WO2012088663A1 - Oeuvres avec filigrane numérique comportant des caractéristiques de protection du droit d'auteur et procédé de génération associé - Google Patents

Oeuvres avec filigrane numérique comportant des caractéristiques de protection du droit d'auteur et procédé de génération associé Download PDF

Info

Publication number
WO2012088663A1
WO2012088663A1 PCT/CN2010/080376 CN2010080376W WO2012088663A1 WO 2012088663 A1 WO2012088663 A1 WO 2012088663A1 CN 2010080376 W CN2010080376 W CN 2010080376W WO 2012088663 A1 WO2012088663 A1 WO 2012088663A1
Authority
WO
WIPO (PCT)
Prior art keywords
work
information
digital
author
trusted
Prior art date
Application number
PCT/CN2010/080376
Other languages
English (en)
Chinese (zh)
Inventor
黄正全
王健
姜楠
Original Assignee
北京邮电大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京邮电大学 filed Critical 北京邮电大学
Priority to PCT/CN2010/080376 priority Critical patent/WO2012088663A1/fr
Publication of WO2012088663A1 publication Critical patent/WO2012088663A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/103Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right

Definitions

  • the invention belongs to the field of digital media copyright protection, and particularly relates to a framework of a basic service system using digital watermark technology and cryptography technology, and a method for realizing digital media copyright protection and tracking illegal copy based on the system, in particular, a copyright protection feature.
  • Digital watermark works and their generation methods.
  • Encryption technology It can block direct access to the copy, but once the decrypted digital work will be completely exposed, without any protection, it can be copied and distributed without any restrictions.
  • Trusted module Usually tamper-resistant hardware that can be used to protect decryption keys or other copyright protection policies developed by the publisher.
  • the Trusted Module requires each user to have appropriate hardware for each digital work, which is not practical.
  • existing software analysis techniques can easily disable their "tamper-proof" features.
  • digital watermarking technology has embedded insignificant marks embedded in digitized data content.
  • the embedded marks are usually invisible or invisible, but can be detected or extracted by some calculation operations.
  • the digital watermark is closely integrated with the source data and hidden therein, becoming an inseparable part of the source data, and can survive some operations that do not destroy the use value or commercial value of the source data.
  • copyright protection feature refers to at least two functions: copyright confirmation and illegal copy source tracking.
  • some additional functions added to achieve these two basic functions such as watermark embedding, watermark extraction, illegal copy acquisition, etc., may be further provided.
  • the invention is based on the deficiencies in the prior art, and provides a digital watermarked work with copyright protection features that can realize copyright confirmation and illegal copy source tracking and support digital media transactions and applications in various ways in reality.
  • the generation method is based on the deficiencies in the prior art, and provides a digital watermarked work with copyright protection features that can realize copyright confirmation and illegal copy source tracking and support digital media transactions and applications in various ways in reality.
  • the object of the present invention is achieved by the following route.
  • Digital watermarked works with copyright protection features including digital work information and watermark information
  • the watermark information is embedded in the digital work information
  • the watermark information includes two watermarks signed by a trusted third party, one for identifying the author of the digital work, one for To identify the publisher, wherein the author information watermark includes an author identification number, and the publisher information watermark includes a publisher identification number and a work identification number, and the watermark information is used by the corresponding identification number after being signed by a trusted third party.
  • a random sequence produced by the seed is produced by the seed.
  • trusted third party refers to a copyright protection organization, a copyright registration center or a similar organization.
  • the user uses the digital media for free on the author's authorized network or storage medium, which contains the author information watermark and the copyright information watermark.
  • the author information watermark contains the author information watermark and the copyright information watermark.
  • the system architecture of copyright protection of digital works is realized by digital watermarking technology and cryptography technology, and the versatility of digital media security services is realized and provided. It protects the copyright of digital media, security services for copyright confirmation, illegal copy tracking and source confirmation, and supports digital media transactions and applications in various ways.
  • the author first obtains a client software from a trusted third party, including the calculation of the hash value hash function, the signature function, and two different watermark embedding functions.
  • the author calculates the hash value of the original digital work and signs it with the private key. Together with the application information, it is sent to a trusted third party.
  • the trusted third party looks up the author information base and the work information database for review. If the review is qualified, the trusted third party numbers the two information to generate the author identification number AUID and hash value.
  • the identification number HashID, and the relevant information such as the applicant's name, valid ID number, application date, and hash hash value of the work are stored in the author information database and the work information database, and the trusted third party will sign the signed message (AUID, HashID) is sent to the author, the author embeds the message SignCA (AUID, HashID) as a watermark in the original digital work, producing the initial digital work,
  • Publishers must obtain a client software from a trusted third party before requesting their own copyright from a trusted third party, including the calculation of the hash value function, the signature function, two different watermark embedding functions, and the registration of copyright.
  • the publisher will send the Hash value of the original digital work, the author's private key signature, along with the author's Hash value of the original digital work, the publisher's signature and the application information, to the trusted third party, trusted.
  • the two information numbers are numbered, and the issuer identification number RHID and the hash value identification number HashID are generated, and the applicant's name, valid ID number, application date, work hash value and other related information are stored in the publisher information database and the work information.
  • Library a trusted third party will sign the self-signed message SignCA (RHID, HashID) is sent to the publisher, who publishes the message SignCA (RHID, HashID) as a watermark in the original digital work, producing an intermediate digital work.
  • Purchaser P provides its own information P to the trusted third party before purchase.
  • the trusted third party forms the purchaser identification number PID for the purchaser number and deposits it into the purchaser information database, and at the same time signs the message SignCA (PID) ) to the purchaser, when the purchase, the purchaser sends SignCA (PID) to the publisher RH and pays, the publisher uses the watermark algorithm to embed the message SignCA (PID) as a fingerprint in the intermediate digital work, forming the final digital work to send to the purchase By.
  • the author and the publisher can obtain the client software from a trusted third party either by downloading it from a trusted third party's website or by directly obtaining a setup disk from a trusted third party.
  • a trusted third party looks up the AU information base and the work repository for review. It can be guaranteed that the work does not have duplicate application rights, and this is also a process of reviewing the legality of copyright.
  • the purchaser obtains the purchaser identification number PID from a trusted third party before purchase, thereby avoiding the participation of a trusted third party in each purchase process.
  • Sending the hash value of the original digital work instead of sending the original digital work itself ensures that the risk of leaking the original digital work does not occur, and that each piece of work can only be claimed once for copyright, and there will be no unrestricted double application; RHID and HashID as a watermark embedded in digital works can effectively reduce the amount of watermark data, thus greatly reducing the requirements of the watermarking algorithm.
  • Fingerprints are also a kind of watermark, except that each legal copy has a different watermark embedded in it, so the image is called a "fingerprint”.
  • CA obtains controversial digital works, original works, and application information submitted by the conscriptor when applying for copyright, and obtains AUID and HashID, RHID and HashID from the controversial works, and obtains from the RH information base and the work information database according to AUID and HashID. Corresponding information, according to RHID and HashID from the RH information base and the work information library to get the corresponding information.
  • the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database.
  • the original digital work needs to be provided only when there is a dispute in the copyright of the work, and it is determined by the nature of the hash function that the original digital work is not forged.
  • the need to compare two kinds of information is equivalent to giving the copyright double insurance.
  • the CA extracts the AUID, RHID, HashID, and PID from it, and processes it in the following three cases:
  • the AUID, RHID, and HashID can be extracted, and the PID cannot be extracted: the illegal communicator is RH himself;
  • the object of the present invention can also be achieved by the following means.
  • the watermark information also includes a watermark for identifying the purchaser, the watermark containing the purchaser identification number.
  • Illegal copies in the form of optical discs need to be discovered by humans.
  • Illegal copies scattered on the network need to be discovered by mobile agents.
  • the mobile agent-based network detector is a distributed suspicious digital work detection module that provides support for active, real-time digital watermark based detection and tracking of illegal copies on the network.
  • Multiple inspection agents are connected through the network and work together with the help of communication agents and database maintenance agents.
  • the detection agent is a mobile agent, which receives the detection task and the target address from a trusted third party, moves to the new target host, completes the detection task of the suspicious digital work, or cooperates with multiple mobile agents. Carpet search for suspicious items on the web. Suspicious works and related information (such as discovery IP, discovery time, etc.) will be stored in the suspicious work library for confirmation by the trusted third party.
  • mobile agents for illegal copy detection fully utilizes the characteristics of mobile agents' self-execution and dynamic adaptation, which can reduce network load and reduce network delay, reduce internal communication volume, and realize real-time automatic detection.
  • Figure 1 Schematic diagram of the system.
  • the legal digital works purchased by the user are embedded with three CA-signed watermarks, one for identifying digital media authors (author information) and one for identifying publishers. (Copyright information), another is used to identify the purchaser (digital fingerprint); when illegal copying of digital works is discovered through a mobile agent or storage medium, it is possible to determine who is illegally spreading based on the extracted three watermarks, for tracing An illegal copy provides evidence.
  • the author information watermark includes an author ID (AUID), the copyright information watermark includes a publisher ID and a work ID, and the digital fingerprint watermark includes a purchaser ID, and the two watermarks are random sequences generated by the corresponding ID after being signed by the CA as a seed.
  • Figure 2 shows the copyright information generation process.
  • the author calculates the hash value calculated by his original digital work and signs it with the private key, along with the application information, to the CA.
  • the CA looks up the AU information base and the work information library to ensure that the work does not have duplicate application rights, and this is also a process of reviewing the legality of the copyright. If the review is qualified, the CA numbers the two messages, generates the AUID and HashID, and stores the relevant information (applicant name, valid ID number, application date, work hash value, etc.) in the AU information base and the work information database.
  • the CA will pass its own signed message SignCA (AUID, HashID) is sent to AU.
  • AU will message SignCA (AUID, HashID) is embedded as a watermark in the original digital work, producing an initial digital work.
  • the publisher RH to register the copyright calculates the hash value of the original digital work and signs it with the private key, along with the application information, to the CA.
  • CA looks up the RH information base and the library of works to ensure that the work does not duplicate the copyright, and it is also a process of reviewing the legality of copyright. If the review is qualified, the CA numbers the two messages, generates the RHID and HashID, and stores the relevant information (applicant name, valid ID number, application date, work hash value, etc.) in the RH information base and the work information database.
  • the CA will pass its own signed message SignCA (RHID, HashID) is sent to RH.
  • RH embeds the message SignCA (RHID, HashID) as a watermark in the original digital work, producing an intermediate digital work.
  • Figure 3 is a digital fingerprint generation process, that is, the purchase process of the purchaser.
  • the purchaser P provides the CA with its own information P before purchase, the CA forms a PID for the P number, stores the purchase information in the purchaser information base, and transmits the CA signed message SignCA (PID) to the P.
  • P sends SignCA (PID) to the publisher RH and pays.
