簡易檢索 / 詳目顯示

研究生: 陳威豪
論文名稱: 一個強調消費者隱私權且含有匿名身分辨識資訊的數位版權管理系統
A Privacy-enhancing DRM system with anonymous fingerprinting
指導教授: 張隆紋
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2005
畢業學年度: 93
語文別: 英文
論文頁數: 33
中文關鍵詞: 數位版權管理個人身分辨識資訊匿名平均式聯合攻擊
外文關鍵詞: DRM, Fingerprinting, Anonymous, Average attack
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於數位科技的進步和網路頻寬的普及,人們可以很輕易的修改、複製和散播數位多媒體內容。為了防止消費者有侵犯數位內容的行為,數位版權管理系統已發展來保護智慧財產權。但使用者往往不喜歡新系統的約束,且當此約束有影響到個人隱私時,就更難讓系統普遍的讓人接受。所以我們提供了一個新的協定,在此協定之下消費者可以匿名的購買電影。我們相信這樣一個強調消費者隱私權的系統可以更容易使系統普及。
    除此之外,我們加入了匿名使用者身份辨識資訊,避免消費者藉著隱私權保護機制侵犯數位版權。在此論文中,使用者身份辨識資訊是信用卡卡號。此卡號會加密成為匿名身分辨識資訊。當數位內容提供者發現有非法的電影流傳的網路上時,可以藉著數位內容裡的身分辨識資訊追朔非法散播者。我們論文中的身分辨識資訊可以抵抗至多九個消費者的聯合平均攻擊。


    In order to protect the intellectual property rights of digital content, a DRM system has been developed to prevent illegal behaviors of consumers. People are not willing to accept a new restriction that is insensitive to privacy concerns. So, we propose a new protocol which can provide anonymous buying.
    Furthermore, we add the anonymous fingerprinting to prevent customers taking advantage of the privacy protection mechanisms to violate the copyright. In the thesis, fingerprinting is customer’s credit card number which is encrypted to become anonymous fingerprinting. When content providers find the illegal video distributing on the internet, they can extract the fingerprinting in the multimedia content and trace the distributors. Our fingerprinting scheme can resist average collusion attack up to 9 colluders.

    Abstract (in Chinese)...............................i Abstract (in English)...............................ii ACKNOWLEDGEMENTS....................................iii Contents............................................iv List of Figures......................................v List of Tables.......................................vi 1.Introduction.......................................1 2.Related work.......................................3 3.The Proposed DRM Protocol ..........................5 3.1 Cut-and-Choose and Blind signature protocol...6 3.2 The detail of the proposed protocol...........8 3.3 Template movie and License key................16 4.Security analysis and experiment result............23 5.Conclusion.........................................31 Reference............................................32

    [1] T. Sander, “Golden times for digital rights management?,” in Proc. Financial Cryptography 5th Int. Conf. (FC 2001), P. F. Syverson, Ed., pp. 64–74.
    [2] D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” IEEE Trans. Information Theory 44, pp.1897–1905, 1998.
    [3] W. Trappe, M. Wu, and KJR Liu: "Collusion-Resistant Fingerprinting for Multimedia," IEEE Signal Processing Magazine, 2004
    [4] Y. K. Lee and L. H. Chen, “Secure Error-Free Steganography for JPEG Images”, International Journal of Pattern Recognition and Artificial Intelligence, Vol. 17, 2003, p. 967-981.
    [5] Min Wu; Bede Liu, "Data hiding in image and video .I. Fundamental issues and solutions," IEEE Trans. Image Processing, Volume: 12 , Issue: 6 , June 2003 Pages:685 - 695.
    [6] P. Persiano and I. Visconti, “User Privacy Issues regarding Certificates and the TLS Protocol”, Proc. of the 7th ACM Conference on Computer and Communications Security, Greece, 2000.
    [7] Von Claudine Conrado, Frank Kamperman, Geert Jan Schrijen und Willem Jonker, "Privacy in An Identity-Based DRM System", Proceedings of the 14th International Workshop on Database and Expert Systems Applications, September 2003.
    [8] Bok-Nyong Park , Jae-Won Kim , Wonjun Lee.” PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management”, Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA'04) Volume 2 - Volume 2 March 2004.
    [9] Bruce Schneier, "Applied cryptography protocols, Algorithms, and Source Code in C", 2nd Edition, John Wiley & Sons, 1996.
    [10] D. Chaum, “Blind signatures for untraceable payments,”Advances in Cryptology – CRYPTO’82, Plenum, 1983.
    [11] D. Kundur and K. Karthik, Video Fingerprinting and Encryption Principles for Digital Rights Management, Proceedings of the IEEE Special Issue on Enabling Security Technologies for Digital Rights Management, vol. 92, no. 6, pp. 918-932, June 2004.
    [12] Yao Wang, Jorn Ostermann, Ya-Qin Zhang, ”Video Processing And Communications”, PRENTICE HALL, 2002.
    [13] CL Lei, and WS Juang, "Provably Secure Blind Threshold Signatures Based on Discrete Logarithm," Journal of Information Science and Engineering, Vol. 18, pp. 23-39, 2002.
    [14] D. Pointcheval and J. Stern, "New Blind Signatures Equivalent to Factorization," Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 92-99, ACM Press, 1997.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE