Towards multilateral secure digital rights distribution infrastructures

Digital Rights Management (DRM) systems and applications appear to increasingly attract the interest of e-commerce business developers. DRM systems aim at secure distribution of digital content and commonly comprise a huge variety of different technologies. Current DRM systems focus mainly on right-holder's security needs and commonly neglect those of consumers. In particular, these systems even lack reliable means for users to verify that they purchase usage-rights on works (licenses) from the rightful authors (rights-holder). This seems to be simply achievable in centralistic systems where only global players or a few large collecting societies control the distribution of licenses. However, in a large distributed system with many unknown and potentially untrusted sellers/distributors of digital content it is crucial from the legal and security perspectives that any user/device of the DRM platform can reliably verify that a purchased license is authorised by the rightful author/rights-holder.In this paper we introduce a formal model and the corresponding schemes for establishing a multilateral secure rights-distribution infrastructure. The key features of our proposal are: firstly, consumers can directly verify that a seller is indeed authorised to grant certain usage-rights. Secondly, the authorship and rights licenses are invariant with respect to perceptibly similar works, i.e., they are not only valid for the original work but also for a set of closely related similar works which are modifications of the original work (e.g., different resolutions or encodings of an image or a video). The reason for providing this property is that these works are still considered to be under the copyright of the author.Our scheme provides an enabling technology for decentralised right distribution infrastructures for intellectual property with multilateral security.

[1]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[2]  Jan Vitek,et al.  Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .

[3]  Susanne Guth Rights Expression Languages , 2003, Digital Rights Management.

[4]  Jaap A. Haitsma,et al.  Robust Audio Hashing for Content Identification , 2001 .

[5]  Fabrice Boudot,et al.  Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.

[6]  Min Wu,et al.  Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[7]  Bernd Girod,et al.  Asymmetric Watermarking Schemes , 2000 .

[8]  Ahmad-Reza Sadeghi,et al.  Overcoming the obstacles of zero-knowledge watermark detection , 2004, MM&Sec '04.

[9]  H. Wang,et al.  A signature for content-based image retrieval using a geometrical transform , 1998, MULTIMEDIA '98.

[10]  Ahmad-Reza Sadeghi,et al.  Advanced techniques for dispute resolving and authorship proofs on digital works , 2003, IS&T/SPIE Electronic Imaging.

[11]  Matthias Schunter,et al.  Optimistic fair exchange , 2000 .

[12]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[13]  William E. Johnston,et al.  Certificate-based Access Control for Widely Distributed Resources , 1999, USENIX Security Symposium.

[14]  Ahmad-Reza Sadeghi,et al.  Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it , 2005, Multimedia Systems.

[15]  White-Box Cryptography for Digital Content Protection , 2005 .

[16]  Shih-Fu Chang,et al.  Generating Robust Digital Signature for Image/Video Authentication , 1998 .

[17]  Matthew K. Franklin,et al.  Distribution chain security , 2000, CCS.

[18]  Pierangela Samarati,et al.  Proceedings of the 8th ACM conference on Computer and Communications Security , 1998, CCS 2001.

[19]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[20]  Antonio Maña,et al.  EC-GATE : AN INFRASTRUCTURE FOR DRM , 2003 .

[21]  Ee-Chien Chang,et al.  Watermarking with retrieval systems , 2004, Multimedia Systems.

[22]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[23]  Jan Vitek,et al.  Secure Internet Programming , 1999 .

[24]  Ahmad-Reza Sadeghi,et al.  Proving Ownership of Digital Content , 1999, Information Hiding.

[25]  Ahmad-Reza Sadeghi,et al.  Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.

[26]  Michiharu Kudo,et al.  XML document security based on provisional authorization , 2000, CCS.

[27]  Steve Mitchell,et al.  The long march to interoperable digital rights management , 2004, Proceedings of the IEEE.

[28]  Andreas Uhl,et al.  Robust Visual Hashing Using JPEG 2000 , 2004, Communications and Multimedia Security.

[29]  Pierre Duhamel,et al.  An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.