Advertisement

A DRM System Supporting What You See Is What You Pay

  • Bin B. Zhu
  • Yang Yang
  • Tierui Chen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3919)

Abstract

We present a Digital Rights Management (DRM) system that supports what you see is what you pay. In our system, multimedia is compressed with a scalable codec and encrypted preserving the scalable granularity and multi-access capability. This paper focuses on the DRM modules enabling efficient key generation and management. We employ a light license server which stores only the master keys of content publishers, which are used to regenerate decryption keys for clients during license acquisition. All the remaining information needed in key generation is efficiently packaged in a DRM header of protected content. The DRM header is sent to a license server during license acquisition to allow the license server to generate a single key for a requested access, which is sent to the client in a license along with the acquired rights. The key is used by the client to generate all the remaining keys of subordinate accesses.

Keywords

Multimedia Content Message Authentication Code Joint Photographic Expert Group Hasse Diagram Digital Right Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Iannella, R.: Digital Rights Management (DRM) Architectures. D-Lib Magazine 7(6) (June 2001)Google Scholar
  2. 2.
    Eskicioglu, A.M., Town, J., Delp, E.J.: Security of Digital Entertainment Content from Creation to Consumption. Signal Processing: Image Communication, Special Issue on Image Security 18(4), 237–262 (2003)Google Scholar
  3. 3.
    ISO/IEC JTC1/SC29/WG11 13818-11:2003(E). Information Technology – Generic Coding of Moving Pictures and Associated Audio Information – Part 11: IPMP on MPEG-2 Systems (2003)Google Scholar
  4. 4.
    ISO/IEC JTC1/SC29/WG11 14496-13:2004(E). Information Technology – Coding of Audio-Visual Object – Part 13: Intellectual Property Management and Protection (IPMP) Extensions (2004)Google Scholar
  5. 5.
    Open Mobile Alliance. OMA DRM Specification Draft Version 2.0 (March 2004), http://www.openmobilealliance.org
  6. 6.
    Microsoft Windows Media Digital Rights Management, Available at: http://www.microsoft.com/windows/windowsmedia/drm/default.aspx
  7. 7.
  8. 8.
    IBM: Electronic Media Management System, Available at: http://www-306.ibm.com/software/data/emms/
  9. 9.
    RealNetworks: Helix DRM, Available at: http://www.realnetworks.com/products/drm/index.html
  10. 10.
    Adobe EBooks, Available at: http://www.adobe.com/epaper/ebooks
  11. 11.
    Li, W.: Overview of Fine Granularity Scalability in MPEG-4 Video Standard. IEEE Trans. on Circuits and Systems for Video Technology 11(3), 301–317 (2001)CrossRefGoogle Scholar
  12. 12.
    ISO/IEC: Information Technology – JPEG 2000 Image Coding System, Part 1: Core Coding System. ISO/IEC 15444-1:2000 (ISO/IEC JTC/SC 29/WG 1 N1646R) (March 2000)Google Scholar
  13. 13.
    ISO/IEC: Information Technology – JPEG 2000 Image Coding System, Part 3: Motion JPEG 2000. ISO/IEC 15444-3:2002 Google Scholar
  14. 14.
    Zhu, B.B., Swanson, M.D., Li, S.: Encryption and Authentication for Scalable Multimedia: Current State of the Art and Challenges. In: Proc. of SPIE Internet Multimedia Management Systems V, Philadelphia PA, vol. 5601, pp. 157–170 (October 2004)Google Scholar
  15. 15.
    Microsoft: Architecture of Windows Media Rights Manager, Available at: http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx
  16. 16.
    Wee, S.J., Apostolopoulos, J.G.: Secure Scalable Streaming and Secure Transcoding with JPEG-2000. IEEE Int. Image Processing 1, I205–I208 (2003)Google Scholar
  17. 17.
    Wu, H., Ma, D.: Efficient and Secure Encryption Schemes for JPEG2000. In: IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2004), May 2004, vol. 5, pp. V869–V872 (2004)Google Scholar
  18. 18.
    Wu, Y., Deng, R.H.: Compliant Encryption of JPEG 2000 Codestreams. In: IEEE. Int. Conf. on Image Processing 2004 (ICIP 2004), Singapore, October 2004, pp. 3447–3450 (2004)Google Scholar
  19. 19.
    Zhu, B.B., Yang, Y., Li, S.: JPEG 2000 Encryption Enabling Fine Granularity Scalability without Decryption. In: IEEE Int. Symp. Circuits and Systems 2005, May 2005, pp. 6304–6307 (2005)Google Scholar
  20. 20.
    Zhu, B.B., Feng, M., Li, S.: A Framework of Scalable Layered Access Control for Multimedia. In: IEEE Int. Symp. Circuits and Systems 2005, May 2005, pp. 2703–2706 (2005)Google Scholar
  21. 21.
    Zhong, S.: A Practical Key Management Scheme for Access Control in a User Hierarchy. Computer & Security 21(8), 750–759 (2002)CrossRefGoogle Scholar
  22. 22.
  23. 23.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Bin B. Zhu
    • 1
  • Yang Yang
    • 2
  • Tierui Chen
    • 3
  1. 1.Microsoft Research AsiaBeijingChina
  2. 2.Dept. of Elec. Eng. & Info Sci.Univ. of Sci. & Technol. of ChinaHefei, AnhuiChina
  3. 3.Inst. of Computing TechnologyChinese Academy of SciencesBeijingChina

Personalised recommendations