Skip to main content
  • Conference proceedings
  • © 2006

Digital Rights Management

Technologies, Issues, Challenges and Systems

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3919)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DRMTICS: International Conference on Digital Rights Management

Conference proceedings info: DRMTICS 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Assurance and Authentication Issues

    1. TIVA: Trusted Integrity Verification Architecture

      • Mahadevan Gomathisankaran, Akhilesh Tyagi
      Pages 13-31
  3. Legal and Related Issues

    1. Downloading vs Purchase: Music Industry vs Consumers

      • Supriya Singh, Margaret Jackson, Jenny Waycott, Jenine Beekhuyzen
      Pages 52-65
  4. Expressing Rights and Management

    1. User-Attributed Rights in DRM

      • Milan Petković, R. Paul Koster
      Pages 75-89
    2. A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights

      • K. Bhoopalam, K. Maly, R. Mukkamala, M. Zubair, D. Agrawal, D. Kaminsky
      Pages 102-112
  5. Watermarking

    1. The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks

      • Yanjun Hu, Xiaoping Ma, Linming Dou, Ying Chen
      Pages 113-122
    2. A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream

      • Hongmei Liu, Fenglian Shao, Jiwu Huang
      Pages 123-134
    3. Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform

      • Xiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu
      Pages 135-145
  6. Software Issues

    1. Software Tamper Resistance Through Dynamic Program Monitoring

      • Brian Blietz, Akhilesh Tyagi
      Pages 146-163
    2. Algorithms to Watermark Software Through Register Allocation

      • William Zhu, Clark Thomborson
      Pages 180-191
  7. Fingerprinting and Image Authentication

    1. An Efficient Fingerprinting Scheme with Secret Sharing

      • Seunglim Yong, Sang-Ho Lee
      Pages 192-202
    2. Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion

      • Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota
      Pages 203-216
    3. Secure Remote Fingerprint Verification Using Dual Watermarks

      • Taehae Kim, Yongwha Chung, Seunghwan Jung, Daesung Moon
      Pages 217-227
  8. Supporting Cryptographic Technology

    1. Security Weaknesses of Certain Broadcast Encryption Schemes

      • Miodrag J. Mihaljević, Marc P. C. Fossorier, Hideki Imai
      Pages 228-245
    2. A Broadcast Encryption Scheme with Free-Riders but Unconditional Security

      • Andre Adelsbach, Ulrich Greveler
      Pages 246-257

Other Volumes

  1. Digital Rights Management. Technologies, Issues, Challenges and Systems

About this book

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – pronounced ‘dramatics’), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of Wollongong and in cooperation with the International Association of Cryptologic Research (IACR) and IEEE Computer Society’s Task Force on Information Assurance. DRMTICS isan internationalconferenceseriesthat coversthe areaof digital rights management, including research advancements of an applied and theor- ical nature. The goal is to have a broad coverage of the ?eld and related issues and subjects as the area evolves. Since the Internet and the computing infr- tructure has turned into a marketplace for content where information goods of various kinds are exchanged, this area is expected to grow and be part of the ongoing evolution of the information society. The DRM area is a unique blend of many diverse disciplines that include mathematics and cryptography, legal and social aspects, signal processing and watermarking, game theory, infor- tion theory, software and systems design and business analysis, and DRMTICS attempts to cover as much ground as possible, and to cover new results that will further spur new investigations on the foundations and practices of DRM. We hope that this ?rst conference marks the beginning of a fruitful and useful series of future conferences. This year, the conference received 57 submissions out of which 26 were - cepted for presentation after a rigorous refereeing process.

Editors and Affiliations

  • Department of Computer Science, University of Calgary, Calgary

    Reihaneh Safavi-Naini

  • Computer Science Department, Google Inc. and Columbia University,, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access