  • RH uses the watermark algorithm to embed the message SignCA (PID) as a fingerprint in the intermediate digital work, and the final digital work is sent to the purchaser.
  • CA obtains controversial digital works, original works, and application information submitted by the conscriptor when applying for copyright, and obtains AUID and HashID, RHID and HashID from the controversial works, and obtains from the RH information base and the work information database according to AUID and HashID. Corresponding information, according to RHID and HashID from the RH information base and the work information library to get the corresponding information.
  • the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared with the Hash obtained from the AU work database, and the application information submitted now and the application information obtained from the CA database are compared. . If both controls yield a consistent result, it can be confirmed that the author's copyright is confirmed by the request; otherwise it is not owned by him. If the RHID and HashID fail, the digital work is considered to have no legitimate copyright, otherwise the Hash of the original digital work is calculated, compared to the Hash obtained from the database, and the application information submitted now is compared with the application information obtained from the CA database. If both controls yield a consistent result, it can be confirmed that the copyright is owned by the requester; otherwise it is not owned by him.
  • Figure 5 is an illegal copy source confirmation process.
  • the suspicious digital work is handed over to the CA.
  • the CA extracts the AUID, RHID, HashID, and PID from it, and processes it in the following three cases:
  • Figure 6 shows how illegal copy tracking can be performed.
  • This process is closely related to the detection agent structure of Figure 7.
  • the detection agent receives the detection task and the target address from the CA, moves to the new target host, and completes the detection task for the suspicious digital work; or multiple mobile agents cooperate with each other to perform a carpet search on the suspicious works on the network.
  • Suspicious works and related information (such as discovery IP, discovery time, etc.) will be stored in the suspicious work library for CA to confirm the illegal copy source.
  • the specific process is as follows:
  • the Detect/Extract Agent resides on a server or router in the network that filters all multimedia data files residing on the server where it resides. Communicate with the CA and other agents through the communication component, find the local and remote databases, determine whether the relevant record of the multimedia data already exists, if not, the trigger starts the operation component work, and the input interface obtains relevant information from the system through the communication component, and the operation component Call the test program to get a result of whether it is a suspicious work.
  • the output interface stores the suspicious works and related information (such as the discovered IP, discovery time, etc.) into the database for the CA to confirm the illegal copy source.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention, qui s'applique au domaine de la protection du droit d'auteur d'oeuvres multimédia numériques, concerne spécifiquement une architecture système de services de base faisant appel à une technique de filigrane numérique et à une technique cryptographique et un procédé basé sur le système permettant de mettre en œuvre une protection du droit d'auteur d'œuvres multimédia numériques et de repérer une copie illégale, et plus spécialement une œuvre avec filigrane numérique comportant des caractéristiques de la protection du droit d'auteur et un procédé de génération associé, consistant en l'utilisation gratuite par un utilisateur des œuvres multimédia numériques sur le réseau ou sur un support de stockage autorisé par l'auteur, lesdites œuvres multimédia numériques comprenant un filigrane d'informations d'auteur et un filigrane d'informations de droit d'auteur. Ainsi, l'architecture système de protection du droit d'auteur d'œuvres numériques est réalisée par une technique de filigrane numérique et une technique cryptographique, et un service de sécurisation d'œuvres multimédia numériques non spécialisé est mis en œuvre et décrit. Il protège le droit d'auteur d'œuvres multimédia numériques, et peut exécuter des services de sécurisation de confirmation de droit d'auteur, un repérage de copie illégale et une confirmation de source, et prendre en charge tout type de transaction et d'application d'œuvres multimédia numériques en temps réel.
PCT/CN2010/080376 2010-12-28 2010-12-28 Oeuvres avec filigrane numérique comportant des caractéristiques de protection du droit d'auteur et procédé de génération associé WO2012088663A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/080376 WO2012088663A1 (fr) 2010-12-28 2010-12-28 Oeuvres avec filigrane numérique comportant des caractéristiques de protection du droit d'auteur et procédé de génération associé

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/080376 WO2012088663A1 (fr) 2010-12-28 2010-12-28 Oeuvres avec filigrane numérique comportant des caractéristiques de protection du droit d'auteur et procédé de génération associé

Publications (1)

Publication Number Publication Date
WO2012088663A1 true WO2012088663A1 (fr) 2012-07-05

Family

ID=46382180

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/080376 WO2012088663A1 (fr) 2010-12-28 2010-12-28 Oeuvres avec filigrane numérique comportant des caractéristiques de protection du droit d'auteur et procédé de génération associé

Country Status (1)

Country Link
WO (1) WO2012088663A1 (fr)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049682A (zh) * 2013-01-28 2013-04-17 上海理工大学 一种基于字符间距编码的双重水印嵌入的文本水印方法
CN103294937A (zh) * 2013-06-28 2013-09-11 玉林师范学院 一种软件保护系统及其保护方法
CN106682457A (zh) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 一种基于区块链技术的图片版权保护方法和系统
CN109727134A (zh) * 2018-12-29 2019-05-07 北京奇虎科技有限公司 一种图片的版权交易方法及装置
CN109766672A (zh) * 2019-01-14 2019-05-17 湖南大学 一种芯核版权匿名认证方法
CN110110500A (zh) * 2019-06-04 2019-08-09 施建锋 具备侵权即时检测的去中心化图像版权保护系统及方法
CN110580405A (zh) * 2019-08-16 2019-12-17 湖北工业大学 一种基于社交网络的图片版权保护系统及方法
CN111667395A (zh) * 2020-06-03 2020-09-15 南京师范大学 一种三维模型版权认证方法
CN112069496A (zh) * 2020-09-10 2020-12-11 杭州锘崴信息科技有限公司 保护信息的作品查新系统、方法、设备及存储介质
CN112258323A (zh) * 2020-10-22 2021-01-22 苏州市星际云通区块链科技有限公司 基于区块链的数字版权登记方法及终端设备
CN113706344A (zh) * 2021-08-05 2021-11-26 武汉大学 一种基于区块链的数字版权保护方法
CN113782122A (zh) * 2021-08-09 2021-12-10 中国中医科学院中医药信息研究所 一种电子知情同意方法和系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558303A (zh) * 2004-02-11 2004-12-29 北京邮电大学 数字水印基础设施
CN101196970A (zh) * 2007-12-29 2008-06-11 武汉理工大学 基于数字水印和移动代理的数字版权管理系统
US20080225311A1 (en) * 2007-03-12 2008-09-18 Fuji Xerox Co., Ltd. Image forming apparatus, image forming method and computer readable medium
CN101449508A (zh) * 2006-03-14 2009-06-03 奥多比公司 保护电子衍生作品的完整性
CN101512512A (zh) * 2006-08-31 2009-08-19 微软公司 利用软件名声的软件授权

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558303A (zh) * 2004-02-11 2004-12-29 北京邮电大学 数字水印基础设施
CN101449508A (zh) * 2006-03-14 2009-06-03 奥多比公司 保护电子衍生作品的完整性
CN101512512A (zh) * 2006-08-31 2009-08-19 微软公司 利用软件名声的软件授权
US20080225311A1 (en) * 2007-03-12 2008-09-18 Fuji Xerox Co., Ltd. Image forming apparatus, image forming method and computer readable medium
CN101196970A (zh) * 2007-12-29 2008-06-11 武汉理工大学 基于数字水印和移动代理的数字版权管理系统

