WO2012088663A1 - Digital watermark works with characteristics of copyright protection and generation method thereof - Google Patents

Digital watermark works with characteristics of copyright protection and generation method thereof Download PDF

Info

Publication number
WO2012088663A1
WO2012088663A1 PCT/CN2010/080376 CN2010080376W WO2012088663A1 WO 2012088663 A1 WO2012088663 A1 WO 2012088663A1 CN 2010080376 W CN2010080376 W CN 2010080376W WO 2012088663 A1 WO2012088663 A1 WO 2012088663A1
Authority
WO
WIPO (PCT)
Prior art keywords
work
information
digital
copyright
author
Prior art date
Application number
PCT/CN2010/080376
Other languages
French (fr)
Chinese (zh)
Inventor
黄正全
王健
姜楠
Original Assignee
北京邮电大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京邮电大学 filed Critical 北京邮电大学
Priority to PCT/CN2010/080376 priority Critical patent/WO2012088663A1/en
Publication of WO2012088663A1 publication Critical patent/WO2012088663A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/103Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right

Abstract

The present invention relates to the field of digital media copyright protection, and specifically relates to a base service system architecture by means of digital watermark technique and cryptographic technique and a method for implementing digital media copyright protection and tracking illegal copy based on the system, especially a digital watermark work with characteristics of the copyright protection and generation method thereof, which consists in, a user uses digital media on the network or storage medium authorized by the author for free, said digital media includes author information watermark and copyright information watermark. Therefore, the system architecture of digital works copyright protection is implemented by digital watermark technique and cryptographic technique, and commonality of digital media security service is implemented and provided. It protects the copyright of digital media, and can perform security services of copyright confirmation, tracing of illegal copy and source confirmation, and supports every kind of trade and application of digital media in reality.

Description

 Digital watermarking work with copyright protection feature and its generating method

Technical field

The invention belongs to the field of digital media copyright protection, and particularly relates to a framework of a basic service system using digital watermark technology and cryptography technology, and a method for realizing digital media copyright protection and tracking illegal copy based on the system, in particular, a copyright protection feature. Digital watermark works and their generation methods.

Background technique

Traditional technologies for solving digital media copyright protection issues, including encryption technology, digital signature technology, trusted software and hardware modules, etc., but these technologies have certain problems:

(1) Encryption technology: It can block direct access to the copy, but once the decrypted digital work will be completely exposed, without any protection, it can be copied and distributed without any restrictions.

(2) Digital Signature Technology: Provides verification of the authenticity of the source of information and the authenticity of the content. But digital signatures are separated from digital works and are easily removed, and as long as the digital work is slightly modified, the signature is invalid.

(3) Trusted module: Usually tamper-resistant hardware that can be used to protect decryption keys or other copyright protection policies developed by the publisher. The Trusted Module requires each user to have appropriate hardware for each digital work, which is not practical. In the case of tamper-proof software, existing software analysis techniques can easily disable their "tamper-proof" features.

As a new technology, digital watermarking technology has embedded insignificant marks embedded in digitized data content. The embedded marks are usually invisible or invisible, but can be detected or extracted by some calculation operations. Moreover, the digital watermark is closely integrated with the source data and hidden therein, becoming an inseparable part of the source data, and can survive some operations that do not destroy the use value or commercial value of the source data.

However, there is no digital watermarked work with copyright protection features in the prior art. The so-called copyright protection feature refers to at least two functions: copyright confirmation and illegal copy source tracking. In addition to this, some additional functions added to achieve these two basic functions, such as watermark embedding, watermark extraction, illegal copy acquisition, etc., may be further provided.

Summary of the invention

The invention is based on the deficiencies in the prior art, and provides a digital watermarked work with copyright protection features that can realize copyright confirmation and illegal copy source tracking and support digital media transactions and applications in various ways in reality. The generation method.

The object of the present invention is achieved by the following route.

Digital watermarked works with copyright protection features, including digital work information and watermark information, the watermark information is embedded in the digital work information, the watermark information includes two watermarks signed by a trusted third party, one for identifying the author of the digital work, one for To identify the publisher, wherein the author information watermark includes an author identification number, and the publisher information watermark includes a publisher identification number and a work identification number, and the watermark information is used by the corresponding identification number after being signed by a trusted third party. A random sequence produced by the seed.

The above-mentioned so-called trusted third party refers to a copyright protection organization, a copyright registration center or a similar organization.

Thus, the user uses the digital media for free on the author's authorized network or storage medium, which contains the author information watermark and the copyright information watermark. When an illegal copy of a digital work is found through a mobile agent or storage medium, it is possible to determine who is illegally spreading based on the extracted watermark and provide evidence for tracing the illegal copy.

The system architecture of copyright protection of digital works is realized by digital watermarking technology and cryptography technology, and the versatility of digital media security services is realized and provided. It protects the copyright of digital media, security services for copyright confirmation, illegal copy tracking and source confirmation, and supports digital media transactions and applications in various ways.

A method for generating a digital watermarked work with copyright protection features includes the following steps:

1, The author first obtains a client software from a trusted third party, including the calculation of the hash value hash function, the signature function, and two different watermark embedding functions. The author calculates the hash value of the original digital work and signs it with the private key. Together with the application information, it is sent to a trusted third party. The trusted third party looks up the author information base and the work information database for review. If the review is qualified, the trusted third party numbers the two information to generate the author identification number AUID and hash value. The identification number HashID, and the relevant information such as the applicant's name, valid ID number, application date, and hash hash value of the work are stored in the author information database and the work information database, and the trusted third party will sign the signed message (AUID, HashID) is sent to the author, the author embeds the message SignCA (AUID, HashID) as a watermark in the original digital work, producing the initial digital work,

2, Publishers must obtain a client software from a trusted third party before requesting their own copyright from a trusted third party, including the calculation of the hash value function, the signature function, two different watermark embedding functions, and the registration of copyright. The publisher will send the Hash value of the original digital work, the author's private key signature, along with the author's Hash value of the original digital work, the publisher's signature and the application information, to the trusted third party, trusted. After the three parties have confirmed through the author information database and the work information database, The two information numbers are numbered, and the issuer identification number RHID and the hash value identification number HashID are generated, and the applicant's name, valid ID number, application date, work hash value and other related information are stored in the publisher information database and the work information. Library, a trusted third party will sign the self-signed message SignCA (RHID, HashID) is sent to the publisher, who publishes the message SignCA (RHID, HashID) as a watermark in the original digital work, producing an intermediate digital work.

3, Purchaser P provides its own information P to the trusted third party before purchase. The trusted third party forms the purchaser identification number PID for the purchaser number and deposits it into the purchaser information database, and at the same time signs the message SignCA (PID) ) to the purchaser, when the purchase, the purchaser sends SignCA (PID) to the publisher RH and pays, the publisher uses the watermark algorithm to embed the message SignCA (PID) as a fingerprint in the intermediate digital work, forming the final digital work to send to the purchase By.

The author and the publisher can obtain the client software from a trusted third party either by downloading it from a trusted third party's website or by directly obtaining a setup disk from a trusted third party.

A trusted third party looks up the AU information base and the work repository for review. It can be guaranteed that the work does not have duplicate application rights, and this is also a process of reviewing the legality of copyright.

The purchaser obtains the purchaser identification number PID from a trusted third party before purchase, thereby avoiding the participation of a trusted third party in each purchase process.

Sending the hash value of the original digital work instead of sending the original digital work itself ensures that the risk of leaking the original digital work does not occur, and that each piece of work can only be claimed once for copyright, and there will be no unrestricted double application; RHID and HashID as a watermark embedded in digital works can effectively reduce the amount of watermark data, thus greatly reducing the requirements of the watermarking algorithm.

Fingerprints are also a kind of watermark, except that each legal copy has a different watermark embedded in it, so the image is called a "fingerprint".

