Skip to main content

A DRM System Supporting What You See Is What You Pay

  • Conference paper
Book cover Digital Rights Management. Technologies, Issues, Challenges and Systems (DRMTICS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3919))

Included in the following conference series:

Abstract

We present a Digital Rights Management (DRM) system that supports what you see is what you pay. In our system, multimedia is compressed with a scalable codec and encrypted preserving the scalable granularity and multi-access capability. This paper focuses on the DRM modules enabling efficient key generation and management. We employ a light license server which stores only the master keys of content publishers, which are used to regenerate decryption keys for clients during license acquisition. All the remaining information needed in key generation is efficiently packaged in a DRM header of protected content. The DRM header is sent to a license server during license acquisition to allow the license server to generate a single key for a requested access, which is sent to the client in a license along with the acquired rights. The key is used by the client to generate all the remaining keys of subordinate accesses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Iannella, R.: Digital Rights Management (DRM) Architectures. D-Lib Magazine 7(6) (June 2001)

    Google Scholar 

  2. Eskicioglu, A.M., Town, J., Delp, E.J.: Security of Digital Entertainment Content from Creation to Consumption. Signal Processing: Image Communication, Special Issue on Image Security 18(4), 237–262 (2003)

    Google Scholar 

  3. ISO/IEC JTC1/SC29/WG11 13818-11:2003(E). Information Technology – Generic Coding of Moving Pictures and Associated Audio Information – Part 11: IPMP on MPEG-2 Systems (2003)

    Google Scholar 

  4. ISO/IEC JTC1/SC29/WG11 14496-13:2004(E). Information Technology – Coding of Audio-Visual Object – Part 13: Intellectual Property Management and Protection (IPMP) Extensions (2004)

    Google Scholar 

  5. Open Mobile Alliance. OMA DRM Specification Draft Version 2.0 (March 2004), http://www.openmobilealliance.org

  6. Microsoft Windows Media Digital Rights Management, Available at: http://www.microsoft.com/windows/windowsmedia/drm/default.aspx

  7. Intertrust, Available at: http://www.intertrust.com/main/overview/drm.html

  8. IBM: Electronic Media Management System, Available at: http://www-306.ibm.com/software/data/emms/

  9. RealNetworks: Helix DRM, Available at: http://www.realnetworks.com/products/drm/index.html

  10. Adobe EBooks, Available at: http://www.adobe.com/epaper/ebooks

  11. Li, W.: Overview of Fine Granularity Scalability in MPEG-4 Video Standard. IEEE Trans. on Circuits and Systems for Video Technology 11(3), 301–317 (2001)

    Article  Google Scholar 

  12. ISO/IEC: Information Technology – JPEG 2000 Image Coding System, Part 1: Core Coding System. ISO/IEC 15444-1:2000 (ISO/IEC JTC/SC 29/WG 1 N1646R) (March 2000)

    Google Scholar 

  13. ISO/IEC: Information Technology – JPEG 2000 Image Coding System, Part 3: Motion JPEG 2000. ISO/IEC 15444-3:2002

    Google Scholar 

  14. Zhu, B.B., Swanson, M.D., Li, S.: Encryption and Authentication for Scalable Multimedia: Current State of the Art and Challenges. In: Proc. of SPIE Internet Multimedia Management Systems V, Philadelphia PA, vol. 5601, pp. 157–170 (October 2004)

    Google Scholar 

  15. Microsoft: Architecture of Windows Media Rights Manager, Available at: http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx

  16. Wee, S.J., Apostolopoulos, J.G.: Secure Scalable Streaming and Secure Transcoding with JPEG-2000. IEEE Int. Image Processing 1, I205–I208 (2003)

    Google Scholar 

  17. Wu, H., Ma, D.: Efficient and Secure Encryption Schemes for JPEG2000. In: IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2004), May 2004, vol. 5, pp. V869–V872 (2004)

    Google Scholar 

  18. Wu, Y., Deng, R.H.: Compliant Encryption of JPEG 2000 Codestreams. In: IEEE. Int. Conf. on Image Processing 2004 (ICIP 2004), Singapore, October 2004, pp. 3447–3450 (2004)

    Google Scholar 

  19. Zhu, B.B., Yang, Y., Li, S.: JPEG 2000 Encryption Enabling Fine Granularity Scalability without Decryption. In: IEEE Int. Symp. Circuits and Systems 2005, May 2005, pp. 6304–6307 (2005)

    Google Scholar 

  20. Zhu, B.B., Feng, M., Li, S.: A Framework of Scalable Layered Access Control for Multimedia. In: IEEE Int. Symp. Circuits and Systems 2005, May 2005, pp. 2703–2706 (2005)

    Google Scholar 

  21. Zhong, S.: A Practical Key Management Scheme for Access Control in a User Hierarchy. Computer & Security 21(8), 750–759 (2002)

    Article  Google Scholar 

  22. Kakadu, Available from: http://www.kakadusoftware.com/welcome.html

  23. JasPer, Available from: http://www.ece.uvic.ca/~mdadams/jasper/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, B.B., Yang, Y., Chen, T. (2006). A DRM System Supporting What You See Is What You Pay. In: Safavi-Naini, R., Yung, M. (eds) Digital Rights Management. Technologies, Issues, Challenges and Systems. DRMTICS 2005. Lecture Notes in Computer Science, vol 3919. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11787952_26

Download citation

  • DOI: https://doi.org/10.1007/11787952_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35998-2

  • Online ISBN: 978-3-540-35999-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics