A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
In this paper, we propose a mechanism which takes care of the above security issues, for delivering multimedia content through multiparty multilevel DRM architecture. ... In a multiparty multilevel DRM architecture the cryptographic and watermarking mechanism need to ensure the secure delivery of the content as well as the security concerns of the owner, multiple levels ... CONCLUSION In this paper, we presented a mechanism for securely delivering multimedia content through a multiparty multilevel DRM architecture using a joint watermarking mechanism combined with cryptographic ...doi:10.1145/1542245.1542265 dblp:conf/nossdav/ThomasEDK09 fatcat:aq35haps3jdvjmiubin4idktam
In this paper, we propose a joint digital watermarking protocol for the multiparty multilevel DRM architecture using Garner's algorithm for the Chinese remainder theorem (CRT). ... The proposed joint watermarking protocol embeds a single watermark signal into the content while taking care of the various security concerns such as proof of involvement in the distribution chain, nonrepudiation ... Hence, multiparty multilevel digital rights management architecture (MPML-DRM-A) has been suggested as an alternative to the traditional two party (buyerseller) DRM architecture by many authors [2, 7] ...doi:10.1109/icme.2009.5202668 dblp:conf/icmcs/ThomasEDK09 fatcat:ma7xpnryiradtirbulowuszfbe
Acknowledgement This work was supported by the Slovenian Research Agency (ARRS), development project M2-0210 (C) entitled "AvID: Audiovisual speaker identification and emotion detection for secure communications ... As such, DRM extends beyond the physical delivery of content into managing the content lifecycle. ... General architecture The general architecture of a DRM system is shown in Figure 2 . It is composed of 4 main components: Content Encoder, Content Server, Rights Issuer and User. ...fatcat:ekua3zeo5rfnvcycdaxfmhjihq
International Journal of Network Security
Accordingly, we propose an enhanced scheme to remedy these security weaknesses, and prove that our scheme is more secure and efficient for network application with several positive properties. ... Recently, Li et al. pointed out some security weaknesses in Chen et al.' ... In order to solve these problems, Muller et al. proposed a new DRM architecture which limits the digital content access to a subset of users who possess certain properties assigned during the encryption ...fatcat:nev5sh4gw5c45hffrl3qmchnzi