When there is a dispute over the copyright of digital works, copyright confirmation is required to determine the copyright attribution. CA obtains controversial digital works, original works, and application information submitted by the conscriptor when applying for copyright, and obtains AUID and HashID, RHID and HashID from the controversial works, and obtains from the RH information base and the work information database according to AUID and HashID. Corresponding information, according to RHID and HashID from the RH information base and the work information library to get the corresponding information. If the AUID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database. If both controls yield a consistent result, it can be confirmed that the copyright is owned by the requester; otherwise it is not owned by him. From the above two stages, we can confirm the author's copyright and publisher's copyright. Therefore, it is possible to confirm the illegal infringement of the publisher's rights or the author's rights of the user; or the publisher's violation of the author's rights can be found.

It can be seen that the original digital work needs to be provided only when there is a dispute in the copyright of the work, and it is determined by the nature of the hash function that the original digital work is not forged. The need to compare two kinds of information is equivalent to giving the copyright double insurance.

When a suspicious illegal copy is found, the suspicious digital work is handed over to the CA. The CA extracts the AUID, RHID, HashID, and PID from it, and processes it in the following three cases:

(1) The AUID, RHID, and HashID can be extracted, and the PID cannot be extracted: the illegal communicator is RH himself;

(2) Can extract AUID, can't extract RHID, HashID, PID: it is a work that has not applied for copyright;

(3) Can extract AUID, RHID, HashID, PID: illegal communication is the user.

With this evidence, it is much easier to track down illegal copies.

The object of the present invention can also be achieved by the following means.

The watermark information also includes a watermark for identifying the purchaser, the watermark containing the purchaser identification number.

Illegal copies in the form of optical discs need to be discovered by humans. Illegal copies scattered on the network need to be discovered by mobile agents.

The mobile agent-based network detector is a distributed suspicious digital work detection module that provides support for active, real-time digital watermark based detection and tracking of illegal copies on the network. Multiple inspection agents are connected through the network and work together with the help of communication agents and database maintenance agents. The detection agent is a mobile agent, which receives the detection task and the target address from a trusted third party, moves to the new target host, completes the detection task of the suspicious digital work, or cooperates with multiple mobile agents. Carpet search for suspicious items on the web. Suspicious works and related information (such as discovery IP, discovery time, etc.) will be stored in the suspicious work library for confirmation by the trusted third party.

The use of mobile agents for illegal copy detection fully utilizes the characteristics of mobile agents' self-execution and dynamic adaptation, which can reduce network load and reduce network delay, reduce internal communication volume, and realize real-time automatic detection.

DRAWINGS

Figure 1: Schematic diagram of the system.

Figure 2: Copyright information generation.

Figure 3: Digital fingerprint generation.

Figure 4: Copyright Confirmation.

Figure 5: Illegal copy source confirmation.

Figure 6: Illegal copy tracking.

Figure 7: Detecting the Agent structure.

detailed description

In Figure 1, the relationship between the four entities of the whole system is revealed. The legal digital works purchased by the user are embedded with three CA-signed watermarks, one for identifying digital media authors (author information) and one for identifying publishers. (Copyright information), another is used to identify the purchaser (digital fingerprint); when illegal copying of digital works is discovered through a mobile agent or storage medium, it is possible to determine who is illegally spreading based on the extracted three watermarks, for tracing An illegal copy provides evidence. The author information watermark includes an author ID (AUID), the copyright information watermark includes a publisher ID and a work ID, and the digital fingerprint watermark includes a purchaser ID, and the two watermarks are random sequences generated by the corresponding ID after being signed by the CA as a seed.

Figure 2 shows the copyright information generation process. The author calculates the hash value calculated by his original digital work and signs it with the private key, along with the application information, to the CA. The CA looks up the AU information base and the work information library to ensure that the work does not have duplicate application rights, and this is also a process of reviewing the legality of the copyright. If the review is qualified, the CA numbers the two messages, generates the AUID and HashID, and stores the relevant information (applicant name, valid ID number, application date, work hash value, etc.) in the AU information base and the work information database. The CA will pass its own signed message SignCA (AUID, HashID) is sent to AU. AU will message SignCA (AUID, HashID) is embedded as a watermark in the original digital work, producing an initial digital work. The publisher RH to register the copyright calculates the hash value of the original digital work and signs it with the private key, along with the application information, to the CA. CA looks up the RH information base and the library of works to ensure that the work does not duplicate the copyright, and it is also a process of reviewing the legality of copyright. If the review is qualified, the CA numbers the two messages, generates the RHID and HashID, and stores the relevant information (applicant name, valid ID number, application date, work hash value, etc.) in the RH information base and the work information database. The CA will pass its own signed message SignCA (RHID, HashID) is sent to RH. RH embeds the message SignCA (RHID, HashID) as a watermark in the original digital work, producing an intermediate digital work.

