Abstract
DRM (Digital Rights Management) systems is the promising technique to allow the copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. However, traditional DRMs are achieved with individual function modules of cryptography and watermarking. Therefore, all digital contents are temporarily disclosed with perfect condition via decryption process in the user side and it becomes the risk of illegal redistribution. In this paper, we propose an incomplete encryption based on multi-channel AES algorithm (MAA) to control the quality of digital contents as a solution in DRM system. We employed the multi-channel AES algorithm in the incomplete cryptography to imitate multimedia fingerprint embedding. Our proposed method can trace the malicious users who redistribute the digital contents via network. We make this scenario more attractive for users by preserving their privacy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Shapiro, W., Vingralek, R.: How to manage persistent state in DRM systems. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 176–191. Springer, Heidelberg (2002)
Kiayias, A., Yung, M.: Breaking and repairing asymmetric public-key traitor tracing. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 32–50. Springer, Heidelberg (2003)
Serrao, C., Naves, D., Barker, T., Balestri, M., Kudumakis, P.: Open SDRM? an open and secure digital rights management solution (2003)
Chang, H., Atallah, M.J.: Protecting Software Code by Guards. In: DRM f01: ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, pp. 160–175 (2002)
Emmanuel, S., Kankanhalli, M.S.: A Digital Rights Management Scheme for Broadcast Video. Multimedia System 8, 444–458 (2003)
Seki, A., Kameyama, W.: A Proposal on Open DRM System Coping with Both Benefits of Rights-Holders and Users. In: IEEE Conf. on Image Proceedings, vol. 7, pp. 4111–4115 (2003)
Lin, C., Prangjarote, P., Kang, L., Huang, W., Chen, T.-H.: Joint fingerprinting and decryption with noise-resistant for vector quantization images. Journal of Signal Processing 92(9), 2159–2171 (2012)
Federal Information Processing Standards Publication: Announcing the Advanced Encryption Standard (AES), FIPS (2001)
Tachibana, T., Fujiyoshi, M., Kiya, H.: A method for lossless watermarking using hash function and its application for broadcast monitoring. IEICE Technical Report, ITS 103(640) 103(643), 13–18 (2004) (in Japanese)
T.84, Digital Compression and Coding of Continuous-tone still Images - Requirements and Guidelines. International Telecommunication Union (1992)
Iwakiri, M., Thanh, T.M.: Fundamental Incomplete Cryptography Method to Digital Rights Management Based on JPEG Lossy Compression. In: The 26th IEEE International Conf. on AINA, pp. 755–762 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Thanh, T.M., Iwakiri, M. (2014). Incomplete Encryption Based on Multi-channel AES Algorithm to Digital Rights Management. In: Huynh, V., Denoeux, T., Tran, D., Le, A., Pham, S. (eds) Knowledge and Systems Engineering. Advances in Intelligent Systems and Computing, vol 244. Springer, Cham. https://doi.org/10.1007/978-3-319-02741-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-02741-8_18
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-02740-1
Online ISBN: 978-3-319-02741-8
eBook Packages: EngineeringEngineering (R0)