CN103235908A - Digital safety protection algorithm - Google Patents

Digital safety protection algorithm Download PDF

Info

Publication number
CN103235908A
CN103235908A CN2013100559976A CN201310055997A CN103235908A CN 103235908 A CN103235908 A CN 103235908A CN 2013100559976 A CN2013100559976 A CN 2013100559976A CN 201310055997 A CN201310055997 A CN 201310055997A CN 103235908 A CN103235908 A CN 103235908A
Authority
CN
China
Prior art keywords
digital
product
watermarking
piracy
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100559976A
Other languages
Chinese (zh)
Inventor
韩永飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Onets Wireless & Internet Security Tech Co Ltd
Original Assignee
Onets Wireless & Internet Security Tech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Onets Wireless & Internet Security Tech Co Ltd filed Critical Onets Wireless & Internet Security Tech Co Ltd
Priority to CN2013100559976A priority Critical patent/CN103235908A/en
Publication of CN103235908A publication Critical patent/CN103235908A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Piracy becomes more and more serious with emergence of digital products and seriously threatens legal interests of a digital product creditor. A traditional copyright protection manner based on cryptography only guarantees safety transmission of the digital products and can not be against secondary propagation and illegal copying, and can not carry out piracy source tracing and the like. Based on the exposition of basic digital copyright protection concept and system architecture, the invention discloses the digital watermark based traceable DRM (Digital Rights Management)which performs discussion and analysis for legality, integrality, access control, piracy source tracing and the like of the digital products.

