Earticle

현재 위치 Home

A DRM Model for Copyrights Protection based on Hiding Information

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJMUE) 바로가기
  • 간행물
    International Journal of Multimedia and Ubiquitous Engineering SCOPUS 바로가기
  • 통권
    Vol.1 No.4 (2006.12)바로가기
  • 페이지
    pp.1-9
  • 저자
    Deok Gyu Lee, Jianhua Ma
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A67398

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
There have been researches into digital watermarking technology or Fingerprinting
vigorously to safeguard 'Protective rights for knowledge and poverty' for digital contents.
DRM, Digital Rights Management, is not only 'Protective rights for knowledge and poverty',
but also management and systems that are necessary to put out, circulate and use for contents.
This technology, DRM, encrypts contents to protect digital contents and they are sold users
on. Sellers transmit contents with 'Usage Right' and a license including a key of encryption.
The key of encryption decodes encoded files. The right of usage restricts users' application of
contents. Even if digital contents that are applied the DRM are coped illegally and circulated,
contents will be protected from that because a player of DRM checks existence of licenses
and allows contents to be restored. However, this method might cause users to feel
inconvenient since the users can only restore contents through the licenses offered by a
player or a Smartcard. If radio as well as cable is used popularly in the future, there will be a
lot of limits to use those kinds of players. In the method of that, the method using players need
different players in order to work successfully in wired and wireless environment. In the case
of using Smartcards, there might be a dangerous situation when the Smartcards disappeared.
This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as
illegal copies when the contents are in the process of circulation. The other is the protocol
that can give users convenience. Hidden Agents are used so that contents are protected from
illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be
installed without any special setup. In addition, it can replace roles of Watermarking as a
protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

목차

Abstract
 1. Introduction
 2. Outline of Agents
 3. Elements of DRM and Analysis of existing Model
  3.1 Elements of DRM
  3.2 Analysis of existing models
 4. Proposal Scheme
  4.1 Terms desired of the proposal scheme
  4.2 Illegal copies of contents
  4.3 Whole system model
  4.4 Constituents
  4.5 System Parameters
  4.6 Explanation for each stage of protocols
 5. Inquiry into proposed system
  5.1 Analysis and compare with existing method
 6. Conclusion
 7. References

키워드

DRM Hiding Information

저자

  • Deok Gyu Lee [ Electronics and Telecommunications Research Institute, Daejeon, Korea ]
  • Jianhua Ma [ Computer & Information Sciences, Hosei University, Japan ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJMUE) [Science & Engineering Research Support Center, Republic of Korea(IJMUE)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Multimedia and Ubiquitous Engineering
  • 간기
    월간
  • pISSN
    1975-0080
  • 수록기간
    2008~2016
  • 등재여부
    SCOPUS
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Multimedia and Ubiquitous Engineering Vol.1 No.4

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장