WO2012088663A1 - Digital watermark works with characteristics of copyright protection and generation method thereof - Google Patents

Digital watermark works with characteristics of copyright protection and generation method thereof Download PDF

Info

Publication number
WO2012088663A1
WO2012088663A1 PCT/CN2010/080376 CN2010080376W WO2012088663A1 WO 2012088663 A1 WO2012088663 A1 WO 2012088663A1 CN 2010080376 W CN2010080376 W CN 2010080376W WO 2012088663 A1 WO2012088663 A1 WO 2012088663A1
Authority
WO
WIPO (PCT)
Prior art keywords
work
information
digital
author
trusted
Prior art date
Application number
PCT/CN2010/080376
Other languages
French (fr)
Chinese (zh)
Inventor
黄正全
王健
姜楠
Original Assignee
北京邮电大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京邮电大学 filed Critical 北京邮电大学
Priority to PCT/CN2010/080376 priority Critical patent/WO2012088663A1/en
Publication of WO2012088663A1 publication Critical patent/WO2012088663A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/103Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right

Definitions

  • the invention belongs to the field of digital media copyright protection, and particularly relates to a framework of a basic service system using digital watermark technology and cryptography technology, and a method for realizing digital media copyright protection and tracking illegal copy based on the system, in particular, a copyright protection feature.
  • Digital watermark works and their generation methods.
  • Encryption technology It can block direct access to the copy, but once the decrypted digital work will be completely exposed, without any protection, it can be copied and distributed without any restrictions.
  • Trusted module Usually tamper-resistant hardware that can be used to protect decryption keys or other copyright protection policies developed by the publisher.
  • the Trusted Module requires each user to have appropriate hardware for each digital work, which is not practical.
  • existing software analysis techniques can easily disable their "tamper-proof" features.
  • digital watermarking technology has embedded insignificant marks embedded in digitized data content.
  • the embedded marks are usually invisible or invisible, but can be detected or extracted by some calculation operations.
  • the digital watermark is closely integrated with the source data and hidden therein, becoming an inseparable part of the source data, and can survive some operations that do not destroy the use value or commercial value of the source data.
  • copyright protection feature refers to at least two functions: copyright confirmation and illegal copy source tracking.
  • some additional functions added to achieve these two basic functions such as watermark embedding, watermark extraction, illegal copy acquisition, etc., may be further provided.
  • the invention is based on the deficiencies in the prior art, and provides a digital watermarked work with copyright protection features that can realize copyright confirmation and illegal copy source tracking and support digital media transactions and applications in various ways in reality.
  • the generation method is based on the deficiencies in the prior art, and provides a digital watermarked work with copyright protection features that can realize copyright confirmation and illegal copy source tracking and support digital media transactions and applications in various ways in reality.
  • the object of the present invention is achieved by the following route.
  • Digital watermarked works with copyright protection features including digital work information and watermark information
  • the watermark information is embedded in the digital work information
  • the watermark information includes two watermarks signed by a trusted third party, one for identifying the author of the digital work, one for To identify the publisher, wherein the author information watermark includes an author identification number, and the publisher information watermark includes a publisher identification number and a work identification number, and the watermark information is used by the corresponding identification number after being signed by a trusted third party.
  • a random sequence produced by the seed is produced by the seed.
  • trusted third party refers to a copyright protection organization, a copyright registration center or a similar organization.
  • the user uses the digital media for free on the author's authorized network or storage medium, which contains the author information watermark and the copyright information watermark.
  • the author information watermark contains the author information watermark and the copyright information watermark.
  • the system architecture of copyright protection of digital works is realized by digital watermarking technology and cryptography technology, and the versatility of digital media security services is realized and provided. It protects the copyright of digital media, security services for copyright confirmation, illegal copy tracking and source confirmation, and supports digital media transactions and applications in various ways.
  • the author first obtains a client software from a trusted third party, including the calculation of the hash value hash function, the signature function, and two different watermark embedding functions.
  • the author calculates the hash value of the original digital work and signs it with the private key. Together with the application information, it is sent to a trusted third party.
  • the trusted third party looks up the author information base and the work information database for review. If the review is qualified, the trusted third party numbers the two information to generate the author identification number AUID and hash value.
  • the identification number HashID, and the relevant information such as the applicant's name, valid ID number, application date, and hash hash value of the work are stored in the author information database and the work information database, and the trusted third party will sign the signed message (AUID, HashID) is sent to the author, the author embeds the message SignCA (AUID, HashID) as a watermark in the original digital work, producing the initial digital work,
  • Publishers must obtain a client software from a trusted third party before requesting their own copyright from a trusted third party, including the calculation of the hash value function, the signature function, two different watermark embedding functions, and the registration of copyright.
  • the publisher will send the Hash value of the original digital work, the author's private key signature, along with the author's Hash value of the original digital work, the publisher's signature and the application information, to the trusted third party, trusted.
  • the two information numbers are numbered, and the issuer identification number RHID and the hash value identification number HashID are generated, and the applicant's name, valid ID number, application date, work hash value and other related information are stored in the publisher information database and the work information.
  • Library a trusted third party will sign the self-signed message SignCA (RHID, HashID) is sent to the publisher, who publishes the message SignCA (RHID, HashID) as a watermark in the original digital work, producing an intermediate digital work.
  • Purchaser P provides its own information P to the trusted third party before purchase.
  • the trusted third party forms the purchaser identification number PID for the purchaser number and deposits it into the purchaser information database, and at the same time signs the message SignCA (PID) ) to the purchaser, when the purchase, the purchaser sends SignCA (PID) to the publisher RH and pays, the publisher uses the watermark algorithm to embed the message SignCA (PID) as a fingerprint in the intermediate digital work, forming the final digital work to send to the purchase By.
  • the author and the publisher can obtain the client software from a trusted third party either by downloading it from a trusted third party's website or by directly obtaining a setup disk from a trusted third party.
  • a trusted third party looks up the AU information base and the work repository for review. It can be guaranteed that the work does not have duplicate application rights, and this is also a process of reviewing the legality of copyright.
  • the purchaser obtains the purchaser identification number PID from a trusted third party before purchase, thereby avoiding the participation of a trusted third party in each purchase process.
  • Sending the hash value of the original digital work instead of sending the original digital work itself ensures that the risk of leaking the original digital work does not occur, and that each piece of work can only be claimed once for copyright, and there will be no unrestricted double application; RHID and HashID as a watermark embedded in digital works can effectively reduce the amount of watermark data, thus greatly reducing the requirements of the watermarking algorithm.
  • Fingerprints are also a kind of watermark, except that each legal copy has a different watermark embedded in it, so the image is called a "fingerprint”.
