Academia.eduAcademia.edu

DRM technologies

description27 papers
group15 followers
lightbulbAbout this topic
Digital Rights Management (DRM) technologies refer to a set of access control technologies used to protect digital content from unauthorized use, distribution, and reproduction. These technologies enable copyright holders to enforce their rights and manage the usage of their digital assets across various platforms and devices.
lightbulbAbout this topic
Digital Rights Management (DRM) technologies refer to a set of access control technologies used to protect digital content from unauthorized use, distribution, and reproduction. These technologies enable copyright holders to enforce their rights and manage the usage of their digital assets across various platforms and devices.

Key research themes

1. How can watermarking protocols and service-oriented architectures enhance copyright protection in DRM systems?

This research area focuses on improving content protection in DRM systems through advanced watermarking protocols and flexible, modular implementations. Watermarking embeds imperceptible, robust information into digital content to identify ownership and track unauthorized distribution. Watermarking protocols define interactions among system entities ensuring security and user-rights balance. Service-Oriented Architectures (SOA) federate multiple coordinated web entities to dynamically apply protection measures, improving renewability and scalability. This theme matters as it directly addresses the robustness of DRM against piracy in multimedia content distributed online, a critical and active area of investigation.

Key finding: Developed a web platform DRM system implementing a watermarking protocol that embeds user-identifying watermarks into digital multimedia content, enabling tracing of illegal copies. The system uses a SOA composed of federated... Read more
Key finding: Proposed integration of non-repudiation security services in mobile DRM frameworks, ensuring undeniable acquisition of rights objects by users. Leveraged trusted third parties like mobile network operators to securely manage... Read more
Key finding: Demonstrated the extension of an OMA DRM distributed rights management platform with non-repudiation mechanisms, enabling secure, anonymous purchasing of digital rights via mobile network operators. The system produces... Read more

2. What are the effective strategies for combining fragmentation, encryption, and dispersion to enhance data protection in DRM environments?

This theme investigates methodologies that integrate data fragmentation, encryption, and dispersion to bolster protection of sensitive digital content throughout its lifecycle, including processing, transmission, and storage. The approach aims to mitigate the risks of data breaches and unauthorized access by splitting data into fragments, encrypting selectively, and dispersing fragments across diverse physical or cloud architectures. Such combined strategies are essential for continuous data security especially in pervasive DRM contexts involving distributed systems and cloud computing.

Key finding: Developed and analyzed a family of fragmentation-encryption-dispersion systems (FEDS) that split data into public and private fragments, encrypt private parts, and disperse fragments over multiple machines (including GPUs and... Read more

3. How do digital watermarking techniques and real-time multimedia processing contribute to the protection of intellectual property in mobile and embedded DRM platforms?

This area examines digital watermarking methodologies, both visible and invisible, integrated with real-time image and video processing on mobile and embedded platforms such as Android and Beagleboard-xM. The research addresses embedding pre-specified copyright information into multimedia at capture time to prevent unauthorized use and piracy. The works also focus on computational optimizations for resource-constrained devices, leveraging frequency domain transforms like DCT and real-time OpenCV processing. This theme is pivotal for practical DRM deployment in ubiquitous consumer devices.

Key finding: Implemented visible watermarking via spatial domain techniques on Android and invisible watermarking via DCT-based frequency domain methods, embedding copyright information during image capture. Achieved real-time video... Read more
Key finding: Reviewed and synthesized a wide range of digital watermarking techniques for multimedia content, emphasizing their roles in copyright protection by embedding imperceptible ownership information robust to attacks and... Read more

