Decentralized digital content exchange and copyright protection via P2P networks (original) (raw)
Related papers
Digital Rights Management in Peer To Peer Cultural Networks
Applications and Environments
As a general and effective protection measure for copyright violations which occur with the use of digital technologies including peer to peer (P2P) networks, copyright owners from the cultural sector often use Digital Rights Management systems and digital watermarking techniques to encrypt copyright information with the cultural content. In other cases copyright owners restrict or even block access to the digital cultural content through the Internet and the P2P infrastructure. This chapter claims that DRM and P2P can be quite complementary. Specifically, pa P2P infrastructure is presented which allows broad digital cultural content exchange while at the same time supporting copyright protection and management through watermarking technologies for digital images.
IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications, 2014
This paper presents a novel implementation for the distribution of cultural heritage digital images via a Peer-to-Peer network. This implementation consists of a Peer-to-Peer (P2P) network for the distribution of cultural heritage digital images and Digital Rights Management (DRM) technologies for the copyright protection of these digital images. In this approach, we design and implement a software in which each peer of P2P network performs the functionalities of three basic entities of a typical DRM system. That is, each peer of P2P network acting as Content Owner, as Trusted Third Party and as User, simultaneously. The Content Owner uploads cultural heritage images to P2P network, these images are at protected format. The protection of digital images is achieved with watermarking techniques and encryption techniques. The License Broker controls the usage of digital images and detects the infringement of copyright. The User performs a search to a list with the available cultural heritage images. Then, the User downloads the images that chooses and uses these images with the terms of usage license. The purpose of this implementation is the legitimate distribution of cultural heritage digital images in a P2P network. The legitimate distribution achieved with the use of DRM technologies. Finally, we are trying to achieve a distributed DRM and P2P architecture for our implementation.
Copyright and IPR management for cultural heritage digital content in peer-to-peer networks
Journal of Cultural Heritage, 2011
Peer-to-peer networks Digital images of cultural heritage Optimal key searching and retrieval a b s t r a c t As a general and effective protection measure for copyright violations, which occur with the use of digital technologies including peer-to-peer (P2P) networks, copyright owners from the cultural sector often use Digital Rights Management (DRM) systems and digital watermarking techniques so as to encrypt copyright information to the cultural content. In other cases, copyright owners restrict or even block access to the digital cultural content through the Internet and the P2P infrastructure. This chapter claims that DRM and P2P can be quite complementary. Specifically, a P2P infrastructure is presented which allows broad digital cultural content exchange while on the same time supports copyright protection and management through watermarking technologies for digital images.
Intellectual Property Rights Protection in Peer to Peer Networks
Next Generation Society. Technological and Legal Issues, 2010
Peer to Peer Networks are oftenly used by internet users to share and distribute digital content (images, audio and video) which is in most of cases protected by the Intellectual Property Rights (IPR) legislation. This fact threatens e-inclusion and Internet democracy as a whole as it forces organizations to block access to valuable content. This paper claims that IPR protection and P2P can be complementary. Specifically, a P2P infrastructure is presented which allows broad digital content exchange while on the same time supports data and copyright protection through watermarking technologies.
A Distributed DRM Platform Based on a Web-Oriented Watermarking Protocol
Proceedings of the 5th Wseas International Conference on Software Engineering Parallel and Distributed Systems, 2006
This paper presents a distributed digital rights management platform (DRMp) based on a web-oriented watermarking protocol. The platform enables web service providers (SPs) to dynamically supply copyright protection services on behalf of web content providers (CPs) in a security context. Thus, CPs exploiting the platform can take advantage of copyright protection services supplied by SPs acting as trusted third parties (TTPs) without having to directly implement them. On the other hand, SPs can follow the proposed design approach to implement protection procedures that can be easily exploited by CPs without imposing a tight coupling among the involved web entities.
Efficient P2P Multimedia Distribution based on Encryption
2018
Unidentified unique mark (UUM) has been suggested as an appropriate answer for the approved imparting of mixed media substance to patent assurance while safeguarding the privacy of purchasers, whose personalities are just appeared if there should be an occurrence of disallowed re-conveyance. Notwithstanding, a large portion of the current unidentified fingerprinting conventions are unreasonable for two primary reasons: 1) the utilization of complicated extended conventions and/or homomorphism encryption of the substance, and 2) a unicast advance for commitment that does not degree for a gigantic Number of purchasers. This paper originates from a prior suggestion of recombined fingerprints which beat several of these downsides. However, the recombined unique finger impression approach requires a complicated chart look for trickster following, which needs the association of different purchasers, and legitimate intermediaries in its P2P portion situation. This paper concentrate on expelling these detriments bringing about a capable, adaptable, security protecting and P2P-based fingerprinting framework.
2017
Digital watermarking protocols are the one, which have combined fingerprinting technique with watermarking, for embedding digital signal or watermark into an original multimedia object. Buyer-seller watermarking protocol is fundamentally applied to continue the digital rights of both buyers and seller. We proposed an identity-based buyer-seller watermarking protocol that encounters various weaknesses of Zhang et al.'s watermarking protocol. We ensured that by pointing out these weaknesses, inaccuracy can be minimised for further implementing the buyer-seller watermarking protocol. The suggested protocol uses ID-based public key cryptography and digital watermarking scheme to place the ownership of digital content. Hence, copyright protection is attained. We claim that our suggested protocol is efficient and has adequate security as compared to traditionally proposed protocols, and therefore suitable for any practical buyer-seller watermarking scheme.
PLI: a new framework to protect digital content for P2P networks
Applied Cryptography and Network Security, 2003
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license services for the Digital Rights Management (DRM). This distributed PLI replaces the centralized license server in a conventional DRM system. PLI offers many advantages such as intrusion and fault tolerance, flexibility, scalability, reliability, high availability. We then propose a PLI-based DRM system to provide content protection and digital rights management for users of Peer-to-Peer (P2P) networks. This DRM system is especially useful for small content providers such as peers in a P2P network who cannot afford the conventional server/client based DRM system and traditional distribution channels.
DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system
Lecture Notes in Computer Science, 1998
This paper presents secure architecture and protocols for managing Intellectual Property Rights in distributed content databases in a close environment. The implementation of this architecture is currently being realized in the European project AQUARELLE. Registered users will access on the Internet to high value content through secure servers. The main interest of this paper is protocols and architecture developed for using watermarking technologies, with a clever and efficient key management based on the Diffie-Hellman (DH) protocol and Trusted Third Parties (TTP). This paper presents a short survey of watermarking technologies. Next Aquarelle background is specified, along with the chosen watermarking algorithm, which is convenient for the project. Next the DHWM key exchange is presented, based on the simple idea that watermarking and verification can be separated. This scheme uses the Diffie-Hellman keyexchange protocol. Next some hints on the implementation of the scheme and on its correctness are given.