  • CA obtains controversial digital works, original works, and application information submitted by the conscriptor when applying for copyright, and obtains AUID and HashID, RHID and HashID from the controversial works, and obtains from the RH information base and the work information database according to AUID and HashID. Corresponding information, according to RHID and HashID from the RH information base and the work information library to get the corresponding information.
  • the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database.
  • the original digital work needs to be provided only when there is a dispute in the copyright of the work, and it is determined by the nature of the hash function that the original digital work is not forged.
  • the need to compare two kinds of information is equivalent to giving the copyright double insurance.
  • the CA extracts the AUID, RHID, HashID, and PID from it, and processes it in the following three cases:
  • the AUID, RHID, and HashID can be extracted, and the PID cannot be extracted: the illegal communicator is RH himself;
  • the object of the present invention can also be achieved by the following means.
  • the watermark information also includes a watermark for identifying the purchaser, the watermark containing the purchaser identification number.
  • Illegal copies in the form of optical discs need to be discovered by humans.
  • Illegal copies scattered on the network need to be discovered by mobile agents.
  • the mobile agent-based network detector is a distributed suspicious digital work detection module that provides support for active, real-time digital watermark based detection and tracking of illegal copies on the network.
  • Multiple inspection agents are connected through the network and work together with the help of communication agents and database maintenance agents.
  • the detection agent is a mobile agent, which receives the detection task and the target address from a trusted third party, moves to the new target host, completes the detection task of the suspicious digital work, or cooperates with multiple mobile agents. Carpet search for suspicious items on the web. Suspicious works and related information (such as discovery IP, discovery time, etc.) will be stored in the suspicious work library for confirmation by the trusted third party.
  • mobile agents for illegal copy detection fully utilizes the characteristics of mobile agents' self-execution and dynamic adaptation, which can reduce network load and reduce network delay, reduce internal communication volume, and realize real-time automatic detection.
  • Figure 1 Schematic diagram of the system.
  • the legal digital works purchased by the user are embedded with three CA-signed watermarks, one for identifying digital media authors (author information) and one for identifying publishers. (Copyright information), another is used to identify the purchaser (digital fingerprint); when illegal copying of digital works is discovered through a mobile agent or storage medium, it is possible to determine who is illegally spreading based on the extracted three watermarks, for tracing An illegal copy provides evidence.
  • the author information watermark includes an author ID (AUID), the copyright information watermark includes a publisher ID and a work ID, and the digital fingerprint watermark includes a purchaser ID, and the two watermarks are random sequences generated by the corresponding ID after being signed by the CA as a seed.
  • Figure 2 shows the copyright information generation process.
  • the author calculates the hash value calculated by his original digital work and signs it with the private key, along with the application information, to the CA.
  • the CA looks up the AU information base and the work information library to ensure that the work does not have duplicate application rights, and this is also a process of reviewing the legality of the copyright. If the review is qualified, the CA numbers the two messages, generates the AUID and HashID, and stores the relevant information (applicant name, valid ID number, application date, work hash value, etc.) in the AU information base and the work information database.
  • the CA will pass its own signed message SignCA (AUID, HashID) is sent to AU.
  • AU will message SignCA (AUID, HashID) is embedded as a watermark in the original digital work, producing an initial digital work.
  • the publisher RH to register the copyright calculates the hash value of the original digital work and signs it with the private key, along with the application information, to the CA.
  • CA looks up the RH information base and the library of works to ensure that the work does not duplicate the copyright, and it is also a process of reviewing the legality of copyright. If the review is qualified, the CA numbers the two messages, generates the RHID and HashID, and stores the relevant information (applicant name, valid ID number, application date, work hash value, etc.) in the RH information base and the work information database.
  • the CA will pass its own signed message SignCA (RHID, HashID) is sent to RH.
  • RH embeds the message SignCA (RHID, HashID) as a watermark in the original digital work, producing an intermediate digital work.
  • Figure 3 is a digital fingerprint generation process, that is, the purchase process of the purchaser.
  • the purchaser P provides the CA with its own information P before purchase, the CA forms a PID for the P number, stores the purchase information in the purchaser information base, and transmits the CA signed message SignCA (PID) to the P.
  • P sends SignCA (PID) to the publisher RH and pays.
  • RH uses the watermark algorithm to embed the message SignCA (PID) as a fingerprint in the intermediate digital work, and the final digital work is sent to the purchaser.
  • CA obtains controversial digital works, original works, and application information submitted by the conscriptor when applying for copyright, and obtains AUID and HashID, RHID and HashID from the controversial works, and obtains from the RH information base and the work information database according to AUID and HashID. Corresponding information, according to RHID and HashID from the RH information base and the work information library to get the corresponding information.
  • the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database. If both controls yield a consistent result, it can be confirmed that the copyright is owned by the requester; otherwise it is not owned by him.
  • Figure 5 is an illegal copy source confirmation process.
  • the suspicious digital work is handed over to the CA.
  • the CA extracts the AUID, RHID, HashID, and PID from it, and processes it in the following three cases:
  • Figure 6 shows how illegal copy tracking can be performed.
  • This process is closely related to the detection agent structure of Figure 7.
  • the detection agent receives the detection task and the target address from the CA, moves to the new target host, and completes the detection task for the suspicious digital work; or multiple mobile agents cooperate with each other to perform a carpet search on the suspicious works on the network.
  • Suspicious works and related information (such as discovery IP, discovery time, etc.) will be stored in the suspicious work library for CA to confirm the illegal copy source.
  • the specific process is as follows:
  • the Detect/Extract Agent resides on a server or router in the network that filters all multimedia data files residing on the server where it resides. Communicate with the CA and other agents through the communication component, find the local and remote databases, determine whether the relevant record of the multimedia data already exists, if not, the trigger starts the operation component work, and the input interface obtains relevant information from the system through the communication component, and the operation component Call the test program to get a result of whether it is a suspicious work.
  • the output interface stores the suspicious works and related information (such as the discovered IP, discovery time, etc.) into the database for the CA to confirm the illegal copy source.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to the field of digital media copyright protection, and specifically relates to a base service system architecture by means of digital watermark technique and cryptographic technique and a method for implementing digital media copyright protection and tracking illegal copy based on the system, especially a digital watermark work with characteristics of the copyright protection and generation method thereof, which consists in, a user uses digital media on the network or storage medium authorized by the author for free, said digital media includes author information watermark and copyright information watermark. Therefore, the system architecture of digital works copyright protection is implemented by digital watermark technique and cryptographic technique, and commonality of digital media security service is implemented and provided. It protects the copyright of digital media, and can perform security services of copyright confirmation, tracing of illegal copy and source confirmation, and supports every kind of trade and application of digital media in reality.

