A signature for content-based image retrieval using a geometrical transform
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Proceedings of the 7th ACM conference on Computer and communications security
7th ACM Conference on Computer and Communication Security 2000
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
Digital watermarking
Proving Ownership of Digital Content
IH '99 Proceedings of the Third International Workshop on Information Hiding
An Asymmetric Public Detection Watermarking Technique
IH '99 Proceedings of the Third International Workshop on Information Hiding
Zero-Knowledge Watermark Detection and Proof of Ownership
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Overcoming the obstacles of zero-knowledge watermark detection
Proceedings of the 2004 workshop on Multimedia and security
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Efficient proofs that a committed number lies in an interval
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Ensuring content integrity for untrusted peer-to-peer content distribution networks
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Enabling fairer digital rights management with trusted computing
ISC'07 Proceedings of the 10th international conference on Information Security
Computation time efficient approach for licenses validation in DRM systems
Multimedia Tools and Applications
Hi-index | 0.01 |
Digital Rights Management (DRM) systems and applications appear to increasingly attract the interest of e-commerce business developers. DRM systems aim at secure distribution of digital content and commonly comprise a huge variety of different technologies. Current DRM systems focus mainly on right-holder's security needs and commonly neglect those of consumers. In particular, these systems even lack reliable means for users to verify that they purchase usage-rights on works (licenses) from the rightful authors (rights-holder). This seems to be simply achievable in centralistic systems where only global players or a few large collecting societies control the distribution of licenses. However, in a large distributed system with many unknown and potentially untrusted sellers/distributors of digital content it is crucial from the legal and security perspectives that any user/device of the DRM platform can reliably verify that a purchased license is authorised by the rightful author/rights-holder.In this paper we introduce a formal model and the corresponding schemes for establishing a multilateral secure rights-distribution infrastructure. The key features of our proposal are: firstly, consumers can directly verify that a seller is indeed authorised to grant certain usage-rights. Secondly, the authorship and rights licenses are invariant with respect to perceptibly similar works, i.e., they are not only valid for the original work but also for a set of closely related similar works which are modifications of the original work (e.g., different resolutions or encodings of an image or a video). The reason for providing this property is that these works are still considered to be under the copyright of the author.Our scheme provides an enabling technology for decentralised right distribution infrastructures for intellectual property with multilateral security.