Skip to main content

Incomplete Encryption Based on Multi-channel AES Algorithm to Digital Rights Management

  • Conference paper
  • 1045 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 244))

Abstract

DRM (Digital Rights Management) systems is the promising technique to allow the copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. However, traditional DRMs are achieved with individual function modules of cryptography and watermarking. Therefore, all digital contents are temporarily disclosed with perfect condition via decryption process in the user side and it becomes the risk of illegal redistribution. In this paper, we propose an incomplete encryption based on multi-channel AES algorithm (MAA) to control the quality of digital contents as a solution in DRM system. We employed the multi-channel AES algorithm in the incomplete cryptography to imitate multimedia fingerprint embedding. Our proposed method can trace the malicious users who redistribute the digital contents via network. We make this scenario more attractive for users by preserving their privacy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shapiro, W., Vingralek, R.: How to manage persistent state in DRM systems. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 176–191. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Kiayias, A., Yung, M.: Breaking and repairing asymmetric public-key traitor tracing. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 32–50. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Serrao, C., Naves, D., Barker, T., Balestri, M., Kudumakis, P.: Open SDRM? an open and secure digital rights management solution (2003)

    Google Scholar 

  4. Chang, H., Atallah, M.J.: Protecting Software Code by Guards. In: DRM f01: ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, pp. 160–175 (2002)

    Google Scholar 

  5. Emmanuel, S., Kankanhalli, M.S.: A Digital Rights Management Scheme for Broadcast Video. Multimedia System 8, 444–458 (2003)

    Article  Google Scholar 

  6. Seki, A., Kameyama, W.: A Proposal on Open DRM System Coping with Both Benefits of Rights-Holders and Users. In: IEEE Conf. on Image Proceedings, vol. 7, pp. 4111–4115 (2003)

    Google Scholar 

  7. Lin, C., Prangjarote, P., Kang, L., Huang, W., Chen, T.-H.: Joint fingerprinting and decryption with noise-resistant for vector quantization images. Journal of Signal Processing 92(9), 2159–2171 (2012)

    Article  Google Scholar 

  8. Federal Information Processing Standards Publication: Announcing the Advanced Encryption Standard (AES), FIPS (2001)

    Google Scholar 

  9. Tachibana, T., Fujiyoshi, M., Kiya, H.: A method for lossless watermarking using hash function and its application for broadcast monitoring. IEICE Technical Report, ITS 103(640) 103(643), 13–18 (2004) (in Japanese)

    Google Scholar 

  10. T.84, Digital Compression and Coding of Continuous-tone still Images - Requirements and Guidelines. International Telecommunication Union (1992)

    Google Scholar 

  11. Iwakiri, M., Thanh, T.M.: Fundamental Incomplete Cryptography Method to Digital Rights Management Based on JPEG Lossy Compression. In: The 26th IEEE International Conf. on AINA, pp. 755–762 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ta Minh Thanh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Thanh, T.M., Iwakiri, M. (2014). Incomplete Encryption Based on Multi-channel AES Algorithm to Digital Rights Management. In: Huynh, V., Denoeux, T., Tran, D., Le, A., Pham, S. (eds) Knowledge and Systems Engineering. Advances in Intelligent Systems and Computing, vol 244. Springer, Cham. https://doi.org/10.1007/978-3-319-02741-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-02741-8_18

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-02740-1

  • Online ISBN: 978-3-319-02741-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics