{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:17:40Z","timestamp":1774019860128,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540232087","type":"print"},{"value":"9783540301448","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_33","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"391-403","source":"Crossref","is-referenced-by-count":36,"title":["Survey on the Technological Aspects of Digital Rights Management"],"prefix":"10.1007","author":[{"given":"William","family":"Ku","sequence":"first","affiliation":[]},{"given":"Chi-Hung","family":"Chi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking schemes provably secure against copy and ambiguity attacks. In: Proceedings of the 2003 ACM workshop on Digital rights management, pp. 111\u2013119 (2003)","DOI":"10.1145\/947380.947395"},{"key":"33_CR2","unstructured":"Allamanche, E., Herre, J., Helmuth, O., Frba, B., Kasten, T., Cremer, M.: Content-Based Identification of Audio Material Using MPEG-7 Low Level Description. In: Proceedings of the International Symposium of Music Information Retrieval (2001)"},{"key":"33_CR3","first-page":"28","volume-title":"Data hiding for fighting piracy, Signal Processing Magazine","author":"M. Barni","year":"2004","unstructured":"Barni, M., Bartolini, F.: Data hiding for fighting piracy, Signal Processing Magazine, March 2, vol.\u00a021(2), pp. 28\u201339. IEEE, Los Alamitos (2004)"},{"key":"33_CR4","unstructured":"Cano, P., Batlle, E., Gmez, E., Gomes, L., De, C.T., Bonnet, M.: Audio fingerprinting: concepts and applications. In: Proceedings of 1st International Conference on Fuzzy Systems and Knowledge Discovery, Singapore (November 2002)"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Cano, P., Batlle, E., Kalker, T., Haitsma, J.: A review of algorithms for audio fingerprinting. In: Proceedings of International Workshop on Multimedia Signal Processing, US Virgin Islands (December 2002)","DOI":"10.1109\/MMSP.2002.1203274"},{"key":"33_CR6","unstructured":"Chi, C.H., Wang, H., Ku, W.: Proxy-Cache Aware Object Bundling for Web Access Acceleration. In: Proceedings of Eighth International Workshop on Web Content Caching and Distribution (2003)"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Conrado, C., Kamperman, F., Schrijen, G.J., Jonker, W.: Privacy in an identity-based DRM system. In: Proceedings of 14th International Workshop on Database and Expert Systems Applications 2003, September 1-5, pp. 389\u2013395 (2003)","DOI":"10.1109\/DEXA.2003.1232053"},{"key":"33_CR8","unstructured":"DOI.: The Digital Object Identifier (DOI) System, http:\/\/www.doi.org\/"},{"key":"33_CR9","unstructured":"Erickson, J., Iannella, R., Wenning, R.: 2001. Workshop Report, W3C Workshop on Digital Rights Management for the Web, 22-23 January (2001)"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T., Shin, M., Straub, C.D., Tamassia, R.: Distributed data authentication. In: Proceedings of DARPA Information Survivability Conference and Exposition 2003, April 22-24, vol.\u00a02, pp. 58\u201359 (2003)","DOI":"10.1109\/DISCEX.2003.1194915"},{"issue":"11","key":"33_CR11","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/35.883493","volume":"38","author":"F. Hartung","year":"2000","unstructured":"Hartung, F., Ramme, F.: Digital rights management and watermarking of multimedia content for m-commerce applications. IEEE Communications Magazine\u00a038(11), 78\u201384 (2000)","journal-title":"IEEE Communications Magazine"},{"key":"33_CR12","unstructured":"Iannella, R.: Digital Rights Management (DRM) Architectures. D-Lib Magazine\u00a07(6) (2001), http:\/\/www.dlib.org\/dlib\/june01\/iannella\/06iannella.html ISSN 1082-9873"},{"key":"33_CR13","unstructured":"Iannella, R., Higgs, P.: Driving Content Management with Digital Rights Management (April 2003), http:\/\/www.iprsystems.com\/whitepapers\/CM-DRM-WP.pdf"},{"key":"33_CR14","unstructured":"INDECS. The <indecs> framework, http:\/\/www.indecs.org"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Iwata, T., Abe, T., Ueda, Y., Sunaga, H.: A DRM system suitable for P2P content delivery and the study on its implementation. In: Proceedings of The 9th Asia- Pacific Conference on Communications, APCC 2003, September 21-24, vol.\u00a02, pp. 806\u2013811 (2003)","DOI":"10.1109\/APCC.2003.1274471"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Kang, Y.K., Kim, M.H.: Real-time fingerprints recognition mechanism-based digital contents protection system for interaction on the Web. In: Proceedings of Pacific Rim International Symposium on Dependable Computing 2001, December 17-19, pp. 304\u2013309 (2001)","DOI":"10.1109\/PRDC.2001.992713"},{"key":"33_CR17","unstructured":"Mori, R., Kawahara, M.: Superdistribution: the concept and the architecture. Technical Report 7, Inst. of Inf. Sci. & Electron (Japan), Tsukuba Univ., Japan (July 1990)"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Mih\u00e7Ak, K., Venkatesan, R.: New Iterative Geometric Methods for Robust Perceptual Image Hashing, Security and Privacy in Digital Rights Management. In: Proceedings of ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, pp. 13\u201324 (2001)","DOI":"10.1007\/3-540-47870-1_2"},{"key":"33_CR19","unstructured":"MPEG-21. MPEG-21, http:\/\/www.chiariglione.org\/mpeg\/standards\/mpeg-21\/mpeg-21.htm"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Nutzel, J., Grimm, R.: Potato System and signed media format - an alternative approach to online music business. In: Proceedings of Third International Conference on Web Delivering of Music, September 15-17. WEDELMUSIC, pp. 23\u201326 (2003)","DOI":"10.1109\/WDM.2003.1233868"},{"key":"33_CR21","unstructured":"OASIS. OASIS Rights Language Technical Committee http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=rights"},{"key":"33_CR22","unstructured":"ODRL. Open Digital Rights Language (ODRL), http:\/\/www.odrl.net\/"},{"key":"33_CR23","unstructured":"OEBF. Open eBook Forum, http:\/\/www.openebook.org\/"},{"key":"33_CR24","unstructured":"OMA. Open Mobile Alliance (OMA), http:\/\/www.openmobilealliance.org\/"},{"key":"33_CR25","first-page":"50","volume-title":"Authentication gets personal with biometrics, Signal Processing Magazine","author":"J. Ortega-Garcia","year":"2004","unstructured":"Ortega-Garcia, J., Bigun, J., Reynolds, D., Gonzalez-Rodriguez, J.: Authentication gets personal with biometrics, Signal Processing Magazine, March 2004, vol.\u00a021(2), pp. 50\u201362. IEEE, Los Alamitos (2004)"},{"key":"33_CR26","first-page":"71","volume-title":"xCP: Peer-to-Peer content protection, Signal Processing Magazine","author":"F. Pestoni","year":"2004","unstructured":"Pestoni, F., Lotspiech, J.B., Nusser, S.: xCP: Peer-to-Peer content protection, Signal Processing Magazine, vol.\u00a021(2), pp. 71\u201381. IEEE, Los Alamitos (2004)"},{"key":"33_CR27","volume-title":"Digital Rights Management: Business and Technology","author":"B. Rosenblatt","year":"2001","unstructured":"Rosenblatt, B., Trippe, B., Mooney, S.: Digital Rights Management: Business and Technology. John Wiley & Sons, Chichester (2001) ISBN 0764548891"},{"key":"33_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/10941270_2","volume-title":"Digital Rights Management","author":"N. Rump","year":"2003","unstructured":"Rump, N.: Definition, Aspects, and Overview. In: Becker, E., Buhse, W., G\u00fcnnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol.\u00a02770, pp. 3\u201315. Springer, Heidelberg (2003)"},{"key":"33_CR29","unstructured":"Screamer, B.: Beale Screamer\u2019s crack of Microsoft DRM Version 2 (2001), http:\/\/cryptome.org\/ms-drm.htm"},{"key":"33_CR30","doi-asserted-by":"crossref","unstructured":"Uzuner, \u00d6., Davis, R.: Content and expression-based copy recognition for intellectual property protection. In: Proceedings of the 2003 ACM workshop on Digital rights management, pp. 103\u2013110 (2003)","DOI":"10.1145\/947380.947393"},{"key":"33_CR31","first-page":"92","volume-title":"Automatic identification of sound recordings, Signal Processing Magazine","author":"V. Venkatachalam","year":"2004","unstructured":"Venkatachalam, V., Cazzanti, L., Dhillon, N., Wells, M.: Automatic identification of sound recordings, Signal Processing Magazine, March 2004, vol.\u00a021(2), pp. 92\u201399. IEEE, Los Alamitos (2004)"},{"key":"33_CR32","doi-asserted-by":"crossref","unstructured":"Walker, J., Morris, O.J., Marusic, B.: Share it! - the architecture of a rights-managed network of peer-to-peer set-top-boxes, EUROCON 2003. In: Computer as a Tool. The IEEE Region 8, September 22-24, vol.\u00a01, pp. 251\u2013255 (2003)","DOI":"10.1109\/EURCON.2003.1248021"},{"key":"33_CR33","first-page":"15","volume-title":"Collusion-Resistant Fingerprinting for Multimedia, Signal Processing Magazine","author":"M. Wu","year":"2004","unstructured":"Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion-Resistant Fingerprinting for Multimedia, Signal Processing Magazine, March 2004, vol.\u00a021(2), pp. 15\u201327. IEEE, Los Alamitos (2004)"},{"key":"33_CR34","unstructured":"XRML. eXtensible rights Markup Language (XrML), http:\/\/www.xrml.org\/"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T22:37:47Z","timestamp":1740523067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}