Blockchain-Based Digital Rights Management Techniques

Author(s):  
Nguyen Ha Huy Cuong ◽  
Gautam Kumar ◽  
Vijender Kumar Solanki

The usage of information is essential for data-driven capabilities in artificial intelligence. The data-driven AI techniques lead to several security and privacy concerns. Among various digital techniques, digital rights management is required as one of collaboration scheme that ensures the security and privacy of intellectual rights. Though a number of researchers have proposed various security techniques, none of them have proposed an efficient and effective privacy procedure for digital rights. Recently, blockchain technique is considered as one of the major security methods to ensure a transparent communication among individuals. It can be used by various applications such as industries, marketing, transportation systems, etc. The aim of this chapter is to propose an ensured resource allocation algorithm that validates the scheme by comparing various security measures against previous approaches. Further, the proposed phenomenon ensures the transparency on security and privacy due to its integration.

Author(s):  
Ruchira Naskar ◽  
Rajat Subhra Chakraborty ◽  
Dev Kumar Das ◽  
Chandan Chakraborty

With the advent of telemedicine, Digital Rights Management of medical images has become a critical issue pertaining to security and privacy preservation in the medical industry. The technology of telemedicine makes patient diagnosis possible for physicians located at a remote site. This technology involves electronic transmission of medical images over the internet, thus raising the need for ensuring security and privacy of such information. Digital watermarking is a widely used technique for the authentication and protection of multimedia data such as images and video against various security and privacy threats. But such digital rights management practices as watermarking often lead to considerable distortion or information loss of the medical images. The medical images being highly sensitive and legally valuable assets of the medical industry, such information loss are often not tolerable. Most importantly, such information loss may lead to incorrect patient diagnosis or reduced accuracy of disease detection. In this chapter we investigate the impact of digital watermarking, and its effect on the accuracy of disease diagnosis, specifically diagnosis of malarial infection caused by Plasmodium vivax parasite. We have used a computer–aided, automatic diagnostic model for our work in this chapter. Our experimental results show that although general (lossy) digital watermarking reduces the diagnostic accuracy, it can be improved with the use of reversible (lossless) watermarking. In fact, the adverse effect(s) of watermarking on the diagnostic accuracy can be completely mitigated through the use of reversible watermarking.


Author(s):  
Aaron Perzanowski ◽  
Jason Schultz

This chapter address technologies that are collectively known as Digital Rights Management (DRM). DRM is a set of software-based tools implemented by copyright holders, device makers, and retailers to monitor and restrict consumer behavior. For example, after the Supreme Court took the side of consumers and affirmed the legality of the VCR, Hollywood threw its weight behind the DVD, an encrypted format that allowed studios to dictate the design and functionality of playback devices. These and other forms of technological self help are strengthened by the Digital Millennium Copyright Act (DMCA), which prohibits the bypassing, disabling, or otherwise circumventing the digital locks that DRM represents. But the DMCA has largely failed to prevent circumvention, and many copyright holders have recognized that the restrictions imposed by DRM discourage consumers from buying encumbered products. Moreover, as the Sony rootkit incident demonstrates, DRM puts consumer security and privacy at risk.


Author(s):  
Tarek Gaber

In the era of the information technology and the rapid growth of the Internet access, e-Commerce technologies become very crucial as new and effective ways are needed to manage, transact, distribute, and exploit digital contents (e.g. audio and video). The proliferation of these contents has created a need for Digital Rights Management (DRM) systems. DRM, in addition to other security measures, is essential for the management and the protection of digital property, which is the main component of an e-Commerce system. This chapter highlights the need for DRM as a tool facilitating e-Commerce. It also provides the history of developing DRM and the main components of a DRM system. It also gives an overview of the existing DRM system used in e-Commerce systems. It then discuss some open issues in the current DRM system to support consumers’ rights, so supporting e-Commerce business.


2019 ◽  
Vol 8 (2) ◽  
pp. 22 ◽  
Author(s):  
Hezam Akram Abdul-Ghani ◽  
Dimitri Konstantas

As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the existence of IoT. They derive from two main reasons. One is that IoT objects are equipped with limited capabilities in terms of computation power, memory, and bandwidth which hamper the direct implementation of traditional Internet security techniques. The other reason is the absence of widely-accepted IoT security and privacy guidelines and their appropriate implementation techniques. Such guidelines and techniques would greatly assist IoT stakeholders like developers and manufacturers, paving the road for building secure IoT systems from the start and, thus, reinforcing IoT security and privacy by design. In order to contribute to such objective, we first briefly discuss the primary IoT security goals and recognize IoT stakeholders. Second, we propose a comprehensive list of IoT security and privacy guidelines for the edge nodes and communication levels of IoT reference architecture. Furthermore, we point out the IoT stakeholders such as customers and manufacturers who will benefit most from these guidelines. Moreover, we identify a set of implementation techniques by which such guidelines can be accomplished, and possible attacks against previously-mentioned levels can be alleviated. Third, we discuss the challenges of IoT security and privacy guidelines, and we briefly discuss digital rights management in IoT. Finally, through this survey, we suggest several open issues that require further investigation in the future. To the best of the authors’ knowledge, this work is the first survey that covers the above-mentioned objectives.


2014 ◽  
pp. 229-247 ◽  
Author(s):  
Tarek Gaber

In the era of the information technology and the rapid growth of the Internet access, e-Commerce technologies become very crucial as new and effective ways are needed to manage, transact, distribute, and exploit digital contents (e.g. audio and video). The proliferation of these contents has created a need for Digital Rights Management (DRM) systems. DRM, in addition to other security measures, is essential for the management and the protection of digital property, which is the main component of an e-Commerce system. This chapter highlights the need for DRM as a tool facilitating e-Commerce. It also provides the history of developing DRM and the main components of a DRM system. It also gives an overview of the existing DRM system used in e-Commerce systems. It then discuss some open issues in the current DRM system to support consumers' rights, so supporting e-Commerce business.


Sign in / Sign up

Export Citation Format

Share Document