Oh, sorry, I just missed that this was solely a fun question without real-world relevance, and that suggestions are supposed to provide a scenario for a programming exercise, because the correct answer, if the question would be serious, would be that there is no solution that actually can work. Maybe that's why it is called “soft-DRM” – not because it doesn't get as much into the way as “hard-DRM” does but because it is easy to remove. Additionally, probably the identifier of another person could be faked, which then would be blamed for unauthorized distribution.
In this case, I would suggest to investigate if time stamps of the files in an bundled e-book file package can be used, because nobody would check differences in minutes and seconds, which also could be legitimate information as result of the e-book creation process.
|