• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

The Design and Analysis of Secure DRM Systems using Steganography


Do Kyoung-Hwa, Jun Moon-Seog, Journal of Internet Computing and Services, Vol. 4, No. 5, pp. 21-30, Oct. 2003
Full Text:
Keywords: Steganography, DRM, Information Hiding, Network Security

Abstract

Transferring the contents for multimedia shows recently very activity, So this fact ailows the contents for multimedia to be commercialized. These contents, however, included much vulnerability that it is difficult to be commercialized because attackers easily reproduce that. Many developers want to use watermarking method as the technique to protect the contents for multimedia, but it is very vulnerable to use only one method, This paper proposes the Secure DRM system which protects the contents for multimedia steganography methods. The DRM system is more powerful than general DRM systems in that it has the special feature of watermarking and steganography techniques, We can prevent the attackers from reproducing and stealing the contents illegally, and authenticating users through DRM systems.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Do Kyoung-Hwa and Jun Moon-Seog (2003). The Design and Analysis of Secure DRM Systems using Steganography. Journal of Internet Computing and Services, 4(5), 21-30.

[IEEE Style]
D. Kyoung-Hwa and J. Moon-Seog, "The Design and Analysis of Secure DRM Systems using Steganography," Journal of Internet Computing and Services, vol. 4, no. 5, pp. 21-30, 2003.

[ACM Style]
Do Kyoung-Hwa and Jun Moon-Seog. 2003. The Design and Analysis of Secure DRM Systems using Steganography. Journal of Internet Computing and Services, 4, 5, (2003), 21-30.