You are on page 1of 5

46 (IJCNS) International Journal of Computer and Network Security,

Vol. 2, No. 9, September 2010

Video Streamed Acces and Use Control Using


Digital Rights Management
Morad Rafi1 and Mohsine Eleuldj2
Mohammed V University, Mohammedia School of Engineers (EMI),
Telecom & Computer Departements
Avenue Ibn sina, B.P. 765 Agdal Rabat Maroc
Tel: (212-537) 77.26.47
1
rafimourad@gmail.com, 2eleuldj@emi.ac.ma

signals which it then converts (encodes) into a series of IP


Abstract: Digital Rights Management (DRM) is collection of
technologies which protect the copy right holder’s revenue by packets that can be sent out over an IP-based network as a
protecting their digital works, based on a secure architecture data stream. The IP network may be a local area network, a
against any illegal use. The challenge of DRM is to control, in company wide area network, or even the public internet. At
real time, the access and use of these digital contents over a the destination, the receiver re-assembles these packets back
communication channel. In this paper we will use DRM into the original video stream. The reconstructed video can
technologies to control access and use of streamed videos in the
then be viewed, stored, searched, replayed, or retransmitted.
case of a bandwidth-limited network. This contribution makes it
suitable to enable real time DRM in multimedia systems.
Unlike other types of data, video requires large amounts of
bandwidth, as well as highly reliable, predictable delivery
Keywords: DRM, Network, Real time, Video Streaming, mechanisms. Unfortunately, IP was not designed to provide
Control.
this guaranteed quality of service (QoS) to the different
types of traffic it carries and frequently one or more packets
1. Introduction and Motivation may be dropped during transmission. For applications such
One of the fastest growing and most profiting sectors as video, packet re-transmission is a poor option since the
of today’s economy is information industry. Its success missing packets are required to accurately reproduce the
has in short time brought new opportunities to do video image. Unmanaged, these factors cause latency, which
business with digital information products. New result in poor quality or even unusable video at the receiving
technologies like telecommunications, Internet, etc… is now end.
enabling a new business models --- e-Commerce. On the In this context, the use of Digital Rights Management
market of digital content, this results in information (DRM) [6][7] to control the access and use of streamed
prosperity and provides new distribution channels, lower video can degrade the quality of the broadcast (stream) of
costs and fewer barriers. any digital contents through internet or telecommunication
The development of the broadband network allows the network.
exchange, the download and the diffusion through the Peer In order to study the use impact of DRM technology, we will
to Peer networks, and perfect numerical reproduction of a use MATLAB/Simulink to simulate real time DRM control
digital content. streaming video over a bandwidth-limited communication
Moreover, the use of technologies which are at the channel.
same time sophisticated and simple to handle as well as It is necessary to specify rules stating the use conditions of
the provision of a powerful reading equipment of digital the digital contents. These rules are often expressed in the
contents facilitate the task to circumvent technical form of a license which is a kind of contract between a
protection measure of digital contents. supplier of a digital content and a consumer. A language to
Now industry is demanding urgently an efficient mechanism express licenses is needed. The Rights Expression Language
for e-Content protection. Thus DRM systems [1][2][3] were (REL) chosen was the standardized MPEG-21 REL [8][9]
designed and implemented to take up the challenge to witch is simple and sufficiently expressive in order to meet
protect the copyright holder’s revenue by protecting their the requirements of the streaming videos over networks.
works against illegal use based in secure architecture[4][5]. The reminder of this paper is organized as follow: In section
These systems authorize only controlled rights associated 2 we present our main contribution which consists of
with digital contents. introducing DRM technologies to control user rights for a
Traditional analog video is sent as a continuous stream of streamed video in real time. Then Experimental results are
electrical signals over a cable from the source (camera) to presented. The paper concludes in section III.
the destination such as a video monitor. Digital technology
and IP has changed that. With this new type of video, a
digital camera translates the viewed image into digital
(IJCNS) International Journal of Computer and Network Security, 47
Vol. 2, No. 9, September 2010

2. Main Contributions and Experimentation The DRM process is as follow:

3.6 Studied Model 1-The User request a play right for the video streamed.
The Figure1 illustrates the video streaming scenario studied 2-The DRM block parse the license XML based with a
which consists of 3 parts: A video streaming source server parser
(Blue block, Fig.2), video end user (Brown block, Fig.2) and 3-The DRM block evaluate the license according to the user
a bandwidth-limited communication network (Green block, request
Fig.2). The implementation of DRM access control can be 4-If the play right exist then the user can play the video
done either in the server side or in the end user side. 5-If the play right doesn’t exit then a message will be played
informing the user that he/she is not authorized to play the
video.
Video End
Video Source User The MPEG-21REL Embedded MATLAB Function Block is
Server inserted to the studied model to control user rights for the
video streamed.

