Secure Watermarking Protocols for Digital Content Transactions
碩士 === 國立中興大學 === 資訊科學與工程學系所 === 97 === As the digital technology had grown rapidly and the popularity of the Internet, digital media (such as music, images, movies etc.) have been adopted widely. It’s become more and more maturity about digital content transaction over Internet. However, this kind...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Online Access: | http://ndltd.ncl.edu.tw/handle/47209342563893893949 |
id |
ndltd-TW-097NCHU5394003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097NCHU53940032016-04-29T04:19:41Z http://ndltd.ncl.edu.tw/handle/47209342563893893949 Secure Watermarking Protocols for Digital Content Transactions 適用於數位內容交易的安全浮水印協定 Chin-Chang Chen 陳(王晉)璋 碩士 國立中興大學 資訊科學與工程學系所 97 As the digital technology had grown rapidly and the popularity of the Internet, digital media (such as music, images, movies etc.) have been adopted widely. It’s become more and more maturity about digital content transaction over Internet. However, this kind of trend also increases the risk of the unauthorized distribution of digital content. Therefore, digital content’s ownership or copyright protection has become an imperative issue. Buyer-seller watermarking protocol permit the seller inserts a unique digital watermark, without causing serious degradation, into digital content to be sold secretly. This unique digital watermark can be extracted from a replica found in the market. Using the extraction watermark mechanism, the seller can identify the truthfulness of the digital content clearly. And the ownership of the digital content can be protected through this way. In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it’s more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer’s right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer’s participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer’s watermark without decrypting it in our scheme. Hence, the proposed protocols become more practical. 陳金鈴 學位論文 ; thesis 58 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中興大學 === 資訊科學與工程學系所 === 97 === As the digital technology had grown rapidly and the popularity of the Internet, digital media (such as music, images, movies etc.) have been adopted widely. It’s become more and more maturity about digital content transaction over Internet. However, this kind of trend also increases the risk of the unauthorized distribution of digital content. Therefore, digital content’s ownership or copyright protection has become an imperative issue.
Buyer-seller watermarking protocol permit the seller inserts a unique digital watermark, without causing serious degradation, into digital content to be sold secretly. This unique digital watermark can be extracted from a replica found in the market. Using the extraction watermark mechanism, the seller can identify the truthfulness of the digital content clearly. And the ownership of the digital content can be protected through this way.
In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it’s more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer’s right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer’s participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer’s watermark without decrypting it in our scheme. Hence, the proposed protocols become more practical.
|
author2 |
陳金鈴 |
author_facet |
陳金鈴 Chin-Chang Chen 陳(王晉)璋 |
author |
Chin-Chang Chen 陳(王晉)璋 |
spellingShingle |
Chin-Chang Chen 陳(王晉)璋 Secure Watermarking Protocols for Digital Content Transactions |
author_sort |
Chin-Chang Chen |
title |
Secure Watermarking Protocols for Digital Content Transactions |
title_short |
Secure Watermarking Protocols for Digital Content Transactions |
title_full |
Secure Watermarking Protocols for Digital Content Transactions |
title_fullStr |
Secure Watermarking Protocols for Digital Content Transactions |
title_full_unstemmed |
Secure Watermarking Protocols for Digital Content Transactions |
title_sort |
secure watermarking protocols for digital content transactions |
url |
http://ndltd.ncl.edu.tw/handle/47209342563893893949 |
work_keys_str_mv |
AT chinchangchen securewatermarkingprotocolsfordigitalcontenttransactions AT chénwángjìnzhāng securewatermarkingprotocolsfordigitalcontenttransactions AT chinchangchen shìyòngyúshùwèinèiróngjiāoyìdeānquánfúshuǐyìnxiédìng AT chénwángjìnzhāng shìyòngyúshùwèinèiróngjiāoyìdeānquánfúshuǐyìnxiédìng |
_version_ |
1718252003486859264 |