期刊文献+
共找到25篇文章
< 1 2 >
每页显示 20 50 100
Digital Rights Management:Model,Technology and Application 被引量:7
1
作者 Zhaofeng Ma 《China Communications》 SCIE CSCD 2017年第6期156-167,共12页
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ... with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality. 展开更多
关键词 digital rights management drm security infrastructure ENCRYPTION WATERMARK usage control drm-free
下载PDF
Home Network and Digital Rights Management Technology 被引量:2
2
作者 Yang Cheng 1Wang Yongbin 2Yang Yixian 3(1. Information Engineering School, Communication University of China, Beijing 100024, China 2. Computer and Software School, Communication University of China, Beijing 100024, China 3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2006年第4期12-18,共7页
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom... The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description. 展开更多
关键词 HDCP Home Network and digital rights Management Technology ZTE ISDB ATSC
下载PDF
A DRM System Based on Mobile Agent for Digital Rights Redistribution
3
作者 LI Ping LU Zhengding ZOU Fuhao LING Hefei 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期475-480,共6页
We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent ... We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent and dispatches it to the user end to enforce DRM functions. The blackbox is an agent that can resist the attacks from the malicious user in a certain time interval. Owing to digital rights redistribution support, the user whose rights belong to redistribution category can transfer his rights to other users. Moreover, by introducing public key infrastructure (PKI) and certificate authority (CA) role, the security of the session can be ensured. An analysis of system security and performance and a comparison with traditional DRM system is given. 展开更多
关键词 digital rights management public key infrastructure certificate authority mobile agent rights redistribution
下载PDF
Digital Rights Management for a Chinese XML Text Centre
4
作者 Wai -man Wong(The Open University of Hong Kong Library,Hong Kong,China) 《现代图书情报技术》 CSSCI 北大核心 2002年第S1期172-177,共6页
The Electronic Text Centre of the OpenUniversity of Hong Kong(OUHK)has been in full operationsince early 2001.It currently houses 7,300+electronictexts,including free electronic titles,electronic titlespurchased direc... The Electronic Text Centre of the OpenUniversity of Hong Kong(OUHK)has been in full operationsince early 2001.It currently houses 7,300+electronictexts,including free electronic titles,electronic titlespurchased directly from the market,and about,1,000 locallyproduced electronic titles.The locally produced titles are notavailable in the market but require local digitization andnegotiation with publishers with regard to the right to use(RTU)them so as to meet the learning needs of the OUHKcommunity.Nearl... 展开更多
关键词 TEXT digital rights Management for a Chinese XML Text Centre XML
下载PDF
Digital Human Rights from the Perspective of System Theory——Concept Definition, Social Function, and Constitutional Basis
5
作者 WENG Zhuangzhuang LI Donglin 《The Journal of Human Rights》 2024年第4期824-852,共29页
The three core issues in the“digital human rights”debate are whether“digital human rights”are possible,necessary,and feasible.Both sides of the debate focus on discovering the value of“digital human rights”to in... The three core issues in the“digital human rights”debate are whether“digital human rights”are possible,necessary,and feasible.Both sides of the debate focus on discovering the value of“digital human rights”to individuals from a semantic level,but ignore the significance of“digital human rights”to the whole society and its subsystems at the level of social structure.By introducing Niklas Luhmann's System Theory,this observation blind spot can be eliminated.Fundamental rights are devoted to directly shaping not a physiological-psychological“individual”as a social environment but a social“person”that can be included by social systems.It is clear that digital human rights are the right to participate in digital communication of a“human”as a“person”,so they are possible in terms of conceptual definition.Digital human rights can help“people”lower the threshold for participation in digital communication,limit the excessive expansion of social systems,and promote the free and complete expression of body and mind,so they are necessary for social functions.There are limitations in the existing two ideas of“incorporating digital human rights into the constitution”.Based on the new construction idea of System Theory of Law,digital human rights as the right to participate in digital communication can be typified into digital communication in social sub-fields such as politics,economy,science,and art.The right to participate constructs a complete digital human rights system,making it feasible on the basis of the constitution. 展开更多
关键词 system theory HUMAN digital human rights social communication digital communication
下载PDF
The Prosecutorial Protection of Digital Human Rights
6
作者 张杰 NI Weisi(译) 《The Journal of Human Rights》 2023年第5期1016-1039,共24页
