A lot of money and efforts have been invested in controlling unauthorized sharing of copyrighted contents but still the problem persists. This paper introduces a method to control and limit the disk duplication. Confidentiality and authenticity measures have been employed in this method to ensure that the disk if copied will result in an unusable and unauthentic copy. It also ensures that any attempt to tamper the contents on the disk while copying will also result in an unusable copy of the disk. The method however requires 2 constraints to be fulfilled: first, the disk will be playable on special physical drives and the disk will be made available to the authorized end user in a restricted manner. This paper also mentions that the approach being described is a generic one and different disk and disk player vendors can surely have compatibility.
CITATION STYLE
Lulla, J., & Sharma, V. (2014). Piracy control using secure disks. In Communications in Computer and Information Science (Vol. 467, pp. 417–430). Springer Verlag. https://doi.org/10.1007/978-3-662-44966-0_41
Mendeley helps you to discover research relevant for your work.