Figure 3 is a digital fingerprint generation process, that is, the purchase process of the purchaser. The purchaser P provides the CA with its own information P before purchase, the CA forms a PID for the P number, stores the purchase information in the purchaser information base, and transmits the CA signed message SignCA (PID) to the P. At the time of purchase, P sends SignCA (PID) to the publisher RH and pays. RH uses the watermark algorithm to embed the message SignCA (PID) as a fingerprint in the intermediate digital work, and the final digital work is sent to the purchaser.

How to perform copyright confirmation is shown in FIG. When there is a dispute over the copyright of digital works, copyright confirmation is required to determine the copyright attribution. CA obtains controversial digital works, original works, and application information submitted by the conscriptor when applying for copyright, and obtains AUID and HashID, RHID and HashID from the controversial works, and obtains from the RH information base and the work information database according to AUID and HashID. Corresponding information, according to RHID and HashID from the RH information base and the work information library to get the corresponding information. If the AUID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database. If both controls yield a consistent result, it can be confirmed that the copyright is owned by the requester; otherwise it is not owned by him.

Figure 5 is an illegal copy source confirmation process. When a suspicious illegal copy is found, the suspicious digital work is handed over to the CA. The CA extracts the AUID, RHID, HashID, and PID from it, and processes it in the following three cases:

(4) Can extract AUID, RHID, HashID, can not extract PID: illegal communicator is RH himself;

(5) Can extract AUID, can't extract RHID, HashID, PID: it is a work that has not applied for copyright;

(6) Can extract AUID, RHID, HashID, PID: illegal communication is the user.

Figure 6 shows how illegal copy tracking can be performed. This process is closely related to the detection agent structure of Figure 7. The detection agent receives the detection task and the target address from the CA, moves to the new target host, and completes the detection task for the suspicious digital work; or multiple mobile agents cooperate with each other to perform a carpet search on the suspicious works on the network. Suspicious works and related information (such as discovery IP, discovery time, etc.) will be stored in the suspicious work library for CA to confirm the illegal copy source. The specific process is as follows:

The Detect/Extract Agent resides on a server or router in the network that filters all multimedia data files residing on the server where it resides. Communicate with the CA and other agents through the communication component, find the local and remote databases, determine whether the relevant record of the multimedia data already exists, if not, the trigger starts the operation component work, and the input interface obtains relevant information from the system through the communication component, and the operation component Call the test program to get a result of whether it is a suspicious work. The output interface stores the suspicious works and related information (such as the discovered IP, discovery time, etc.) into the database for the CA to confirm the illegal copy source.

Claims (8)

