473,699 Members | 2,433 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Digital rights management for images

Hello!

I have some images (for instance in .jpg files) which I would like to apply
digital rights management for, i.e. that only authorized users may wiew then
using their www browser, i.e. if a non-authorized user is attempting to
address the .jpg file with a url, or for that sake gets a copy of the image
file from an authorized user, the un-authorized user should not be able to
view the image.

Does some of the .NET or other Microsoft products offer a solution to the
mentioned problem?
Best regards,

Henrik Dahl
Dec 28 '06 #1
10 3157
Hi,

No, there is nothing like, the best you can do is placing the images inside
a password protected folder.
but if such a user gets a copy of the image there is no protection at all
and he can do anything with it.
Cheers,

--
Ignacio Machin
machin AT laceupsolutions com

"Henrik Dahl" <He********@com munity.nospamwr ote in message
news:un******** ******@TK2MSFTN GP03.phx.gbl...
Hello!

I have some images (for instance in .jpg files) which I would like to
apply digital rights management for, i.e. that only authorized users may
wiew then using their www browser, i.e. if a non-authorized user is
attempting to address the .jpg file with a url, or for that sake gets a
copy of the image file from an authorized user, the un-authorized user
should not be able to view the image.

Does some of the .NET or other Microsoft products offer a solution to the
mentioned problem?
Best regards,

Henrik Dahl


Dec 28 '06 #2
Hello again!

OK. Actually the user does not need to get the .jpg file. For instance it
could be that the .jpg file could be wrapped in something, e.g. a file of a
different kind, but supporting digital rights management in some way, which
the user could then get.
Best regards,

Henrik Dahl

"Ignacio Machin ( .NET/ C# MVP )" <machin TA laceupsolutions .comskrev i en
meddelelse news:ev******** ******@TK2MSFTN GP02.phx.gbl...
Hi,

No, there is nothing like, the best you can do is placing the images
inside a password protected folder.
but if such a user gets a copy of the image there is no protection at all
and he can do anything with it.
Cheers,

--
Ignacio Machin
machin AT laceupsolutions com

"Henrik Dahl" <He********@com munity.nospamwr ote in message
news:un******** ******@TK2MSFTN GP03.phx.gbl...
>Hello!

I have some images (for instance in .jpg files) which I would like to
apply digital rights management for, i.e. that only authorized users may
wiew then using their www browser, i.e. if a non-authorized user is
attempting to address the .jpg file with a url, or for that sake gets a
copy of the image file from an authorized user, the un-authorized user
should not be able to view the image.

Does some of the .NET or other Microsoft products offer a solution to the
mentioned problem?
Best regards,

Henrik Dahl



Dec 28 '06 #3
On Thu, 28 Dec 2006 23:40:00 +0100, Henrik Dahl wrote:
Hello again!

OK. Actually the user does not need to get the .jpg file. For instance it
could be that the .jpg file could be wrapped in something, e.g. a file of a
different kind, but supporting digital rights management in some way, which
the user could then get.

Best regards,

Henrik Dahl
That's an interesting idea you could create a custom file type and have the
image data as an attribute of your new file type -- then you could enforce
your DRM using a custom viewer application, perhaps an ActiveX component or
a J# applet.

But alas there's little you can do for the showstopper that is the Print
Screen button or the ULTIMATE showstopper - a camera :)

--
Bits.Bytes
http://bytes.thinkersroom.com
Dec 28 '06 #4
Hi Henrik,

Rad [Visual C# MVP] has provided the basic idea of this approach. The key
DRM of this approach is using the undocumented file format to wrap the
image so that other vendor's image browser can not read it without your
company's file format specification.

Actually, DRM is out of the scope of .Net or C#. DRM is hot area in
computer science. Normally, the software DRM solution is not reliable
without special hardware support. Here is some comments, for your
information:
1. Undocumented custom file format. It is not uncommon for the hacker to
disassemble your application image browser to understand the logic of
parsing this undocumented file. After analysising the file format, it is
easy for the hacker to read the image part from the custom file format. DRM
lost now.
2. Although you may have encrypt the image file on the disk with enough
strong algorithm, the image still have to be decrypted in the memory before
viewing by your own application. Then the hacker process can still position
the decrypted JPG in the memory and dump/save it to the disk. DRM lost
again.