Description

具有版权保护特性的数字水印作品及其生成方法 Digital watermarking work with copyright protection feature and its generating method
技术领域Technical field
本发明属于数字媒体版权保护领域,具体涉及一种利用数字水印技术和密码技术的基础服务系统的构架以及基于该系统实现数字媒体版权保护、追踪非法拷贝的方法,特别是一种具有版权保护特性的数字水印作品及其生成方法。The invention belongs to the field of digital media copyright protection, and particularly relates to a framework of a basic service system using digital watermark technology and cryptography technology, and a method for realizing digital media copyright protection and tracking illegal copy based on the system, in particular, a copyright protection feature. Digital watermark works and their generation methods.
背景技术Background technique
传统解决数字媒体版权保护问题的技术,包括加密技术、数字签名技术、可信软硬模块等,但是这些技术均有一定的问题:Traditional technologies for solving digital media copyright protection issues, including encryption technology, digital signature technology, trusted software and hardware modules, etc., but these technologies have certain problems:
(1) 加密技术:能够阻止对拷贝的直接访问,但一旦解密数字作品将完全暴露,没有任何保护措施,可以任意拷贝和传播而不受任何限制。(1) Encryption technology: It can block direct access to the copy, but once the decrypted digital work will be completely exposed, without any protection, it can be copied and distributed without any restrictions.
(2) 数字签名技术:提供对信息来源的可靠性和内容的真实性验证。但是数字签名与数字作品相分离,很容易去除,而且只要数字作品稍微修改,签名就无效了。(2) Digital Signature Technology: Provides verification of the authenticity of the source of information and the authenticity of the content. But digital signatures are separated from digital works and are easily removed, and as long as the digital work is slightly modified, the signature is invalid.
(3) 可信模块:通常是防篡改硬件,可以用来保护解密密钥或发行商制定的其它版权保护策略。可信模块要求每个用户对每个数字作品都要有相应硬件,这是不实用的。如果是防窜改软件,现有的软件分析技术很容易使其“防窜改”特性失效。(3) Trusted module: Usually tamper-resistant hardware that can be used to protect decryption keys or other copyright protection policies developed by the publisher. The Trusted Module requires each user to have appropriate hardware for each digital work, which is not practical. In the case of tamper-proof software, existing software analysis techniques can easily disable their "tamper-proof" features.
数字水印技术作为一种新的技术,其具有在数字化的数据内容中嵌入不明显的记号,被嵌入的记号通常是不可见或不可察的,但是通过一些计算操作可以被检测或者被提取。而且数字水印与源数据紧密结合并隐藏其中,成为源数据不可分离的一部分,并可以经历一些不破坏源数据使用价值或商用价值的操作而存活下来。 As a new technology, digital watermarking technology has embedded insignificant marks embedded in digitized data content. The embedded marks are usually invisible or invisible, but can be detected or extracted by some calculation operations. Moreover, the digital watermark is closely integrated with the source data and hidden therein, becoming an inseparable part of the source data, and can survive some operations that do not destroy the use value or commercial value of the source data.
但是,现有技术中未见具有版权保护特性的数字水印作品,所谓版权保护特性指的是至少应该具备两个功能:版权确认和非法拷贝来源追踪。除此之外还可以进一步具备为实现这两个基本功能而增加的一些附加功能,如水印嵌入、水印提取、非法拷贝的获得等。However, there is no digital watermarked work with copyright protection features in the prior art. The so-called copyright protection feature refers to at least two functions: copyright confirmation and illegal copy source tracking. In addition to this, some additional functions added to achieve these two basic functions, such as watermark embedding, watermark extraction, illegal copy acquisition, etc., may be further provided.
发明内容Summary of the invention
本发明基于现有技术中所存在的不足之处,提供一种可以实现版权确认和非法拷贝来源追踪并支持现实中各种方式的数字媒体交易和应用的具有版权保护特性的数字水印作品及其生成方法。The invention is based on the deficiencies in the prior art, and provides a digital watermarked work with copyright protection features that can realize copyright confirmation and illegal copy source tracking and support digital media transactions and applications in various ways in reality. The generation method.
本发明的目的是通过以下途径来实现的。The object of the present invention is achieved by the following route.
具有版权保护特性的数字水印作品,包括数字作品信息和水印信息,水印信息嵌入在数字作品信息中,水印信息包括两个经过可信任第三方签名的水印,一个用来标识数字作品作者,一个用来标识发行商,其中,作者信息水印包含作者身份识别号,发行商信息水印中包含发行商身份识别号和作品身份识别号,水印信息是由相应的身份识别号经过可信任第三方签名后作为种子产生的随机序列。Digital watermarked works with copyright protection features, including digital work information and watermark information, the watermark information is embedded in the digital work information, the watermark information includes two watermarks signed by a trusted third party, one for identifying the author of the digital work, one for To identify the publisher, wherein the author information watermark includes an author identification number, and the publisher information watermark includes a publisher identification number and a work identification number, and the watermark information is used by the corresponding identification number after being signed by a trusted third party. A random sequence produced by the seed.
上述所谓可信任第三方指的是版权保护组织、版权登记中心或类似的组织机构。The above-mentioned so-called trusted third party refers to a copyright protection organization, a copyright registration center or a similar organization.
这样,用户在作者授权的网络或存储介质上免费使用数字媒体,该数字媒体上包含作者信息水印和版权信息水印。当通过移动代理或存储介质发现数字作品非法拷贝的时候,可以根据提取出来的水印确定是谁在进行非法传播,并为追查非法拷贝提供证据。Thus, the user uses the digital media for free on the author's authorized network or storage medium, which contains the author information watermark and the copyright information watermark. When an illegal copy of a digital work is found through a mobile agent or storage medium, it is possible to determine who is illegally spreading based on the extracted watermark and provide evidence for tracing the illegal copy.
利用数字水印技术和密码技术实现数字作品版权保护的系统架构,实现并提供数字媒体安全服务的通用性。它保护的是数字媒体的版权,可以进行版权确认、非法拷贝的追踪和来源确认的安全服务,支持现实中各种方式的数字媒体交易和应用。The system architecture of copyright protection of digital works is realized by digital watermarking technology and cryptography technology, and the versatility of digital media security services is realized and provided. It protects the copyright of digital media, security services for copyright confirmation, illegal copy tracking and source confirmation, and supports digital media transactions and applications in various ways.
具有版权保护特性的数字水印作品的生成方法,包括如下步骤:A method for generating a digital watermarked work with copyright protection features includes the following steps:
