数字水印应用协议及关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息和网络技术的发展,数字版权管理问题日益突出。密码学和数字水印技术被认为是解决数字版权管理问题的两种有效方法。传统的密码学技术侧重于对数字产品的访问控制和保密通信,但是对版权认证和盗版追踪问题显得力不从心。数字水印技术作为九十年代新兴的信息安全技术,正是由于数字版权保护的需要而产生和发展起来的。与传统的密码学技术相比,水印技术在多媒体数字产品的真伪鉴别和合法用户的盗版控制方面体现出无可比拟的优势。因此数字水印技术受到越来越多的专家、学者的重视。但是目前对于数字水印的研究多集中在算法和理论基础方面,而忽视了水印的应用协议和实施标准设计和制定。而优秀的应用协议和规范往往是数字水印具体应用中不可或缺的。没有一个安全高效的水印协议的支撑,再好的水印算法在应用中也可能出现安全性问题。因此数字水印应用协议研究是克服目前水印应用瓶颈的关键。
     论文主要工作和研究成果如下:
     (一)介绍了数字水印应用协议的关键技术,包括密码学基础和数字水印相关技术,重点分析了PKI、数字签名、数字指纹和水印攻击对策等技术,
     (二)针对目前水印协议在版权管理方面的缺陷和问题,给出了数字水印应用协议的设计思想和构建原则,
     (三)提出了一个具体的改进的新的数字水印应用协议。该协议在文献[17]的基础上,借助PKI技术,结合数字签名、数字信封数字水印等技术,而设计出的安全高效的数字水印应用协议。
     (四)详细分析了协议的版权管理效力和可行性。改进后的协议在安全性方面可以抵抗多种协议攻击和密码学中的中间人攻击,同时在有效保护版权的同时着重加强了合法消费者权益的保护,对商家和用户的欺诈行为进行了有效控制,达到了综合管理的目标和协议的公平性,此外协议的性能和效率也得到了显著提高。
With the development of information and network technologies, the problem of digital rights management have become increasingly prominent. Cryptography and digital watermarking technologies are considered effective methods to resolve the issue of digital rights management. Traditional cryptography technology focused on the access control and confidentiality communications of digital products, but for authentication and copyright piracy tracing it is insufficient. In the 1990s, as one of the emerging information security technologies, digital watermarking was created and developed to meet the need of digital copyright protection.Compared with the traditional cryptography technologies, digital watermarking has incomparable advantages in the identification of the authenticity of products and pirated control of legitimate users. Therefore digital watermarking technology is paid more attention by a growing number of experts and scholars. But more research of the digital watermarking focus on algorithms and theoretical basis, while ignoring the design of watermark application protocol and implementation. And excellent application protocol and norms are indispensable in the specific application of digital watermarking.Without a safe and efficient watermarking protocol, the best watermarking algorithm in the application may also have security problem. Therefore the research of digital watermarking application protocol is essencial to overcome the current bottleneck of watermarking application.
     The main works and research results of this article are as follows: (A)The key technologies of the watermarking protocol are introduced, including the basis of cryptography and digital watermarking technology, and the technologises of PKI, digital signatures, fingerprints and digital watermarking attack are analysed with emphasis.
     (B)In the light of shortcomings of the existing watermarking protocols, the principles of the protocol design and the thinking of creation is proposed.
     (C)Based on the literature[17], a new digital watermarking application protocol is proposed. Combined with PKI, digital signatures and digital envelope technologies, this watermarking protocol is safe and effective (D)a detailed analysis of the protocol's effectiveness of the copyright management and feasibility. In the aspect of security, this protocol can be resist many kinds of attacks about protocol and intermediate attack, while it has effective protection of copyright, and at the same time focuses on strengthening the protection of the legitimate rights and interests of consumers, controlling fraudulent conduct of merchants and users effectively and realizing the integrated management of objectives and the fairness of the protocol.And the performance and efficiency of the protocol have also been significantly enhanced.
引文
[1]俞银燕,汤帜数字版权保护技术研究综述计算机学报第28卷第12期,1957-1968
    [2]张晓林 数字权益管理技术 现代图书情报技术2001年第5期3-7
    [3]赵翔,郝林数字水印综述计算机工程与设计第27卷第11期1946-1950
    [4]L.Qiao,K.Nahrstedt.Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights Journal of Visual Communication and Image Representation Vol 9 No3,September1998 194-210.