All papers in DRM technologies

Somalia is among the most climate-vulnerable countries globally, facing extreme environmental shocks such as recurrent droughts, floods, desertification, and erratic rainfall patterns. These climatic disruptions intensify existing... more
It is very high time to act now without making any further delay in developing resilience infrastructure to secure a safe, healthy, and prosperous environment on planet earth for our generation next as extreme changes are taking place due... more
Disasters are increasing in frequency and intensity with impacts across all facets of human endeavour globally. Moreover, the impacts of disasters have been exacerbated by the climate change phenomenon. Climate change and weather events... more
is the program's principal investigator and leads the program's Disaster Vulnerability project. This project is developing a disaster vulnerability model for Asia, which identifies the subnational locations in Southern and Southeast Asia... more
Climate change exacerbates the challenges faced by waste workers, particularly in developing countries where the majority work in the informal sector. Rising temperatures, extreme weather events, and shifting disease patterns pose... more
Over 3 million individuals in the US have a disability in their hands and/or forearms and thus have difficulties in effecting pinch and swipe gestures needed for tablet interaction. In this paper, a forearm mountable mobile interface,... more
Many will remember 2020 as the year of the COVID-19 pandemic. Yet for millions of people around the world, the virus served as a backdrop to another battle as we lived through the most intense period yet of climate fuelled extreme... more
This paper introduces new interaction techniques for SmartSkin, a sensor architecture for freehand manipulation. This sensor recognizes multiple hand positions and shapes and calculates the distance between the hand and the surface by... more
This paper introduces new interaction techniques for Smart-Skin, a sensor architecture for freehand manipulation. This sensor recognizes multiple hand positions and shapes and calculates the distance between the hand and the surface by... more
Hand gesture interfaces provide an intuitive and natural way for interacting with a wide range of applications. Nowadays, the development of these interfaces is supported by an increasing number of sensing devices which are able to track... more
Abstract We are going to wait to beat Heat Waves. We must adapt to it and get resilient to a new normal. This paper reviews the impact of heat waves, an emerging disaster that has not received much attention recently because of the... more
In this paper we discuss some of the key issues behind the need to move away from screens and keyboards on mobile devices. Our aim is to allow non-hand based gestures for input with 3D sound and tactile displays for output to create more... more
Adapting humanitarian action to the effects of climate change ii ALNAP is a global network of NGOs, UN agencies, members of the Red Cross/ Crescent Movement, donors, academics, networks and consultants dedicated to learning how to improve... more
We present here the Continuous Marking Menus, which help users learning a set of handwritten commands on a pen-based interface. The aim of this paper is to experimentally attest the interest of this new type of menu by evaluating its... more
This paper describes our experimental real time recognition sys-tem of handwritten mathematical expressions, linked to a computer algebra system Mathematica by Mathlink. This system is titled as INFTY". The fundamental operations of... more
The strong El Niño event, which was forecast to reach peak intensity in late 2023 and then dissipate by mid-2024, will affect food insecurity across the globe. FEWS NET anticipates a total 1 of 105-110 million people will need food... more
The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters.
Mathematical novices-including students in introductory mathematics and statistics service courses-increasingly need to engage in online mathematical collaboration. Using currently-available interfaces for their mobile and touch-enabled... more
Limited permission is granted free of charge to print or photocopy all pages of this publication for educational, not-for-profit use by health care workers, students or faculty. All copies must retain all author credits and copyright... more
Important Guidelines for Printing and Photocopying Limited permission is granted free of charge to print or photocopy all pages of this publication for educational, not-for-profit use by health care workers, students or faculty. All... more
Computer assisted functionalities and services have saturated our world becoming such an integral part of our daily activities that we hardly notice them. In this study we are focusing on enhancements in Human-Computer Interaction (HCI)... more
Use of Virtual Interactive Techniques for personalized product design is described in this paper. Usually products are designed and built by considering general usage patterns and Prototyping is used to mimic the static or working... more
The year 2023 witnessed alarming trends in global temperatures, with recordbreaking heatwaves, prolonged droughts, devastating wildfires, and catastrophic floods occurring with unprecedented frequency and intensity. These climate-related... more
Fine motor skills are affected by a large number of neurological pathologies (Parkinson’s disease, ataxia, stroke, essential tremor, among others), as well as by normal aging. Persons who suffer from these conditions find their abilities... more
Tablet PCs are a new generation of notebook computers which provide multimodal input options of pen, voice and keyboard. Recently, these portable and flexible Tablet PCs have attracted attention as a potential tool in academic... more
From 18th century to now, Destructive Effects of Urbanization has put the world at a greater risk of Environmental and Health Crises that have been associated with significant ' Direct and Indirect Losses'. For example, World... more
Disaster risk reduction (DRR) involves complex processes with different stakeholders at all administrative levels.Two elements in particular play a major role: the need to ensure stakeholders inter ...
Tablet PCs are a new generation of notebook computers which provide multimodal input options of pen, voice and keyboard. Recently, these portable and flexible Tablet PCs have attracted attention as a potential tool in academic... more
There has been a conscious shift towards developing increasingly inclusive applications. However, despite this fact, most research has focused on supporting those with visual or hearing impairments and less attention has been paid to... more
Touchscreen interaction suffers from occlusion problems as fingers can cover small targets, which makes interacting with such targets challenging. To improve touchscreen interaction accuracy and consequently the selection of small or... more
The non-touch system is a modern approach of computer-interface technology capable of revolutionizing human-computer interaction. The interface allows the user to input data and interact with a human, machine or robot in an uncontrolled... more
this research presents gesture recognition based virtual keyboard functional framework. Fingertip trajectory based key stroke detection, articulation feature vector based key association are basic building blocks for the framework. This... more
Dissemination level of the document Public Restricted to other programme participants (including the Commission Services) Restricted to a group specified by the consortium (including the European Commission Services) Confidential, only... more
The creation of a PSI register in Greece, primarily for asylum and immigration purposes, represents a significant stride towards a register of proficient and qualified interpreters for the entire Greek public sector. This initiative... more
Flexible sensing styluses deliver additional degrees of input for pen-based interaction, yet no research on bendable styluses has looked at the influence of stiffness on performance or its integration with creative digital applications.... more
Touchscreen sensors are widely used in many devices such as smart phones, tablets, and laptops with diverse applications. We present the design, analysis, and implementation of an ultrasonic touchscreen system that utilizes the... more
Daniel lectures at Deakin University in the School of Humanities and Social Sciences and teaches units within the Masters of Humanitarian Assistance. He is engaged in research on policy and practices associated with state-building... more
The use of touchscreens as an input method on Smartphones has become the norm in the mobile phone industry. This has changed the way keys are traditionally arranged on Smartphones devices. One of these changes is on the location of “back... more
The world is experiencing a technology shift. In 2011, more touchscreenbased mobile devices like smartphones and tablets will be sold than desktops, laptops, and netbooks combined. In fact, in many cases incredibly powerful and... more
Modes allow a few inputs to invoke many operations, yet if a user misclassifies or forgets the state of a system, modes can result in errors. Spring-loaded modes (quasimodes) maintain a mode while the user holds a control such as a button... more
The impact of tropical cyclones on humans depends on the number of people exposed and their vulnerability, as well as the frequency and intensity of storms. How will the cumulative effects of climate change, demography and vulnerability... more
This paper introduces the object-oriented character recognition engine AQUIRE which was originally designed as a general pattern-classifier under the academic aspects of objectorientation and parallelism together with low space and time... more
Download research papers for free!