0% found this document useful (0 votes)
35 views13 pages

Digital Rights Management

Digital Content Management
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views13 pages

Digital Rights Management

Digital Content Management
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd

“Digital Rights Management”

By
CHANDRASHEKHARA N
2nd Year MSc.
Department of Studies and Research in Library and
Information Science,
Tumkur University, Tumakuru.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Content

• Introduction
• What is DRM
• Purpose of DRM
• Functional Architecture of DRM
• DRM Techniques
• Conclusion
• References

1-2
Introduction

 DRM controls the use of digital content


 Preventing access, copying or conversion to other formats by end users
 Digital media files may be duplicated an unlimited number of times
 Digital piracy-Internet and popular file sharing tools, has made
unauthorized distribution of copies
 DRM disallow copyright infringements

1-3
What is DRM

• Digital rights management, is a general term used to describe a


set of technologies which intends to simplify the practice of
preventing in appropriate use of digital content. These sets of
technologies are being used by publishers, copyright holders,
individuals and hardware manufactures with an intention to
control the use of digital content and devices to protect it from in-
intended use.

1-4
Purpose of DRM

 Copyright Protection
 Preventing Piracy
 Content Monetization
 Access Control
 Digital Rights Enforcement
 Protecting Sensitive Information

1-5
Functional Architecture of DRM

1-6
DRM Techniques

• Water marking
• Digital Signature
• Digital Certificate
• Finger Printing
• Encryption
• License Control / Access Control

1-7
DRM Techniques

Watermarking:
 Embeds identifying information into digital content.
 Can be visible or invisible.
 Helps track unauthorized distribution.
 Provides proof of ownership.
Digital Signature:
 Uses cryptographic techniques to authenticate the sender and
ensure the integrity of digital content.
 Provides assurance that the content has not been altered or
tampered with.
 Typically involves the use of public-private key pairs.

1-8
DRM Techniques

Digital Certificate:
 Issued by a trusted authority (Certificate Authority) to validate
the identity of individuals or entities.
 Contains public key and other identifying information.
 Used in conjunction with digital signatures to establish trust.
Fingerprinting:
 Generates a unique identifier for each copy of digital content.
 Can be based on specific characteristics of the content itself or
metadata associated with it.
 Allows tracking of individual copies to identify sources of
unauthorized distribution.

1-9
DRM Techniques

Encryption:
 Converts digital content into a coded form using algorithms.
 Requires a key to decrypt and access the original content.
 Protects content from unauthorized access or interception.
License Control / Access Control:
 Governs the usage rights and permissions associated with
digital content.
 Specifies conditions under which the content can be accessed,
copied, or distributed.
 Can involve techniques such as DRM licenses, user
authentication, and content expiration.

1-10
Conclusion

 Digital Rights Management (DRM) employs watermarking, digital


signatures, encryption, and access controls to protect digital content
from unauthorized use and distribution.
 Through these techniques, DRM ensures data integrity, validates
identities, and enforces licensing agreements.
 DRM serves as a vital tool for content creators to safeguard their
intellectual property rights and maintain control over distribution
channels.

1-11
References

 Iannella R., "Digital Rights Management (DRM) Architectures." D-


Lib Magazine v.7, no.6,
([Link]
2001)
 International Federation of Library Associations, & Institutions.
Section on Cataloguing. Standing Committee. (1998). Functional
requirements for bibliographic records: final report (Vol. 19). IFLA
Study Group on the Functional Requirements for Bibliographic
Records (Ed.). KG Saur Verlag Gmbh & Company.
([Link]
bibliographic-records)
 [Link]

1-12
Y o u
a n k
T h
1-13

You might also like