移动数字版权管理及相关水印技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机网络和通信技术的飞速发展,电子商务和2G、3G 移动网络的普及,促进了移动电子商务的普及和发展,数字媒体亦得到广泛应用,随之而来的数字媒体的知识产权保护和认证等问题也变得日益突出,已成为数字世界中一个非常紧迫的重要议题。数字水印作为传统加密方法的有效补充手段,是一种可以在开放的网络环境下保护版权和认证来源及完整性的数字版权管理新技术。近年来,基于数字水印的数字版权管理技术研究已成为多媒体信息处理与应用领域的一个研究热点。
    目前国内外对数字版权管理的研究主要集中在有线网络,在移动数字版权管理上仅见初步的研究。随着移动通信网络和移动终端技术的发展,移动网络中数字版权管理将愈来愈得到重视。为保护媒体作者和交易各方的权益,针对普遍存在的数字媒体盗版问题,结合移动网络的特点,在移动数字版权管理系统模型W-MDRM(Watermark based Mobile Digital Right Management)及相关水印技术展开了研究。
    在分析研究数字版权管理技术现状及存在的问题基础上,指出了移动数字版权管理对数字水印技术的基本要求; 针对移动终端CPU 处理速度较低的特性,结合对称与非对称密码技术和数字水印技术,提出了一种基于数字水印技术的移动数字版权管理系统模型W-MDRM; 在分析研究空域和变换域数字水印算法的计算复杂度和鲁棒性,以及移动终端特性的基础上,利用W-MDRM 模型中可信的移动终端,提出了一种改进的空域数字水印算法,基于对称和非对称数字水印嵌入技术,实现数字媒体版权认证管理和数字媒体在移动终端的使用控制; 给出了改进的水印算法在数字移动终端模拟器上的具体实现。实验结果表明,所改进的水印算法鲁棒性强,计算复杂度低,适应移动终端上的数字媒体使用控制和移动网络中的版权跟踪。模型W-MDRM 充分利用可信移动终端的特性和数字水印技术,在保护媒体作者利益的情况下利用无线网络实现数字媒体的发布,具有重要的研究和实际应用意义。
Electronic commerce has become a huge business and a driving factor in the development of the Internet. Online delivery services are well established and will, with the advent of evolved 2G and 3G mobile networks, soon be complemented by their wireless counterparts. Furthermore, online delivery of digital media, such as MP3 audio or video, is very popular and will become an increasingly important part of e-commerce and mobile e-commerce (m-commerce). However, a major obstacle for digital media distribution is the possibility of unlimited consecutive copying in the digital domain, which threatens intellectual property rights. Digital rights management systems are required to protect rights and business’profit. Digital watermarking makes possible to embed a watermark (such as identification data, serials number, text or image etc.) to multimedia documents allowing copyright protection, secret communication, document authentication and tracing mechanisms. To solve digital media’s piracy problem, thinking of the chacter of mobile value service, a watermark based mobile digital right management (W-MDRM) system model is proposed in this paper. This model employ digital watermark technology and mobile handset’s speciality, to protect the owner and the publisher’s profit. And then the digital media can be distributed using mobile network.
    In the W-MDRM model, digital watermark, which is the part of the basis support subsystem of the model, are very important. It is not only the basis of the whole model’s using control and transmission control, but also is the effective way to protect the author’s right and the publisher’s profit. At present, the research on DRM is mainly focus in the wired netwrok, and there is some work is relaton to mobile DRM. But along with the development of wireless network, the mobile DRM will become more and more important.
    In this paper, we consider the popular problem of piracy on digital media, a mobile digital rights management and security technology model based on watermark technology
    is presented, the components of the system and the mechanism of each module are also discussed. In this system, the information of the credible mobile terminal, would be embedded into the digital media twice by two different methods, symmetric and asymmetric digital watermark technology. And then the digital media will be sent to the legal customer by mobile communication network. The asymmetry watermark is used for copyright protection and symmetric watermark is used for usage control. The system is used for mobile terminal presented in this paper overcome the drawback of watermark on the fixed internet. This protects the rights of the digital media owner and publisher, and corresponds with the development of the mobile communication.
