encryption in
DRM (2) - Rosenblatt et al.
Use both for end-to-end secure content distribution
Case1: embed metadata, then encrypt watermarked
contents
Protect both contents and metadata
Even after cracking encrypted content, metadata is still bound
with the content
Case2: encrypt metadata, then embed encrypted
metadata into contents
temper-resistant, secure watermark
Digital timestamping from Surety Inc’s digital notary tech.,
DigiMarc’s tracking pirated contents
57
Commercial Efforts for Open-
standard (XrML)
XrML: Extensible Rights Markup Language
What is XrML?
“A language in XML for describing specifications of rights,
fees and conditions for using digital contents, together with
message integrity and entity authentication within these
specifications” (www.xrml.org)
An extension of the Xerox “Digital Property Rights Language
version 2.0 (DPRL)”
ContentGuardTM has developed XrML as an open
specification licenced on a royalty-free basis
Why XrML?
In DRM, XrML can be viewed as one of potential
mechanisms to express specific rights and rules.
XrML is extensible, open specification with license
XrML is accepted as a standard for MPEG21 58
30. Top-Level Structure
<XrML>
<BODY>
(TIME)? time interval in which this spec is valid
(ISSUED)? time moment at which this spec is issued
(DESCRIPTOR)? description or meta data of this spec
(ISSUER)? principal who issues this spec
(ISSUEDPRINCIPALS)? list of principals this spec is issued to
(PRINCIPAL)+
(WORK)? work and rights this spec specifies
(AUTHENTICATEDDATA)? data that provided to application
</BODY>
(SIGNATURE)?
</XrML>
"?" denotes zero or one occurrence; "+" denotes one or more occurrences; and "*" denotes
zero or more occurrences
59
Digital Works & Usage
Rights
<WORK>
OBJECT object used to identify the work
DESCRIPTION description of the work
CREATOR creator of the work
OWNER owner of the work
METADATA additional metadata of the work
DIGEST digest value of the work
PARTS parts of the work, each of which is a work itself
CONTENTS indicator of where content of the work is
COPIES number of copies of the work that are specified
COMMENT Comment
SKU Stock Keeping Unit, for extensibility to allow people to
identify this work in their own stock.
FORMAT Digital or physical manifestation of the work
(RIGHTSGROUP | REFERENCEDRIGHTSGROUP )+ rights group associated
with the work | reference rights group of the work
60
</WORK>
31. Rights in RIGHTSGROUP
Element
Digital property rights
Specifying times, fees and incentives
Specifying access controls
(licenses/certificates, security levels)
Specifying territory information
Specifying tracking information
Specifying watermark information
Bundle specifications (time limits, fees,
access, and watermark info inside bundle)
61
Case Study
Windows Media Digital Rights
Management
33. License
The key to unlock the Windows Media file
The rights, or rules, that govern the use of the
digital media file:
How many times can a file be played
Which devices a file can be played or transferred on.
When the user can start playing the file and what is
the expiration date.
If the file can be transferred to a CD recorder
(burner).
If the user can back up and restore the license.
What security level is required on the client to play
the Windows Media file.
…
65
Related Issues
34. Fair Use
Fair use provides an exemption on legal
liability for the use of copyrighted
materials.
To limit copyright owner’s exclusive rights
on copyrighted materials
Reproduction or other means for criticism,
news reporting, teaching, scholarship, and
research is fair use and not an
infringement of copyrights [section 107]
67
First Sale
When you buy a physical book, you can
do anything you want on your copy and
your copy only.
Read, sell, destroy, give away, etc.
You buy a copy, you own the copy.
However, no rights on copyrights
68
35. Purchase vs. License
In general, digital contents are not sold but
licensed
When you are licensing, you don’t buy
anything but a right to use (read, listen, run,
etc.) the copy
By agreeing on a license, you may give up
your rights for fair use and first sale.
License is contract law and shouldn’t be
overridden federal copyrights law.
69
Fair use and first sale in DRM
DRM largely relies on licensing
There exists a great fear about DRM because
license agreement can give away rights on
fair use and first sale
Fair use is very difficult or impossible to
implement in DRM because it cannot be pre-
judged
First sale is not likely to be allowed in
licensing (e.g., MS windows OS)
70
36. Digital Millennium Copyright Act
(DMCA)
Legislated in 1998
“anti-circumvention provision”, in
Section 1201 is most controversial.
Implies that copy protection technology is
not perfect
Abused to override copyright law such as
fair use
71