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049682B (zh) * 2013-01-28 2015-04-01 上海理工大学 一种基于字符间距编码的双重水印嵌入的文本水印方法
CN103049682A (zh) * 2013-01-28 2013-04-17 上海理工大学 一种基于字符间距编码的双重水印嵌入的文本水印方法
CN103294937A (zh) * 2013-06-28 2013-09-11 玉林师范学院 一种软件保护系统及其保护方法
CN106682457A (zh) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 一种基于区块链技术的图片版权保护方法和系统
CN109727134A (zh) * 2018-12-29 2019-05-07 北京奇虎科技有限公司 一种图片的版权交易方法及装置
CN109727134B (zh) * 2018-12-29 2024-04-05 三六零科技集团有限公司 一种图片的版权交易方法及装置
CN109766672B (zh) * 2019-01-14 2022-07-12 湖南大学 一种芯核版权匿名认证方法
CN109766672A (zh) * 2019-01-14 2019-05-17 湖南大学 一种芯核版权匿名认证方法
CN110110500B (zh) * 2019-06-04 2023-04-07 施建锋 具备侵权即时检测的去中心化图像版权保护系统及方法
CN110110500A (zh) * 2019-06-04 2019-08-09 施建锋 具备侵权即时检测的去中心化图像版权保护系统及方法
CN110580405B (zh) * 2019-08-16 2022-07-05 湖北工业大学 一种基于社交网络的图片版权保护系统及方法
CN110580405A (zh) * 2019-08-16 2019-12-17 湖北工业大学 一种基于社交网络的图片版权保护系统及方法
CN111667395A (zh) * 2020-06-03 2020-09-15 南京师范大学 一种三维模型版权认证方法
CN112069496A (zh) * 2020-09-10 2020-12-11 杭州锘崴信息科技有限公司 保护信息的作品查新系统、方法、设备及存储介质
CN112069496B (zh) * 2020-09-10 2024-04-26 杭州锘崴信息科技有限公司 保护信息的作品查新系统、方法、设备及存储介质
CN112258323A (zh) * 2020-10-22 2021-01-22 苏州市星际云通区块链科技有限公司 基于区块链的数字版权登记方法及终端设备
CN113706344A (zh) * 2021-08-05 2021-11-26 武汉大学 一种基于区块链的数字版权保护方法
CN113706344B (zh) * 2021-08-05 2024-03-01 武汉大学 一种基于区块链的数字版权保护方法
CN113782122A (zh) * 2021-08-09 2021-12-10 中国中医科学院中医药信息研究所 一种电子知情同意方法和系统
CN113782122B (zh) * 2021-08-09 2024-04-16 中国中医科学院中医药信息研究所 一种电子知情同意方法和系统

Similar Documents

Publication Publication Date Title
WO2012088663A1 (fr) Oeuvres avec filigrane numérique comportant des caractéristiques de protection du droit d'auteur et procédé de génération associé
Piva et al. Managing copyright in open networks
Zhao A WWW service to embed and prove digital copyright watermarks
RU2331917C2 (ru) Выдача лицензий на использование средства публикации в автономном режиме в системе управления правами на цифровое содержимое drm
Zhao Applying digital watermarking techniques to online multimedia commerce
JP5330488B2 (ja) 安全にコンテンツを配布する方法及び装置
US20200226233A1 (en) Distributed ledger-based digital content piracy deterrence
CN103942470B (zh) 一种具有溯源功能的电子音像制品版权管理方法
JP2004503880A (ja) 電子透かし技術を基盤とする著作物の提供および認証サービスシステムとその方法
WO2002080442A1 (fr) Appareil de traitement d'informations
JP2006504176A (ja) コンテンツ操作を許可する方法及び装置
JP7133589B2 (ja) Nftアクセス制限システムおよびnftアクセス制限プログラム
CN100428107C (zh) 数字水印基础设施
JP4987978B2 (ja) デジタルフィンガープリンティングを用いたデジタルコンテンツ供給システム
Cheung et al. A watermarking infrastructure for enterprise document management
Delaigle et al. Digital images protection techniques in a broadcast framework: an overview
KR100773963B1 (ko) 핑거프린팅 관리 시스템 및 핑거프린트 코드 전달 방법
Cheung et al. Rights protection for digital contents redistribution over the Internet
Cheung et al. The use of digital watermarking for intelligence multimedia document distribution
He et al. Digital right management model based on cryptography and digital watermarking
JP2001052072A (ja) コンテンツ流通方法および該コンテンツ流通プログラムを記録した記録媒体
Song et al. A blockchain based Buyer-seller Watermark Protocol with Trustless Third party
KR20010087808A (ko) 워터마킹 기술을 기반으로 한 저작물 제공 및 인증 서비스시스템 및 방법
Adelsbach et al. Towards multilateral secure digital rights distribution infrastructures
US20040093310A1 (en) Transaction system and method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10861366

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 03/09/2013)

122 Ep: pct application non-entry in european phase

Ref document number: 10861366

Country of ref document: EP

Kind code of ref document: A1