引文
[1] Johnson N F, Jajodia S. Exploring steganography: Seeing the unseen. IEEE Computer, 1988, Vol.31(2):26~34
    [2] Aderson R J, Needham R M, Shamir A. The steganographic file system. Proc of Information Hiding’98, 1998:73~82
    [3] M. Miller, I. J. Cox and J. A Bloom.Watermarking in the real world: An Application ro DVD. Proc. Wksp. Multimedia and Security at ACM Multimedia 98, Bristol, U.K., Sept. 1998:1496~1502
    [4] 沈庆国.移动多媒体信息系统特征分析.移动通信,2001,8:18~22 页
    [5] Mobile Media Asia Pacific Limited. 基于英特尔个人互联网用户端架构的IceStream Service. http://www.intel.com/cn/gb/wirel ess/case/IceStream.htm
    [6] Mark Stamp. Digital Rights Management: The Technology Behind the Hype. Journal of Electronic Commerce Research, Sept. 2002:73~81
    [7] Van Schyndel, R.G. Tirkel, A.Z. Osborne etc. A digital watermark Image Processing. Proceedings ICIP-94., IEEE International Conference, Nov. 1994, Vol.(2):13~16, 86~90
    [8] Cox I J, Kilian J, Leighton T and Shamoon T. A Secure, Robust Watermark for Multimedia. Workshop on Information Hiding. Cambridge, Cambridge, UK, Number 1174 in Lecture Notes in Computer Science. Springer-Verlag, Jun. 1996:185~206
    [9] Zeng Wendjun and Liu Bede. On Resolving Rightful Ownerships for Digital Images by Invisible Watermarks. Proc. Of IEEE on Image Processing, 1997,Vol.85(7):552~555
    [10] Christine I. Podichuk and Wenjun Zeng. Image-Adaptive Watermarking Using Visual Models. IEEE Journal on Selected Areas in Communications, 1998, Vol.16(4):525~539
    [11] Xia Xiang-Gen, Boncelet C G and Arce G R. Wavelet transform based watermark for digital images. Watermarking Special Issue of Optic Express, Dec 1998, Vol.3(12):97~111
    [12] Xia Xiang-Gen, Charles G. Boncelet, and Gonzalo R. Arce. A Multiresolution Watermark for Digital Images. Proc. Of IEEE, 1997,Vol.85(9):248~251
    [13] Wengwu Zhu, Zixiang Xiong, and Ya-Qin Zhang. Multiresolution Watermarking for Images and Video: A Unified Approach. Proc. Of International Conference on Image Processing, 1998, Vol.5(7):465~468
    [14] Ioannis Pitas. A Method for Watermark Casting on Digital Image. IEEE Trans. On Circuit and Systems for Video Technology, 1998, Vol. 8(6):775~780
    [15] I. Pitas. A Method for Signature Casting on Digital Image. Proc. Of International Conference on Image processing, 1996, Vol. 3(2):215~218
    [16] G. Voyatzis and I. Pitas. Chaotic Watermarks for Embedding in the Spatial Digital Image Domain. Proc. Of the IEEE, 1998,Vol.86(11):432~436
    [17] Raymond B. Wolfgang, Christine I. Podilchuk, and Edward J.Delp. Perceptual Watermarks for Digital Images and Video. Proc. Of the IEEE, 1999, Vol.87(7):1108~1126
    [18] Raymond B. Wolfgang and Edward H. Delp. A Watermark for Digital Images. Proc. Of IEEE, 1996,Vol.84(2):219~222
    [19] Mohan S. Kankanhalli, K. R. Ramakrishnan, and Rajmohan. Content Based Wateramrking of Images. Proc. Of the 6th ACM International Conference on Multimedia, 1998:61~70
    [20] Gang Qu and Miodrag Potkonjak. Analysis of Watermarking Techniques for Graph Color Problem. Proc. Of the 1998 IEEE/ACM International Conference on Computer-aided Design, 1998:190~193
