Constructing a wrapper-based DRM system for digital content protection in digital libraries

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Conventional digital libraries utilize access control and digital watermarking techniques to protect their digital content. These methods, however, have drawbacks. First, after passing the identity authentication process, authorized users can easily redistribute the digital assets. Second, it is impractical to expect a digital watermarking scheme to prevent all kinds of attack. Thus, how to enforce property rights after digital content has been released to authorized users is a crucial and challenging issue. In this paper, we propose a wrapper-based approach to digital content protection that integrates digital watermarking, cryptography, information protection technology, and a rights model. In this rights enforcement environment, the behavior of all content players is monitored and digital content can only be accessed after certain usage rules have been satisfied. Furthermore, the proposed architecture can be easily integrated into any digital content player, or even existing DRM systems in digital libraries. With the protection of the proposed DRM system, the abuse of digital content can be drastically reduced. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Hsiao, J. H., Wang, J. H., Chen, M. S., Chen, C. S., & Chien, L. F. (2005). Constructing a wrapper-based DRM system for digital content protection in digital libraries. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3815 LNCS, pp. 375–379). https://doi.org/10.1007/11599517_43

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free