基于水印技术的版权保护协议的研究与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
本文在对数字版权保护及其基本体系结构、相关技术进行深入研究的基础上,针对解决版权保护及版权纠纷问题,提出了版权保护协议系统(RPPS)模型,该模型由许可证申请子协议、身份验证子协议、版权注册子协议、水印验证子协议和纠纷仲裁子协议五个子协议组成。在协议的描述中,采用五元组的操作向量[CLI,OP,TOOL,OBJ,RESULT],描述协议各部分操作机制,通过对协议系统的安全分析得出结论,RPPS模型可以有效地防止非法用户对版权信息进行的未经授权检测、未经授权去除、未经授权嵌入,抵抗其针对版权水印进行去除攻击、几何攻击、密码攻击和协议攻击,提供了安全可靠的数字作品发布环境。
     最后,参照RPPS模型思想,设计实现了基于水印技术的版权保护系统WDRM(Watermarking based DRM),并将一种基于图像DCT变换的鲁棒水印算法在系统中实现,为数字图像的版权人提供版权保护服务。
With the computer becomes an indispensable tool in people’s daily life, the development of digital process has been gradually accelerated. However since digital products can be copied, modified and sent easily, there are lots of piracy and copyright infringement on the internet. Copyright disputes are happening all the time and getting worse and worse. In order to protect Intellectual Property and promote the healthy development of modern IT industry, the problem of how to resolve the Intellectual Property rightly and efficiently is becoming the focus of attention. So we put forward a new technical called Digital Rights Management (DRM) to protect Intellectual Property by technical method in their whole cycle.
     DRM has its own basic system structure, including Content Server, License Server and Client Server, working corperately. An integrated DRM is a giant management system which needs lots of areas of knowledge; digital watermark is one of them. There are robust watermark and fragile watermark. We use robust watermark to embed watermark into original product with rights information. We could detect the watermark when we need to distinguish the real righter and resolve right dissensions. But none of the robust watermark arithmetic could resist all of attacks. We can not resolve right dissensions by watermarking only, because they are not absolutely safe.
     This paper put forward Rights Protect Protocol System (RPPS) Model in this background. It is supported by watermark technology to resolve problems on policy lay. It brings in a credible third party DRPC, which is responsible to embed and detect the watermark. Any copyrighter enrolls in DRPC before publishing their digital products. DRPC can distinguish the real righter and resolve dissensions. The model is composed by five child protocols, which includes Apply License Protocol (ALP), Affirm Identity Protocol (AIP), Register Rights Protocol (RRP), Detect Watermark Protocol (DWP), and Arbitrate Dissension Protocol (ADP). This paper describe the model by symbol system, and devise operate-vector to simulate every step of operating. The operate-vector has 5 members like [CLI, OP, TOOL, OBJ, RESULT], CLI presents the sender of operating, OP presents the type of operating, TOOL presents the condition of operating, OBJ presents the object of operating, RESULT presents the result of operating. All of these would make programming easily.
     The righter could apply license from DRPC by ALP, which is the first step of the model. Only the righter who owns license can receive right protection later. The information of license include license ID, public key of righter, name of righter, and so on; One side of the communication can make sure of identity of the other side by AIP, preventing criminal imitate partner. RRP is the most important part of RPPS. The owner applies property protection by RRP. DRPC embeds identity information into the product by robust watermark. DRPC refuses apply if it detects that the product has been watermarked before. The owner can make sure whether his product has been enrolled successfully or not by DWP, then he can publish the product safely. The owner can apply arbitrate dissension to DRPC when he believes his property was infringed by ADP, DRPC estimates the real owner by watermark arithmetic of detection and time stamp to provide evidences to the court. After analyzing the security of RPPS, this paper can make the following conclusions: RPPS can provide safe right protecting, preventing illegal behaviors. The righter have a safe publishing environment in RPPS frame.
     This paper have designed a WDRM system for protecting rights and resolving rights dissension. The system adopts centralized management mode based on RPPS idea. It is partitioned into 2 parts: Client and Server. Client is responsible for the applying functions in RPPS frame. Server is responsible for the real disposing functions. Server is maintained by DRPC to prevent unsafe factors in client. The system adopts three-layer structure: applying layer, logic layer, and data layer. Applying layer provides the human-machine interface; users can obtain all operations’interface in RPPS by it. Logic layer finishes all of the operations of a series of protecting rights, including UNI, LS, EC, and CA. Database is the main part of data layer, keeping communication information and flowing information.
     This paper also take a robust image watermark algorithm based on image DCT domain, which is a blind detection algorithm. The system can provide rights protection for image products and safe publishing environment. It also meets the demand of designing.
引文
[1] Alexander T J,Special issues on copyright and privacy,IEEE Journal of Selected Area in Communications,1998,16(4).
    [2] William Rosenblatt, William Trippe, Stephen Mooney. Digital Rights Management: Business and Technology. New York: M&T Books,2002.
