研究生: |
陳信宇 Hsin-Yu Chen |
---|---|
論文名稱: |
使用平均色飽和度隱蔽法之數位版權管理模型 Digital Rights Management Model Using Mean Intensity Value Steganography |
指導教授: |
張隆紋
Long-Wen Chang |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2004 |
畢業學年度: | 92 |
語文別: | 英文 |
論文頁數: | 30 |
中文關鍵詞: | 隱匿學 、資訊隱藏 、密碼學 、高階加密演算法 、數位版權管理 |
外文關鍵詞: | Steganography, Data Hiding, Cryptography, Advanced Encryption Standard, Digital Rights Management |
相關次數: | 點閱:1 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文以所研究的資訊隱藏法將版權資訊藏匿在平均色飽和度中,來防止非法使用者拷貝散布有版權的數位內容,在合法狀況下使用時還原數位內容。將資訊隱藏在空間域,會造成模糊的效果,可以達到保護數位內容的目的,並且可用於各種檔案格式,也就是說,只要將擷取流程附加到現行播放軟硬體上即可達到版權保護效果,這和現行數位版權管理機制需要特殊的軟硬體去驗證專用的檔案格式不同。所以即使是未授權之使用者,也可以去預覽模糊的數位內容。
整個數位版權管理模型所考慮的重點在於系統的強韌度、效率性以及安全度。我們利用區塊的亮度平均值藏匿資料,當區塊中像數越多的時候,藏匿的資料也就越不易遭到更改。所以即使使用了各種資料壓縮方法,我們的系統仍然可以無失真地取出隱藏的資訊。由於提出的隱蔽方法只需要較低的計算複雜度,所以可以有效地應用在影片及音樂的數位版權管理機制,在播放時即時取出和驗證版權資訊。另外,搭配設計的數位版權管理架構模型,將系統安全度轉換到所選用的亂數產生器和加密演算法(在這裡採用高階加密演算法)上,可以有效防止非法使用者的破解。
實驗結果證實,這個方法在可容納資料量範圍內,版權資訊的長度並不會影響最後還原的數位內容的品質。而且,隱藏的版權資訊在不同的壓縮方法下,仍然可以完整地保存。這表示此方法適用於各種非破壞性地內容修改(資料壓縮、一般雜訊等),防止數位內容在解壓時因為版權資訊錯誤解碼核對錯誤而造成中斷播放的可能性發生。
We propose a steganography method which hides copyright information in the mean intensity value. The stego-content is dim after embedding the rights information into the digital content so that it is used to prevent the illegal users from piracy and spreading the digit content. And because the file format does not change, anybody without authorization can preview the digital content. The focal points assessed in this model lie in systematic robustness, efficiency and degree of security. We use the mean intensity value of blocks to embed rights information. The more the pixels of a block are, the more hardly the embedded information is altered. The proposed method only needs very low computational complexity. It can apply to digital rights management (DRM) for films and music efficiently because it can extract and verify copyright information in real-time. Moreover, the random number generator is used for generating stego-tables with that the bit stream of authorization information can be hided in blocks. During the embedding procedure, every block that each bit is embedded in generates one shift value. AES (Advance encryption Standard) algorithm is applied to encrypt the shift values stored in a small residual file after embedding procedure. These protect the rights information and digital content and avoid malicious attacks.
[1] Fetscherin, M., Schmid, M. “The Application of Digital Rights Management Systems in the Music Industry - An Empirical Investigation”, IEEE Computer Society, September 2003, p. 115-121.
[2] Y. K. Lee and L. H. Chen, “Secure Error-Free Steganography for JPEG Images”, International Journal of Pattern Recognition and Artificial Intelligence, Vol. 17, 2003, p. 967-981.
[3] N. F. Johnson and S.Jajodia, “Steganography: seeing the unseen,” IEEE Computer 31, 2 (1998), p. 26-34.
[4] R. Machado, “Stego,” http://www.stego.com/.
[5] H. Repp, “Hide4PGP,” http://www.rugeley.demon.co.uk/security/hdsk50.zip.
[6] J2k, http://www.fnordware.com/j2k/.
[7] Fetscherin, M., Schmid, M. “The Application of Digital Rights Management Systems in the Music Industry - An Empirical Investigation”, IEEE Computer Society, September 2003, p. 115-121.
[8] Microsoft, http://www.microsoft.com/windows/windowsmedia/drm.aspx.
[9] Adobe, http://www.adobe.co.uk/epaper/features/drm/drmtools.html.
[10] IBM, http://www-3.ibm.com/software/data/emms/.
[11] SDMI, SDMI Portable Device Specification, Part 1, Version 1.0, SDMI doc.pdwg99070802, 1999.
[12] R. H. Koenen, J. Lacy, M. Mackay, and S. Mitchell, “The Long March to Interoperable Digital Rights Management”, Proceedings of IEEE, June 2004, p. 883-897.
[13] L. Jean Camp, “First Principles of Copyright for DRM Design”, IEEE Internet Computing, Vol. 7, No. 3, 2003, p. 59-65.
[14] F. Hartung, and F. Ramme, “Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications”, IEEE Communications Magazine, Vol. 38, Nov. 2000, p. 78-84.
[15] J. Lacy, N. Rump, and P. Kudumarkis, “MPEG-4 Intellectual Property Management & Protection (IPMP) Overview and Applications”, MPEG doc. ISO/IEC JTC1/SC29/WG11/N2614, Dec. 1998.
[16] Daemen, J., and Rijmen, V. “Rijndael: The Advanced Encryption Standard.” Dr. Dobb’s Journal, March 2001.
[17] William Stallings, “Cryptography and Network Security”, Chap. 5, 2003.
[18] D.E. Knuth. “The Art of Computer Programming” Vol. 2, Seminumerical Algorithms. Addison-Wesley. Reading, MA, 1969.
[19] H.S. Bright, R.L. Enison, “Quasi-Random Number Sequences from a Long-Period TLP Generator with Remarks on Application to Cryptography”, ACM Computing Surveys 11(4), 1979, p. 357-370.
[20] P. Bratley, B.L. Fox, L.E. Schage, “Uniform Random Numbers”, in A Guide to Simulation. Springer Verlag, 1995, p. 180-213.
[21] G.Mastronardi. A Combination of Pseudorandom Number Generators Applied to the Steganography. In Abstracts of SIMAI’2000 Congress, Ischia(Italy). June 2000, p. 756-757.