Incomplete Encryption Based on Multi-channel AES Algorithm to Digital Rights Management

DRM (Digital Rights Management) systems is the promising technique to allow the copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. However, traditional DRMs are achieved with individual function modules of cryptography and watermarking. Therefore, all digital contents are temporarily disclosed with perfect condition via decryption process in the user side and it becomes the risk of illegal redistribution. In this paper, we propose an incomplete encryption based on multi-channel AES algorithm (MAA) to control the quality of digital contents as a solution in DRM system. We employed the multi-channel AES algorithm in the incomplete cryptography to imitate multimedia fingerprint embedding. Our proposed method can trace the malicious users who redistribute the digital contents via network. We make this scenario more attractive for users by preserving their privacy.

[1]  Wataru Kameyama,et al.  A proposal on open DRM system coping with both benefits of rights-holders and users , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[2]  Aggelos Kiayias,et al.  On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.

[3]  Carlos Serrão,et al.  OPEN SDRM – AN OPEN AND SECURE DIGITAL RIGHTS MANAGEMENT SOLUTION , 2003 .

[4]  Mikhail J. Atallah,et al.  Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.

[5]  Chih-Yang Lin,et al.  Joint fingerprinting and decryption with noise-resistant for vector quantization images , 2012, Signal Process..

[6]  Mohan S. Kankanhalli,et al.  A digital rights management scheme for broadcast video , 2003, Multimedia Systems.

[7]  Aggelos Kiayias,et al.  Breaking and Repairing Asymmetric Public-Key Traitor Tracing , 2002, Digital Rights Management Workshop.

[8]  Ta Minh Thanh,et al.  Fundamental Incomplete Cryptography Method to Digital Rights Management Based on JPEG Lossy Compression , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[9]  Radek Vingralek,et al.  How to Manage Persistent State in DRM Systems , 2001, Digital Rights Management Workshop.