    [3] Digital Rights Management Architecture. http://www.dlib.org/dljb/june01/iannella/o6iannella.html.
    [4] Garnett N.,Digital rights management,copyright,and napster,ACM SIGecom Exchanges,2001,2(2):1~5.
    [5] Fetscherin M,Evaluating consumer acceptance for protected digital content,Lecture Notes in Computer Science 2770,2003,301~320.
    [6] Yu Yin-Yan,Tang Zhi,A hardware adaptive copyright protection mechanism for digital contents,Journal(Natural Science)of Peking University(JNSPU),2005,41(5):800~805.
    [7] 华先胜,石青云,易损数字水印若干问题的研究,中国图象图形学报,2001,6(5):1089—1095.
    [8] 张立和,杨义先,钮心忻,软件水印综述,软件学报,2003,14(2).
    [9] 李淑云,李高峰,数字音频水印技术发展及应用,计算机应用,2007,27.
    [10] Swanson M,Zhu B,Multiresolution scene based video watermarking using perceptual models,IEEE Journal on Selected Areas in Communications,1998,16(4),540~550.
    [11] Microsoft Corporation. Architecture of Windows Media Rights Manager.http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx.
    [12] Felten E W,A skeptical view of DRM and fair use,Communications of the ACM,2003,46(4):57~59.
    [13] 俞银燕, 汤帜. 数字版权保护技术研究综述. 计算机学报, 2005,12,28(12):1957~1968.
    [14] Kwok S H,Watermark-based copyright protection system security.Communications of the ACM,2003,46(10):98~101.
    [15] Memon,Ping Wah Wong,A Buyer-Seller Watermarking Protocol, Proceedings of the Second Workshop on Multimedia Signal Processing,1998,278~283.
    [16] Erickson J,Fair use,DRM,and trusted computing,Communications of the ACM,2003,46(4):34~39.
    [17] Naumovich G,Memon N D,Preventing piracy,reverse engineering and tampering,IEEE Computer,2003,36(7),64~71.
    [18] 司端锋, 王益冬, 潘爱民, 叶志远. 多媒体数字版权保护系统的研究和实现. 北京大学学报(自然科学版), 2005,09, 41:792~799.
    [19] Katzenbeisser S. On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking. Proceedings of the 5th International Query Processing and Multimedia Issues in Distributed Systems Workshop.Munich: IEEE Computer Society Press, 2001. 815~819.
    [20] 杨义先,钮心忻,数字水印理论与技术,2006,83~86.
    [21] Kanhalli M.S,Rajmohan,Ramakrishnan,Content based watermarking of images,Effelsberg W,ed.ACM Multimedia 98-Electronic Proceedings,ACM Press,1998.
    [22] Petitcolas F,Anderson R,Attacks on copyright marking systems, Information Hiding:2nd International Workshop,1998,218~238.
    [23] Alper Koz and A.Aydm Alatan.Video watermarking using temporal sensitivities of human visual system.Workshop on Transmitting, Processing and watermarking Multimedia Contents 2003.
    [24] Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere. Hybrid Static-Dynamic Attacks against Software Protection Mechanisms. DRM’05, 2005(11):75~82.
    [25] Katzenbeisser S,Petitcolas F,信息隐藏技术——隐写术与水印,吴新丘译,人民邮电出版社,2001.
    [26] 陈明奇,钮心忻,数字水印的研究进展和应用,通信学报,2001,22(5).
    [27] F.Hartung,M.Kutter. Multimedia watermarking techniques. Proc. of IEEE,1999,87(7): 1079-1107.
    [28] 杨波.现代密码学. 清华大学出版社, 2003.08.
    [29] Craver S.Memo, Yeo B et al. Can invisible watermarks resolve rightful ownership. In:SPIE Electronic Imaging:Storage and Retrieval of Image and Video Databases.1997,3022 :310~321.
    [30] Wong PW,A public key watermark for image verification and authentication[A].Proceedings of the International Conference on Image Processing[C].Chicago:IEEE Computer Society Press,1998, l:425~429.
    [31] Fridrich J. Methods for tamper detection in digital images. Proceedings of the Multimedia and Security Workshop at ACM Multimedia’99. Orlando: ACM Press, 1999. 29~33.
    [32] Cox I, Kilian J, Thomson F,et al. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing,1997,6(12):1673~1687.
    [33] Yin Kangkang,Shi Jiaoying,Multimedia watermarking systems and their attack analysis,Computer Science,1999,26(10),44~48.
    [34] V.Solachidis,A.Tefas,A benchmarking protocol for watermarking methods,2001 IEEE Int. Conf. on Image Processing,7~10.
    [35] William Stallings. 密码编码学与网络安全—原理与实践. 电子工 业出版社. 2004.01.
    [36] Mohanty SP,A DCT domain visible watermarking technique for image. IEEE International Conference on Multimedia, 2000,1029~1032.
    [37] 王晟. C++Builder数据库开发经典案例解析. 清华大学出版社, 2005.03.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700