Secure Watermarking Protocols for Digital Content Transactions

碩士 === 國立中興大學 === 資訊科學與工程學系所 === 97 === As the digital technology had grown rapidly and the popularity of the Internet, digital media (such as music, images, movies etc.) have been adopted widely. It’s become more and more maturity about digital content transaction over Internet. However, this kind...

Full description

Bibliographic Details
Main Authors: Chin-Chang Chen, 陳(王晉)璋
Other Authors: 陳金鈴
Format: Others
Language:zh-TW
Online Access:http://ndltd.ncl.edu.tw/handle/47209342563893893949
id ndltd-TW-097NCHU5394003
record_format oai_dc
spelling ndltd-TW-097NCHU53940032016-04-29T04:19:41Z http://ndltd.ncl.edu.tw/handle/47209342563893893949 Secure Watermarking Protocols for Digital Content Transactions 適用於數位內容交易的安全浮水印協定 Chin-Chang Chen 陳(王晉)璋 碩士 國立中興大學 資訊科學與工程學系所 97 As the digital technology had grown rapidly and the popularity of the Internet, digital media (such as music, images, movies etc.) have been adopted widely. It’s become more and more maturity about digital content transaction over Internet. However, this kind of trend also increases the risk of the unauthorized distribution of digital content. Therefore, digital content’s ownership or copyright protection has become an imperative issue. Buyer-seller watermarking protocol permit the seller inserts a unique digital watermark, without causing serious degradation, into digital content to be sold secretly. This unique digital watermark can be extracted from a replica found in the market. Using the extraction watermark mechanism, the seller can identify the truthfulness of the digital content clearly. And the ownership of the digital content can be protected through this way. In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it’s more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer’s right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer’s participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer’s watermark without decrypting it in our scheme. Hence, the proposed protocols become more practical. 陳金鈴 學位論文 ; thesis 58 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中興大學 === 資訊科學與工程學系所 === 97 === As the digital technology had grown rapidly and the popularity of the Internet, digital media (such as music, images, movies etc.) have been adopted widely. It’s become more and more maturity about digital content transaction over Internet. However, this kind of trend also increases the risk of the unauthorized distribution of digital content. Therefore, digital content’s ownership or copyright protection has become an imperative issue. Buyer-seller watermarking protocol permit the seller inserts a unique digital watermark, without causing serious degradation, into digital content to be sold secretly. This unique digital watermark can be extracted from a replica found in the market. Using the extraction watermark mechanism, the seller can identify the truthfulness of the digital content clearly. And the ownership of the digital content can be protected through this way. In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it’s more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer’s right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer’s participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer’s watermark without decrypting it in our scheme. Hence, the proposed protocols become more practical.
author2 陳金鈴
author_facet 陳金鈴
Chin-Chang Chen
陳(王晉)璋
author Chin-Chang Chen
陳(王晉)璋
spellingShingle Chin-Chang Chen
陳(王晉)璋
Secure Watermarking Protocols for Digital Content Transactions
author_sort Chin-Chang Chen
title Secure Watermarking Protocols for Digital Content Transactions
title_short Secure Watermarking Protocols for Digital Content Transactions
title_full Secure Watermarking Protocols for Digital Content Transactions
title_fullStr Secure Watermarking Protocols for Digital Content Transactions
title_full_unstemmed Secure Watermarking Protocols for Digital Content Transactions
title_sort secure watermarking protocols for digital content transactions
url http://ndltd.ncl.edu.tw/handle/47209342563893893949
work_keys_str_mv AT chinchangchen securewatermarkingprotocolsfordigitalcontenttransactions
AT chénwángjìnzhāng securewatermarkingprotocolsfordigitalcontenttransactions
AT chinchangchen shìyòngyúshùwèinèiróngjiāoyìdeānquánfúshuǐyìnxiédìng
AT chénwángjìnzhāng shìyòngyúshùwèinèiróngjiāoyìdeānquánfúshuǐyìnxiédìng
_version_ 1718252003486859264