We have two possibilities to implement the control: a)-In the


video streaming server side or b)-in the end user video
player side.

Bandwith -limited a)-In the video streaming server side:


communication channel In the video source block (Fig.3), the embedded function is
Figure 1. Video streaming over networks scenario studied inserted to control the user rights before the video can be
streamed in the case of a video on demand or IPTV [12].
The Red elements illustrate the added DRM controls:
The Model (Fig.2) presents the studied scenario to
implement DRM control which is simulated using
MATLAB/Simulink. It illustrates a communication system
that sends frames of video data over a channel. By dropping
frames that wait too long to reach the end user, the model
also illustrates how to use timeouts to implement point-to-
point timing constraints. The video file used for the
simulation is vipmen.avi (120*160, 30fps).

Figure 3. Video Source block with DRM components


inserted to control user rights for the streamed video.
b)-in the end user video player side:
In the end user video block (Fig.4), the MPEG-21 REL
Embedded MATLAB function can be inserted to control the
user rights for the video before to be played. The Red
elements illustrate the added DRM controls:

Figure 2. Video streaming Over Bandwidth-limited


Communication Channel

3.7 Introduction of DRM technologies

In order to implement DRM to control the use of the video


in real time we have chosen the standardized MPEG 21
Rights Expression Language to express the licenses [11].
These licenses, XML based, contain the rights that a user
has and will be evaluated during DRM process. The license Figure 4. Video End User block with DRM components
can be located in the source server side or in the end user inserted to control user rights for the streamed video.
side.
48 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 9, September 2010

The added DRM controls components are: 3.8 Simulation and Experimentation
1- The Embedded MATLAB function block (Fig.5)
that we call “MPEG-21 REL” which consists of 2.3.1 Without DRM Control
controlling the video user rights by parsing the When we run the simulation without DRM components
XML license file (Fig.8), we have the Scopes that plot the following
quantities to evaluate performance:

-uThe size of the “input buffer” shows how many frames


are waiting in the channel. Frames accumulate in the input
buffer until they either progress through the channel or time
out.

-vThe size of the “reception buffer” shows how many


Figure 5. MPEG 21 REL Embedded MATLAB Function frames are waiting in the receiver. Before T=10, frames
After parsing the XML license file and evaluating the user accumulate in the reception buffer because the block labelled
rights, if the user is not authorized to view the video the Flow Control keeps the path closed between the receiver's
constant K will be equal to “0” (Fig.10b): buffer and the video viewer.
Y1= U1 -wThe status of “underflow” events in the receiver has a
Y2= K*U2 , K =0 in order to transmit the video value of 1 whenever the Release Gate block permits a frame
Y3= U3 without the green colour to deliver to advance from the reception buffer to the video viewer, but
Y4= 0 a bad quality of video. no frame is present.
Y5= 0
Y6= 0 -xThe “communication delay per frame” shows how
long the channel delays each frame that has advanced
Yi: The R,G,B output variables beyond the input buffer. In this model, the delay is periodic.
Uj,: The R,G,B input variables
i=1,2,3,4,5,6.
-yThe “number of timed-out entities” shows how many
J=1,2,3.
frames have timed out in the channel. The end user does not
After parsing the XML license file and evaluating the user receive these frames and can observe a gap in the video if
rights, if the user is authorized to view the video (Fig.10a): many consecutive frames time out.
Y1= 0
Y2= 0
u v w
Y3= 0
Y4= U1
Y5= U2
Y6= U3

2- The MATLAB Insert Text block which consists of


watermarking the streamed video by inserting a
text informing the user that he/she is not
authorized to play the video. The video viewed by
the user is a bad quality of the original video. x y

Figure 8. Simulation results without introducing DRM


controls
Figure 6. Insert Text MATLAB block
2.3.2 With DRM Control
The simulation using DRM control gives the same video
3- The MATLAB Add element which consists of
performance as the original model without using DRM
adding the outputs signals.
control for the case of authorized user (Fig.8, Fig.10a) or for
the non-authorized user (Fig.9, Fig.10b). This shows that
our implementation of the DRM control don’t affect the
Figure 7. Add MATLAB block network performance and the quality of the streamed video.
(IJCNS) International Journal of Computer and Network Security, 49
Vol. 2, No. 9, September 2010

have find “XMLTree” [13] which is an XML parser toolbox


that can be added to the set path of MATLAB. The XML
Parser is an XML 1.0 parser written in MATLAB. It aims to
be fully conforming. This XML Parser is embedded in a
MATLAB class (@xmltree) including powerful methods to
import, export, access and modify the data. Xpath[14] is
used for addressing parts of the XML document. This
program is free software, distributed under a GPL License.