Please refer to the book below, if you need more information about how
hacker does the above 2 technologies:
"Reversing: Secrets of Reverse Engineering (Paperback) "
http://www.amazon.com/Reversing-Secr...m/dp/076457481
7/sr=1-1/qid=1167379224/ref=pd_bbs_sr_1/002-0699431-9284048?ie=UTF8 &s=books

Another famous case study is Sony Music's DRM for its CD, which uses the
kernel-mode rootkit. This behavior is discovered by Mark Russinovich on his
wonderful blog below:
http://blogs.technet.com/markrussino...ny-rootkits-an
d-digital-rights-management-gone-too-far.aspx

However, using kernel-mode rootkit for DRM is also not perfect, Mark
Russinovich talks about how to use rootkit to defeat rootkit based DRM in
the article below:
"Using Rootkits to Defeat Digital Rights Management"
http://blogs.technet.com/markrussino...ing-rootkits-t
o-defeat-digital-rights-management.aspx

Using special hardware to decrypt and display the encrypted image is the
only perfect reliable way of implementing DRM, however, it is just a
principle solution, because many company can not afford the hardware based
solution.

Sorry, for the long comment, I just want to provide more information
regarding this interesting topic. The idea solution is based on your DRM
severity, in normal situation, the Rad [Visual C# MVP]'s solution is a good
balance, although you may add some type of encryption in file.

Happy New Year!

Best regards,
Jeffrey Tan
Microsoft Online Community Support
=============== =============== =============== =====
Get notification to my posts through email? Please refer to
http://msdn.microsoft.com/subscripti...ult.aspx#notif
ications.

Note: The MSDN Managed Newsgroup support offering is for non-urgent issues
where an initial response from the community or a Microsoft Support
Engineer within 1 business day is acceptable. Please note that each follow
up response may take approximately 2 business days as the support
professional working with you may need further investigation to reach the
most efficient resolution. The offering is not appropriate for situations
that require urgent, real-time or phone-based interactions or complex
project analysis and dump analysis issues. Issues of this nature are best
handled working with a dedicated Microsoft Support Engineer by contacting
Microsoft Customer Support Services (CSS) at
http://msdn.microsoft.com/subscripti...t/default.aspx.
=============== =============== =============== =====
This posting is provided "AS IS" with no warranties, and confers no rights.

Dec 29 '06 #5
"Jeffrey Tan[MSFT]" wrote:
[...]
Using special hardware to decrypt and display the encrypted image is the
only perfect reliable way of implementing DRM, however, it is just a
principle solution, because many company can not afford the hardware based
solution.
As Rad pointed out, even custom hardware isn't a perfect solution. You
can't stop someone from making a copy via the "analog hole" by pointing
a digital camera at the screen. There'll be some quality loss, but that
may be acceptable to the copiers.

There's no technical solution to this problem, short of giving your
customers cybernetic eye transplants or beaming an image directly into
their brains. The only real solution is at the business level: if your
ability to profit depends on preventing or detecting an activity that
simply cannot be prevented or detected, perhaps you should rethink the
business model.

Jesse

Dec 29 '06 #6
On Fri, 29 Dec 2006 08:13:48 GMT, je***@online.mi crosoft.com ("Jeffrey
Tan[MSFT]") wrote:
>However, using kernel-mode rootkit for DRM is also not perfect, Mark
Russinovich talks about how to use rootkit to defeat rootkit based DRM in
the article below:
"Using Rootkits to Defeat Digital Rights Management"
http://blogs.technet.com/markrussino...ing-rootkits-t
o-defeat-digital-rights-management.aspx
Here is the new (correct) URL to the above:
http://blogs.technet.com/markrussino...anagement.aspx

Good luck with your project,

Otis Mukinfus
http://www.arltex.com
http://www.tomchilders.com
Dec 29 '06 #7
Hi,
"Henrik Dahl" <He********@com munity.nospamwr ote in message
news:OL******** ******@TK2MSFTN GP03.phx.gbl...
Hello again!

OK. Actually the user does not need to get the .jpg file. For instance it
could be that the .jpg file could be wrapped in something, e.g. a file of
a different kind, but supporting digital rights management in some way,
which the user could then get.
Honestly I think you are after the holy gail , if a user can see it he can
do a number of things:
1- printscreen
2- take a photo

and those are only the more rustic

what I see that the sites that sells pictures do is insert a watermark in
the photo in such a way that you can still see the photo but with a text or
logo inside.

in anycase there is nothing in .net to allow this.
--
Ignacio Machin
machin AT laceupsolutions com
Dec 29 '06 #8
On Fri, 29 Dec 2006 11:37:26 -0500, Ignacio Machin ( .NET/ C# MVP ) wrote:
Hi,

