Abstract
By reviewing DRMs up to now and two typical examples – AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical and social viewpoints. Not only it is difficult to deploy and update content encryption and security infrastructure, but also the content diffusion is limited and Fair Use is affected. The new schema for DRM should be content monitoring system in public space that prevents illegal diffusion of content in copyright but permits content being used freely in private space or for social liberty. The traditional rights in analog times will fluently move to digital space under the proposed schema.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The U.S. Copyright Office. The Digital Millennium Copyright Act (1998), http://www.copyright.gov/legislation/dmca.pdf
Fernando, G., Jacobs, T., et al.: Project DreaM: An Architectural Overview. Sun Microsystems White paper (September 2005)
Jobs, S.: Thoughts on Music (February 6, 2007), http://www.apple.com/hotnews/thoughtsonmusic/
China national standard GB/T 20090.2. Advanced Audio and Video coding Part 2: Video (2006)
Tie-jun, H., Yongliang, L.: Basic Considerations on AVS DRM Architecture. J. of Computer Science and Technology 21.3, 366–369 (2006)
The Digital Media Manifesto (2003/09/30), http://www.dmpf.org/manifesto/dmm.htm
Digital Media Project, http://www.dmpf.org/
Eugene, T.L., Ahmet, M.E., Rgginald, L.L., Edward, J.D.: Advances in Digital Video Content Protection. Proceedings of the IEEE 93, 171–183 (2005)
Doërr, G., Dugelay, J.-L.: A guide tour of video watermarking. Signal Process. Image Commun. 18(4), 263–282 (2003)
Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco,CA (2002)
Wagner, N.R.: Fingerprinting. In: Proceedings of IEEE Symp. Security and Privacy, pp. 18–22 (1983)
Hill Slowinski, F.: What Consumers Want in Digital Rights Management (DRM): Making Content as Widely Available as Possible in Ways that Satisfy Consumer Preferences. AAP/ALA White Paper (March 2003), http://dx.doi.org/10.1003/whitepaper
DMP0270. Collection of TRU templates (November 11, 2004), http://www.dmpf.org/open/dmp0270.zip
Kalker, T., Haitsma, J.A., Oostveen, J.: Issues with digital watermarking and perceptual hashing. In: Proceedings of SPIE 4518, Multimedia Systems and Applications IV (2001)
Du, R., Fridrich, J.: Lossless Authentication of MPEG-2 Video. In: Proceedings of 2002 International Conference on Image Processing, vol. 2, pp. 893–896 (2002)
Pröfrock, D., Richter, H. Schlauweg, M., et al.: H.264/AVC video authentication using skipped macroblocks for an erasable watermark. In: Proceedings of Vision Communication and Image Processing, pp. 1480–1490 (2005)
Queluz, M.P.: Towards robust, content based techniques for image authentication. In: Proceedings of the 2nd Workshop on Multimedia Signal Processing, pp. 297–302 (1998)
Lin, C.-Y., Chang, S.-F.: Issues and solutions for authenticating MPEG video. In: Proceedings of SPIE Storage and Retrieval for Image and Video Databases, San Jose, CA, USA (1999)
Martinian, E., Wornell, G.W., Chen, B.: Authentication with Distortion Criteria. IEEE Transactions on Information Theory 52(7), 2523–2542 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Huang, T. (2007). Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring. In: Sebe, N., Liu, Y., Zhuang, Y., Huang, T.S. (eds) Multimedia Content Analysis and Mining. MCAM 2007. Lecture Notes in Computer Science, vol 4577. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73417-8_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-73417-8_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73416-1
Online ISBN: 978-3-540-73417-8
eBook Packages: Computer ScienceComputer Science (R0)