  1. A digital watermarked work having copyright protection features, comprising digital work information and watermark information embedded in digital work information, the watermark information comprising two watermarks signed by a trusted third party, and one for identifying digital works The author, one is used to identify the publisher, wherein the author information watermark contains the author identification number, the publisher information watermark contains the publisher identification number and the work identification number, and the watermark information is trusted by the corresponding identification number. A random sequence generated as a seed after the three-party signature.
  2. The digital watermarked work with copyright protection feature according to claim 1, wherein the watermark information further comprises a watermark for identifying the purchaser, the watermark containing the purchaser identification number.
  3. A method for generating a digital watermarked work with copyright protection features, comprising the steps of: The author first obtains a client software from a trusted third party, including calculating the hash value. Function, signature function, two different watermark embedding functions, the author calculates the hash value of the original digital work and signs it with the private key, together with the application information, sends it to a trusted third party, and the trusted third party finds the author information base and the work information. The library is reviewed, and if the review is qualified, the trusted third party numbers the two messages to generate the author identification number. AUID and hash value identification number HashID, and the applicant's name, valid ID number, application date, work hash Hash Relevant information such as values is stored in the author information base and the work information database, and the trusted third party sends the signed message MessageCA (AUID, HashID) to the author, and the author will message SignCA (AUID, HashID) is embedded as a watermark in the original digital work, producing an initial digital work, Publishers must obtain a client software from a trusted third party before requesting their own copyright from a trusted third party, including the calculation of the hash value function, the signature function, two different watermark embedding functions, and the registration of copyright. Publisher of the original digital works The Hash value, the author's signature with the private key, along with the author's Hash of the original digital work obtained from the author The value, the publisher's signature and the application information are sent to the trusted third party. After the trusted third party compares and confirms the author information database and the work information database, the two information numbers are numbered to generate the issuer identification number RHID. And hash value identification number HashID, and the applicant's name, valid ID number, application date, work Hash Values and other related information are stored in the publisher's information base and the work information database. The trusted third party sends the self-signed message SignCA (RHID, HashID) to the publisher, and the publisher will send the message. SignCA (RHID, HashID) is embedded as a watermark in the original digital work, producing an intermediate digital work. Purchaser P provides his or her own information to a trusted third party before purchasing. The trusted third party forms the purchaser identification number PID of the purchaser number and deposits it in the buyer information database, and sends the signed message SignCA (PID) to the purchaser. At the time of purchase, the purchaser will SignCA (PID) is sent to the publisher RH and paid, and the publisher uses the watermark algorithm to send the message SignCA(PID) As a fingerprint embedded in the intermediate digital work, the final digital work is formed and sent to the purchaser.
  4. A method for generating a digital watermarked work with copyright protection characteristics according to claim 2, wherein the author and the publisher obtain the client software from a trusted third party or download it from a trusted third party website, or Get the installation disk directly from a trusted third party.
  5. The digital watermark creation method with copyright protection feature according to claim 2, wherein the purchaser obtains the purchaser identification number PID from the trusted third party before the purchase.
  6. The method for generating a digital watermarked work with copyright protection characteristics according to claim 2, wherein when there is a dispute over the copyright of the digital work, copyright confirmation is required to determine the copyright attribution, and the CA obtains the controversial digital work, the original work, and the request. The application information submitted by the confirmer when applying for copyright, obtains AUID and HashID, RHID and HashID from the disputed works, and obtains corresponding information from the RH information base and the work information database according to AUID and HashID, according to RHID and HashID from the RH information base and The corresponding information is obtained in the work repository. If the AUID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database. If both controls yield a consistent result, it can be confirmed that the copyright is owned by the requester; otherwise it is not owned by him. From the above two stages, we can confirm the author's copyright and publisher's copyright. Therefore, it is possible to confirm the illegal infringement of the publisher's rights or the author's rights of the user; or the publisher's violation of the author's rights can be found.
  7. The digital watermark creation method with copyright protection feature according to claim 2, further comprising a network detection agent, which is a mobile agent, which receives the detection task and the target address from the trusted third party. Move to this new target host to complete the task of detecting suspicious digital works; or multiple mobile agents work together to perform a carpet search on suspicious works on the network.
  8. The digital watermark creation method with copyright protection feature according to claim 7, wherein the mobile agent based network detector is a distributed suspicious digital work detection module.
PCT/CN2010/080376 2010-12-28 2010-12-28 Digital watermark works with characteristics of copyright protection and generation method thereof WO2012088663A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/080376 WO2012088663A1 (en) 2010-12-28 2010-12-28 Digital watermark works with characteristics of copyright protection and generation method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/080376 WO2012088663A1 (en) 2010-12-28 2010-12-28 Digital watermark works with characteristics of copyright protection and generation method thereof

Publications (1)

Publication Number Publication Date
WO2012088663A1 true WO2012088663A1 (en) 2012-07-05

Family

ID=46382180

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/080376 WO2012088663A1 (en) 2010-12-28 2010-12-28 Digital watermark works with characteristics of copyright protection and generation method thereof