In the digital age,the rise of digital human rights has become an important expansion in the field of human rights.When advancing digital prosecution strategies,prosecutorial agencies should pay greater attention to t... In the digital age,the rise of digital human rights has become an important expansion in the field of human rights.When advancing digital prosecution strategies,prosecutorial agencies should pay greater attention to the protection of digital human rights.The fragile state of digital human rights and the unique position of prosecutorial agencies in human rights protection make it imperative that prosecutorial agencies place more emphasis on fulfilling their responsibilities in legal oversight to promote the protection of digital human rights.Currently,prosecutorial agencies have strengthened the protection of digital human rights through such measures as promoting legal oversight with big data,enhancing the handling of criminal cases involving citizens'digital human rights,expanding the scope of public interest litigation protecting digital human rights,and improving their roles in civil and administrative prosecution.However,there are still challenges related to the inadequacy of updating the mindset,the incompleteness of measures,and the lack of innovation in mechanisms and systems.Therefore,prosecutorial agencies should further align with the implementation of digital prosecution strategies,update their human rights protection concepts,intensify efforts to combat cybercrime,strengthen the protection of citizens'personal information through prosecution,enhance public interest protection of collective digital human rights through public interest litigation,and actively innovate prosecutorial work mechanisms and systems to bolster the protection of digital human rights. 展开更多
关键词 digital human rights legal supervision prosecutorial protection four-pronged procuratorial protection
下载PDF
Digital Development Rights in Developing Countries:Where the Governance Rules for Cross-Border Data Flows
7
作者 李艳华 JIANG Yu(译) 《The Journal of Human Rights》 2023年第5期1040-1066,共27页
The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-ro... The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-rounded development in the digital society.The relationship between cross-border data flows and the realization of digital development rights in developing countries is quite complex.Currently,developing countries seek to safeguard their existing digital interests through unilateral regulation to protect data sovereignty and multilateral regulation for cross-border data cooperation.However,developing countries still have to face internal conflicts between national digital development rights and individual and corporate digital development rights during the process of realizing digital development rights.They also encounter external contradictions such as developed countries interfering with developing countries'data sovereignty,developed countries squeezing the policy space of developing countries through dominant rules,and developing countries having conflicts between domestic and international rules.This article argues that balancing openness and security on digital trade platforms is the optimal solution for developing countries to realize their digital development rights.The establishment of WTO digital trade rules should inherently reflect the fundamental demands of developing countries in cross-border data flows.At the same time,given China's dual role as a digital powerhouse and a developing country,it should actively promote the realization of digital development rights in developing countries. 展开更多
关键词 developing countries digital development rights cross-border data flows governance rules
下载PDF
The Concept of Digital Human Rights and Its Reshaping of Basic Rights
8
作者 张龑 江烁 QIAN Chuijun(译) 《The Journal of Human Rights》 2023年第5期973-993,共21页
Whether a new generation of human rights emerges in the digital age has sparked widespread debate.Academic understanding of digital technology remains confined to thinking about network technology and products,often o... Whether a new generation of human rights emerges in the digital age has sparked widespread debate.Academic understanding of digital technology remains confined to thinking about network technology and products,often overlooking the revolutionary nature of digital media.Digital media has the sweeping potential to unify all forms of media and reshape social life,giving rise to new demands for a new generation of human rights.The concept of digital human rights can be defined as the legitimate rights of human's infinitely extended personalities through digital media.Its core characteristic is its transcendency,where every person lives in a networked space that surpasses physical boundaries,nations,and individual personalities.Human rights are generally considered the foundation for basic constitutional rights,which,in turn,form the basis for legislative acts across various sectors.In recent years,China has enacted numerous laws in the digital domain to keep pace with the times,but due to the lack of guidance on digital human rights,these laws tend to be fragmented and disjointed.It is urgent to unify digital legislation at all levels on the basis of reshaping basic constitutional rights.Thus,it is essential to reshape the basic rights based on the concept and characteristics of digital human rights and streamline legislation at all levels under the unified guidance of basic rights.This can help establish a comprehensive digital human rights protection system that meets the demands of the modern era. 展开更多
