A Comprehensive Study of Digital Rights Management
Everything is just a click away with the Internet. Due to numerous of software applications availability, conversion of physical media information to analog form has become much easier. Thus, to manage the rights of digital content by the intellectual owner or seller, Digital Rights Management (DRM) Systems were introduced. DRM authenticates the user, distributes the content and then control the access of user to ensure protection from violation of copyrights. DRM Systems are mainly used by Entertainment Industry to prevent piracy of music or movies, Software firms etc.
William Ku and Chi-Hung Chi, “Survey on technological aspects of Digital Rights Management”, Springer 2004
Qiong Liu, Reihaneh Safavi-Naini and Nicholas Paul Sheppard, “Digital Rights for Content Distribution”, Australian Information Security, Workshop 2003 (AISW2003), Adelaide, Australia
Workshop Report, W3C Workshop on DRM for the Web, Jan-2001. Available at: http://www.w3.org/2000/12/drm-ws/workshop-report.html
Iannella, “DRM Architectures”, D-Lib Magazine, June-2001
Rosenblat, “DRM: Bussiness and Technology”, John Wiley and Sons, 2001
Andre Adelsbach , Stefan Katzenbeisser and Helmut Veith, Watermarking Schemes provably secure against copy and ambiguity attacks, ACM Workshop on DRM, 2003
Jean-Marc Boucqueau, “Digital Rights Management”, IEEE Emerging Technology portal, 2006 - 2012.
Watermark, Available at::http://en.wikipedia.org/wiki/Watermark
Digital Fingerprinting, Available at:: http://computer.howstuffworks.com/digital-fingerprinting2.htm
Hashing, Available at:: en.wikipedia.org/wiki/Hash function
P2P, Available at:: searchnetworking.techtarget.com/definition/peer-to-peer
Digital Signature, Available at:: searchsecurity.techtarget.com/definition/digital-signature
REL, Available at:: http://en.wikipedia.org/wiki/Rights_Expression_Language
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.