23 terms

Digital Rights Management (DRM)

STUDY
PLAY
Digital Rights Management (DRM)
A set of technologies that control the access and use of digital works. The technology is usually some sort of digital code.
Denial of Service Attack (DoS)
Prevents the normal use or management of communication services, e.g. a network may be flooded with messages that cause a degradation of service or shutdown.
Darknet
A term used to describe how the internet can be used to distribute works ignoring the restriction of copyright laws.
Strong BOBE
If the security is broken on a device then the impact is restricted to that device.
Fuzzy Hashing
When the digital work can be uniquely identified by a has value calculated from the digital work itself. The 'fuzziness' comes in because minor modifications that do not significantly affect the perception of the work should not change the hash value.
Draconian DRM system
Devices with this system can only handle managed (protected) digital works.
Digital Watermarking
Refers to techniques for embedding marks in digital works to give additional protection by tying copyright information to the server.
Fingerprinting
A form of copyright marking that includes some means of identifying the original purchaser of the work.
Unauthorised embedding
Embedding a detection watermark into digital content which fraudulently generates revenue for someone other than the intended recipient.
Copyright protection
In the context of digital watermarking, the copyright info is embedded within the digital work so that the identity of the copyright holders can be identified.
Copy Protection
In the context of digital watermarking, a device that reads the watermark to determine the restrictions imposed on the device.
Perceptual Transparency
In the context of digital watermarking, the presence of a watermark should not affect the quality of the digital work to a degree that is detectable by humans.
Robustness
A watermark ability to be able to survive a range of intentional and unintentional degradations. Increasing robustness can decrease perceptual transparency.
Oblivious watermarking
A watermark is detected WITHOUT a knowledge of the un-watermarked work.
Non-oblivious watermarking
A watermark is detected WITH a knowledge of the un-watermarked work.
Unauthorised acquisition
When you use piracy to get hold of a copyrighted works, such as downloading a film from a peer-to-peer website.
Unauthorised use
Using the original digital works (such as a legitimate CD) in order to copy and distribute illegal copies for financial gain.
Data Authentication
The presence of a fragile watermark can indicate that no changes have been made.
Ambiguity attack
An example of 'unauthorised embedding'. The result of the attack gives the appearance of a new watermark being embedded.
Sensitivity attack
An attack with a goal of creating a digital work that is perceptually similar to the original but it doesn't trigger the watermark detection. Alterations made in small steps.
Weak BOBE
If security is broken once, then the means of attack applies to many devices.
Unauthorised extraction
Extracting and decoding watermark info, which may contain sensitive data such as bank details.
Unauthorised removal
making watermarked content indistinguishable from non-watermarked content, allowing unrestricted use, for example.
YOU MIGHT ALSO LIKE...