tailieunhanh - Lecture Notes in Computer Science- P17

Lecture Notes in Computer Science- P17:This year, we received about 170 submissions to ICWL 2008. There were a total of 52 full papers, representing an acceptance rate of about 30%, plus one invited paper accepted for inclusion in this LNCS proceedings. The authors of these accepted papers | 70 S. Wang and Q. Liu The main driving force of DRM comes from industry 1 . The most representative sample is the protection of eBook electronic music and digital movie. Several famous international companies have release their own solutions and productions such as Microsoft s WMRM Real Networks Helix DRM Adobe s Content Server and IBM s EMMS. 2 Current DRM Systems Classification of DRM Systems Existing DRM systems could be classified into different categories according to different standards such as safety technique chosen protected object etc. . The protected objects include software eBook images stream media and contents on mobile devices. The main function of software-protected DRM system is the precaution of software piracy. The protection of software appeared in the 1980s which could be regarded as the earliest application of DRM. In the early times the methods to prevent software piracy include the usage of key floppy disk copy-proofed CD encryption card etc. Many new software-protection forms appear along with the development of DRM technology and network technology. The eBook-protected DRM systems have two kinds of applications the online bookstore such as Amazon eReader and the digital library such as netLibrary Apabi . The online bookstore sells eBook directly to the readers while the digital library only provides borrowing service and both of them have to protect the rights against infringement by third parties. The images-protected DRM systems are somewhat complex. Some websites attach their own logo onto the images to prevent others from using it illegally. But the visible logo sacrificed the image s quality. Another preferable method is to embed the copyright information into the images by digital watermarking. If someone used the images without authorization the owner could detect the copyright information hided in the images with special software and prove it. Now the companies who focus on digital watermarking include Digimarc in USA and High

TỪ KHÓA LIÊN QUAN