A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Windows Server 2003 Security Infrastructures: Core Security Features
Windows Server 2003 Security Infrastructures: Core Security Features
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
A lightweight and anonymous copyright-protection protocol
Computer Standards & Interfaces
On implementing mpeg-21 intellectual property management and protection
Proceedings of the 2007 ACM workshop on Digital Rights Management
A secure and traceable E-DRM system based on mobile device
Expert Systems with Applications: An International Journal
Flexible and secure enterprise rights management based on trusted virtual domains
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Digital rights management architectures
Computers and Electrical Engineering
Formal Modelling of PKI Based Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Digital Rights Management: The Open Mobile Alliance DRM specifications
Information Security Tech. Report
Analysis of a Buyer---Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
Wireless Personal Communications: An International Journal
Tutorial: Technological infrastructure for PKI and digital certification
Computer Communications
A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.00 |
Easy duplication and distribution of digital works on Internet has facilitated copyright infringement problems in many ways. It's impossible to prevent illegal replication of the decrypted content just using content encryption and access control technologies. A novel copyright ownership identification protocol is proposed. Anyone can register as an author and embed the copyright watermarks into the original digital works on the trusted authority center before disseminating them. Once a digital work is found pirated, the author (or other authorized copyright holders) can apply for the copyright ownership identification service. The proposed protocol has no restrictions for the buyers and the copyright holders don't have to interact with the consumers. It's much more suitable for the large-scale distributed anonymous network applications. Since the copyright watermark is embedded by a trusted authority center, and the registration is timestamped by the reliable time stamp center, the identification results could be used as legally admissible evidence.