节点文献
基于叛逆者追踪的数字版权保护研究
Research on Digital Copyright Protection Based on Traitor Tracing
【作者】 王青龙;
【导师】 杨波;
【作者基本信息】 西安电子科技大学 , 密码学, 2005, 硕士
【摘要】 数字产品的版权保护是当前受到广泛研究的一个热门课题,由于数字产品的多样性,对其进行保护的方式也就有多种。目前,点到点传输的数字音频、视频信息的版权保护已有较成熟研究和应用。当数字信息以广播形式发送时(如数字电视、网上股票信息发布等),如何保护供应商的利益,还是一个比较新的领域,叛逆者追踪研究的目的就是为了解决此问题。叛逆者追踪研究不仅为广播数字信息提供一种版权保护技术,也将促进现有版权保护技术的完善与发展。本文对叛逆者追踪作了深入研究,取得了如下一些成果:详细叙述了当前数字版权保护技术的研究现状,进展以及存在的问题。简要介绍了信息隐藏的由来,现状及进展情况。对数字指纹研究的现有成果进行了总结、分析,设计了一种新的匿名指纹方案。介绍了一种二进制指纹编码方案。阐述了叛逆者追踪的研究背景、现状、存在的问题及建议。对已有叛逆者追踪方案的性能进行了分析总结。设计了两种叛逆者追踪方案。与导师合作完成了一种追踪方案和两个不经意估值协议。
【Abstract】 More attention is paid to the copyright protection of digital products with the rapiddevelopment of E-business. Different ways are used to protect digital copyright fordifferent digital contents. Nowadays, the copyright protection on digital contents ofaudio and video sent by point to point is well studied and applied. However, it is a newfield, too, that how to protect the digital copyright when transferred through internet inthe way of broadcast, and it is just the object that the traitor tracing focuses on. Thetraitor tracing not only provides a new digital copyright protection for broadcast signal,but also promotes the performance improving of existed copyright protectiontechnology. Following are the main achievements of this thesis:Introduce the origin, evolvement, states and existing problems of digital copyright protection in detail.Introduce the origin, evolvement and states of information hiding simply. Summarize and analyze the existing digital fingerprinting schemes, and design a new anonymous fingerprinting scheme. In addition, a digital fingerprinting algorithm based on binary codes is described. Expatiate the backgrounds, states and existing problems of the traitor tracing.Analyze and summarize the performance of the presented traitor tracing schemes in detail.Design two traitor tracing schemes. Design one traitor tracing scheme and two oblivious polynomial protocols in collaboration with tutor.
【Key words】 Copyright; protection; Digital; fingerprinting; Traitor; tracing; Information hiding;
- 【网络出版投稿人】 西安电子科技大学 【网络出版年期】2005年 06期
- 【分类号】TP309
- 【被引频次】3
- 【下载频次】217