"Henrik Dahl" <He********@com munity.nospamwr ote in message
news:OL******** ******@TK2MSFTN GP03.phx.gbl...
Honestly I think you are after the holy gail , if a user can see it he can
do a number of things:
1- printscreen
2- take a photo

and those are only the more rustic

what I see that the sites that sells pictures do is insert a watermark in
the photo in such a way that you can still see the photo but with a text or
logo inside.

in anycase there is nothing in .net to allow this.
Not sure I understand that -- are you saying there is nothing in .NET to do
watermarking? If so I believe you can use the Graphics.DrawSt ring() or
Graphics.DrawIm age() to layer some text or another image on top of an
existing image
--
Bits.Bytes
http://bytes.thinkersroom.com
Dec 29 '06 #9
Hi,

"Rad [Visual C# MVP]" <no****@nospam. comwrote in message
news:1g******** *******@thinker sroom.com...
On Fri, 29 Dec 2006 11:37:26 -0500, Ignacio Machin ( .NET/ C# MVP ) wrote:
>Hi,

"Henrik Dahl" <He********@com munity.nospamwr ote in message
news:OL******* *******@TK2MSFT NGP03.phx.gbl.. .
>Honestly I think you are after the holy gail , if a user can see it he
can
do a number of things:
1- printscreen
2- take a photo

and those are only the more rustic

what I see that the sites that sells pictures do is insert a watermark in
the photo in such a way that you can still see the photo but with a text
or
logo inside.

in anycase there is nothing in .net to allow this.

Not sure I understand that -- are you saying there is nothing in .NET to
do
watermarking? If so I believe you can use the Graphics.DrawSt ring() or
Graphics.DrawIm age() to layer some text or another image on top of an
existing image
I was refering to DRM really.

But neither the watermarking is supported in .net it's not as simple as
drawing a string or image, its' that you have to difuse it in such a way
that it does not affect the original image
Dec 29 '06 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
1945
by: Joan MacEachern | last post by:
Receive a free digital camera by registering for one of Sun's online security courses during the month of October. To receive your free digital camera, register for one of the following courses: * Administering Security on the Solaris Operating System * Network Security Using SunScreen EFS * Trusted Solaris 8 System Administration * Enterprise Security Assessment and Best Practices * Solaris Network Intrusion Detection
12
10691
by: Kim | last post by:
I have a .NET service sending mails using CDOEX. These mails I need to sign. I got a tip that I should use CAPICOM. That worked fine sending a mail with signature. BUT the problem is that I have to type the password for my certificate every time my program signs a mail :o( My program is a windows service running on a server so typing passwords is
7
7651
by: Guangxi Wu | last post by:
Hi all, Happy New Year. I am using SignedXML and an X509 certificate to digitally sign a SOAP message body and put the signature in the SOAP header for a B2B business application. Can you suggest which type of digital certificates from VeriSign is for this purpose? I checked VeriSign's web site but didn't find it obvious to decide.
6
11556
by: Matt Frame | last post by:
I have a client that has asked us to get a digital signature certificate and start digitally signing all files we pass between each other. I have heard of the subject and know about the certs but I have no idea how to do something like this with VB.Net. Has anyone done something like this or know where I can find out information how to perform the process of signing a document when sending it then checking one on receipt? Your help is...
1
1191
by: Student01001072 | last post by:
I am researching into Content-Based Image Retrieval from Digital libraries for my final year project, so when a search is carried out the images in the database will load according to its content, I have come up with the conclusion of using the colour histogram method to carry out his process using Microsoft VB. i want to star with creating a database with images this could be external or internal with VB.6 but i have no idea how to create...
1
1652
by: karry555 | last post by:
Hi guys... this is a sincere request and requirement.. i need serious help for doing this project using html and php along with MySql. I Need DAMS(Digital Asset Management System) to be implemented in a website using html and php. Kindly let me know. I will be ever grateful to u. Thank u karry
1
1672
by: pechar | last post by:
Hi guys, I have a Content Management System (CMS) which will be used by clients to update their site. The CMS has multiple users. What I'd like to implement is access rights. Some users are not allowed to update or can only view and not update certain sections of their site etc. I've read a lot about access rights and found out role based and page based methods of dealing with this. I am not planning to use role based rights since the...
0
905
by: ott.deb | last post by:
digital rights management crack http://cracks.12w.net F R E E
1
1317
by: bahamas | last post by:
We have a requirement where we need to enforce digital certificates on client machines. In abstract, the requirement is to have digital certificates installed in a limited set of machines in the client local network which certain users will need to use in order to gain login to the system. These users will hold different roles in the system. The idea is that we need to stop these users from login in to the system from any other machine except...
0
8687
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9174
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9034
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8914
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
7750
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
4376
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
3057
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
2347
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2009
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.