3. Conclusion
In this paper we have used DRM technologies to control
access and use of real time streamed videos in the case of a
bandwidth-limited network.
The video quality and network performance was not affected
Figure 9. Simulation results using DRM control. by DRM processing. This makes it suitable to enable real
time DRM e-commerce. Further research is under way to
convert the program into VHDL to be tested on FPGA since
the MATLAB software support the conversion operation to
VHDL if all the components or programs are synthesizable
like the parser used. In order to secure licenses to be
tampered with we can convert them to binary format. Also
more complex licenses will be studied in order to deal with
complex business model and the XML licenses time parsing.

4. References
a) Output video for authorized user b) Output video for non authorized user

Figure 10. Comparison of the output videos


[1] O. Patkanen, M. Valimaki, “Towards a Framework for
Digital Rights Management”, hiit.fi, [Online].
The MPEG 21 REL license file Alice.xml used for the Available:
simulation is as follow: Alice has the right to play the video www.hiit.fi/~opp/pub/drm_framework_iec2000.pdf.
18 times. [Accessed: Sept. 15, 2010].
[2] P. Herwann, “Rapport DRM DESS,”, Université
<?xml version="1.0"?> René Descartes, Paris, France, 2004.
<license> [3] P. Chantepie. M. Herubel, F. Tarrier, “Mesures
<!-- This is the first entryofour Address Book--> Techniques de Protection des œuvres & DRMS-1ère
<grant lastModified="04-Jun-2009"> Partie : Un état des lieux,” Rapport Inspection générale
<keyHolder> de l'administration des affaires culturelles, Paris,
Alice
France, 2003.
</keyHolder>
<mx:play/>
[4] M. Rafi, M. Eleuldj, “Digital Rights Management,” In
<digitalResource> Proceedings of the La conférence Internationale sur les
<nonSecureIndirect URI="urn:video.world/999999/video/vpimen.avi"> Nouvelles Technologies de la Répartition (NOTERE),
</nonSecureIndirect> 2007.
</digitalResource> [5] M. Rafi, M. Eleuldj, Z. Guennoun,“ Digital rights
<allConditions> management adaptable architecture,” In Proceedings of
<exerciseLimit> the 3rd IEEE International Conference on Information
<count> & Communication Technologies: from Theory to
18 Applications (ICTTA), 2008.
</count>
[6] M. Rafi, M. Eleuldj, “Les jetons dans les DRM,” In
</exerciseLimit>
</allConditions> Proceedings of the Les 2ème JOurnées Scientifiques en
</grant> Technologies de l'Information et de la Communication
</license> (JOSTIC), 2008.
[7] M. Rafi, M. Eleuldj, O.Diouri, “ Digital rights
management-A developpement of a media player,”
In Proceedings of the Scientific Research Outlook &
Constraint of Simulation Technology Development in the Arab World’08-SRO5,
MATLAB don’t have a toolbox that can be used to parse ICT Conference, 2008.
XML files. We have had to find a parser compatible with [8] M. Rafi, M. Eleuldj, Z. Guennoun, “Improvement of
MATLAB to perform the simulation. After hard search, we MPEG-21 Rights Expression Language,” In
Proceedings of the 7th ACS/IEEE International
50 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 9, September 2010

Conference on Computer Systems and Applications


(AICCSA), 2009.
[9] “Moving Picture Expert Group. ISO/IEC JTC/SC29
WG11”, chiariglione.org, [Online]. Available:
http://www.chiariglione.org/mpeg/index.htm.
[Accessed: Sept. 15, 2010].
[10] “MATLAB Software”, mathworks.com, [Online].
Available: http://www.mathworks.com. [Accessed:
Sept. 15, 2010].
[11] “MPEG 21 REL”, chiariglione.org, [Online].
Available:
http://www.chiariglione.org/mpeg/technologies/mp21-
rel/index.htm. [Accessed: Sept. 15, 2010].
[12] “IPTV (Internet Protocol Television)”, wikipedia.org,
[Online]. Available:
http://en.wikipedia.org/wiki/IPTV. [Accessed: Sept.
15, 2010].
[13] “XMLTREE:XML toolbox for MATLAB”, artefact.tk,
[Online]. Available:
www.artefact.tk/software/matlab/xml. [Accessed: Sept.
15, 2010].
[14] “XML Path Language (XPath)”, w3.org, [Online].
Available: http://www.w3.org/TR/xpath. [Accessed:
Sept. 15, 2010].

You might also like