关键词 digital human rights infinitely extended personalities personalities with transcendency reshaping the basic rights
下载PDF
The Dynamic System Theory of Legal Protection for Personal Information Rights Infringement
9
作者 莫杨燊 NI Weis 《The Journal of Human Rights》 2024年第1期143-172,共30页
The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessmen... The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessment,and liability.Traditional tort law is unable to provide a robust response for these challenges,which severely hinders human rights protection in the digital society.The dynamic system theory represents a third path between fixed constitutive elements and general clauses.It both overcomes the rigidity of the“allor-nothing”legal effect evaluation mechanism of the“element-effect”model and avoids the uncertainty of the general clause model.It can effectively enhance the flexibility of the legal system in responding to social changes.In light of this,it is necessary to construct a dynamic foundational evaluation framework for personal information infringement under the guidance of the dynamic system theory.By relying on the dynamic interplay effect of various foundational evaluation elements,this framework can achieve a flexible evaluation of the constitutive elements of liability and the legal effects of liability for personal information infringement.Through this approach,the crisis of personal information infringement in the era of big data can be mitigated,and the realization of personal information rights as digital human rights can be promoted. 展开更多
关键词 personal information digital human rights dynamic system theory constitutive elements of torts LIABILITY
下载PDF
Encrypted data sharing with multi-owner based on digital rights management in online social networks 被引量:1
10
作者 HUANG Qin-long FU Jing-yi +2 位作者 MA Zhao-feng YANG Yi-xian NIU Xin-xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第1期86-93,共8页
The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before s... The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before sharing, the access control of encrypted data has become a challenging task. Moreover, multiple owners may enforce different access policy to the same data because of their different privacy concerns. A digital rights management(DRM) scheme is proposed for encrypted data in OSNs. In order to protect users' sensitive data, the scheme allows users outsource encrypted data to the OSNs service provider for sharing and customize the access policy of their data based on ciphertext-policy attribute-based encryption. Furthermore, the scheme presents a multiparty access control model based on identity-based broadcast encryption and ciphertext-policy attribute-based proxy re-encryption, which enables multiple owners, such as tagged users who appear in a single data, customize the access policy collaboratively, and also allows the disseminators update the access policy if their attributes satisfy the existing access policy. Security analysis and comparison indicate that the proposed scheme is secure and efficient. 展开更多
关键词 digital rights management online social networks multi-owner attribute-based encryption broadcast encryption
原文传递
Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection
11
作者 黄政嘉 卢佩君 +3 位作者 庄文胜 范俊逸 林政扬 林俊宏 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期443-447,共5页
In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by th... In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management(DRM)scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem. 展开更多
关键词 identity authentication elliptic curve cryptosystem privacy protection digital rights management(DRM)
原文传递
General digital rights management solution based on white-box cryptography
12
作者 Liu Jun Hu Yupu Chen Jie 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第1期52-63,共12页
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of crypto... Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical. 展开更多
关键词 digital rights management(DRM) white-box cryptography traceable white-box program white-box compiler
原文传递
Modernization and the Diversity of Human Rights Among Civilizations--Review of the 2023 China-europe Seminar on Human Rights
13
作者 谭堾垿 LIU Haile(Translated) 《The Journal of Human Rights》 2023年第6期1373-1386,共14页
Human rights are an achievement of humanity and a symbol of progress.Respect for and protection of human rights are basic principles of modern civilization.Around the world,countries and regions have chosen different ... Human rights are an achievement of humanity and a symbol of progress.Respect for and protection of human rights are basic principles of modern civilization.Around the world,countries and regions have chosen different paths to modernization,which are rooted in their unique civilizations.to promote exchanges and mutual learning among civilizations,facilitate human rights exchanges and cooperation between different countries,and advance the global development of human rights,on September 20,2023,the 2023 China-europe Seminar on Human Rights was held in Rome,the capital of Italy.Under the theme of“Modernization and the Diversity of Human Rights Among Civilizations,”the seminar focused on discussing topics such as exchanges and mutual learning among civilizations and the development of modern human rights philosophy,modernization and the free and well-rounded development of every person,sustainable development in the process of modernization,and the evolution of the civilization of human rights in the digital age.participants reached the following consensuses at the event:First,the participants from various countries spoke highly of the great achievements that China has made in human rights cause and fully recognized China’s contributions in promoting the development and progress of the global human rights cause;Second,the participants from all countries agreed that it is necessary to discard the concept of“Western-centrism,”transcend the mindset of“cultural superiority,”promote human rights exchanges and mutual learning among civilizations on the basis of equality and mutual respect,and inject new impetus into the diversity of human rights among civilizations;third,participants reaffirmed that human rights represent an open concept,and that we should discuss the development of human rights with an open mind and jointly promote the progress of human rights in the world. 展开更多
关键词 China-Europe Seminar on Human rights modern-ization diversity of human rights among civilizations sustainable development digital human rights
下载PDF
Building International Consensus and Working Together to Advance the Development of the Global Human Rights Cause—Summary of Academic Views at the Forum on Global Human Rights Governance
14
作者 孙本雄 《The Journal of Human Rights》 2023年第4期915-933,共19页
On June 14-15,2023,the Forum on Global Human Rights Governance,jointly hosted by the State Council Information Office,the Ministry of Foreign Affairs,and the China International Development Cooperation Agency,was held... On June 14-15,2023,the Forum on Global Human Rights Governance,jointly hosted by the State Council Information Office,the Ministry of Foreign Affairs,and the China International Development Cooperation Agency,was held in Beijing under the theme of“Equality,Cooperation and Development:The 30th Anniversary of the Vienna Declaration and Programme of Action and Global Human Rights Governance.”Participants conducted in-depth discussions and exchanges on topics such as“International Cooperation and Global Human Rights Governance,”“Global Development Initiative and the Realization of the Right to Development”,“Global Security Initiative and Human Rights Protection,”“UN Human Rights Mechanisms and Global Human Rights Governance,”and“Human Rights Protection in the Digital Age.”The event helped build international consensus and yielded fruitful achievements. 展开更多
关键词 global human rights governance international cooperation a community with a shared future for mankind digital human rights
下载PDF
A Digital Right Management Model for Distribution of Digital Audiovisual Content
15
作者 FAN Kefeng PEI Qingqi +2 位作者 WANG Meihua MO Wei CAO Ling 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1877-1881,共5页
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, ... This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, the necessary protocol for the copyright control and content distribution, the authentication mechanism which offer consumption registration for content fair distribution, of the model are all provided. The scheme also provides distribution and evidence for using the copyright of digital content fairly and effectively. Finally, analysis shows the proposed model has both high security and good performance. 展开更多
关键词 digital rights management content distribution authentication mechanism MODEL
下载PDF
Attribute Based DRM Scheme with Dynamic Usage Control in Cloud Computing 被引量:3
16
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第4期50-63,共14页
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in... In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient. 展开更多
关键词 digital rights management cloud computing usage control attribute-based encryption homomorphic encryption
下载PDF
Machines as readers: A solution to the copyright problem
17
作者 SHAMOS Michael I. 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第11期1179-1187,共9页