Description

Numeric security protection algorithm
Technical field:
The present invention designs a kind of computerized information symmetric encipherment algorithm, can carry out the high strength safety encipher to character stream and file.
Background technology:
20 worlds are since the nineties, the digital publishing tide begins to have swept the globe, digital form becomes one of main forms of works, changed carrier form, storage means, mode of propagation, sale industry situation and the reading method published deeply, but mandate, pirate activity simultaneously is also more and more rampant by new technology.Digital product almost allows the editor of all possibility forms; very easily distort or forge and be difficult to and discover; can't guarantee integrality and the authenticity of original works; digital product can be realized indifference, low cost, large-scale " clone " at short notice; these all serious threat to digital product obligee's legitimate interests; become more difficult and follow the trail of strike, infringement evidence obtaining and judicial expertise; traditional copyright protection mode can not satisfy the needs of copyrighted digital content protection; so people propose a kind of new technology---digital copyright management.
Rely on cryptological technique that digital product is encrypted to realize copyright protection traditionally, have only validated user just can have key, can guarantee that like this safety of digital content transmits, and can be used as the means of access control and collection of charges.But encryption technology can not effectively prevent secondary propagation, the illegal copies of digital product and usurp; And can not review the piracy sources of digital product.Digital watermark technology replenishes as cryptographic, can continue its possessory intellecture property of protection under digital product form expressly and not encroached on.
Summary of the invention:
1 digital watermarking
Digital watermarking is the technology that a kind of effective digital product copyright protection and data security are safeguarded, is an important branch in Investigation of Information Hiding Technology field.It will have the mark (watermark) of certain sense, utilize the method for numeral embedding to be hidden in the digital products such as digital picture, audio frequency, document, books, video, in order to prove that the creator is to the entitlement evidence that also conduct is identified, prosecution is illegally encroached right of works; Simultaneously, the complete reliability that guarantees numerical information by detection and analysis to watermark [5]
Digital watermarking can be divided into robustness watermark, fragile watermarking, half fragile watermarking by characteristic.Its characteristics have: invisibility, robustness, security, key uniqueness, reversibility, false alarm rate etc.
Digital watermarking has solved digital copyright and has returned whose all problem.Its objective is the information of in copyright embedding energy proof works copyright ownership, these works are claimed had copyright thereby can overthrow other people and group.
Usually, can when the distribution Digital Media, embed the digital watermark information that represents buyer's information, by the detection to this digital watermark information, just can the infringement of digital media information be monitored and follow the tracks of.Because two recipients of the necessary differentiation works that can be unique of embedded information, therefore, this information of the title of people's image is electronic fingerprint, also digital watermark technology in this case is called digital finger-print.If unwarranted copy and distribute the content of multimedia that obtains is disclosed, the author can follow the trail of its source by the retrieval fingerprint according to having embedded a watermark (fingerprint) in each product.As seen, digital finger-print has solved copyright and has copied out problem where certainly.
To construct a kind of digital finger-print herein, that realizes the digital product piracy sources reviews and copies control etc.
2 digital signature
Digital signature, others the hop count word string that can't forge of having only exactly that the sender of information could produce, this hop count word string also is valid certificates that the sender of information sent information authenticity simultaneously.Digital signature is asymmetric-key encryption technology and digital digest The Application of Technology.
Digital signature (Digital Signature) technology is that the typical case of asymmetrical encryption algorithm uses.The application process of digital signature is, the private key that the data source transmit leg uses oneself to the data verification with or other variablees relevant with data content be encrypted processing, finish legal " signature " to data, " digital signature " that the data receiver then utilizes the other side's PKI to understand to receive, and will understand the result for the check to the data integrality, to confirm the legitimacy of signature.Digital signature technology is the important technology of confirming identity in the network system virtual environment, can replace " autographic signature " in the real process fully, in technology and guaranteed legally.In digital signature applications, sender's PKI can obtain easily, but his private key then needs to hold in close confidence.
3 access control technologies
After the user obtained digital content and licence thereof, how according to the right to use of authorizing, the use of control figure content was the key of DRM.Using control to comprise that the user controls with right control: the user that the user controls digital content controls, and guarantees to have only the grantee could use corresponding digital content; Right control is controlled the use of digital content, and the user can only use digital content in the interest field that digital license is described, and can not exceed the operation in addition of these rights.
Description of drawings:
Figure one increases piracy to review server, realizes the piracy sources of digital product being reviewed the framework synoptic diagram after the improvement.
Figure two is property right protection synoptic diagram of digital product.
Figure three is implementation procedure synoptic diagram of Distributor.
Figure four is digital product integrity detection synoptic diagram.
Embodiment:
Digital copyright management technology (DRM) refers to adopt the system scheme that comprises the information security technology means; when guaranteeing that user legal, that have authority normally uses digital media content; the protection creator of Digital Media and owner's copyright; and obtain legal income according to copyright information, and copyright ownership that can discriminating digit information when copyright is received infringement and the true and false of copyright information.The purpose of digital copyright management is not only copyright protection, and the interests of protection copyright digital content provider also need be guaranteed the distribution of access control content and management etc. simultaneously.
Digital copyright management not only relates to the safeguard protection of digital content, management and the identification of copyright; and empowerment management and to use control also be the important component part of DRM; use comprising the legal authorization that ensures digital content, prevent from digital content is optionally copied, unlawfully spreads and propagation etc.
The general framework of digital copyright protection system then comprises digital content owner, digital content authorization center, digital content distribution server and authorized user 4 major parts; increase piracy herein and review server; realization is reviewed the piracy sources of digital product, the framework after the improvement such as figure one.
The content provider submits to content distributing server with oneself digital product and copyright information, the copyright information that content distributing server is responsible for the content provider is provided is embedded in the digital product as watermark, to guarantee when dispute over copyright occurring, can guarantee copyright owner's right.Content distributing server is responsible for obtaining digital product distribution unique encoding to each from the content provider simultaneously, can produce unique sequence number by pseudo-random generator, deposit the embedding algorithm of digital watermarking simultaneously in the content server, be responsible for embedding such as the figure two of digital product digital watermarking.
Distribution for the control figure product, set up customer data base at content distributing server, on the one hand the storage of each number fingerprint (HASH value) is then carried out in the distribution (sequence number) of the digital content of being stranded on the other hand, for the tracking of piracy sources provides foundation.In this database, sequence number and HASH value all are unique, and corresponding one by one.
The structure of concrete digital finger-print is as follows:
There is multistage distribution in digital product, and the user who namely obtains the authorization can proceed the distribution of product, therefore, and for the structure of digital finger-print in two kinds of situation:
1. be the one-level distributor if obtain usufructuary user, then utilize pseudo-random generator to produce unique sequence number, and carry out the HASH computing that the value that obtains is utilized digital watermarking to embed algorithm it is embedded in the digital product as digital finger-print.The process of concrete generation HASH value is as follows:
(1) make up formula 1:
Figure BSA00000856924700021
(wherein M is the product of two big prime numbers) (formula 1)
(2) value that calculates with formula 1 is carried out the HASH computing, utilizes the uniqueness of HASH computing generation value, produces unique HASH value, and stores.The HASH algorithm can adopt MD5, SHA-1 etc.
2. if obtaining usufructuary user is the above distributor of secondary, namely its rights of using are to have obtained usufructuary user place by other to obtain, and then the formation of its sequence number then utilizes its upper level user's sequence number to construct, concrete generative process:
At first, content distributing server obtains what kind of authority that this user has from authorization center, carries out for two steps and judges: the first, judge that this user has or not distribution rights; The second, if this user has distribution rights, how many users of subordinate it can be distributed to the product of oneself.Secondly, construct the sequence number of its authorized user, the generation method is: the HASH+ numeral (can authorize next stage user's number) that this user's sequence number generates.Here, numeral whenever licenses to a user since 1, and then numeral adds 1, up to the authority of authorizing number greater than it, then stops to authorize, and deprives the authority of its distribution.
The implementation procedure of particular content Distributor is as figure three.
The detection of digital product integrality relies on the HASH value that detects in the digital product whether variation has taken place, if variation has taken place, then this digital product integrality in the process of propagating is destroyed, should regain this user to the right to use of digital product.As figure four.

Claims (4)

1. the exertion process of a digital product is actually digital signature is hidden in the digital product as watermark.
2. digital signature is under attack easily, and the degree of safety of digital watermarking is not high.This invention organically combines digital watermarking and digital signature, and serves as that the basis has constituted a kind of new watermarking project with them, its security, confidence level, solves precision and will improve greatly.
3. numeric security protection algorithm adopts XOR, and its speed is greatly improved.
Of the present invention innovative be to utilize digital watermarking to set up chain-of-trust, realize that the colleague of copy control has also realized reviewing of piracy sources.
CN2013100559976A 2013-02-22 2013-02-22 Digital safety protection algorithm Pending CN103235908A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100559976A CN103235908A (en) 2013-02-22 2013-02-22 Digital safety protection algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100559976A CN103235908A (en) 2013-02-22 2013-02-22 Digital safety protection algorithm

Publications (1)

Publication Number Publication Date
CN103235908A true CN103235908A (en) 2013-08-07

Family

ID=48883948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100559976A Pending CN103235908A (en) 2013-02-22 2013-02-22 Digital safety protection algorithm

Country Status (1)

Country Link
CN (1) CN103235908A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942468A (en) * 2014-04-10 2014-07-23 王静 Method and device for protecting audio copyright
CN104715168A (en) * 2015-02-13 2015-06-17 陈佳阳 File security control and trace method and system based on digital fingerprints
CN111510421A (en) * 2019-01-31 2020-08-07 金联汇通信息技术有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN114155010A (en) * 2021-12-06 2022-03-08 广州繁星互娱信息科技有限公司 Method and device for generating product identification code, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1777091A (en) * 2004-11-17 2006-05-24 英特尔公司 Techniques to manage digital media
CN100428107C (en) * 2004-02-11 2008-10-22 北京邮电大学 Digital watermarking infrastructure
CN100435162C (en) * 2006-04-18 2008-11-19 北京大学 Finger print structure in digital products, its authentication and digital products issue system
CN101794363B (en) * 2010-01-29 2011-08-24 华中科技大学 Network multimedia copyright active following and monitoring system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100428107C (en) * 2004-02-11 2008-10-22 北京邮电大学 Digital watermarking infrastructure
CN1777091A (en) * 2004-11-17 2006-05-24 英特尔公司 Techniques to manage digital media
CN100435162C (en) * 2006-04-18 2008-11-19 北京大学 Finger print structure in digital products, its authentication and digital products issue system
CN101794363B (en) * 2010-01-29 2011-08-24 华中科技大学 Network multimedia copyright active following and monitoring system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
宋秀丽: "《现代密码学原理与应用》", 30 April 2012, 北京:机械工业出版社 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942468A (en) * 2014-04-10 2014-07-23 王静 Method and device for protecting audio copyright
CN104715168A (en) * 2015-02-13 2015-06-17 陈佳阳 File security control and trace method and system based on digital fingerprints
CN104715168B (en) * 2015-02-13 2018-10-09 陈佳阳 A kind of file security management and control based on digital finger-print and the method and system traced to the source
CN111510421A (en) * 2019-01-31 2020-08-07 金联汇通信息技术有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN114155010A (en) * 2021-12-06 2022-03-08 广州繁星互娱信息科技有限公司 Method and device for generating product identification code, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
KR100459147B1 (en) Proprietary watermark system for secure digital media and content distribution
EP2616986A2 (en) Improvements in watermark extraction efficiency
EP3673390B1 (en) Identifying copyrighted material using embedded copyright information
CN113190866B (en) Power plant data safety credible transmission method for enhancing digital watermarking technology
CN110727927A (en) Digital product protection system and method based on block chain technology
Qureshi et al. Blockchain-based P2P multimedia content distribution using collusion-resistant fingerprinting
CN1801695A (en) Digital copyright managing system and managing method for digital family network
CN104966000A (en) Multimedia copyright protection method based on security engine
CN103235908A (en) Digital safety protection algorithm
CN100428107C (en) Digital watermarking infrastructure
Kwok Watermark-based copyright protection system security
CN103186731A (en) Digital copyright protection method and system of hybrid mode
CN115955308A (en) Digital asset processing method, device, equipment and medium based on anti-quantum key
He et al. Digital right management model based on cryptography and digital watermarking
Conrado et al. Controlled sharing of personal content using digital rights management
KR100848369B1 (en) Method and device for producing coded data, for decoding coded data and for producing re-signed data
Williams et al. On the importance of one-time key pairs in buyer-seller watermarking protocols
Thomas et al. Secure multimedia content delivery with multiparty multilevel DRM architecture
Sharma et al. Digital watermarking for secure e-government framework
Xie et al. A Buyer-seller digital watermarking protocol without third party authorization
Hu et al. A secure and practical buyer-seller watermarking protocol
Tomsich et al. Copyright protection protocols for multimedia distribution based on trusted hardware
Sharma et al. A Blockchain-Trusted Scheme Based on Multimedia Content Protection
CN112650813B (en) Data sharing method for distributed auditing
Geethanjalia et al. Blockchain-Based Protected Digital Copyright Management with Digital

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130807