    [21] Puate J. and Jordan F. Using Fractal Compression Scheme to Embedded a Digital Signature into An Image. Proc. Of SPIE, 1996:94~102
    [22] Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on Copyright Marking System. David Aucsmith, Ed., Information Hiding, Second International Workshop, IH’98, Proceedings, LNCS 1525, Springer-Verlag, 1998:219~239
    [23] Fabien A. P. Petitcolas and Ross J. Anderson. Evaluation of Copyright Marking Systems. Proc. Of IEEE multimedia Systems(ICMCS’99), 1999, Vol.4 (1):574~579,7~11
    [24] OMA-Download-ARCH-v1-0-20020610–a; OMA-Download-DRMCF-v1-0-20030 619–c; OMA-DRMREL-v1-0-20020913-a.; OMA-Download-DRM-v1-0-20020905-a; OMA-ERELD-DRM-V1-0-20021104-c.http://www.openmobilealliance.org
    [25] Sonera Plaza Ltd MediaLab. Digital Rights Management White Paper. Feb. 2002:10~37
    [26] Qiong Liu, Reihaneh Safa-vi-Naini and Nicholas Paul. Digital Rights Management for Content Distribution. AISW2003 Sheppard, 2003:87~102
    [27] Bruce Schneier. Aplied Cryptography, Protocols, algorithms, and source codeine (Second Edtion) . Wiley&sons, Inc.1996:241~285
    [28] Stefan Katzenbeisser, Fabien A.P.Petitcolas. 信息隐藏技术一隐写术与数字水印.北京:人民邮电出版社,2001:43~67 页
    [29] Steven Bumet, Stephen Paine. 密码工程实践指南.冯登国译.北京:清华大学出版社,2001:231~265 页
    [30] 李忠源,郭全成,任亚萍.图像中的信息隐含及水印技术.电子学报,2000,Vol.28(4):60~62 页
    [31] 张世永.网络安全原理与应用.北京:科学出版社,2003:113~154 页
    [32] C.S.Lu, H.Y.M.Liao and C.J.Sze. Combined watermarking for image authentication and protection. in Proc. IEEE Conf. Multimedia Expo, USA, 2000, Vol.3:1415~1418
    [33] 李重武,倪惜珍.认证理论与技术,微型机与应用,1999, Vol.27(1):137~164 页
    [34] Frank Hartung and Friedhelm Ramme. Ericsson Research. Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications. IEEE Communications Magazine November 2000:78~84
    [35] 胡汉平,王祖喜,吴晓刚等.动态密码无线传输方法.中国专利:99116517.9, 2003-5-28. 1~13 页
    [36] Christine I. Podilchuk, and Edward J. Delp. Digital Watermarking: Algorithms and Applications. IEEE Signal Processing Magazine, July 2001:33~46
    [37] Ping Wah Wong, Nasir Memon. Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Transactions on Image Processing, Oct. 2001,Vol.10(10):1593~1601
    [38] M.Kutter, Petitcolas F A P. A Fair Benchmark for Image Watermarking Systems. Electronic Imaging 99: Security and Watermarking of Multimedia Content, SPIE Proc, San Jose, CA, Jan.1999, Vol.3657(7):426~432
    [39] Deepa Kundur, Dimitrios Hatzinakos. Digital Watermarking Using Multiresolution Wavelet Decomposition. Proc IEEE Int Conf on Acoustics, Speech and Signal Processing, 1998(5):2969~2972
    [40] 牛夏牧,陆哲明,孙圣和.彩色数字水印嵌入技术.电子学报,2000 年9 月,Vol. 28(9):10~12 页
    [41] Mauro Barni, Franco Bartolini, and Alessandro Piva. Improved Wavelet-Based Watermarking Through Pixel-Wise Masking. IEEE Transactions on Image Processing, May 2001, Vol.10(5):36~51
    [42] R. Z. Liu and T. N. Tan. SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Trans. on Multimedia , 2002, Vol. 4 (1):121~128

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700