Sciweavers

137 search results - page 21 / 28
» DRM
Sort
View
SEC
2003
13 years 9 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
IJMSO
2007
102views more  IJMSO 2007»
13 years 8 months ago
Referent tracking for Digital Rights Management
: Digital Rights Management (DRM) covers the description, identification, trading, protection, monitoring and tracking of all forms of rights over both tangible and intangible asse...
Werner Ceusters, Barry Smith
ICMCS
2010
IEEE
260views Multimedia» more  ICMCS 2010»
13 years 7 months ago
Compressed-encrypted domain JPEG2000 image watermarking
In digital rights management (DRM) systems, digital media is often distributed by multiple levels of distributors in a compressed and encrypted format. The distributors in the cha...
A. V. Subramanyam, Sabu Emmanuel, Mohan S. Kankanh...
IJNSEC
2011
143views more  IJNSEC 2011»
13 years 3 months ago
Probable Security Proof of A Blind Signature Scheme over Braid Groups
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
Girraj Kumar Verma
MTA
2011
203views Hardware» more  MTA 2011»
13 years 3 months ago
Interoperable digital rights management based on the MPEG Extensible Middleware
Abstract This paper describes an interoperable Digital Rights Management architecture promoted by the MPEG standardization group in its new standard known as MPEG-M or MPEG Extensi...
Víctor Rodríguez-Doncel, Jaime Delga...