473,382 Members | 1,766 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,382 software developers and data experts.

Digital rights management for images

Hello!

I have some images (for instance in .jpg files) which I would like to apply
digital rights management for, i.e. that only authorized users may wiew then
using their www browser, i.e. if a non-authorized user is attempting to
address the .jpg file with a url, or for that sake gets a copy of the image
file from an authorized user, the un-authorized user should not be able to
view the image.

Does some of the .NET or other Microsoft products offer a solution to the
mentioned problem?
Best regards,

Henrik Dahl
Dec 28 '06 #1
10 3120
Hi,

No, there is nothing like, the best you can do is placing the images inside
a password protected folder.
but if such a user gets a copy of the image there is no protection at all
and he can do anything with it.
Cheers,

--
Ignacio Machin
machin AT laceupsolutions com

"Henrik Dahl" <He********@community.nospamwrote in message
news:un**************@TK2MSFTNGP03.phx.gbl...
Hello!

I have some images (for instance in .jpg files) which I would like to
apply digital rights management for, i.e. that only authorized users may
wiew then using their www browser, i.e. if a non-authorized user is
attempting to address the .jpg file with a url, or for that sake gets a
copy of the image file from an authorized user, the un-authorized user
should not be able to view the image.

Does some of the .NET or other Microsoft products offer a solution to the
mentioned problem?
Best regards,

Henrik Dahl


Dec 28 '06 #2
Hello again!

OK. Actually the user does not need to get the .jpg file. For instance it
could be that the .jpg file could be wrapped in something, e.g. a file of a
different kind, but supporting digital rights management in some way, which
the user could then get.
Best regards,

Henrik Dahl

"Ignacio Machin ( .NET/ C# MVP )" <machin TA laceupsolutions.comskrev i en
meddelelse news:ev**************@TK2MSFTNGP02.phx.gbl...
Hi,

No, there is nothing like, the best you can do is placing the images
inside a password protected folder.
but if such a user gets a copy of the image there is no protection at all
and he can do anything with it.
Cheers,

--
Ignacio Machin
machin AT laceupsolutions com

"Henrik Dahl" <He********@community.nospamwrote in message
news:un**************@TK2MSFTNGP03.phx.gbl...
>Hello!

I have some images (for instance in .jpg files) which I would like to
apply digital rights management for, i.e. that only authorized users may
wiew then using their www browser, i.e. if a non-authorized user is
attempting to address the .jpg file with a url, or for that sake gets a
copy of the image file from an authorized user, the un-authorized user
should not be able to view the image.

Does some of the .NET or other Microsoft products offer a solution to the
mentioned problem?
Best regards,

Henrik Dahl



Dec 28 '06 #3
On Thu, 28 Dec 2006 23:40:00 +0100, Henrik Dahl wrote:
Hello again!

OK. Actually the user does not need to get the .jpg file. For instance it
could be that the .jpg file could be wrapped in something, e.g. a file of a
different kind, but supporting digital rights management in some way, which
the user could then get.

Best regards,

Henrik Dahl
That's an interesting idea you could create a custom file type and have the
image data as an attribute of your new file type -- then you could enforce
your DRM using a custom viewer application, perhaps an ActiveX component or
a J# applet.

But alas there's little you can do for the showstopper that is the Print
Screen button or the ULTIMATE showstopper - a camera :)

--
Bits.Bytes
http://bytes.thinkersroom.com
Dec 28 '06 #4
Hi Henrik,

Rad [Visual C# MVP] has provided the basic idea of this approach. The key
DRM of this approach is using the undocumented file format to wrap the
image so that other vendor's image browser can not read it without your
company's file format specification.

Actually, DRM is out of the scope of .Net or C#. DRM is hot area in
computer science. Normally, the software DRM solution is not reliable
without special hardware support. Here is some comments, for your
information:
1. Undocumented custom file format. It is not uncommon for the hacker to
disassemble your application image browser to understand the logic of
parsing this undocumented file. After analysising the file format, it is
easy for the hacker to read the image part from the custom file format. DRM
lost now.
2. Although you may have encrypt the image file on the disk with enough
strong algorithm, the image still have to be decrypted in the memory before
viewing by your own application. Then the hacker process can still position
the decrypted JPG in the memory and dump/save it to the disk. DRM lost
again.

Please refer to the book below, if you need more information about how
hacker does the above 2 technologies:
"Reversing: Secrets of Reverse Engineering (Paperback) "
http://www.amazon.com/Reversing-Secr...m/dp/076457481
7/sr=1-1/qid=1167379224/ref=pd_bbs_sr_1/002-0699431-9284048?ie=UTF8&s=books

Another famous case study is Sony Music's DRM for its CD, which uses the
kernel-mode rootkit. This behavior is discovered by Mark Russinovich on his
wonderful blog below:
http://blogs.technet.com/markrussino...ny-rootkits-an
d-digital-rights-management-gone-too-far.aspx

However, using kernel-mode rootkit for DRM is also not perfect, Mark
Russinovich talks about how to use rootkit to defeat rootkit based DRM in
the article below:
"Using Rootkits to Defeat Digital Rights Management"
http://blogs.technet.com/markrussino...ing-rootkits-t
o-defeat-digital-rights-management.aspx

Using special hardware to decrypt and display the encrypted image is the
only perfect reliable way of implementing DRM, however, it is just a
principle solution, because many company can not afford the hardware based
solution.

Sorry, for the long comment, I just want to provide more information
regarding this interesting topic. The idea solution is based on your DRM
severity, in normal situation, the Rad [Visual C# MVP]'s solution is a good
balance, although you may add some type of encryption in file.

Happy New Year!

Best regards,
Jeffrey Tan
Microsoft Online Community Support
==================================================
Get notification to my posts through email? Please refer to
http://msdn.microsoft.com/subscripti...ult.aspx#notif
ications.

Note: The MSDN Managed Newsgroup support offering is for non-urgent issues
where an initial response from the community or a Microsoft Support
Engineer within 1 business day is acceptable. Please note that each follow
up response may take approximately 2 business days as the support
professional working with you may need further investigation to reach the
most efficient resolution. The offering is not appropriate for situations
that require urgent, real-time or phone-based interactions or complex
project analysis and dump analysis issues. Issues of this nature are best
handled working with a dedicated Microsoft Support Engineer by contacting
Microsoft Customer Support Services (CSS) at
http://msdn.microsoft.com/subscripti...t/default.aspx.
==================================================
This posting is provided "AS IS" with no warranties, and confers no rights.

Dec 29 '06 #5
"Jeffrey Tan[MSFT]" wrote:
[...]
Using special hardware to decrypt and display the encrypted image is the
only perfect reliable way of implementing DRM, however, it is just a
principle solution, because many company can not afford the hardware based
solution.
As Rad pointed out, even custom hardware isn't a perfect solution. You
can't stop someone from making a copy via the "analog hole" by pointing
a digital camera at the screen. There'll be some quality loss, but that
may be acceptable to the copiers.

There's no technical solution to this problem, short of giving your
customers cybernetic eye transplants or beaming an image directly into
their brains. The only real solution is at the business level: if your
ability to profit depends on preventing or detecting an activity that
simply cannot be prevented or detected, perhaps you should rethink the
business model.

Jesse

Dec 29 '06 #6
On Fri, 29 Dec 2006 08:13:48 GMT, je***@online.microsoft.com ("Jeffrey
Tan[MSFT]") wrote:
>However, using kernel-mode rootkit for DRM is also not perfect, Mark
Russinovich talks about how to use rootkit to defeat rootkit based DRM in
the article below:
"Using Rootkits to Defeat Digital Rights Management"
http://blogs.technet.com/markrussino...ing-rootkits-t
o-defeat-digital-rights-management.aspx
Here is the new (correct) URL to the above:
http://blogs.technet.com/markrussino...anagement.aspx

Good luck with your project,

Otis Mukinfus
http://www.arltex.com
http://www.tomchilders.com
Dec 29 '06 #7
Hi,
"Henrik Dahl" <He********@community.nospamwrote in message
news:OL**************@TK2MSFTNGP03.phx.gbl...
Hello again!

OK. Actually the user does not need to get the .jpg file. For instance it
could be that the .jpg file could be wrapped in something, e.g. a file of
a different kind, but supporting digital rights management in some way,
which the user could then get.
Honestly I think you are after the holy gail , if a user can see it he can
do a number of things:
1- printscreen
2- take a photo

and those are only the more rustic

what I see that the sites that sells pictures do is insert a watermark in
the photo in such a way that you can still see the photo but with a text or
logo inside.

in anycase there is nothing in .net to allow this.
--
Ignacio Machin
machin AT laceupsolutions com
Dec 29 '06 #8
On Fri, 29 Dec 2006 11:37:26 -0500, Ignacio Machin ( .NET/ C# MVP ) wrote:
Hi,

