In today's information-age
world, most libraries use traditional borrowing methods. These conventional
methods have some disadvantages such as torn and loss of books, and no access
to books at that moment. In this paper, to overcome such disadvantages, we
propose a novel e-book borrowing mechanism considering digital rights
management. By combining the techniques given in this paper, e-books are
protected against copying, distributing, printing and unauthorized use while
borrowing and using.
An infrastructure is designed
for users to access books through electronic devices. In this structure,
e-books are user-specific encrypted. Even if the e-book files are copied by
unauthorized users, the key cannot be accessed by the copied device since the
target platform doesn’t have this key. Thus, the borrowed book is prevented
from being used by an unauthorized user. Then, the borrowed books can be
checked via cloud system technologies by sharing resources between devices.
Moreover, even if the books are copied and distributed, the malicious user can
be found via watermarking. The main difference to the previous studies is that
QR code authentication, which is generated by public key cryptographic
techniques, enables the use of books on different devices.
In today's information-age world, most libraries use traditional borrowing methods. These conventional methods have some disadvantages such as torn and loss of books, and no access to books at that moment. In this paper, to overcome such disadvantages, we propose a novel e-book borrowing mechanism considering digital rights management. By combining the techniques given in this paper, e-books are protected against copying, distributing, printing and unauthorized use while borrowing and using.
An infrastructure is designed for users to access books through electronic devices. In this structure, e-books are user-specific encrypted. Even if the e-book files are copied by unauthorized users, the key cannot be accessed by the copied device since the target platform doesn’t have this key. Thus, the borrowed book is prevented from being used by an unauthorized user. Then, the borrowed books can be checked via cloud system technologies by sharing resources between devices. Moreover, even if the books are copied and distributed, the malicious user can be found via watermarking. The main difference to the previous studies is that QR code authentication, which is generated by public key cryptographic techniques, enables the use of books on different devices.
Primary Language | English |
---|---|
Subjects | Engineering |
Journal Section | Articles |
Authors | |
Publication Date | September 30, 2018 |
Submission Date | October 27, 2017 |
Published in Issue | Year 2018 Volume: 6 Issue: 3 |