WO2012088663A1 - 具有版权保护特性的数字水印作品及其生成方法 - Google Patents
具有版权保护特性的数字水印作品及其生成方法 Download PDFInfo
- Publication number
- WO2012088663A1 WO2012088663A1 PCT/CN2010/080376 CN2010080376W WO2012088663A1 WO 2012088663 A1 WO2012088663 A1 WO 2012088663A1 CN 2010080376 W CN2010080376 W CN 2010080376W WO 2012088663 A1 WO2012088663 A1 WO 2012088663A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- work
- information
- digital
- author
- trusted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/103—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copyright
Definitions
- the invention belongs to the field of digital media copyright protection, and particularly relates to a framework of a basic service system using digital watermark technology and cryptography technology, and a method for realizing digital media copyright protection and tracking illegal copy based on the system, in particular, a copyright protection feature.
- Digital watermark works and their generation methods.
- Encryption technology It can block direct access to the copy, but once the decrypted digital work will be completely exposed, without any protection, it can be copied and distributed without any restrictions.
- Trusted module Usually tamper-resistant hardware that can be used to protect decryption keys or other copyright protection policies developed by the publisher.
- the Trusted Module requires each user to have appropriate hardware for each digital work, which is not practical.
- existing software analysis techniques can easily disable their "tamper-proof" features.
- digital watermarking technology has embedded insignificant marks embedded in digitized data content.
- the embedded marks are usually invisible or invisible, but can be detected or extracted by some calculation operations.
- the digital watermark is closely integrated with the source data and hidden therein, becoming an inseparable part of the source data, and can survive some operations that do not destroy the use value or commercial value of the source data.
- copyright protection feature refers to at least two functions: copyright confirmation and illegal copy source tracking.
- some additional functions added to achieve these two basic functions such as watermark embedding, watermark extraction, illegal copy acquisition, etc., may be further provided.
- the invention is based on the deficiencies in the prior art, and provides a digital watermarked work with copyright protection features that can realize copyright confirmation and illegal copy source tracking and support digital media transactions and applications in various ways in reality.
- the generation method is based on the deficiencies in the prior art, and provides a digital watermarked work with copyright protection features that can realize copyright confirmation and illegal copy source tracking and support digital media transactions and applications in various ways in reality.
- the object of the present invention is achieved by the following route.
- Digital watermarked works with copyright protection features including digital work information and watermark information
- the watermark information is embedded in the digital work information
- the watermark information includes two watermarks signed by a trusted third party, one for identifying the author of the digital work, one for To identify the publisher, wherein the author information watermark includes an author identification number, and the publisher information watermark includes a publisher identification number and a work identification number, and the watermark information is used by the corresponding identification number after being signed by a trusted third party.
- a random sequence produced by the seed is produced by the seed.
- trusted third party refers to a copyright protection organization, a copyright registration center or a similar organization.
- the user uses the digital media for free on the author's authorized network or storage medium, which contains the author information watermark and the copyright information watermark.
- the author information watermark contains the author information watermark and the copyright information watermark.
- the system architecture of copyright protection of digital works is realized by digital watermarking technology and cryptography technology, and the versatility of digital media security services is realized and provided. It protects the copyright of digital media, security services for copyright confirmation, illegal copy tracking and source confirmation, and supports digital media transactions and applications in various ways.
- the author first obtains a client software from a trusted third party, including the calculation of the hash value hash function, the signature function, and two different watermark embedding functions.
- the author calculates the hash value of the original digital work and signs it with the private key. Together with the application information, it is sent to a trusted third party.
- the trusted third party looks up the author information base and the work information database for review. If the review is qualified, the trusted third party numbers the two information to generate the author identification number AUID and hash value.
- the identification number HashID, and the relevant information such as the applicant's name, valid ID number, application date, and hash hash value of the work are stored in the author information database and the work information database, and the trusted third party will sign the signed message (AUID, HashID) is sent to the author, the author embeds the message SignCA (AUID, HashID) as a watermark in the original digital work, producing the initial digital work,
- Publishers must obtain a client software from a trusted third party before requesting their own copyright from a trusted third party, including the calculation of the hash value function, the signature function, two different watermark embedding functions, and the registration of copyright.
- the publisher will send the Hash value of the original digital work, the author's private key signature, along with the author's Hash value of the original digital work, the publisher's signature and the application information, to the trusted third party, trusted.
- the two information numbers are numbered, and the issuer identification number RHID and the hash value identification number HashID are generated, and the applicant's name, valid ID number, application date, work hash value and other related information are stored in the publisher information database and the work information.
- Library a trusted third party will sign the self-signed message SignCA (RHID, HashID) is sent to the publisher, who publishes the message SignCA (RHID, HashID) as a watermark in the original digital work, producing an intermediate digital work.
- Purchaser P provides its own information P to the trusted third party before purchase.
- the trusted third party forms the purchaser identification number PID for the purchaser number and deposits it into the purchaser information database, and at the same time signs the message SignCA (PID) ) to the purchaser, when the purchase, the purchaser sends SignCA (PID) to the publisher RH and pays, the publisher uses the watermark algorithm to embed the message SignCA (PID) as a fingerprint in the intermediate digital work, forming the final digital work to send to the purchase By.
- the author and the publisher can obtain the client software from a trusted third party either by downloading it from a trusted third party's website or by directly obtaining a setup disk from a trusted third party.
- a trusted third party looks up the AU information base and the work repository for review. It can be guaranteed that the work does not have duplicate application rights, and this is also a process of reviewing the legality of copyright.
- the purchaser obtains the purchaser identification number PID from a trusted third party before purchase, thereby avoiding the participation of a trusted third party in each purchase process.
- Sending the hash value of the original digital work instead of sending the original digital work itself ensures that the risk of leaking the original digital work does not occur, and that each piece of work can only be claimed once for copyright, and there will be no unrestricted double application; RHID and HashID as a watermark embedded in digital works can effectively reduce the amount of watermark data, thus greatly reducing the requirements of the watermarking algorithm.
- Fingerprints are also a kind of watermark, except that each legal copy has a different watermark embedded in it, so the image is called a "fingerprint”.
- CA obtains controversial digital works, original works, and application information submitted by the conscriptor when applying for copyright, and obtains AUID and HashID, RHID and HashID from the controversial works, and obtains from the RH information base and the work information database according to AUID and HashID. Corresponding information, according to RHID and HashID from the RH information base and the work information library to get the corresponding information.
- the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database.
- the original digital work needs to be provided only when there is a dispute in the copyright of the work, and it is determined by the nature of the hash function that the original digital work is not forged.
- the need to compare two kinds of information is equivalent to giving the copyright double insurance.
- the CA extracts the AUID, RHID, HashID, and PID from it, and processes it in the following three cases:
- the AUID, RHID, and HashID can be extracted, and the PID cannot be extracted: the illegal communicator is RH himself;
- the object of the present invention can also be achieved by the following means.
- the watermark information also includes a watermark for identifying the purchaser, the watermark containing the purchaser identification number.
- Illegal copies in the form of optical discs need to be discovered by humans.
- Illegal copies scattered on the network need to be discovered by mobile agents.
- the mobile agent-based network detector is a distributed suspicious digital work detection module that provides support for active, real-time digital watermark based detection and tracking of illegal copies on the network.
- Multiple inspection agents are connected through the network and work together with the help of communication agents and database maintenance agents.
- the detection agent is a mobile agent, which receives the detection task and the target address from a trusted third party, moves to the new target host, completes the detection task of the suspicious digital work, or cooperates with multiple mobile agents. Carpet search for suspicious items on the web. Suspicious works and related information (such as discovery IP, discovery time, etc.) will be stored in the suspicious work library for confirmation by the trusted third party.
- mobile agents for illegal copy detection fully utilizes the characteristics of mobile agents' self-execution and dynamic adaptation, which can reduce network load and reduce network delay, reduce internal communication volume, and realize real-time automatic detection.
- Figure 1 Schematic diagram of the system.
- the legal digital works purchased by the user are embedded with three CA-signed watermarks, one for identifying digital media authors (author information) and one for identifying publishers. (Copyright information), another is used to identify the purchaser (digital fingerprint); when illegal copying of digital works is discovered through a mobile agent or storage medium, it is possible to determine who is illegally spreading based on the extracted three watermarks, for tracing An illegal copy provides evidence.
- the author information watermark includes an author ID (AUID), the copyright information watermark includes a publisher ID and a work ID, and the digital fingerprint watermark includes a purchaser ID, and the two watermarks are random sequences generated by the corresponding ID after being signed by the CA as a seed.
- Figure 2 shows the copyright information generation process.
- the author calculates the hash value calculated by his original digital work and signs it with the private key, along with the application information, to the CA.
- the CA looks up the AU information base and the work information library to ensure that the work does not have duplicate application rights, and this is also a process of reviewing the legality of the copyright. If the review is qualified, the CA numbers the two messages, generates the AUID and HashID, and stores the relevant information (applicant name, valid ID number, application date, work hash value, etc.) in the AU information base and the work information database.
- the CA will pass its own signed message SignCA (AUID, HashID) is sent to AU.
- AU will message SignCA (AUID, HashID) is embedded as a watermark in the original digital work, producing an initial digital work.
- the publisher RH to register the copyright calculates the hash value of the original digital work and signs it with the private key, along with the application information, to the CA.
- CA looks up the RH information base and the library of works to ensure that the work does not duplicate the copyright, and it is also a process of reviewing the legality of copyright. If the review is qualified, the CA numbers the two messages, generates the RHID and HashID, and stores the relevant information (applicant name, valid ID number, application date, work hash value, etc.) in the RH information base and the work information database.
- the CA will pass its own signed message SignCA (RHID, HashID) is sent to RH.
- RH embeds the message SignCA (RHID, HashID) as a watermark in the original digital work, producing an intermediate digital work.
- Figure 3 is a digital fingerprint generation process, that is, the purchase process of the purchaser.
- the purchaser P provides the CA with its own information P before purchase, the CA forms a PID for the P number, stores the purchase information in the purchaser information base, and transmits the CA signed message SignCA (PID) to the P.
- P sends SignCA (PID) to the publisher RH and pays.
- RH uses the watermark algorithm to embed the message SignCA (PID) as a fingerprint in the intermediate digital work, and the final digital work is sent to the purchaser.
- CA obtains controversial digital works, original works, and application information submitted by the conscriptor when applying for copyright, and obtains AUID and HashID, RHID and HashID from the controversial works, and obtains from the RH information base and the work information database according to AUID and HashID. Corresponding information, according to RHID and HashID from the RH information base and the work information library to get the corresponding information.
- the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database. If both controls yield a consistent result, it can be confirmed that the copyright is owned by the requester; otherwise it is not owned by him.
- Figure 5 is an illegal copy source confirmation process.
- the suspicious digital work is handed over to the CA.
- the CA extracts the AUID, RHID, HashID, and PID from it, and processes it in the following three cases:
- Figure 6 shows how illegal copy tracking can be performed.
- This process is closely related to the detection agent structure of Figure 7.
- the detection agent receives the detection task and the target address from the CA, moves to the new target host, and completes the detection task for the suspicious digital work; or multiple mobile agents cooperate with each other to perform a carpet search on the suspicious works on the network.
- Suspicious works and related information (such as discovery IP, discovery time, etc.) will be stored in the suspicious work library for CA to confirm the illegal copy source.
- the specific process is as follows:
- the Detect/Extract Agent resides on a server or router in the network that filters all multimedia data files residing on the server where it resides. Communicate with the CA and other agents through the communication component, find the local and remote databases, determine whether the relevant record of the multimedia data already exists, if not, the trigger starts the operation component work, and the input interface obtains relevant information from the system through the communication component, and the operation component Call the test program to get a result of whether it is a suspicious work.
- the output interface stores the suspicious works and related information (such as the discovered IP, discovery time, etc.) into the database for the CA to confirm the illegal copy source.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
Description
技术领域
本发明属于数字媒体版权保护领域,具体涉及一种利用数字水印技术和密码技术的基础服务系统的构架以及基于该系统实现数字媒体版权保护、追踪非法拷贝的方法,特别是一种具有版权保护特性的数字水印作品及其生成方法。
背景技术
传统解决数字媒体版权保护问题的技术,包括加密技术、数字签名技术、可信软硬模块等,但是这些技术均有一定的问题:
(1)
加密技术:能够阻止对拷贝的直接访问,但一旦解密数字作品将完全暴露,没有任何保护措施,可以任意拷贝和传播而不受任何限制。
(2)
数字签名技术:提供对信息来源的可靠性和内容的真实性验证。但是数字签名与数字作品相分离,很容易去除,而且只要数字作品稍微修改,签名就无效了。
(3)
可信模块:通常是防篡改硬件,可以用来保护解密密钥或发行商制定的其它版权保护策略。可信模块要求每个用户对每个数字作品都要有相应硬件,这是不实用的。如果是防窜改软件,现有的软件分析技术很容易使其“防窜改”特性失效。
数字水印技术作为一种新的技术,其具有在数字化的数据内容中嵌入不明显的记号,被嵌入的记号通常是不可见或不可察的,但是通过一些计算操作可以被检测或者被提取。而且数字水印与源数据紧密结合并隐藏其中,成为源数据不可分离的一部分,并可以经历一些不破坏源数据使用价值或商用价值的操作而存活下来。
但是,现有技术中未见具有版权保护特性的数字水印作品,所谓版权保护特性指的是至少应该具备两个功能:版权确认和非法拷贝来源追踪。除此之外还可以进一步具备为实现这两个基本功能而增加的一些附加功能,如水印嵌入、水印提取、非法拷贝的获得等。
发明内容
本发明基于现有技术中所存在的不足之处,提供一种可以实现版权确认和非法拷贝来源追踪并支持现实中各种方式的数字媒体交易和应用的具有版权保护特性的数字水印作品及其生成方法。
本发明的目的是通过以下途径来实现的。
具有版权保护特性的数字水印作品,包括数字作品信息和水印信息,水印信息嵌入在数字作品信息中,水印信息包括两个经过可信任第三方签名的水印,一个用来标识数字作品作者,一个用来标识发行商,其中,作者信息水印包含作者身份识别号,发行商信息水印中包含发行商身份识别号和作品身份识别号,水印信息是由相应的身份识别号经过可信任第三方签名后作为种子产生的随机序列。
上述所谓可信任第三方指的是版权保护组织、版权登记中心或类似的组织机构。
这样,用户在作者授权的网络或存储介质上免费使用数字媒体,该数字媒体上包含作者信息水印和版权信息水印。当通过移动代理或存储介质发现数字作品非法拷贝的时候,可以根据提取出来的水印确定是谁在进行非法传播,并为追查非法拷贝提供证据。
利用数字水印技术和密码技术实现数字作品版权保护的系统架构,实现并提供数字媒体安全服务的通用性。它保护的是数字媒体的版权,可以进行版权确认、非法拷贝的追踪和来源确认的安全服务,支持现实中各种方式的数字媒体交易和应用。
具有版权保护特性的数字水印作品的生成方法,包括如下步骤:
1、
作者先要从可信任第三方处得到一个客户端软件,其中包括计算哈希值Hash功能,签名功能,两个不同的水印嵌入功能,作者计算其原始数字作品的哈希值并用私钥签名,连同申请信息一起发送给可信任第三方,可信任第三方查找作者信息库和作品信息库进行审查,如果审查合格,可信任第三方对两条信息编号,产生作者身份识别号AUID和哈希值身份识别号HashID,并将申请人姓名、有效证件号码、申请日期、作品哈希Hash值等相关信息存入作者信息库和作品信息库,可信任第三方将经过自己签名的消息SignCA(AUID,
HashID)发送给作者,作者将消息SignCA(AUID, HashID)作为水印嵌入原始数字作品中,产生初始数字作品,
2、
发行商在向可信任第三方要求自己的版权之前,先要从可信任第三方处得到一个客户端软件,其中包括计算哈希值功能,签名功能,两个不同的水印嵌入功能,要注册版权的发行商将原始数字作品的Hash值、作者用私钥签名,连同从作者处获得的作者对原始数字作品的Hash值、发行商的签名和申请信息一起发送给可信任第三方,可信任第三方通过作者信息库和作品信息库比较确认后,
对两条信息编号,产生发行商身份识别号RHID和哈希值身份识别号HashID,并将申请人姓名、有效证件号码、申请日期、作品Hash值等相关信息存入发行商信息库和作品信息库,可信任第三方将经过自己签名的消息SignCA(RHID,
HashID)发送给发行商,发行商将消息SignCA(RHID, HashID)作为水印嵌入原始数字作品中,产生中间数字作品,
3、
购买者P在购买之前先向可信任第三方提供自己的信息P,可信任第三方对购买者编号形成购买者身份识别号PID,并存入购买者信息库,同时将签名的消息SignCA(PID)发送给购买者,购买时,购买者将SignCA(PID)发送给发行商RH并付费,发行商利用水印算法将消息SignCA(PID)作为指纹嵌入中间数字作品中,形成最终数字作品发送给购买者。
作者以及发行商从可信任第三方获得客户端软件的方式可以是从可信任第三方的网站下载,也可以直接从可信任第三方获得安装盘等。
可信任第三方查找AU信息库和作品信息库进行审查。可以保证该作品没有重复申请版权,同时这也是一个审查版权合法性的过程。
购买之前购买者自行从可信任第三方处获得购买者身份识别号PID,避免了可信任第三方参与每次购买过程。
发送原始数字作品的Hash值而不是发送原始数字作品本身可以保证不发生泄漏原始数字作品的危险,而且也能够保证每件作品只申请一次版权,不会发生无限制重复申请的情况;将RHID和HashID作为水印嵌入数字作品中可以有效降低水印数据量,从而大大降低对水印算法的要求。
指纹其实也是一种水印,只不过每一个合法拷贝中嵌入不同的水印,所以形象的称为“指纹”。
当数字作品版权出现纷争时需要进行版权确认,确定版权归属。CA得到有争议的数字作品、原始作品以及要求确认者申请版权时提交的申请信息,从有争议作品中得到AUID和HashID、RHID和HashID,根据AUID和HashID从RH信息库和作品信息库中得到相应信息,根据RHID和HashID从RH信息库和作品信息库中得到相应信息。如果得到AUID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从AU作品数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认作者的版权归要求确认;否则不归他所有。如果得到RHID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认版权归要求确认者所有;否则不归他所有。从上述两个阶段过程中,我们可以实现确认作者版权和发行商版权。从而可以实现对用户非法侵犯发行商权益或作者权益的确认;或可以发现发行商对作者权益的侵犯。
可以看出只有当作品版权出现纠纷的时候才需要提供原始数字作品,而且由哈希函数的性质可以确定原始数字作品不是伪造的。需要对照两种信息相当于给版权上了双保险。
当发现可疑非法拷贝的时候,将可疑数字作品交给CA。CA从中提取AUID、RHID、HashID和PID,分以下三种情况分别处理:
(1) 能提取出AUID、RHID、HashID,不能提取出PID:非法传播者是RH自己;
(2) 能提取出AUID,不能提取出RHID、HashID、PID:是一件没有申请发行版权的作品;
(3) 能提取出AUID、RHID、HashID、PID:非法传播则是用户。
有了这些证据,使得追查非法拷贝容易了许多。
本发明的目的还可以通过以下途径来实现。
水印信息中还包括一个用来标识购买者的水印,该水印包含购买者身份识别号。
以光盘等形式存在的非法拷贝需要人力来发现,散布在网络上的非法拷贝就需要用移动代理来发现了。
基于移动代理商的网络探测器是一个分布式可疑数字作品检测模块,它为在网络上进行主动、实时地基于数字水印的检测和追踪非法拷贝提供支持。多个检测代理商通过网络相连,在通信代理商和数据库维护代理商的帮助下协同工作。检测代理商是可移动代理商,它从可信任第三方处接收检测任务和目标地址,移动到这一新的目标主机,完成对可疑数字作品的检测任务;或者多个移动代理商互相配合,对网络上的可疑作品进行地毯式搜索。将发现的可疑作品及其相关信息(如发现地IP、发现时间等)存入可疑作品库,供可信任第三方进行非法拷贝来源确认。
使用移动代理进行非法拷贝检测充分利用了移动代理商自主执行,动态适应的特点,可以减轻网络负载和减小网络延时,减少系统内部通信量,实现实时自动检测。
附图说明
图1:系统示意图。
图2:版权信息生成。
图3:数字指纹生成。
图4:版权确认。
图5:非法拷贝来源确认。
图6:非法拷贝追踪。
图7:检测Agent结构。
具体实施方式
在图1中揭示了整个系统四个实体之间的关系,用户购买的合法数字作品中嵌有三个经过CA签名的水印,一个用来标识数字媒体作者(作者信息),一个用来标识发行商(版权信息),另一个用来标识购买者(数字指纹);当通过移动代理或存储介质发现数字作品非法拷贝的时候,可以根据提取出来的三个水印确定是谁在进行非法传播,为追查非法拷贝提供证据。其中,作者信息水印包含作者ID(AUID),版权信息水印中包含发行商ID和作品ID,数字指纹水印包含购买者ID,两个水印是由相应ID经过CA签名后作为种子产生的随机序列。
图2表明了版权信息生成过程。作者计算其原始数字作品计算的Hash值并用私钥签名,连同申请信息一起发送给CA。CA查找AU信息库和作品信息库,保证该作品没有重复申请版权,同时这也是一个审查版权合法性的过程。如果审查合格,CA对两条信息编号,产生AUID和HashID,并将相关信息(申请人姓名、有效证件号码、申请日期、作品Hash值等)存入AU信息库和作品信息库。CA将经过自己签名的消息SignCA(AUID,
HashID)发送给AU。AU将消息SignCA(AUID,
HashID)作为水印嵌入原始数字作品中,产生初始数字作品。要注册版权的发行商RH计算原始数字作品的Hash值并用私钥签名,连同申请信息一起发送给CA。CA查找RH信息库和作品信息库,保证该作品没有重复申请版权,同时这也是一个审查版权合法性的过程。如果审查合格,CA对两条信息编号,产生RHID和HashID,并将相关信息(申请人姓名、有效证件号码、申请日期、作品Hash值等)存入RH信息库和作品信息库。CA将经过自己签名的消息SignCA(RHID,
HashID)发送给RH。RH将消息SignCA(RHID, HashID)作为水印嵌入原始数字作品中,产生中间数字作品。
图3是数字指纹生成过程,也就是购买者的购买过程。购买者P在购买之前先向CA提供自己的信息P,CA对P编号形成PID,将购买信息存入购买者信息库,并将CA签名的消息SignCA(PID)发送给P。购买时,P将SignCA(PID)发送给发行商RH并付费,RH利用水印算法将消息SignCA(PID)作为指纹嵌入中间数字作品中,形成最终数字作品发送给购买者。
在图4中表明如何进行版权确认。当数字作品版权出现纷争时需要进行版权确认,确定版权归属。
CA得到有争议的数字作品、原始作品以及要求确认者申请版权时提交的申请信息,从有争议作品中得到AUID和HashID、RHID和HashID,根据AUID和HashID从RH信息库和作品信息库中得到相应信息,根据RHID和HashID从RH信息库和作品信息库中得到相应信息。如果得到AUID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从AU作品数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认作者的版权归要求确认;否则不归他所有。如果得到RHID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认版权归要求确认者所有;否则不归他所有。
图5是非法拷贝来源确认过程。当发现可疑非法拷贝的时候,将可疑数字作品交给CA。CA从中提取AUID、RHID、HashID和PID,分以下三种情况分别处理:
(4) 能提取出AUID、RHID、HashID,不能提取出PID:非法传播者是RH自己;
(5) 能提取出AUID,不能提取出RHID、HashID、PID:是一件没有申请发行版权的作品;
(6) 能提取出AUID、RHID、HashID、PID:非法传播则是用户。
图6中揭示了如何进行非法拷贝追踪,这一过程与图7的检测Agent结构密切相关。检测Agent从CA处接收检测任务和目标地址,移动到这一新的目标主机,完成对可疑数字作品的检测任务;或者多个移动Agent互相配合,对网络上的可疑作品进行地毯式搜索。将发现的可疑作品及其相关信息(如发现地IP、发现时间等)存入可疑作品库,供CA进行非法拷贝来源确认。具体过程如下:
检测/提取Agent驻留于网络中的服务器或路由器上,它对驻留在其所在服务器的所有多媒体数据文件进行筛选。通过通信构件与CA和其它Agent通信,查找本地和远程数据库,确定是否已经存在该多媒体数据的相关记录,如果没有,触发器启动操作构件工作,输入接口通过通信构件从系统得到相关信息,操作构件调用检测程序得到是否是可疑作品的结果。输出接口将可疑作品及相关信息(如发现地IP、发现时间等)存入数据库,供CA进行非法拷贝来源确认。
Claims (8)
- 具有版权保护特性的数字水印作品,其特征在于,包括数字作品信息和水印信息,水印信息嵌入在数字作品信息中,水印信息包括两个经过可信任第三方签名的水印,一个用来标识数字作品作者,一个用来标识发行商,其中,作者信息水印包含作者身份识别号,发行商信息水印中包含发行商身份识别号和作品身份识别号,水印信息是由相应的身份识别号经过可信任第三方签名后作为种子产生的随机序列。
- 根据权利要求1所述的具有版权保护特性的数字水印作品,其特征在于,水印信息中还包括一个用来标识购买者的水印,该水印包含购买者身份识别号。
- 具有版权保护特性的数字水印作品的生成方法,其特征在于,包括如下步骤: 作者先从可信任第三方处得到一个客户端软件,其中包括计算哈希值 Hash 功能,签名功能,两个不同的水印嵌入功能,作者计算其原始数字作品的哈希值并用私钥签名,连同申请信息一起发送给可信任第三方,可信任第三方查找作者信息库和作品信息库进行审查,如果审查合格,可信任第三方对两条信息编号,产生作者身份识别号 AUID 和哈希值身份识别号 HashID ,并将申请人姓名、有效证件号码、申请日期、作品哈希 Hash 值等相关信息存入作者信息库和作品信息库,可信任第三方将经过自己签名的消息 SignCA(AUID, HashID) 发送给作者,作者将消息 SignCA(AUID, HashID) 作为水印嵌入原始数字作品中,产生初始数字作品, 发行商在向可信任第三方要求自己的版权之前,先要从可信任第三方处得到一个客户端软件,其中包括计算哈希值功能,签名功能,两个不同的水印嵌入功能,要注册版权的发行商将原始数字作品的 Hash 值、作者用私钥签名,连同从作者处获得的作者对原始数字作品的 Hash 值、发行商的签名和申请信息一起发送给可信任第三方,可信任第三方通过作者信息库和作品信息库比较确认后, 对两条信息编号,产生发行商身份识别号 RHID 和哈希值身份识别号 HashID ,并将申请人姓名、有效证件号码、申请日期、作品 Hash 值等相关信息存入发行商信息库和作品信息库,可信任第三方将经过自己签名的消息 SignCA(RHID, HashID) 发送给发行商,发行商将消息 SignCA(RHID, HashID) 作为水印嵌入原始数字作品中,产生中间数字作品, 购买者 P 在购买之前先向可信任第三方提供自己的信息 P ,可信任第三方对购买者编号形成购买者身份识别号 PID ,并存入购买者信息库,同时将签名的消息 SignCA(PID) 发送给购买者,购买时,购买者将 SignCA(PID) 发送给发行商 RH 并付费,发行商利用水印算法将消息 SignCA(PID) 作为指纹嵌入中间数字作品中,形成最终数字作品发送给购买者。
- 根据权利要求2所述的具有版权保护特性的数字水印作品生成方法,其特征在于,作者以及发行商从可信任第三方获得客户端软件的方式或者是从可信任第三方的网站下载,或者是直接从可信任第三方获得安装盘。
- 根据权利要求2所述的具有版权保护特性的数字水印作品生成方法,其特征在于,购买之前购买者自行从可信任第三方处获得购买者身份识别号PID。
- 根据权利要求2所述的具有版权保护特性的数字水印作品生成方法,其特征在于,当数字作品版权出现纷争时需要进行版权确认,确定版权归属,CA得到有争议的数字作品、原始作品以及要求确认者申请版权时提交的申请信息,从有争议作品中得到AUID和HashID、RHID和HashID,根据AUID和HashID从RH信息库和作品信息库中得到相应信息,根据RHID和HashID从RH信息库和作品信息库中得到相应信息。如果得到AUID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从AU作品数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认作者的版权归要求确认;否则不归他所有。如果得到RHID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认版权归要求确认者所有;否则不归他所有。从上述两个阶段过程中,我们可以实现确认作者版权和发行商版权。从而可以实现对用户非法侵犯发行商权益或作者权益的确认;或可以发现发行商对作者权益的侵犯。
- 根据权利要求2所述的具有版权保护特性的数字水印作品生成方法,其特征在于,还包括有网络检测代理商,其为可移动代理商,它从可信任第三方处接收检测任务和目标地址,移动到这一新的目标主机,完成对可疑数字作品的检测任务;或者多个移动代理商互相配合,对网络上的可疑作品进行地毯式搜索。
- 根据权利要求7所述的具有版权保护特性的数字水印作品生成方法,其特征在于,基于移动代理商的网络探测器是一个分布式可疑数字作品检测模块。
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2010/080376 WO2012088663A1 (zh) | 2010-12-28 | 2010-12-28 | 具有版权保护特性的数字水印作品及其生成方法 |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2010/080376 WO2012088663A1 (zh) | 2010-12-28 | 2010-12-28 | 具有版权保护特性的数字水印作品及其生成方法 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2012088663A1 true WO2012088663A1 (zh) | 2012-07-05 |
Family
ID=46382180
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2010/080376 Ceased WO2012088663A1 (zh) | 2010-12-28 | 2010-12-28 | 具有版权保护特性的数字水印作品及其生成方法 |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2012088663A1 (zh) |
Cited By (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103049682A (zh) * | 2013-01-28 | 2013-04-17 | 上海理工大学 | 一种基于字符间距编码的双重水印嵌入的文本水印方法 |
| CN103294937A (zh) * | 2013-06-28 | 2013-09-11 | 玉林师范学院 | 一种软件保护系统及其保护方法 |
| CN106682457A (zh) * | 2016-12-16 | 2017-05-17 | 北京握奇智能科技有限公司 | 一种基于区块链技术的图片版权保护方法和系统 |
| CN109727134A (zh) * | 2018-12-29 | 2019-05-07 | 北京奇虎科技有限公司 | 一种图片的版权交易方法及装置 |
| CN109766672A (zh) * | 2019-01-14 | 2019-05-17 | 湖南大学 | 一种芯核版权匿名认证方法 |
| CN110110500A (zh) * | 2019-06-04 | 2019-08-09 | 施建锋 | 具备侵权即时检测的去中心化图像版权保护系统及方法 |
| CN110580405A (zh) * | 2019-08-16 | 2019-12-17 | 湖北工业大学 | 一种基于社交网络的图片版权保护系统及方法 |
| CN111667395A (zh) * | 2020-06-03 | 2020-09-15 | 南京师范大学 | 一种三维模型版权认证方法 |
| CN112069496A (zh) * | 2020-09-10 | 2020-12-11 | 杭州锘崴信息科技有限公司 | 保护信息的作品查新系统、方法、设备及存储介质 |
| CN112258323A (zh) * | 2020-10-22 | 2021-01-22 | 苏州市星际云通区块链科技有限公司 | 基于区块链的数字版权登记方法及终端设备 |
| CN113706344A (zh) * | 2021-08-05 | 2021-11-26 | 武汉大学 | 一种基于区块链的数字版权保护方法 |
| CN113782122A (zh) * | 2021-08-09 | 2021-12-10 | 中国中医科学院中医药信息研究所 | 一种电子知情同意方法和系统 |
| CN114298882A (zh) * | 2021-12-13 | 2022-04-08 | 阳光电源股份有限公司 | Cad数据的水印的嵌入方法、追溯方法以及电子设备 |
| CN115760427A (zh) * | 2022-12-21 | 2023-03-07 | 中国电信股份有限公司 | 数据交易方法及装置、存储介质、电子设备 |
| EP4564198A4 (en) * | 2022-08-05 | 2025-06-04 | Huawei Technologies Co., Ltd. | Method and system for processing digital content, method and system for confirming copyrights of digital content, and method and system for tracing digital content |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1558303A (zh) * | 2004-02-11 | 2004-12-29 | 北京邮电大学 | 数字水印基础设施 |
| CN101196970A (zh) * | 2007-12-29 | 2008-06-11 | 武汉理工大学 | 基于数字水印和移动代理的数字版权管理系统 |
| US20080225311A1 (en) * | 2007-03-12 | 2008-09-18 | Fuji Xerox Co., Ltd. | Image forming apparatus, image forming method and computer readable medium |
| CN101449508A (zh) * | 2006-03-14 | 2009-06-03 | 奥多比公司 | 保护电子衍生作品的完整性 |
| CN101512512A (zh) * | 2006-08-31 | 2009-08-19 | 微软公司 | 利用软件名声的软件授权 |
-
2010
- 2010-12-28 WO PCT/CN2010/080376 patent/WO2012088663A1/zh not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1558303A (zh) * | 2004-02-11 | 2004-12-29 | 北京邮电大学 | 数字水印基础设施 |
| CN101449508A (zh) * | 2006-03-14 | 2009-06-03 | 奥多比公司 | 保护电子衍生作品的完整性 |
| CN101512512A (zh) * | 2006-08-31 | 2009-08-19 | 微软公司 | 利用软件名声的软件授权 |
| US20080225311A1 (en) * | 2007-03-12 | 2008-09-18 | Fuji Xerox Co., Ltd. | Image forming apparatus, image forming method and computer readable medium |
| CN101196970A (zh) * | 2007-12-29 | 2008-06-11 | 武汉理工大学 | 基于数字水印和移动代理的数字版权管理系统 |
Cited By (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103049682A (zh) * | 2013-01-28 | 2013-04-17 | 上海理工大学 | 一种基于字符间距编码的双重水印嵌入的文本水印方法 |
| CN103049682B (zh) * | 2013-01-28 | 2015-04-01 | 上海理工大学 | 一种基于字符间距编码的双重水印嵌入的文本水印方法 |
| CN103294937A (zh) * | 2013-06-28 | 2013-09-11 | 玉林师范学院 | 一种软件保护系统及其保护方法 |
| CN106682457A (zh) * | 2016-12-16 | 2017-05-17 | 北京握奇智能科技有限公司 | 一种基于区块链技术的图片版权保护方法和系统 |
| CN109727134A (zh) * | 2018-12-29 | 2019-05-07 | 北京奇虎科技有限公司 | 一种图片的版权交易方法及装置 |
| CN109727134B (zh) * | 2018-12-29 | 2024-04-05 | 三六零科技集团有限公司 | 一种图片的版权交易方法及装置 |
| CN109766672B (zh) * | 2019-01-14 | 2022-07-12 | 湖南大学 | 一种芯核版权匿名认证方法 |
| CN109766672A (zh) * | 2019-01-14 | 2019-05-17 | 湖南大学 | 一种芯核版权匿名认证方法 |
| CN110110500A (zh) * | 2019-06-04 | 2019-08-09 | 施建锋 | 具备侵权即时检测的去中心化图像版权保护系统及方法 |
| CN110110500B (zh) * | 2019-06-04 | 2023-04-07 | 施建锋 | 具备侵权即时检测的去中心化图像版权保护系统及方法 |
| CN110580405B (zh) * | 2019-08-16 | 2022-07-05 | 湖北工业大学 | 一种基于社交网络的图片版权保护系统及方法 |
| CN110580405A (zh) * | 2019-08-16 | 2019-12-17 | 湖北工业大学 | 一种基于社交网络的图片版权保护系统及方法 |
| CN111667395A (zh) * | 2020-06-03 | 2020-09-15 | 南京师范大学 | 一种三维模型版权认证方法 |
| CN112069496B (zh) * | 2020-09-10 | 2024-04-26 | 杭州锘崴信息科技有限公司 | 保护信息的作品查新系统、方法、设备及存储介质 |
| CN112069496A (zh) * | 2020-09-10 | 2020-12-11 | 杭州锘崴信息科技有限公司 | 保护信息的作品查新系统、方法、设备及存储介质 |
| CN112258323A (zh) * | 2020-10-22 | 2021-01-22 | 苏州市星际云通区块链科技有限公司 | 基于区块链的数字版权登记方法及终端设备 |
| CN113706344B (zh) * | 2021-08-05 | 2024-03-01 | 武汉大学 | 一种基于区块链的数字版权保护方法 |
| CN113706344A (zh) * | 2021-08-05 | 2021-11-26 | 武汉大学 | 一种基于区块链的数字版权保护方法 |
| CN113782122A (zh) * | 2021-08-09 | 2021-12-10 | 中国中医科学院中医药信息研究所 | 一种电子知情同意方法和系统 |
| CN113782122B (zh) * | 2021-08-09 | 2024-04-16 | 中国中医科学院中医药信息研究所 | 一种电子知情同意方法和系统 |
| CN114298882A (zh) * | 2021-12-13 | 2022-04-08 | 阳光电源股份有限公司 | Cad数据的水印的嵌入方法、追溯方法以及电子设备 |
| EP4564198A4 (en) * | 2022-08-05 | 2025-06-04 | Huawei Technologies Co., Ltd. | Method and system for processing digital content, method and system for confirming copyrights of digital content, and method and system for tracing digital content |
| CN115760427A (zh) * | 2022-12-21 | 2023-03-07 | 中国电信股份有限公司 | 数据交易方法及装置、存储介质、电子设备 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2012088663A1 (zh) | 具有版权保护特性的数字水印作品及其生成方法 | |
| CN101452553B (zh) | 基于数字水印的保护数据库版权的交易方法 | |
| CN101794363B (zh) | 网络多媒体版权主动追踪与监视系统 | |
| Piva et al. | Managing copyright in open networks | |
| Zhao | A WWW service to embed and prove digital copyright watermarks | |
| RU2348073C2 (ru) | Регистрация/субрегистрация сервера управления цифровыми правами (уцп) в архитектуре уцп | |
| JP5330488B2 (ja) | 安全にコンテンツを配布する方法及び装置 | |
| US20200226233A1 (en) | Distributed ledger-based digital content piracy deterrence | |
| JP2004503880A (ja) | 電子透かし技術を基盤とする著作物の提供および認証サービスシステムとその方法 | |
| KR20040076811A (ko) | 디지털 콘텐츠 공표 및 대응 디지털 공표자 라이센스 발행방법, 공표된 디지털 콘텐츠 렌더링 방법 및 이들을수행하는 컴퓨터 실행가능 명령이 수록된 컴퓨터 판독가능매체 | |
| WO2002080442A1 (en) | Information processing apparatus | |
| CN110147652A (zh) | 基于区块链和数字水印的音乐版权保护方法和系统 | |
| CN109951511A (zh) | 基于区块链平台的买方卖方安全数字水印协议生成方法 | |
| CN100428107C (zh) | 数字水印基础设施 | |
| CN110992218A (zh) | 一种基于区块链的音乐版权保护方法及设备、介质 | |
| Cheung et al. | A watermarking infrastructure for enterprise document management | |
| JP2004139184A (ja) | コンテンツ管理処理システムおよびコンテンツ管理処理方法 | |
| Cheung et al. | Rights protection for digital contents redistribution over the Internet | |
| Cheung et al. | The use of digital watermarking for intelligence multimedia document distribution | |
| KR100773963B1 (ko) | 핑거프린팅 관리 시스템 및 핑거프린트 코드 전달 방법 | |
| He et al. | Digital right management model based on cryptography and digital watermarking | |
| JP2001052072A (ja) | コンテンツ流通方法および該コンテンツ流通プログラムを記録した記録媒体 | |
| Song et al. | A blockchain based Buyer-seller Watermark Protocol with Trustless Third party | |
| CN116167071A (zh) | 一种基于区块链的数字资产确权登记方法及装置 | |
| CN101507174A (zh) | 用于使用数字指纹识别来提供数字内容的系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10861366 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 03/09/2013) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 10861366 Country of ref document: EP Kind code of ref document: A1 |