digital right management
Recently Published Documents


TOTAL DOCUMENTS

62
(FIVE YEARS 9)

H-INDEX

5
(FIVE YEARS 1)

2021 ◽  
Vol 191 ◽  
pp. 108029
Author(s):  
Yiming Hei ◽  
Jianwei Liu ◽  
Hanwen Feng ◽  
Dawei Li ◽  
Yizhong Liu ◽  
...  

Author(s):  
Bayu Sujadmiko ◽  
Intan Fitri Meutia ◽  
Didik Kurniawan ◽  
A. Negra Mardenitami

Today, the utilization of technology is not merely for the sake of entertainment, but also the exchange of information, trade, study, and governance. Followed by the increasing level of the technology application in various activities, not a few people become victims or perpetrators of a personal data breach in the cyber world. Thus, it is necessary to implement digital right management (DRM) by the manager of electronic systems, the Government and rights holders in the cyber world in computer systems. The Indonesian government has validated the rules that accommodate the protection of the personal data of each citizen in cyberspace, namely, Act number 14 of 2008 concerning Openness of Public Information, Act Number 19 of 2016 concerning Amendments to Act Number 11 of 2008 concerning Information and Electronic Transactions, Regulation of the Minister of Communication and Information Number 20 of 2016 concerning Protection of Personal Data in Electronic Systems and Presidential Regulation Number 39 of 2019 concerning One Data Indonesia. Based on these rules, all parties involved in the management, storage and exchange of personal data in Indonesia must have an integrated and trusted DRM mechanism.


Author(s):  
Yoso Adi Setyoko

Software yang tergolong sebagai aplikasi desktop cukup rentan dari bentuk pembajakan. Pembajakan terhadap software sangat mudah yaitu dengan cara menduplikat software tersebut. Untuk menanggulangi permasalahan duplikasi data tersbut maka dibutuhkan mekanisme perlindungan data yang disebut sebagai Digital Right Management (DRM). Beberapa pihak pembuat software telah menerapkan teknik-teknik DRM contohnya dengan menggunakan Public Key Infrasturktur (PKI), kemudian dengan teknik penggunaan kode lisensi, serta Attribute Based Access Control (ABAC).Sedangkan penelitian kami saat ini melakukan pendekatan lain dalam pembuatan DRM yaitu menggunakan teknik rekayasa protokol jaringan yang  disebut dengan proses Mutual Authenticataion atau autentikasi dua arah. Pada tahun 2004 Philips menerbitkan sebuah dokumen dan protokol yang digunakan untuk komunikasi smart card dan reader-nya. Protokol yang dibuat oleh Philips di dalamnya terdapat proses Mutual Authentication Pada penelitian ini penulis mengadopsi protokol tersebut untuk diterapkan sebagai DRM. Hasil penelitian kami dapat membuktikan secara matematis bahwa protokol hasil adopsi dan modifikasi tersebut mampu mengamankan komunikasi yang dilakukan antara client (software) dan server. Celah yang dapat ditanggulangi melalui protokol ini adalah celah kebocoran kunci, celah kebocoran autentikasi, dan celah kebocoran pertukaran data. Kelanjutan penelitian ini adalah pengujian availability dan performansi protokol.


2018 ◽  
Vol 7 (2.9) ◽  
pp. 1
Author(s):  
M S Sudha ◽  
T C Thanuja

Perceptibility and robustness are two incongruous requirements demanded by digital image watermarking for digital right management and other applications. A realistic way to concurrently satisfy the two contradictory requirements is to use robust watermark algorithm. The developed algorithm uses DTCWT and PCA techniques to embed watermark signal in host signal. To prove the algorithm robustness without much affecting perceptibility several attacks like noises, cropping, blurring, rotation are applied and tested by varying attack parameters. Parameters like Peak signal noise ratio and Correlation Coefficient are calculated for each attack. Attack percentage is varied and performance parameters are calculated to prove the robustness of the developed algorithm.


Sign in / Sign up

Export Citation Format

Share Document