基于数字水印和加密技术的移动DRM系统的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着移动互联网技术的高速发展及3G运营牌照的发放,我国正式步入了3G时代。用户随时随地都可以接入互联网,访问感兴趣的多媒体数字内容。几乎所有的版权作品数字化以后都能通过网络提供给用户。然而,由于网络环境的开放性以及数字内容拷贝的简易性,各种侵权行为及盗版作品疯狂泛滥,数字内容的知识产权保护和版权管理等问题变得越发突出,并已成为数字世界中一个非常紧迫的议题。
     本文首先对数字版权管理(Digital Rights Management,DRM)及数字水印技术的发展现状进行研究,在此基础上提出一种改进的移动DRM系统模型。该模型涉及的关键技术有数字加密、数字签名、数字水印、数字权限描述及权限转移机制以及移动代理等。数字水印作为传统DRM系统最有力的补充,提供真假鉴定、权限控制、使用跟踪以及版权验证等功能,使版权保护更加全面,符合未来发展趋势。
     本文将基于开放移动联盟(Open Mobile Alliance,OMA)2.0标准的DRM系统与数字水印等信息安全技术有效结合,设计了一种新的移动DRM系统方案。文中分析了该方案的内容保护机制及系统安全性,解决了现有移动DRM系统存在的不足,并设计了DRM在移动终端上的实现方法,阐述了移动终端DRM控制器中各实体的职责和信息流,以及终端与服务器之间的接口协议等。
     深入研究了数字水印技术,分析了一般水印算法的特性及水印攻击类型,着重讨论了用于版权保护的典型水印算法,并从空间域和变换域中各选择了一种代表性算法进行具体分析及仿真测试。实验结果表明,空域算法实时性较强,计算复杂度低,且水印容量较大,缺点是鲁棒性很差,无法抵抗常见的信号处理攻击。而变换域算法鲁棒性要比空域算法好得多,且基于量化的水印算法还可以实现盲检测,但对噪声较敏感。
     通过对抖动调制水印算法进行改进,提出了结合JPEG量化表和Watson模型的扩展变换抖动调制水印算法。对该算法进行鲁棒性测试,并与相关算法进行比较,测试结果显示改进的水印算法综合性能最佳,可抵抗常见信号处理(如几何变换、滤波以及JPEG压缩等)的攻击,同时缓解了量化水印算法对噪声的敏感程度,可应用于移动DRM系统中,为数字媒体提供版权管理与保护。最后提出了一种在移动DRM系统中同时应用鲁棒水印和脆弱水印为数字内容提供双重保护的方案。
Along with the rapid development of mobile Internet technology and the issuance of 3G operating licenses in China, We formally entered the 3G era. Users can access the Internet anywhere to browse their interesting digital contents. Almost all copyright works can provide for users after digitalization. However, due to the openness of the network and the simplicity of copying, all kinds of infringement and piracy are crazy rampant. Intellectual property protection and copyright authentication of digital content have become increasingly prominent, even a very urgent issue in the digital world.
     Based on the study of the digital rights management and digital watermarking technology, the paper put forward a new mobile DRM system model. There are six key technology involved in this model, that is digital encryption, digital signature, digital watermarking, permissions description and transfer, XML language, and mobile agents. Digital watermarking as the most powerful complement to traditional DRM system, it provide more comprehensive protection of copyright by authenticity of identification, use of control and tracking.
     The paper designed a new mobile DRM system combining the theory of OMA DRM 2.0 with digital watermarking, analyzed the system's content protection mechanisms and security, solved the existing system deficiency, gave the realization in mobile terminal, described the responsibilities of the entities and information flow in the DRM controller, and designed the interface between terminal and server.
     Further researched on digital watermarking algorithm, introduced the attack types and characteristics of algorithm, analyzed the typical watermarking algorithm for copyright protection, and presented a simulation test for each representative algorithm in spatial domain and transform domain. Experimental results show that algorithms in spatial domain have real-time property, smaller computational complexity and larger capacity, but poor robustness that can not resist common signal processing attacks. While robustness of algorithm in transform domain is much better than in space. Quantization-based watermarking algorithm can be detected blindly, but more sensitive to noise.
     In order to improve the performance of DM, this paper proposes a watermarking algorithm that is a combination of JPEG quantization table and Watson model for the spread transform dither modulation. The simulation results show that the algorithm can be applied to Mobile DRM system for copyright management and protection because it has stronger robustness that it can resist common attacks for digital watermark and alleviate the sensitivity effectively to noise for quantization watermarking algorithm. Finally, put forward an application solution using robust watermarking and fragile watermarking to provide dual protection for digital content in the mobile DRM system.
引文
[1]顾伟泉.数字版权管理的技术体系分析.情报杂志,2004,23(10):37-39页
    [2]何佳鸣.基于密码和数字水印技术的DRM系统的研究.北京工业大学硕士学位论文,2008
    [3]范刻峰,莫玮,裴庆祺.数字版权管理技术及应用研究进展.电子学报,2007,35(6):35-38页
    [4]肖利,罗蕾.OMA DRM 2.0安全机制研究与解决.计算机应用,2006(26):53-55
    [5]王颖,肖俊,王蕴红.数字水印原理与技术.北京:科学出版社,2007
    [6]李琳.移动数字版权管理的现状与展望.江西科技师范学院学报,2007(12):102-104页
    [7]李良.新型DRM系统的架构及实现.北京化工大学硕士学位论文,2009
    [8]张路宜.CDMA手机数字音乐DRM方案研究.移动通信,2009(7):80-83页
    [9]Atul Kahate著.邱仲潘等译.密码学与网络安全.北京:清华大学出版社,2005
    [10]赵泽茂.数字签名理论.北京:科学出版社,2007
    [11]金聪.数字水印理论与技术.北京:清华大学出版社,2008
    [12]张玲华,胡玉平.基于数字水印的DRM关键技术分析.科技经济市场,2009(2):7-8页
    [13]杨义先,钮心忻.数字水印理论与技术.北京:高等教育出版社,2006
    [14]刘新伟.移动数字版权管理及相关水印技术研究.华中科技大学硕士学位论文,2005
    [15]王爱华,孙世兵,朱本军.数字权限描述语言及其比较研究.开放教育研究,2005(8):77-81页
    [16]张茹,杨榆,张啸.数字版权管理.北京:北京邮电大学出版社,2008
    [17]胡隽明.数字水印及其在数字版权管理系统中的应用研究.西安电子科技大学硕士学位论文,2008
    [18]袁征.基于密码和水印的数字版权保护技术研究.北京邮电大学博士学位论文,2007
    [19]朱秀玲.基于大容量SIM卡的移动DRM系统研究与应用.北京邮电大学硕士学位论文,2008
    [20]Eun-Jun Yoon,Jeung-Seop Kim.Efficient OMA DRM v2.0 ROAP for Protecting a Rights Object for a Device.2008 Second International Conference on Future Generation Communication and Networking Symposia,2008:9-12P
    [21]Zonghua Liu, Guangqing Liu, Byungwook Lee.An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier. Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.3-6P
    [22]魏景芝,杨义先,钮心忻.OMA DRM技术体系研究综述.电子与信息学报,2008(3):46-50页
    [23]肖利.OMA数字版权管理的研究及实现.电子科技大学硕士学位论文,2007
    [24]张茹,周琳娜,杨义先.移动通信数字版权管理系统模型研究.哈尔滨工业大学学报,2006(7):691-693页
    [25]谢俊,陈明,李晓明.流媒体版权管理系统的研究与实践.计算机应用与软件,2009(7):23-25页
    [26]程春玲,张登银.实现DRM系统的一种新方案.计算机技术与发展,2009(7):166-169页
    [27]黄晓芳,赖欣等.计费公平的安全移动数字版权管理方案.电子科技大学学报,2009(3):296-300页
    [28]袁莉.数字水印的应用及攻击类型.长春师范学院学报(自然科学版),2005(11):33-34页
    [29]Winne D A, Knowles H D, Bull D R,and Canagarajah C N.An investigation of an MPEG-4 embedded spatial digital watermark developed for tamper detection and characterization. In Proceedings of IEEE International Conference on Consumer Electronics(ICCE'2003), June 17-19,2003:64-65P
    [30]Brassil J, Low S, Maxemchuk N, Gorman L O.Electronic marking and identification techniques.Proceedings of ICIP,1994:1278-1287P
    [31]Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding. IBM System Journal,1996,35 (3&4):313-336P
    [32]Li Q, Cox I J. Using perceptual models to improve fidelity and provide invariance to volumetric scaling for quantization index modulation watermarking. In Proceedings of 2005 IEEE International Conference on Acoustics,Speech, and Signal Proceeding, March 18-23,2005, Philadelphia, PA, USA,1-4P
    [33]Wang S H, Lin Y P. Wavelet tree quantization for copyright protection watermarking. IEEE Transactions on Image Processing,2004,13 (2):154-165P
    [34]Wu Min. Joint security and robustness enhancement for quantization based data embedding.IEEE Transactions on Circuits and Systems for Video Technology,2003, 13 (8):831-841P
    [35]Kim H, Beak Y, Oh H S, and Lee H K.A robust watermarking method for high quality image. In Proceedings of IEEE International Conference on Consumer Electronics(ICCE'99), June 22-24,1999,106-107P
    [36]Piva A. DCT-based watermark recovering without resorting to the uncorrupted original images. In Proceedings of ICIP,1997, No.1,520-523P
    [37]Hsu C.T, Wu J L. Hidden signature in images. In Proceedings of ICIP,1996, No3, 223-226P
    [38]Wang H J M, SuPC, Kuo C C J. Wavelet-based digital image Processing,1999,8 (11):1534-1548P
    [39]Kundur D, Hatzinakos D. Digital watermarking using multiresolution wavelet decomposition. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing,Seattle, Washington,1998, No.5,2969-2972P
    [40]Joseph J K, Roanaidh K O, and Pun T.Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing,1998,66(3):303-318P
    [41]Su P C, Wang H J,Kuo C C J.Digital watermarking in region of interest. IS&T Image Processing/Image Quantity/Image Capture Systems(PICS), Savannah Georgia,1999, No.4,25-28P
    [42]朱晓冬,苑森淼等.空域数字水印算法.吉林大学学报,2003(4):56-59页
    [43]高会军,刘文霞等.一种基于LSB算法的数字水印改进技术.现代电子技术,2009(13):86-88页
    [44]傅德胜,蔡玮.基于BMP图像的LSB改进算法的研究及实现.微计算机信息,2007(23):307-309页
    [45]刘彤,裘正定.一种基于量化的图像水印方案.通信学报,2002,23(10):89-93
    [46]王向阳,杨红颖,邬俊.一种基于自适应量化的半脆弱图像水印算法.小型微型计算机系统,2006,11(6):840-847页
    [47]肖俊,王颖.自适应抖动调制图像水印算法.电子与信息学报,2009(3):552-555
    [48]B Chen, G W Wornell. Provably Robust Digital Watermarking. Proceedings of the 1999 Multimedia Systems and Applications. Bellingham:Society of Photo-Optical Instrumentation Engineers,1999,3845:43-54P
    [49]B Chen, G W Wornell. Quantization Index Modulation:A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transactions on Information Theory,2001,47 (4):1423-1443P
    [50]Lin ZHANG, Fengyong QIAN, Yi GAO, Yuesheng ZHU. A New Integration Scheme of Robust and Fragile for Secured Digital Watermarking.2008 ISECS International Colloquium on Computing, Communication, Control, and Management,2008, 358:312-316P
    [51]邹建成,杨玲,李国富.基于JPEG量化的数字图像水印容量估计.北方工业大学学报,2008(9):1-4页
    [52]孙晓霞,曹广志.基于Watson感知模型水印的讨论.现代电子技术,2009(7):76-78页
    [53]张专成,张殿富,闫小萍.一种鲁棒的基于DWT域自适应量化步长的图像盲水印算法.中国图像图形学报,2006(6):840-847页

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700