Content Protection and Tracking for Digital Rights Management in Digital Libraries
No Thumbnail Available
Date
2007-04-??
Authors
王正豪
Jenq-Haur Wang
Journal Title
Journal ISSN
Volume Title
Publisher
國立台灣師範大學圖書資訊研究所
Graduate Institute of Library and Information Studies
Graduate Institute of Library and Information Studies
Abstract
數位圖書館一般採用存取控制與數位浮水印等方式來保護數位內容,然而這些方式有其限制。首先,經過身份驗證與授權之合法使用者可以輕易將內容再次傳播出 去。其次,數位浮水印的方法大多無法有效抵擋各種影像處理的攻擊。因此,如何在數位內容傳播至合法使用者後仍能保護其合法使用是目前相當重要的挑戰與議 題。數位版權管理系統是目前常見的解決方法之一。然而此類系統只能在受保護的可靠環境 (trusted environment),根據一致的權利政策,提供完整的內容保護。因此有其實用的困難。在本文中,我們提出一個整合式內容保護與追蹤架構,並結合了靜 態的權利控管與動態的內容追蹤,目標在有效偵測網路上非法的侵權行為。首先,我們介紹一種wrapper-based權利控管方法,整合了數位浮水印,密 碼學,資訊保護技術,及權利模型(rights model)。其次,我們也提出了一個多媒體內容近似複製的偵測追蹤技術,作為內容保護的第二道防線。在受wrapper保護的環境中,透過監控各種內容 播放程式,數位內容唯有在符合使用規則的情形下才能被存取。更重要的是,我們所提的架構可以很容易與現有的內容播放程式及DRM系統整合。實驗結果展示了 此架構的有效性與複製偵測的準確度。
Conventional digital libraries utilize access control and digital watermarking techniques to protect their digital content. These methods have some limitations. First, after passing the identity authentication process, authorized users can easily redistribute the digital assets. Second, it is impractical to expect a digital watermarking scheme to prevent all kinds of attacks. Thus, how to enforce property rights after digital content has been released to authorized users is a crucial and challenging issue. Digital rights management (DRM) systems have been proposed to address this issue by enforcing the rights access policies in a trusted computing environment. However, DRM systems can only be useful if the computing environment can be protected and compliant to the common rights policy throughout the lifecycle of digital objects. In this paper, we propose an integrated framework of content protection and tracking that aims to detect unlawful copyright infringements on the Internet, and combines the strengths of static rights enforcement and dynamic illegal content tracking. First, we introduce a wrapper-based approach to digital rights enforcement for content protection that integrates digital watermarking, cryptography, information protection technology, and a rights model. Also, we present a content tracking mechanism for multimedia-content near-replica detection as the second line of defense. In the rights enforcement environment, the behavior of all content players is monitored and digital content can only be accessed after certain usage rules have been satisfied. Furthermore, the proposed architecture can be easily integrated into any digital content player, or even existing DRM systems in digital libraries. With the protection of the proposed framework, the abuse of digital content can be drastically reduced. Our experiments demonstrate the efficacy of proposed framework and the accuracy of copy detection.
Conventional digital libraries utilize access control and digital watermarking techniques to protect their digital content. These methods have some limitations. First, after passing the identity authentication process, authorized users can easily redistribute the digital assets. Second, it is impractical to expect a digital watermarking scheme to prevent all kinds of attacks. Thus, how to enforce property rights after digital content has been released to authorized users is a crucial and challenging issue. Digital rights management (DRM) systems have been proposed to address this issue by enforcing the rights access policies in a trusted computing environment. However, DRM systems can only be useful if the computing environment can be protected and compliant to the common rights policy throughout the lifecycle of digital objects. In this paper, we propose an integrated framework of content protection and tracking that aims to detect unlawful copyright infringements on the Internet, and combines the strengths of static rights enforcement and dynamic illegal content tracking. First, we introduce a wrapper-based approach to digital rights enforcement for content protection that integrates digital watermarking, cryptography, information protection technology, and a rights model. Also, we present a content tracking mechanism for multimedia-content near-replica detection as the second line of defense. In the rights enforcement environment, the behavior of all content players is monitored and digital content can only be accessed after certain usage rules have been satisfied. Furthermore, the proposed architecture can be easily integrated into any digital content player, or even existing DRM systems in digital libraries. With the protection of the proposed framework, the abuse of digital content can be drastically reduced. Our experiments demonstrate the efficacy of proposed framework and the accuracy of copy detection.