ETRI Journal | |
A DRM Framework for Distributing Digital Contents through the Internet | |
关键词: usage rule; packager; security; distribution business model; license; contract; MPEG-21; Digital rights management (DRM); | |
Others : 1184672 DOI : 10.4218/etrij.03.0103.0024 |
|
【 摘 要 】
This paper describes our design of a contents distribution framework that supports transparent distribution of digital contents on the Internet as well as copyright protection of participants in the contents distribution value chain. Copyright protection must ensure that participants in the distribution channel get the royalties due to them and that purchasers use the contents according to usage rules. It must also prevent illegal draining of digital contents. To design a contents distribution framework satisfying the above requirements, we first present four digital contents distribution models. On the basis of the suggested distribution models, we designed a contract system for distribution of royalties among participants in the contents distribution channel, a license mechanism for enforcement of contents usage to purchasers, and both a packaging mechanism and a secure client system for prevention of illegal draining of digital contents.
【 授权许可】
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
20150520103445640.pdf | 455KB | download |
【 参考文献 】
- [1]Bill Rosenblatt, Bill Trippe, and Stephen Mooney, Digital Rights Management, Business and Technology, M&T Books, 2002, pp. 79-102.
- [2]U. Kohl, "Secure Container Technology as a Basis for Cryptographically Secured Multimedia Communication," Proc. Multimedia and Security Workshop at ACM Multimedia’98, Sept. 1998.
- [3]Marc A. Kaplan, IBM CryptolopesTM, SuperDistribution and Digital Rights Management, http://www.research.ibm.com/ people/k/kaplan/, Dec. 1996.
- [4]Olin Sibert, "The DigiBox: A Self Protecting Container for Electronic Commerce," Proc. USENIX’95 Electronic Commerce Workshop, 1995.
- [5]H. Sakamoto, M. Yamada, T. Nakamura, T. Nakanishi, and "Additional content-related service/product offering system based on new standards: MPEG-21 and content ID/DOI," Proc. IEEE Multimedia and Expo’02, Int’l Conf., 2002.
- [6]World Intellectual Property Organization, WIPO Copyright Treaty, 1996.
- [7]World Intellectual Property Organization, Berne Convention, 1971.
- [8]United States copyright law, The Digital Millennium Copyright Act, 1998.
- [9]European Council, European Copyright Directive, 2001.
- [10]http://www.odrl.net, ODRL.
- [11]http://www.XrML.org, XrML.
- [12]ISO/IEC TR 21000-1, Vision, technologies and strategy, 2001.
- [13]ISO/IEC FDIS 21000-2, Digital Item Declaration, 2002.
- [14]ISO/IEC FDIS 21000-3, Digital Item Identification, 2002.
- [15]Draft Requirements for MPEG-21, Intellectual Property Management and Protection, N5235, 2002.
- [16]Text of ISO/IEC CD 21000-5, Part 5: Rights Expression Language, N4942, 2002.
- [17]Text of ISO/IEC CD 21000, Part 6: Rights Data Dictionary, N4943, 2002.
- [18]Text of ISO/IEC CD 21000-7, Digital Item Adaptation, N5353, Jan. 2003.
- [19]ISO/IEC JTC1/SC29/WG11, Proposal for a new Part: MPEG-21 File Format - Part 9, N4990, July 2002.
- [20]ISO/IEC JTC1/SC29/WG11, Final Call for Proposals on Digital Item Processing: Digital Item Base operations and Digital Item Method Language, N5329, Dec. 2002.
- [21]ISO/IEC/JTC1/SC29/WG11, Requirements for the Persistent Association of Identification and Description of Digital Items, N5229, 2002.
- [22]ISO/IEC JTC1/SC29/WG11, Draft Requirements for Event Reporting, N5230, Oct. 2002.
- [23]http://www.editeur.org/onix.html, Online Information Exchange.
- [24]http://www.dublincore.org/, Dublin Core Metadata Initiatives.
- [25]http://www.w3.org/TR/1999/REC-rdf-syntax-19990222/, Resource Description Framework Model and Syntax Specification, 1999.
- [26]http://www.cIDf.org, Content ID Forum.
- [27]ANSI/NISO Z39.84 2000, The Syntax for Digital Object Identifier, 2000.
- [28]SMPTE Standard 330M-2000, Unique Material Identifier, 2000.
- [29]http://xml.coverpages.org/DPRLmanual-XML2.html, Digital Property Rights Language.
- [30]http://www.imprimatur.net, IMPRIMATUR Business Model, Version 2.1, June 1999.
- [31]R. Mori and M. Kawahara, "Superdistribution: The concept and Architecture," Trans. IEICE, vols.E 73, no.7, July 1990.
- [32]J. Jeon and S. Park, "DRM Security Framework:ID-Based Approach for Content Super-Distribution," SCI, 2001.
- [33]A.O.Waller, G. Jones, T. Whitley, J. Edwards, D. Kaleshi, A. Munro, B. MacFarlane, and A. Wood, "Securing the delivery of digital content over the internet," Electronics & Comm. Eng. J., vol. 14, Oct. 2002, pp. 239-248.
- [34]Sarah Jung, Jongwon Seok, and Jinwoo Hong, "An Improved Detection Technique for Spread Spectrum Audio Watermarking with a Spectral Envelope Filter," ETRI J., vol. 25, no. 1, Feb. 2003, pp. 52-54.
- [35]Jongwon Seok, Jinwoo Hong, and Jinwoong Kim, "A Novel Audio Watermarking Algorithm for Copyright Protection of Digital Audio," ETRI J., vol. 24, no. 3, Feb. 2002, pp. 181-189.
- [36]E. V. Faber, R. Hammelrath, and F. P. Heider, "The Secure Distribution of Digital Contents," Proc. Computer Security Applications Conf., 13th Ann., Dec. 1997, pp. 16-22.
- [37]Young Man Ro, Munchurl Kim, Ho Kyung Kang, B.S. Manjunath, and Jinwoong Kim, "MPEG-7 Homogeneous Texture Descriptor," ETRI J., vol. 23, no. 2, June 2001, pp.41-51.
- [38]Chee Sun Won, Dong Kwon Park, and Soo-Jun Park, "Efficient Use of MPEG-7 Edge Histogram Descriptor," ETRI J., vol. 24, no. 1, Feb. 2002, pp. 23-30.
- [39]GennDurfree and Matt Franklin, "Distribution Chain Security," ACM CCS, 2002, pp. 63-70.
- [40]Peterson, W. Wesley, and E. J. Weldon, Jr., Error-correcting Codes, 2nd ed., MIT Press, Cambridge, Mass., 1972.
- [41]D.J.C. MacKay, R.M. Neal, "Near Shannon limit performance of low density parity check codes,’’ Electronics Lett., vol. 32, 1996, pp. 1645-1646.
- [42]S. Joo, Y. Suh, J. Shin, and H. Kikuchi, "A New Robust Watermark Embedding into Wavelet DC Components," ETRI J., vol. 24, no. 5, oct. 2002, pp. 401-404.
- [43]Mikhail J. Atallah, V. Raskin, and Christian F. Hempelmann, "Natural Language Watermarking and Tamperproofing," Information hiding 5th Int’l Workshop, Oct. 2002, pp. 195-210.
- [44]W. Shapiro and R. Vingralek, "How to Manage Persistent State in DRM Systems," LNCS 2320, p. 176.