Copyright and its international complications have presented a significant barrier to the Universal Digital Library (UDL)'s mission to digitize all the published works of mankind and make them available throughout ... Copyright and its international complications have presented a significant barrier to the Universal Digital Library (UDL)'s mission to digitize all the published works of mankind and make them available throughout the world. We discuss the effect of existing copyright treaties and various proposals, such as compulsory licensing and the public lending fight that would allow access to copyrighted works without requiring permission of their owners. We argue that these schemes are ineffective for purposes of the UDL. Instead, making use of the international consensus that copyright does not protect facts, information or processes, we propose to scan works digitally to extract their intellectual content, and then generate by machine synthetic works that capture this content, and then translate the generated works automatically into multiple languages and distribute them free of copyright restriction. 展开更多
关键词 Universal digital Library (UDL) COPYRIGHT digital rights management Compulsory license Berne convention Public lending right Synthetic documents Machine translation
下载PDF
REAL-TIME LICENSING MANAGEMENT OF SECURE MULTIMEDIA CONTENT DELIVE RY
18
作者 马兆丰 冯博琴 《Journal of Pharmaceutical Analysis》 SCIE CAS 2004年第2期110-113,118,共5页
Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violat... Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violated w ay is one of most important issues to take into account. In this paper, a novel and efficient authorization and authentication Digital Rights Management (DRM) s chema is proposed firstly for secure multimedia delivery, then based on the sche ma, a real-time digital signature algorithm built on Elliptic Curve Cryptograph y (ECC) is adopted for fast authentication and verification of licensing managem ent, thus secure multimedia delivery via TCP/RTP can efficiently work with real -time transaction response and high Quality of Service (QoS) . Performance eval uations manifest the proposed schema is secure, available for real-time media s tream authentication and authorization without much effected of QoS. The propose d schema is not only available for Client/Server media service but can be easily extended to P2P and broadcasting network for trusted rights management. 展开更多
关键词 digital rights management multimedia delivery real-time licensing management elliptic curve cryptography
下载PDF
Composite Chaotic Pseudo-Random Sequence Encryption Algorithm for Compressed Video 被引量:10
19
作者 袁春 钟玉琢 杨士强 《Tsinghua Science and Technology》 SCIE EI CAS 2004年第2期234-241,共8页
Stream cryptosystems, which implement encryption by selecting parts of the block data and header information of the compressed video stream, achieve good real-time encryption with high flexibility. Chaotic random numb... Stream cryptosystems, which implement encryption by selecting parts of the block data and header information of the compressed video stream, achieve good real-time encryption with high flexibility. Chaotic random number generator-based approaches, for example, logistics maps, are comparatively promising approachs, but are vulnerable to attacks by nonlinear dynamic forecasting. A composite chaotic cryptography scheme was developed to encrypt the compressed video with the logistics map with a Z(2311) field linear congruential algorithm to strengthen the security of the mono-chaotic cryptography. The scheme maintained real-time performance and flexibility of the chaotic sequence cryptography. The scheme also in-tegrated asymmetrical public-key cryptography and encryption and identity authentification of control pa-rameters at the initialization phase. Encryption is performed in a layered scheme based on the importance of the data in a compressed video stream. The composite chaotic cryptography scheme has the advantage that the value and updating frequency of the control parameters can be changed online to satisfy the net-work requirements and the processor capability, as well as the security requirements. Cryptanalysis shows that the scheme guarantees robust security,provides good real-time performance,and has flexible im-plementation. Statistical evaluations and tests verify that the scheme is effective. 展开更多
关键词 CHAOTIC compressed video content-based encryption digital rights management stream cryptosystem
原文传递
Basic Considerations on AVS DRM Architecture 被引量:3
20
作者 黄铁军 刘永亮 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第3期366-369,共4页
Digital Rights Management (DRM) is an important infrastructure for the digital media age. It is a part of the AVS (Audio and Video coding Standard) of China. AVS Trusted Decoder (ATD) that plays back digital med... Digital Rights Management (DRM) is an important infrastructure for the digital media age. It is a part of the AVS (Audio and Video coding Standard) of China. AVS Trusted Decoder (ATD) that plays back digital media program according to rights conditions is the core of AVS DRM architecture. Adaptation layers axe responsible for translating or negotiating between ATD and peripheral systems. The Packaging Adaptation Layer (PAL), Licensing Adaptation Layer (LAL) and Rendering Adaptation Layer (RAL) will help ATD to gain the interoperability in various DRM environments. 展开更多
关键词 digital media digital rights management AVS (Audio and Video coding Standard)
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部