    [5]N.Memon,P.W.WongA Buyer-Seller Watermarking Protocol IEEE 2001 vol.10643-649
    [6]Chin-Laung Lei,Pei-Ling Yu,Pan-Lung Tsai,and Ming-Hwa Chan An Efficient and Anonymous Buyer-Seller Watermaring Protocol IEEE TRANSACTIONS ON IMAGE PROCESSING VOL 13 NO.12 1618-1626
    [7]C.C Chang,C.Y Chung An Enhanced Buyer seller Watermarking Protocol Proceeding of ICCT 2003 1779-1783
    [8]牛少彰,江为强网络攻击与防御-理论与实践北京邮电大学出版社2006年
    [9]陈晓迪 签密的相关研究[学位论文]济南山东大学2007年
    [10]钮心忻信息隐藏与数字水印北京邮电大学出版社2004年
    [11]尹浩,林闯,邱锋等数字水印技术综述计算机研究与发展第42卷第7期1093-1099
    [12]张燕 安全数字水印协议的研究[学位论文]西安西安电子科技大学2003年
    [13]陈政 数字水印协议研究[学位论文]武汉武汉理工大学2006年
    [14]刘立刚,陈晓苏,胡蕾抗协议攻击的数字版权保护安全方案中山大学学报(自然科学版)第43卷增刊(2)83-86
    [15]武强信息安全中的数字水印协议研究[学位论文]成都西南交通大学2007年
    [16]刘子威 数字水印协议研究与应用[学位论文]广州中山大学2006年
    [17]陈晓苏,胡蕾,肖道举一个基于PKI和数字水印的数字版权保护框架模型计算机工程与科学第27卷第6期12-14
    [18]ZHANG Li-he,KONG Xiang-wei Digital Rights Management Independent of Terminals in Mobile Applications THE JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOMMUNICATIONS March 2007 Volumel4,Issue 1
    [19]张同庆 基于安全数字水印协议的DRM系统第五届中国通信学会学术年会 论文集北京电子工业出版社2008年2月241-246
    [20]肖菁,李建华基于数字签名的安全数字水印协议计算机工程与应用2006年第16期160-162
    [21]徐杰民,陈洁,肖云数字水印中的协议攻击研究计算机与现代化2004年第11期47-48,51
    [22]Zhang Ru,Yu Xiao-gang,Zhou Lin-na,etc.A New Watermarking Protocol of Copyright protection Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP'06)
    [23]毛琼,陈明奇,夏光升等安全数字水印体系的研究电子与信息学报第23卷第9期833-840
    [23]袁中兰,夏光升,温巧燕等数字作品著作权保护协议北京邮电大学学报2005,28 19-22
    [24]OMA DRM Architecture oma-drm-arch-v2_0_6-20040820-c http://www.openmobilalliance.org August 2004
    [25]OMA DRM Specification oma-drm-drm-v2_O-20041210-c http://www.openmobilalliance.org December 2004
    [26]夏光升信息隐藏技术研究[学位论文]北京北京邮电大学2003年
    [27]Mark Stamp著 Information Security Principles and Practice杜瑞颖赵波等译 信息安全原理与实践电子工业出版社2007年
    [28]牛少彰 信息安全概论 北京邮电大学出版社2004
    [29]Piyali Mandal,Ashish Thakral,Shekhar Verma Watermark Based Digital Rights Management Proceedings of the International Conference on Information Technology Coding and Computing(ITCC'05)
    [30]Valerio Rosset,Cleber Vini cios Filippin,Carla Merkle Westphall A DRM Architecture to Distribute and Protect Digital Contents Using DigitalLicenses Proceedings of the Advanced Industrial Conference on Telecommunications /Service Assurance with Partial and Intermittent Resources Conference /ELearning on Telecommunications Workshop
    [31]陈明奇,钮心忻,杨义先数字水印的攻击方法电子与信息学报 Vol.23No.7 2001 705-711
    [32]J.Dittmann,M.Steinebach,L.C.Ferri Watermarking Protocols for Authentication and Ownership Protection Based on Timestamps and Holograms Security and Watermarking of Multimedia ContentsIV Proceedings of SPIE Vol.4675 2002 240-251.
    [33]Y Q.Zhuang,J.Q.Wu,F.Duan.A Semi-trusted Third Party Watermark Protocol and Implement Framework 5th International Symposium on Test and Measurement,ShenZhen China JunO 1-05,2003 162-166
    [34]王玛PKI应用研究[学位论文]西安西安电子科技大学2006

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700