Country Status (1)

Country Link
WO (1) WO2012088663A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049682A (en) * 2013-01-28 2013-04-17 上海理工大学 Character pitch encoding-based dual-watermark embedded text watermarking method
CN103294937A (en) * 2013-06-28 2013-09-11 玉林师范学院 Software protection system and software protection method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558303A (en) * 2004-02-11 2004-12-29 北京邮电大学 Digital watermarking infrastructure
CN101196970A (en) * 2007-12-29 2008-06-11 武汉理工大学 Digital copyright management system based on digital watermarking and mobile proxy
US20080225311A1 (en) * 2007-03-12 2008-09-18 Fuji Xerox Co., Ltd. Image forming apparatus, image forming method and computer readable medium
CN101449508A (en) * 2006-03-14 2009-06-03 奥多比公司 Protecting the integrity of electronically derivative works
CN101512512A (en) * 2006-08-31 2009-08-19 微软公司 Software authorization utilizing software reputation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558303A (en) * 2004-02-11 2004-12-29 北京邮电大学 Digital watermarking infrastructure
CN101449508A (en) * 2006-03-14 2009-06-03 奥多比公司 Protecting the integrity of electronically derivative works
CN101512512A (en) * 2006-08-31 2009-08-19 微软公司 Software authorization utilizing software reputation
US20080225311A1 (en) * 2007-03-12 2008-09-18 Fuji Xerox Co., Ltd. Image forming apparatus, image forming method and computer readable medium
CN101196970A (en) * 2007-12-29 2008-06-11 武汉理工大学 Digital copyright management system based on digital watermarking and mobile proxy

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049682A (en) * 2013-01-28 2013-04-17 上海理工大学 Character pitch encoding-based dual-watermark embedded text watermarking method
CN103049682B (en) * 2013-01-28 2015-04-01 上海理工大学 Character pitch encoding-based dual-watermark embedded text watermarking method
CN103294937A (en) * 2013-06-28 2013-09-11 玉林师范学院 Software protection system and software protection method

Similar Documents

Publication Publication Date Title
US7756892B2 (en) Using embedded data with file sharing
US7174021B2 (en) Systems and methods for providing secure server key operations
US7891007B2 (en) Systems and methods for issuing usage licenses for digital content and services
KR101594230B1 (en) Secure and efficient content screening in a networked environment
US5822432A (en) Method for human-assisted random key generation and application for digital watermark system
US6898706B1 (en) License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
CA2457938C (en) Enrolling/sub-enrolling a digital rights management(drm) server into a drm architecture
EP1452941B1 (en) Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
US6801999B1 (en) Passive and active software objects containing bore resistant watermarking
US7131144B2 (en) Methods and apparatus for protecting information
JP4668524B2 (en) A domain-based trust model for content rights management
Haas et al. Aspects of privacy for electronic health records
ES2271427T3 (en) Plugged server architecture secured for digital rights management systems.
JP4847701B2 (en) Obtaining digital content signed rights labels (SRLs) using flexible rights templates in a rights management system
EP1342149B1 (en) Method for protecting information and privacy
Petitcolas Watermarking schemes evaluation
US7123718B1 (en) Utilizing data reduction in stegnographic and cryptographic systems
US6208746B1 (en) Biometric watermarks
EP1457860A1 (en) Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
JP2004206435A (en) License management method, and license management system
EP1378812A2 (en) Using a rights template to obtain a signed rights label (SRL) for digital content in a digital rights management system
Qiao et al. Watermarking schemes and protocols for protecting rightful ownership and customer's rights
CN1540915B (en) Revocation of certificate and exclusion of other principals in digital rights management system and delegated revocation authority
JP4562909B2 (en) Safe delivery of digital expressions
US20080310636A1 (en) Access-controlled encrypted recording system for site, interaction and process monitoring

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10861366

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase in:

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 03/09/2013)

122 Ep: pct app. not ent. europ. phase

Ref document number: 10861366

Country of ref document: EP

Kind code of ref document: A1