1、 作者先要从可信任第三方处得到一个客户端软件,其中包括计算哈希值Hash功能,签名功能,两个不同的水印嵌入功能,作者计算其原始数字作品的哈希值并用私钥签名,连同申请信息一起发送给可信任第三方,可信任第三方查找作者信息库和作品信息库进行审查,如果审查合格,可信任第三方对两条信息编号,产生作者身份识别号AUID和哈希值身份识别号HashID,并将申请人姓名、有效证件号码、申请日期、作品哈希Hash值等相关信息存入作者信息库和作品信息库,可信任第三方将经过自己签名的消息SignCA(AUID, HashID)发送给作者,作者将消息SignCA(AUID, HashID)作为水印嵌入原始数字作品中,产生初始数字作品,1, The author first obtains a client software from a trusted third party, including the calculation of the hash value hash function, the signature function, and two different watermark embedding functions. The author calculates the hash value of the original digital work and signs it with the private key. Together with the application information, it is sent to a trusted third party. The trusted third party looks up the author information base and the work information database for review. If the review is qualified, the trusted third party numbers the two information to generate the author identification number AUID and hash value. The identification number HashID, and the relevant information such as the applicant's name, valid ID number, application date, and hash hash value of the work are stored in the author information database and the work information database, and the trusted third party will sign the signed message (AUID, HashID) is sent to the author, the author embeds the message SignCA (AUID, HashID) as a watermark in the original digital work, producing the initial digital work,
2、 发行商在向可信任第三方要求自己的版权之前,先要从可信任第三方处得到一个客户端软件,其中包括计算哈希值功能,签名功能,两个不同的水印嵌入功能,要注册版权的发行商将原始数字作品的Hash值、作者用私钥签名,连同从作者处获得的作者对原始数字作品的Hash值、发行商的签名和申请信息一起发送给可信任第三方,可信任第三方通过作者信息库和作品信息库比较确认后, 对两条信息编号,产生发行商身份识别号RHID和哈希值身份识别号HashID,并将申请人姓名、有效证件号码、申请日期、作品Hash值等相关信息存入发行商信息库和作品信息库,可信任第三方将经过自己签名的消息SignCA(RHID, HashID)发送给发行商,发行商将消息SignCA(RHID, HashID)作为水印嵌入原始数字作品中,产生中间数字作品,2, Publishers must obtain a client software from a trusted third party before requesting their own copyright from a trusted third party, including the calculation of the hash value function, the signature function, two different watermark embedding functions, and the registration of copyright. The publisher will send the Hash value of the original digital work, the author's private key signature, along with the author's Hash value of the original digital work, the publisher's signature and the application information, to the trusted third party, trusted. After the three parties have confirmed through the author information database and the work information database, The two information numbers are numbered, and the issuer identification number RHID and the hash value identification number HashID are generated, and the applicant's name, valid ID number, application date, work hash value and other related information are stored in the publisher information database and the work information. Library, a trusted third party will sign the self-signed message SignCA (RHID, HashID) is sent to the publisher, who publishes the message SignCA (RHID, HashID) as a watermark in the original digital work, producing an intermediate digital work.
3、 购买者P在购买之前先向可信任第三方提供自己的信息P,可信任第三方对购买者编号形成购买者身份识别号PID,并存入购买者信息库,同时将签名的消息SignCA(PID)发送给购买者,购买时,购买者将SignCA(PID)发送给发行商RH并付费,发行商利用水印算法将消息SignCA(PID)作为指纹嵌入中间数字作品中,形成最终数字作品发送给购买者。3, Purchaser P provides its own information P to the trusted third party before purchase. The trusted third party forms the purchaser identification number PID for the purchaser number and deposits it into the purchaser information database, and at the same time signs the message SignCA (PID) ) to the purchaser, when the purchase, the purchaser sends SignCA (PID) to the publisher RH and pays, the publisher uses the watermark algorithm to embed the message SignCA (PID) as a fingerprint in the intermediate digital work, forming the final digital work to send to the purchase By.
作者以及发行商从可信任第三方获得客户端软件的方式可以是从可信任第三方的网站下载,也可以直接从可信任第三方获得安装盘等。The author and the publisher can obtain the client software from a trusted third party either by downloading it from a trusted third party's website or by directly obtaining a setup disk from a trusted third party.
可信任第三方查找AU信息库和作品信息库进行审查。可以保证该作品没有重复申请版权,同时这也是一个审查版权合法性的过程。A trusted third party looks up the AU information base and the work repository for review. It can be guaranteed that the work does not have duplicate application rights, and this is also a process of reviewing the legality of copyright.
购买之前购买者自行从可信任第三方处获得购买者身份识别号PID,避免了可信任第三方参与每次购买过程。The purchaser obtains the purchaser identification number PID from a trusted third party before purchase, thereby avoiding the participation of a trusted third party in each purchase process.
发送原始数字作品的Hash值而不是发送原始数字作品本身可以保证不发生泄漏原始数字作品的危险,而且也能够保证每件作品只申请一次版权,不会发生无限制重复申请的情况;将RHID和HashID作为水印嵌入数字作品中可以有效降低水印数据量,从而大大降低对水印算法的要求。Sending the hash value of the original digital work instead of sending the original digital work itself ensures that the risk of leaking the original digital work does not occur, and that each piece of work can only be claimed once for copyright, and there will be no unrestricted double application; RHID and HashID as a watermark embedded in digital works can effectively reduce the amount of watermark data, thus greatly reducing the requirements of the watermarking algorithm.
指纹其实也是一种水印,只不过每一个合法拷贝中嵌入不同的水印,所以形象的称为“指纹”。Fingerprints are also a kind of watermark, except that each legal copy has a different watermark embedded in it, so the image is called a "fingerprint".
当数字作品版权出现纷争时需要进行版权确认,确定版权归属。CA得到有争议的数字作品、原始作品以及要求确认者申请版权时提交的申请信息,从有争议作品中得到AUID和HashID、RHID和HashID,根据AUID和HashID从RH信息库和作品信息库中得到相应信息,根据RHID和HashID从RH信息库和作品信息库中得到相应信息。如果得到AUID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从AU作品数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认作者的版权归要求确认;否则不归他所有。如果得到RHID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认版权归要求确认者所有;否则不归他所有。从上述两个阶段过程中,我们可以实现确认作者版权和发行商版权。从而可以实现对用户非法侵犯发行商权益或作者权益的确认;或可以发现发行商对作者权益的侵犯。When there is a dispute over the copyright of digital works, copyright confirmation is required to determine the copyright attribution. CA obtains controversial digital works, original works, and application information submitted by the conscriptor when applying for copyright, and obtains AUID and HashID, RHID and HashID from the controversial works, and obtains from the RH information base and the work information database according to AUID and HashID. Corresponding information, according to RHID and HashID from the RH information base and the work information library to get the corresponding information. If the AUID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database. If both controls yield a consistent result, it can be confirmed that the copyright is owned by the requester; otherwise it is not owned by him. From the above two stages, we can confirm the author's copyright and publisher's copyright. Therefore, it is possible to confirm the illegal infringement of the publisher's rights or the author's rights of the user; or the publisher's violation of the author's rights can be found.
可以看出只有当作品版权出现纠纷的时候才需要提供原始数字作品,而且由哈希函数的性质可以确定原始数字作品不是伪造的。需要对照两种信息相当于给版权上了双保险。It can be seen that the original digital work needs to be provided only when there is a dispute in the copyright of the work, and it is determined by the nature of the hash function that the original digital work is not forged. The need to compare two kinds of information is equivalent to giving the copyright double insurance.
当发现可疑非法拷贝的时候,将可疑数字作品交给CA。CA从中提取AUID、RHID、HashID和PID,分以下三种情况分别处理:When a suspicious illegal copy is found, the suspicious digital work is handed over to the CA. The CA extracts the AUID, RHID, HashID, and PID from it, and processes it in the following three cases:
(1) 能提取出AUID、RHID、HashID,不能提取出PID:非法传播者是RH自己;(1) The AUID, RHID, and HashID can be extracted, and the PID cannot be extracted: the illegal communicator is RH himself;
(2) 能提取出AUID,不能提取出RHID、HashID、PID:是一件没有申请发行版权的作品;(2) Can extract AUID, can't extract RHID, HashID, PID: it is a work that has not applied for copyright;
(3) 能提取出AUID、RHID、HashID、PID:非法传播则是用户。(3) Can extract AUID, RHID, HashID, PID: illegal communication is the user.
有了这些证据,使得追查非法拷贝容易了许多。With this evidence, it is much easier to track down illegal copies.
本发明的目的还可以通过以下途径来实现。The object of the present invention can also be achieved by the following means.
水印信息中还包括一个用来标识购买者的水印,该水印包含购买者身份识别号。The watermark information also includes a watermark for identifying the purchaser, the watermark containing the purchaser identification number.
以光盘等形式存在的非法拷贝需要人力来发现,散布在网络上的非法拷贝就需要用移动代理来发现了。Illegal copies in the form of optical discs need to be discovered by humans. Illegal copies scattered on the network need to be discovered by mobile agents.
基于移动代理商的网络探测器是一个分布式可疑数字作品检测模块,它为在网络上进行主动、实时地基于数字水印的检测和追踪非法拷贝提供支持。多个检测代理商通过网络相连,在通信代理商和数据库维护代理商的帮助下协同工作。检测代理商是可移动代理商,它从可信任第三方处接收检测任务和目标地址,移动到这一新的目标主机,完成对可疑数字作品的检测任务;或者多个移动代理商互相配合,对网络上的可疑作品进行地毯式搜索。将发现的可疑作品及其相关信息(如发现地IP、发现时间等)存入可疑作品库,供可信任第三方进行非法拷贝来源确认。The mobile agent-based network detector is a distributed suspicious digital work detection module that provides support for active, real-time digital watermark based detection and tracking of illegal copies on the network. Multiple inspection agents are connected through the network and work together with the help of communication agents and database maintenance agents. The detection agent is a mobile agent, which receives the detection task and the target address from a trusted third party, moves to the new target host, completes the detection task of the suspicious digital work, or cooperates with multiple mobile agents. Carpet search for suspicious items on the web. Suspicious works and related information (such as discovery IP, discovery time, etc.) will be stored in the suspicious work library for confirmation by the trusted third party.
使用移动代理进行非法拷贝检测充分利用了移动代理商自主执行,动态适应的特点,可以减轻网络负载和减小网络延时,减少系统内部通信量,实现实时自动检测。The use of mobile agents for illegal copy detection fully utilizes the characteristics of mobile agents' self-execution and dynamic adaptation, which can reduce network load and reduce network delay, reduce internal communication volume, and realize real-time automatic detection.
附图说明DRAWINGS
图1:系统示意图。Figure 1: Schematic diagram of the system.
图2:版权信息生成。Figure 2: Copyright information generation.
图3:数字指纹生成。Figure 3: Digital fingerprint generation.
图4:版权确认。Figure 4: Copyright Confirmation.
图5:非法拷贝来源确认。Figure 5: Illegal copy source confirmation.
图6:非法拷贝追踪。Figure 6: Illegal copy tracking.
图7:检测Agent结构。Figure 7: Detecting the Agent structure.
具体实施方式detailed description
在图1中揭示了整个系统四个实体之间的关系,用户购买的合法数字作品中嵌有三个经过CA签名的水印,一个用来标识数字媒体作者(作者信息),一个用来标识发行商(版权信息),另一个用来标识购买者(数字指纹);当通过移动代理或存储介质发现数字作品非法拷贝的时候,可以根据提取出来的三个水印确定是谁在进行非法传播,为追查非法拷贝提供证据。其中,作者信息水印包含作者ID(AUID),版权信息水印中包含发行商ID和作品ID,数字指纹水印包含购买者ID,两个水印是由相应ID经过CA签名后作为种子产生的随机序列。In Figure 1, the relationship between the four entities of the whole system is revealed. The legal digital works purchased by the user are embedded with three CA-signed watermarks, one for identifying digital media authors (author information) and one for identifying publishers. (Copyright information), another is used to identify the purchaser (digital fingerprint); when illegal copying of digital works is discovered through a mobile agent or storage medium, it is possible to determine who is illegally spreading based on the extracted three watermarks, for tracing An illegal copy provides evidence. The author information watermark includes an author ID (AUID), the copyright information watermark includes a publisher ID and a work ID, and the digital fingerprint watermark includes a purchaser ID, and the two watermarks are random sequences generated by the corresponding ID after being signed by the CA as a seed.
图2表明了版权信息生成过程。作者计算其原始数字作品计算的Hash值并用私钥签名,连同申请信息一起发送给CA。CA查找AU信息库和作品信息库,保证该作品没有重复申请版权,同时这也是一个审查版权合法性的过程。如果审查合格,CA对两条信息编号,产生AUID和HashID,并将相关信息(申请人姓名、有效证件号码、申请日期、作品Hash值等)存入AU信息库和作品信息库。CA将经过自己签名的消息SignCA(AUID, HashID)发送给AU。AU将消息SignCA(AUID, HashID)作为水印嵌入原始数字作品中,产生初始数字作品。要注册版权的发行商RH计算原始数字作品的Hash值并用私钥签名,连同申请信息一起发送给CA。CA查找RH信息库和作品信息库,保证该作品没有重复申请版权,同时这也是一个审查版权合法性的过程。如果审查合格,CA对两条信息编号,产生RHID和HashID,并将相关信息(申请人姓名、有效证件号码、申请日期、作品Hash值等)存入RH信息库和作品信息库。CA将经过自己签名的消息SignCA(RHID, HashID)发送给RH。RH将消息SignCA(RHID, HashID)作为水印嵌入原始数字作品中,产生中间数字作品。Figure 2 shows the copyright information generation process. The author calculates the hash value calculated by his original digital work and signs it with the private key, along with the application information, to the CA. The CA looks up the AU information base and the work information library to ensure that the work does not have duplicate application rights, and this is also a process of reviewing the legality of the copyright. If the review is qualified, the CA numbers the two messages, generates the AUID and HashID, and stores the relevant information (applicant name, valid ID number, application date, work hash value, etc.) in the AU information base and the work information database. The CA will pass its own signed message SignCA (AUID, HashID) is sent to AU. AU will message SignCA (AUID, HashID) is embedded as a watermark in the original digital work, producing an initial digital work. The publisher RH to register the copyright calculates the hash value of the original digital work and signs it with the private key, along with the application information, to the CA. CA looks up the RH information base and the library of works to ensure that the work does not duplicate the copyright, and it is also a process of reviewing the legality of copyright. If the review is qualified, the CA numbers the two messages, generates the RHID and HashID, and stores the relevant information (applicant name, valid ID number, application date, work hash value, etc.) in the RH information base and the work information database. The CA will pass its own signed message SignCA (RHID, HashID) is sent to RH. RH embeds the message SignCA (RHID, HashID) as a watermark in the original digital work, producing an intermediate digital work.
图3是数字指纹生成过程,也就是购买者的购买过程。购买者P在购买之前先向CA提供自己的信息P,CA对P编号形成PID,将购买信息存入购买者信息库,并将CA签名的消息SignCA(PID)发送给P。购买时,P将SignCA(PID)发送给发行商RH并付费,RH利用水印算法将消息SignCA(PID)作为指纹嵌入中间数字作品中,形成最终数字作品发送给购买者。Figure 3 is a digital fingerprint generation process, that is, the purchase process of the purchaser. The purchaser P provides the CA with its own information P before purchase, the CA forms a PID for the P number, stores the purchase information in the purchaser information base, and transmits the CA signed message SignCA (PID) to the P. At the time of purchase, P sends SignCA (PID) to the publisher RH and pays. RH uses the watermark algorithm to embed the message SignCA (PID) as a fingerprint in the intermediate digital work, and the final digital work is sent to the purchaser.
在图4中表明如何进行版权确认。当数字作品版权出现纷争时需要进行版权确认,确定版权归属。 CA得到有争议的数字作品、原始作品以及要求确认者申请版权时提交的申请信息,从有争议作品中得到AUID和HashID、RHID和HashID,根据AUID和HashID从RH信息库和作品信息库中得到相应信息,根据RHID和HashID从RH信息库和作品信息库中得到相应信息。如果得到AUID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从AU作品数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认作者的版权归要求确认;否则不归他所有。如果得到RHID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认版权归要求确认者所有;否则不归他所有。How to perform copyright confirmation is shown in FIG. When there is a dispute over the copyright of digital works, copyright confirmation is required to determine the copyright attribution. CA obtains controversial digital works, original works, and application information submitted by the conscriptor when applying for copyright, and obtains AUID and HashID, RHID and HashID from the controversial works, and obtains from the RH information base and the work information database according to AUID and HashID. Corresponding information, according to RHID and HashID from the RH information base and the work information library to get the corresponding information. If the AUID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database. If both controls yield a consistent result, it can be confirmed that the copyright is owned by the requester; otherwise it is not owned by him.
图5是非法拷贝来源确认过程。当发现可疑非法拷贝的时候,将可疑数字作品交给CA。CA从中提取AUID、RHID、HashID和PID,分以下三种情况分别处理:Figure 5 is an illegal copy source confirmation process. When a suspicious illegal copy is found, the suspicious digital work is handed over to the CA. The CA extracts the AUID, RHID, HashID, and PID from it, and processes it in the following three cases:
(4) 能提取出AUID、RHID、HashID,不能提取出PID:非法传播者是RH自己;(4) Can extract AUID, RHID, HashID, can not extract PID: illegal communicator is RH himself;
(5) 能提取出AUID,不能提取出RHID、HashID、PID:是一件没有申请发行版权的作品;(5) Can extract AUID, can't extract RHID, HashID, PID: it is a work that has not applied for copyright;
(6) 能提取出AUID、RHID、HashID、PID:非法传播则是用户。(6) Can extract AUID, RHID, HashID, PID: illegal communication is the user.
图6中揭示了如何进行非法拷贝追踪,这一过程与图7的检测Agent结构密切相关。检测Agent从CA处接收检测任务和目标地址,移动到这一新的目标主机,完成对可疑数字作品的检测任务;或者多个移动Agent互相配合,对网络上的可疑作品进行地毯式搜索。将发现的可疑作品及其相关信息(如发现地IP、发现时间等)存入可疑作品库,供CA进行非法拷贝来源确认。具体过程如下:Figure 6 shows how illegal copy tracking can be performed. This process is closely related to the detection agent structure of Figure 7. The detection agent receives the detection task and the target address from the CA, moves to the new target host, and completes the detection task for the suspicious digital work; or multiple mobile agents cooperate with each other to perform a carpet search on the suspicious works on the network. Suspicious works and related information (such as discovery IP, discovery time, etc.) will be stored in the suspicious work library for CA to confirm the illegal copy source. The specific process is as follows:
检测/提取Agent驻留于网络中的服务器或路由器上,它对驻留在其所在服务器的所有多媒体数据文件进行筛选。通过通信构件与CA和其它Agent通信,查找本地和远程数据库,确定是否已经存在该多媒体数据的相关记录,如果没有,触发器启动操作构件工作,输入接口通过通信构件从系统得到相关信息,操作构件调用检测程序得到是否是可疑作品的结果。输出接口将可疑作品及相关信息(如发现地IP、发现时间等)存入数据库,供CA进行非法拷贝来源确认。The Detect/Extract Agent resides on a server or router in the network that filters all multimedia data files residing on the server where it resides. Communicate with the CA and other agents through the communication component, find the local and remote databases, determine whether the relevant record of the multimedia data already exists, if not, the trigger starts the operation component work, and the input interface obtains relevant information from the system through the communication component, and the operation component Call the test program to get a result of whether it is a suspicious work. The output interface stores the suspicious works and related information (such as the discovered IP, discovery time, etc.) into the database for the CA to confirm the illegal copy source.

Claims (8)

  1. 具有版权保护特性的数字水印作品,其特征在于,包括数字作品信息和水印信息,水印信息嵌入在数字作品信息中,水印信息包括两个经过可信任第三方签名的水印,一个用来标识数字作品作者,一个用来标识发行商,其中,作者信息水印包含作者身份识别号,发行商信息水印中包含发行商身份识别号和作品身份识别号,水印信息是由相应的身份识别号经过可信任第三方签名后作为种子产生的随机序列。 A digital watermarked work having copyright protection features, comprising digital work information and watermark information embedded in digital work information, the watermark information comprising two watermarks signed by a trusted third party, and one for identifying digital works The author, one is used to identify the publisher, wherein the author information watermark contains the author identification number, the publisher information watermark contains the publisher identification number and the work identification number, and the watermark information is trusted by the corresponding identification number. A random sequence generated as a seed after the three-party signature.
  2. 根据权利要求1所述的具有版权保护特性的数字水印作品,其特征在于,水印信息中还包括一个用来标识购买者的水印,该水印包含购买者身份识别号。The digital watermarked work with copyright protection feature according to claim 1, wherein the watermark information further comprises a watermark for identifying the purchaser, the watermark containing the purchaser identification number.
  3. 具有版权保护特性的数字水印作品的生成方法,其特征在于,包括如下步骤: 作者先从可信任第三方处得到一个客户端软件,其中包括计算哈希值 Hash 功能,签名功能,两个不同的水印嵌入功能,作者计算其原始数字作品的哈希值并用私钥签名,连同申请信息一起发送给可信任第三方,可信任第三方查找作者信息库和作品信息库进行审查,如果审查合格,可信任第三方对两条信息编号,产生作者身份识别号 AUID 和哈希值身份识别号 HashID ,并将申请人姓名、有效证件号码、申请日期、作品哈希 Hash 值等相关信息存入作者信息库和作品信息库,可信任第三方将经过自己签名的消息 SignCA(AUID, HashID) 发送给作者,作者将消息 SignCA(AUID, HashID) 作为水印嵌入原始数字作品中,产生初始数字作品, 发行商在向可信任第三方要求自己的版权之前,先要从可信任第三方处得到一个客户端软件,其中包括计算哈希值功能,签名功能,两个不同的水印嵌入功能,要注册版权的发行商将原始数字作品的 Hash 值、作者用私钥签名,连同从作者处获得的作者对原始数字作品的 Hash 值、发行商的签名和申请信息一起发送给可信任第三方,可信任第三方通过作者信息库和作品信息库比较确认后, 对两条信息编号,产生发行商身份识别号 RHID 和哈希值身份识别号 HashID ,并将申请人姓名、有效证件号码、申请日期、作品 Hash 值等相关信息存入发行商信息库和作品信息库,可信任第三方将经过自己签名的消息 SignCA(RHID, HashID) 发送给发行商,发行商将消息 SignCA(RHID, HashID) 作为水印嵌入原始数字作品中,产生中间数字作品, 购买者 P 在购买之前先向可信任第三方提供自己的信息 P ,可信任第三方对购买者编号形成购买者身份识别号 PID ,并存入购买者信息库,同时将签名的消息 SignCA(PID) 发送给购买者,购买时,购买者将 SignCA(PID) 发送给发行商 RH 并付费,发行商利用水印算法将消息 SignCA(PID) 作为指纹嵌入中间数字作品中,形成最终数字作品发送给购买者。A method for generating a digital watermarked work with copyright protection features, comprising the steps of: The author first obtains a client software from a trusted third party, including calculating the hash value. Function, signature function, two different watermark embedding functions, the author calculates the hash value of the original digital work and signs it with the private key, together with the application information, sends it to a trusted third party, and the trusted third party finds the author information base and the work information. The library is reviewed, and if the review is qualified, the trusted third party numbers the two messages to generate the author identification number. AUID and hash value identification number HashID, and the applicant's name, valid ID number, application date, work hash Hash Relevant information such as values is stored in the author information base and the work information database, and the trusted third party sends the signed message MessageCA (AUID, HashID) to the author, and the author will message SignCA (AUID, HashID) is embedded as a watermark in the original digital work, producing an initial digital work, Publishers must obtain a client software from a trusted third party before requesting their own copyright from a trusted third party, including the calculation of the hash value function, the signature function, two different watermark embedding functions, and the registration of copyright. Publisher of the original digital works The Hash value, the author's signature with the private key, along with the author's Hash of the original digital work obtained from the author The value, the publisher's signature and the application information are sent to the trusted third party. After the trusted third party compares and confirms the author information database and the work information database, the two information numbers are numbered to generate the issuer identification number RHID. And hash value identification number HashID, and the applicant's name, valid ID number, application date, work Hash Values and other related information are stored in the publisher's information base and the work information database. The trusted third party sends the self-signed message SignCA (RHID, HashID) to the publisher, and the publisher will send the message. SignCA (RHID, HashID) is embedded as a watermark in the original digital work, producing an intermediate digital work. Purchaser P provides his or her own information to a trusted third party before purchasing. The trusted third party forms the purchaser identification number PID of the purchaser number and deposits it in the buyer information database, and sends the signed message SignCA (PID) to the purchaser. At the time of purchase, the purchaser will SignCA (PID) is sent to the publisher RH and paid, and the publisher uses the watermark algorithm to send the message SignCA(PID) As a fingerprint embedded in the intermediate digital work, the final digital work is formed and sent to the purchaser.
  4. 根据权利要求2所述的具有版权保护特性的数字水印作品生成方法,其特征在于,作者以及发行商从可信任第三方获得客户端软件的方式或者是从可信任第三方的网站下载,或者是直接从可信任第三方获得安装盘。A method for generating a digital watermarked work with copyright protection characteristics according to claim 2, wherein the author and the publisher obtain the client software from a trusted third party or download it from a trusted third party website, or Get the installation disk directly from a trusted third party.
  5. 根据权利要求2所述的具有版权保护特性的数字水印作品生成方法,其特征在于,购买之前购买者自行从可信任第三方处获得购买者身份识别号PID。The digital watermark creation method with copyright protection feature according to claim 2, wherein the purchaser obtains the purchaser identification number PID from the trusted third party before the purchase.
  6. 根据权利要求2所述的具有版权保护特性的数字水印作品生成方法,其特征在于,当数字作品版权出现纷争时需要进行版权确认,确定版权归属,CA得到有争议的数字作品、原始作品以及要求确认者申请版权时提交的申请信息,从有争议作品中得到AUID和HashID、RHID和HashID,根据AUID和HashID从RH信息库和作品信息库中得到相应信息,根据RHID和HashID从RH信息库和作品信息库中得到相应信息。如果得到AUID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从AU作品数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认作者的版权归要求确认;否则不归他所有。如果得到RHID和HashID失败,则认为数字作品没有正当版权,否则计算原始数字作品的Hash,与从数据库中得到的Hash对照,并且对照现在提交的申请信息与从CA数据库中得到的申请信息。如果两次对照都得出相符合的结果,可以确认版权归要求确认者所有;否则不归他所有。从上述两个阶段过程中,我们可以实现确认作者版权和发行商版权。从而可以实现对用户非法侵犯发行商权益或作者权益的确认;或可以发现发行商对作者权益的侵犯。The method for generating a digital watermarked work with copyright protection characteristics according to claim 2, wherein when there is a dispute over the copyright of the digital work, copyright confirmation is required to determine the copyright attribution, and the CA obtains the controversial digital work, the original work, and the request. The application information submitted by the confirmer when applying for copyright, obtains AUID and HashID, RHID and HashID from the disputed works, and obtains corresponding information from the RH information base and the work information database according to AUID and HashID, according to RHID and HashID from the RH information base and The corresponding information is obtained in the work repository. If the AUID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database. If both controls yield a consistent result, it can be confirmed that the copyright is owned by the requester; otherwise it is not owned by him. From the above two stages, we can confirm the author's copyright and publisher's copyright. Therefore, it is possible to confirm the illegal infringement of the publisher's rights or the author's rights of the user; or the publisher's violation of the author's rights can be found.
  7. 根据权利要求2所述的具有版权保护特性的数字水印作品生成方法,其特征在于,还包括有网络检测代理商,其为可移动代理商,它从可信任第三方处接收检测任务和目标地址,移动到这一新的目标主机,完成对可疑数字作品的检测任务;或者多个移动代理商互相配合,对网络上的可疑作品进行地毯式搜索。The digital watermark creation method with copyright protection feature according to claim 2, further comprising a network detection agent, which is a mobile agent, which receives the detection task and the target address from the trusted third party. Move to this new target host to complete the task of detecting suspicious digital works; or multiple mobile agents work together to perform a carpet search on suspicious works on the network.
  8. 根据权利要求7所述的具有版权保护特性的数字水印作品生成方法,其特征在于,基于移动代理商的网络探测器是一个分布式可疑数字作品检测模块。The digital watermark creation method with copyright protection feature according to claim 7, wherein the mobile agent based network detector is a distributed suspicious digital work detection module.
PCT/CN2010/080376 2010-12-28 2010-12-28 Digital watermark works with characteristics of copyright protection and generation method thereof WO2012088663A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/080376 WO2012088663A1 (en) 2010-12-28 2010-12-28 Digital watermark works with characteristics of copyright protection and generation method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/080376 WO2012088663A1 (en) 2010-12-28 2010-12-28 Digital watermark works with characteristics of copyright protection and generation method thereof

Publications (1)

Publication Number Publication Date
WO2012088663A1 true WO2012088663A1 (en) 2012-07-05

Family

ID=46382180

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/080376 WO2012088663A1 (en) 2010-12-28 2010-12-28 Digital watermark works with characteristics of copyright protection and generation method thereof

Country Status (1)

Country Link
WO (1) WO2012088663A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049682A (en) * 2013-01-28 2013-04-17 上海理工大学 Character pitch encoding-based dual-watermark embedded text watermarking method
CN103294937A (en) * 2013-06-28 2013-09-11 玉林师范学院 Software protection system and software protection method
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN109727134A (en) * 2018-12-29 2019-05-07 北京奇虎科技有限公司 A kind of copyright trading method and device of picture
CN109766672A (en) * 2019-01-14 2019-05-17 湖南大学 A kind of core copyright anonymous authentication method
CN110110500A (en) * 2019-06-04 2019-08-09 施建锋 Has the decentralization image copyright protection system and method that infringement detects immediately
CN110580405A (en) * 2019-08-16 2019-12-17 湖北工业大学 Picture copyright protection system and method based on social network
CN111667395A (en) * 2020-06-03 2020-09-15 南京师范大学 Three-dimensional model copyright authentication method
CN112069496A (en) * 2020-09-10 2020-12-11 杭州锘崴信息科技有限公司 Work updating system, method, device and storage medium for protecting information
CN112258323A (en) * 2020-10-22 2021-01-22 苏州市星际云通区块链科技有限公司 Block chain-based digital copyright registration method and terminal equipment
CN113706344A (en) * 2021-08-05 2021-11-26 武汉大学 Block chain-based digital copyright protection method
CN113782122A (en) * 2021-08-09 2021-12-10 中国中医科学院中医药信息研究所 Electronic informed consent method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558303A (en) * 2004-02-11 2004-12-29 北京邮电大学 Digital watermarking infrastructure
CN101196970A (en) * 2007-12-29 2008-06-11 武汉理工大学 Digital copyright management system based on digital watermarking and mobile proxy
US20080225311A1 (en) * 2007-03-12 2008-09-18 Fuji Xerox Co., Ltd. Image forming apparatus, image forming method and computer readable medium
CN101449508A (en) * 2006-03-14 2009-06-03 奥多比公司 Protecting the integrity of electronically derivative works
CN101512512A (en) * 2006-08-31 2009-08-19 微软公司 Software authorization utilizing software reputation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558303A (en) * 2004-02-11 2004-12-29 北京邮电大学 Digital watermarking infrastructure
CN101449508A (en) * 2006-03-14 2009-06-03 奥多比公司 Protecting the integrity of electronically derivative works
CN101512512A (en) * 2006-08-31 2009-08-19 微软公司 Software authorization utilizing software reputation
US20080225311A1 (en) * 2007-03-12 2008-09-18 Fuji Xerox Co., Ltd. Image forming apparatus, image forming method and computer readable medium
CN101196970A (en) * 2007-12-29 2008-06-11 武汉理工大学 Digital copyright management system based on digital watermarking and mobile proxy

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049682B (en) * 2013-01-28 2015-04-01 上海理工大学 Character pitch encoding-based dual-watermark embedded text watermarking method
CN103049682A (en) * 2013-01-28 2013-04-17 上海理工大学 Character pitch encoding-based dual-watermark embedded text watermarking method
CN103294937A (en) * 2013-06-28 2013-09-11 玉林师范学院 Software protection system and software protection method
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN109727134A (en) * 2018-12-29 2019-05-07 北京奇虎科技有限公司 A kind of copyright trading method and device of picture
CN109727134B (en) * 2018-12-29 2024-04-05 三六零科技集团有限公司 Picture copyright trading method and device
CN109766672B (en) * 2019-01-14 2022-07-12 湖南大学 Anonymous authentication method for core copyright
CN109766672A (en) * 2019-01-14 2019-05-17 湖南大学 A kind of core copyright anonymous authentication method
CN110110500B (en) * 2019-06-04 2023-04-07 施建锋 Decentralized image copyright protection system and method with immediate infringement detection function
CN110110500A (en) * 2019-06-04 2019-08-09 施建锋 Has the decentralization image copyright protection system and method that infringement detects immediately
CN110580405B (en) * 2019-08-16 2022-07-05 湖北工业大学 Picture copyright protection system and method based on social network
CN110580405A (en) * 2019-08-16 2019-12-17 湖北工业大学 Picture copyright protection system and method based on social network
CN111667395A (en) * 2020-06-03 2020-09-15 南京师范大学 Three-dimensional model copyright authentication method
CN112069496A (en) * 2020-09-10 2020-12-11 杭州锘崴信息科技有限公司 Work updating system, method, device and storage medium for protecting information
CN112069496B (en) * 2020-09-10 2024-04-26 杭州锘崴信息科技有限公司 System, method, device and storage medium for checking new works of protection information
CN112258323A (en) * 2020-10-22 2021-01-22 苏州市星际云通区块链科技有限公司 Block chain-based digital copyright registration method and terminal equipment
CN113706344A (en) * 2021-08-05 2021-11-26 武汉大学 Block chain-based digital copyright protection method
CN113706344B (en) * 2021-08-05 2024-03-01 武汉大学 Digital copyright protection method based on block chain
CN113782122A (en) * 2021-08-09 2021-12-10 中国中医科学院中医药信息研究所 Electronic informed consent method and system
CN113782122B (en) * 2021-08-09 2024-04-16 中国中医科学院中医药信息研究所 Electronic informed consent method and system

Similar Documents

Publication Publication Date Title
WO2012088663A1 (en) Digital watermark works with characteristics of copyright protection and generation method thereof
Piva et al. Managing copyright in open networks
Zhao A WWW service to embed and prove digital copyright watermarks
RU2331917C2 (en) Issue of licensies for autonomous usage of publication instruments in rights controlling system for drm digital content
Zhao Applying digital watermarking techniques to online multimedia commerce
JP5330488B2 (en) Method and apparatus for safely distributing content
US20200226233A1 (en) Distributed ledger-based digital content piracy deterrence
CN103942470B (en) A kind of electronic audiovisual product copyright managing method with function of tracing to the source
JP2004503880A (en) Provision and authentication service system and method based on digital watermarking technology
WO2002080442A1 (en) Information processing apparatus
JP2006504176A (en) Method and apparatus for permitting content operation
JP7133589B2 (en) NFT Access Restriction System and NFT Access Restriction Program
CN100428107C (en) Digital watermarking infrastructure
JP4987978B2 (en) Digital content supply system using digital fingerprinting
CN116167017A (en) Shoe original design AI digital copyright management system based on blockchain technology
Cheung et al. A watermarking infrastructure for enterprise document management
Delaigle et al. Digital images protection techniques in a broadcast framework: an overview
KR100773963B1 (en) Fingerprinting management system and method for delivering fingerprint code
Cheung et al. Rights protection for digital contents redistribution over the Internet
Cheung et al. The use of digital watermarking for intelligence multimedia document distribution
He et al. Digital right management model based on cryptography and digital watermarking
JP2001052072A (en) Contents distributing method and recording medium recording contents distribution program therefor
Song et al. A blockchain based Buyer-seller Watermark Protocol with Trustless Third party
KR20010087808A (en) System and method of providing and authenticating works of authorship based on watermarking technique
Adelsbach et al. Towards multilateral secure digital rights distribution infrastructures

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10861366

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 03/09/2013)

122 Ep: pct application non-entry in european phase

Ref document number: 10861366

Country of ref document: EP

Kind code of ref document: A1