Multimedia Security and Digital Rights Management Technology

Author(s):  
Eduardo Fernandez-Medina ◽  
Sabrina De Capitani di Vimercati ◽  
Ernesto Damiani ◽  
Mario Piattini ◽  
Pierangela Samarati

Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the pervasiveness of XML as a data interchange format has given origin to a number of standard formats for multimedia, such as SMIL for multimedia presentations, SVG for vector graphics, VoiceXML for dialog, and MPEG-21 and MPEG-7 for video. Innovative programming paradigms (such as the one of web services) rely on the availability of XML-based markup and metadata in the multimedia flow in order to customize and add value to multimedia content distributed via the Net. In such a context, a number of security issues around multimedia data management need to be addressed. First of all, it is important to identify the parties allowed to use the multimedia resources, the rights available to the parties, and the terms and conditions under which those rights may be executed: this is fulfilled by the Digital Rights Management (DRM) technology. Secondly, a new generation of security and privacy models and languages is needed, capable of expressing complex filtering conditions on a wide range of properties of multimedia data. In this chapter, we analyze the general problem of multimedia security. We summarize the most important XML-based formats for representing multimedia data, and we present languages for expressing access control policies. Finally, we introduce the most important concepts of the DRM technology.

2008 ◽  
pp. 1288-1320
Author(s):  
Eduardo Fernandez-Medina ◽  
Sabrina De Capitani di Vimercati ◽  
Ernesto Damiani ◽  
Mario Piattini ◽  
Perangela Samarati

Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the pervasiveness of XML as a data interchange format has given origin to a number of standard formats for multimedia, such as SMIL for multimedia presentations, SVG for vector graphics, VoiceXML for dialog, and MPEG-21 and MPEG-7 for video. Innovative programming paradigms (such as the one of web services) rely on the availability of XML-based markup and metadata in the multimedia flow in order to customize and add value to multimedia content distributed via the Net. In such a context, a number of security issues around multimedia data management need to be addressed. First of all, it is important to identify the parties allowed to use the multimedia resources, the rights available to the parties, and the terms and conditions under which those rights may be executed: this is fulfilled by the Digital Rights Management (DRM) technology. Secondly, a new generation of security and privacy models and languages is needed, capable of expressing complex filtering conditions on a wide range of properties of multimedia data. In this chapter, we analyze the general problem of multimedia security. We summarize the most important XML-based formats for representing multimedia data, and we present languages for expressing access control policies. Finally, we introduce the most important concepts of the DRM technology.


Author(s):  
Jean-Henry Morin ◽  
Michel Pawlak

This chapter introduces digital rights management (DRM) in the perspective of digital policy management (DPM) focusing on the enterprise and corporate sector. DRM has become a domain in full expansion with many stakes which are by far not only technological. They also touch legal aspects as well as business and economic. Information is a strategic resource and as such requires a responsible approach of its management, almost to the extent of being patrimonial. Digital rights and policy management is now well established mainly in two distinct sectors sharing the same fundamental underlying technical principles: on the one hand, the entertainment and media industry, and on the other hand, the enterprise sector. This chapter mainly focuses on the latter, introducing DRM concepts, standards, and the underlying technologies from its origins to its most recent developments in order to assess the challenges and opportunities of enterprise digital policy management.


Author(s):  
Edgar R. Weippl

While security in general is increasingly well addressed, both mobile security and multimedia security are still areas of research undergoing major changes. Mobile security is characterized by small devices that, for instance, make it difficult to enter long passwords and that cannot perform complex cryptographic operations due to power constraints. Multimedia security has focused on digital rights management and watermarks; as we all know, there are yet no good solutions to prevent illegal copying of audio and video files.


Author(s):  
Ganesh C S Sundar

Multimedia data hiding techniques have developed a strong basis for steganography area with a growing number of applications like digital rights management, covert communications, hiding executables for access control, annotation etc. The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how unbreakable it is, will arouse suspicion and may in itself be incriminating, as in some countries encryption is illegal.


Author(s):  
Dimitra Pappa ◽  
Lefteris G. Gortzis

With emerging technologies constantly creating new possibilities for organisations to manage their information resources, this chapter proposes a model for designing systems to control access to, and usage of, digital resources in organisations.The authors argue that Digital Rights Management (DRM) is a socio-technical challenge that requires a holistic approach. The resulting socio-technical forces model, titled SYNAPSIS, includes the following interdependent dimensions: Technology, Task, Structure, People, and Organisation External Forces, which act as interrelated forces. The application of the SYNAPSIS model can help identify complex interdependencies among the involved dimensions, as well as their evolution with time. Models, like the one proposed, may provide significant support on the underlying field.


2008 ◽  
pp. 1812-1827
Author(s):  
Edgar R. Weippl

While security in general is increasingly well addressed, both mobile security and multimedia security are still areas of research undergoing major changes. Mobile security is characterized by small devices that, for instance, make it difficult to enter long passwords and that cannot perform complex cryptographic operations due to power constraints. Multimedia security has focused on digital rights management and watermarks; as we all know, there are yet no good solutions to prevent illegal copying of audio and video files.


Sign in / Sign up

Export Citation Format

Share Document