"Henrik Dahl" <He********@community.nospamwrote in message
news:OL**************@TK2MSFTNGP03.phx.gbl...
Honestly I think you are after the holy gail , if a user can see it he can
do a number of things:
1- printscreen
2- take a photo

and those are only the more rustic

what I see that the sites that sells pictures do is insert a watermark in
the photo in such a way that you can still see the photo but with a text or
logo inside.

in anycase there is nothing in .net to allow this.
Not sure I understand that -- are you saying there is nothing in .NET to do
watermarking? If so I believe you can use the Graphics.DrawString() or
Graphics.DrawImage() to layer some text or another image on top of an
existing image
--
Bits.Bytes
http://bytes.thinkersroom.com
Dec 29 '06 #9
Hi,

"Rad [Visual C# MVP]" <no****@nospam.comwrote in message
news:1g***************@thinkersroom.com...
On Fri, 29 Dec 2006 11:37:26 -0500, Ignacio Machin ( .NET/ C# MVP ) wrote:
>Hi,

"Henrik Dahl" <He********@community.nospamwrote in message
news:OL**************@TK2MSFTNGP03.phx.gbl...
>Honestly I think you are after the holy gail , if a user can see it he
can
do a number of things:
1- printscreen
2- take a photo

and those are only the more rustic

what I see that the sites that sells pictures do is insert a watermark in
the photo in such a way that you can still see the photo but with a text
or
logo inside.

in anycase there is nothing in .net to allow this.

Not sure I understand that -- are you saying there is nothing in .NET to
do
watermarking? If so I believe you can use the Graphics.DrawString() or
Graphics.DrawImage() to layer some text or another image on top of an
existing image
I was refering to DRM really.

But neither the watermarking is supported in .net it's not as simple as
drawing a string or image, its' that you have to difuse it in such a way
that it does not affect the original image
Dec 29 '06 #10
Hi Jesse,

Oh, yes, thanks for pointing this out. My statement mainly comes from the
binary code DRM, which has some exception with image DRM.

Anyway, since the image will finally be displayed to the end user, so I
eliminate the discussing of the digital camera. It is totally out of the
Computer Science scope and abilitiy :-).

Finally, happy New Year to all the community! Your effect makes the
newsgroup better and better!

Best regards,
Jeffrey Tan
Microsoft Online Community Support
==================================================
Get notification to my posts through email? Please refer to
http://msdn.microsoft.com/subscripti...ult.aspx#notif
ications.

Note: The MSDN Managed Newsgroup support offering is for non-urgent issues
where an initial response from the community or a Microsoft Support
Engineer within 1 business day is acceptable. Please note that each follow
up response may take approximately 2 business days as the support
professional working with you may need further investigation to reach the
most efficient resolution. The offering is not appropriate for situations
that require urgent, real-time or phone-based interactions or complex
project analysis and dump analysis issues. Issues of this nature are best
handled working with a dedicated Microsoft Support Engineer by contacting
Microsoft Customer Support Services (CSS) at
http://msdn.microsoft.com/subscripti...t/default.aspx.
==================================================
This posting is provided "AS IS" with no warranties, and confers no rights.

Jan 2 '07 #11

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Joan MacEachern | last post by:
Receive a free digital camera by registering for one of Sun's online security courses during the month of October. To receive your free digital camera, register for one of the following courses:...
12
by: Kim | last post by:
I have a .NET service sending mails using CDOEX. These mails I need to sign. I got a tip that I should use CAPICOM. That worked fine sending a mail with signature. BUT the problem is that I...
7
by: Guangxi Wu | last post by:
Hi all, Happy New Year. I am using SignedXML and an X509 certificate to digitally sign a SOAP message body and put the signature in the SOAP header for a B2B business application. Can you...
6
by: Matt Frame | last post by:
I have a client that has asked us to get a digital signature certificate and start digitally signing all files we pass between each other. I have heard of the subject and know about the certs but...
1
by: Student01001072 | last post by:
I am researching into Content-Based Image Retrieval from Digital libraries for my final year project, so when a search is carried out the images in the database will load according to its content, I...
1
by: karry555 | last post by:
Hi guys... this is a sincere request and requirement.. i need serious help for doing this project using html and php along with MySql. I Need DAMS(Digital Asset Management System) to be...
1
by: pechar | last post by:
Hi guys, I have a Content Management System (CMS) which will be used by clients to update their site. The CMS has multiple users. What I'd like to implement is access rights. Some users are not...
0
by: ott.deb | last post by:
digital rights management crack http://cracks.12w.net F R E E
1
by: bahamas | last post by:
We have a requirement where we need to enforce digital certificates on client machines. In abstract, the requirement is to have digital certificates installed in a limited set of machines in the...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.