DOI QR코드

DOI QR Code

Process Analysis of Digital Right Management for Web-Based Multicast Contents

  • Toyib, Wildan (Dept. of Advanced Information Science and Technology, Graduate School, Pukyong National University) ;
  • Park, Man-Gon (Dept. of IT Convergence and Application Engineering, Pukyong National University)
  • Received : 2011.11.16
  • Accepted : 2011.12.31
  • Published : 2011.12.31

Abstract

In recent years, advanced in digital technologies have created significant changes in the way we reproduce, distribute and market Intellectual Property (IP). DRM for multicast contents is complicated risk, the further technology development and human demand, this approaching is still being researched by the scientist and all by the company which is conducting in piracy management reduced, and every country has national policy to make this consortium to limit piracy properties, based on this paper research development, just only two approaching to reduce piracy in DRM they are Industrial Property (IP) and Copyright. In this paper, we are not only figuring and analyzing about the processes to reduce and limit the piracy and unprotected copy law but also describing about the encryption process, watermarking and digital signature process algorithms. The basic concepts of this encryption process for web-based multicast content in DRM are implemented in Java. We conduct this method is a computerized through web based application system approaching to reduce unprotected copy and piracy. Which is used in DRM for multicast content in every section, by providing a fundamental in information technology development, we believe this research is reliable to prove that is unprotected copy, and piracy can be reduced by protecting with this paradigm.

Keywords

References

  1. Darko Kirovski, Marcus Peinado, Fabien A. P. Petitcolas, "Digital Right Management for Digital Cinema," Journal of Multimedia Systems, Vol.9, No.3, pp. 228-238, 2003. https://doi.org/10.1007/s00530-003-0094-3
  2. Refik Molva, Alain Pannetrat, "Network Security in the Multicast Framework," Lecture Notes in Computer Science, Vol.2497, pp. 481-485, 2002.
  3. M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," Lecture Notes in Computer Science, Vol.1109, pp. 1-15, 1996.
  4. M. V. D. Burmester and Y. Desmedt, "A Secure and Efficient Conference Key Distribution System," Lecture Notes in Computer Science, Vol.950, pp. 275-286, 1995.
  5. Bellare, M., Desai, A., Jokipii, E., Rogaway, P, "A Concrete Security Treatment of Symmetric encryption," Proceedings of IEEE Foundations of Computer Science, pp.394-403, 1997.
  6. Robert W. Fransdonk, "Method and System to Secure Content for Distribution via a Network," United States Patent No.6961858-B2, appl. No.10/321,767, 2005.
  7. Morin, J. H., Konstantas, D., "Commercialization of Electronic Information," Proceedings of IEEE International Conference on Multimedia Computing and Systems, Vol.2, pp. 524-529, Jul. 1999.
  8. Schneier, Bruce, Applied Cryptography, Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., (1996), 2nd Edition, pp. 31-32, 2001.
  9. Schneier, Bruce, Applied Cryptography, Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., Chapters 2 and 3, pp. 21-74, 1996.
  10. Chae Duck Jung, Weon Shin, Young-jin Hong, and Kyung-hyune Rhee, "Interval Two-Dimensional Hash Chains and Application to a DRM System," Journal of Korea Multimedia Society, Vol.10, No.12, pp.1663-1670, 2007.
  11. Judge, P. Ammar, M, "Security Issues and Solutions in Multicast Content Distribution: a survey," Proceedings of IEEE on Network Security, pp. 30-36, 2003.
  12. Cheriton, D. Deering, S, "Host Groups: A Multicast Extension for Datagram Internetworks," Proceedings of the ninth symposium on Data communications, pp.172-79, 1985.
  13. Deok-Gyu Lee, Hyung-Geun Oh, and In-Young Lee, "A Study on DRM Model Using Electronic Cash System," Journal of Korea Multimedia Society, Vol.7, No.8, pp.1107-1119, 2004.
  14. Ballardie, T, Crowcroft, J., "Multicast-Specific Security Threats and Counter-Measures," Proceedings of IEEE of Network and DistributedSystem Security, pp. 2-16, 1995.
  15. Judge, P. Ammar, M, "Gothic: A Group Access Control Architecture for Secure Multicast and Anycast," Proceedings of IEEE Computer and Communications Societies, pp. 1547-1556, 2002.
  16. Chung Kei Wong. Lam, S.S, "Digital Signatures for Flows and Multicasts," IEEE/ACM Trans. on Networking, pp. 502-513, 1999.
  17. Rohatgi, P, "A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication," Proceedings of the 6th ACM conference on Computer and communications security (CCS '99) , New York, pp.93-100, 1999.
  18. Canetti, R. Garay, J. Itkis, G. Micciancio, D. Naor, M. Pinkas, B, "Multicast Security: A Taxonomy and Some Efficient Constructions," Proceedings of IEEE Computer and Communications Societies, pp. 708-716, 1999.
  19. Brown, I., C. Perkins, J. Crowcroft, Watercasting: Distributed Watermarking of Multicast Media, NGC, 1999.
  20. L Vicisano, L Rizzo and J Crowcroft, "TCP Like Congestion Control for Layered Reliable Multicast Data Transfer," Proceedings of IEEE Infocom Transaction, 1997.
  21. Ballardie, T., Crowcroft, J., "Multicast- Specific Security Threats and Counter-Measures," Proceedings of IEEE Symposium on Network and Distributed System Security, pp. 2-16, 1995.
  22. S. Chuang, Jon Crowcroft, S. Hailes, Mark J. Handley, N. Ismail, D. Lewis, I. Wakeman, "Multimedia Application Requirements for Multicast Communications Services," Proceedings of International Networking Conference (INET'93) , Barry Leiner (Ed.), San Francisco, California, pp. 1-9, 1993.
  23. Jingwen J., Nahrstedt, M, "mc-SPF: An Application- Level Multicast Service Path Finding Protocol for Multimedia Applications," Proceedings of IEEE International Conference on Multimedia and Expo (ICME2002) , Vol.1, pp. 765- 768, 2002.
  24. Jun Yao, Anjun Zhao, Lei Guo, "A Movel Video Multicast Instant Source Authentication Model Based on Digital Watermarking and TESLA," Proceedings of International Conference on Communication Technology (ICCT 2003) , Vol.2, pp. 1719- 1722, 2003.
  25. Moyer, M.J., Rao, J.R., Rohatgi, P., "A Survey of Security Issues in Multicast Communications," IEEE Trans. on Network, Vol.13, No.6, pp. 12-23, 1999. https://doi.org/10.1109/65.806981
  26. Calvin E. Lewis, "Multimedia Communication Management System with Subscriber Message Integration Services," United States Patent Application Publication, 2002.
  27. Hinard, Y., Bettahar, H., Challal, Y., Bouabdallah, A., "AAA Based Security Architecture for Multicast Content Distribution," Proceedings of International Symposium on Computer Networks, pp. 85-90, 2006.
  28. Ian Wakeman and Jon Crowcroft, "Multicast Congestion Control in the Distribution of Variable Bit Rate Video," Technical Report of the Computer Science Department, University College London, 1994.
  29. Daneshpour, N., Abdollahzadeh Barfourosh, "Data Engineering Approach to Efficient Data Warehouse: Life Cycle Development Revisited," Proceedings of International Symposium on Computer Science and Software Engineering (CSSE2011) , pp. 109-120, 2011.
  30. Roger S. Pressman, Software Engineering A Practioner's Approach, Seventh Edition, McGraw Hill, International Edition, 2010.

Cited by

  1. An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone vol.2, pp.12, 2013, https://doi.org/10.3745/KTCCS.2013.2.12.541