期刊文献+

实现DRM系统的一种新方案 被引量:1

A New Implementation Scheme for Secure DRM System
在线阅读 下载PDF
导出
摘要 版权保护一直是困扰创作者和发行商的重大问题,现有的技术和协议在防止盗版上都存在着一定程度的缺陷。数字版权管理(DRM)系统综合使用各种技术和协议寻求买卖双方的利益平衡,保证创作者的版权和用户端的安全。本文提出基于模块化实现DRM系统的全面解决方案。该实现方案对DRM模型进行了改进,将水印的嵌入移交给权威机构来处理,买卖双方只需对水印的存在性进行检验。最后,对整体安全性能进行了分析。该方案利用现有的技术和协议,实现了对作品的整个生命期的安全访问控制。 Copyright is disturbing the authors and issuers. DRaM system combines all kinds of techniques and protocols, so as to balance the benefits of the buyers and sellers, and to assure the authors' copyright and users' security. In this paper, the integrate implementation scheme based on the functional architecture for DRM is proposed. The DRM model is improved on relegating the work of implanting digital watermark to authoritative organization, so the buyers and sellers only need to check the presence of watermark. At last, the analysis about the security of the scheme is also given. Secure access control can be achieved in the writing's whole life period.
出处 《计算机技术与发展》 2009年第7期166-169,共4页 Computer Technology and Development
基金 国家自然科学基金资助项目(60573141) 国家863计划(2008AA701202)
关键词 数字版权管理 数字水印 访问控制 digital rights management digital watermark access control
  • 相关文献

参考文献7

二级参考文献99

  • 1俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808. 被引量:13
  • 2俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:143
  • 3Podilchuk C I, Delp E J. Digital watermarking:algorithms and applications [J]. IEEE Signal Processing Magazine, 2001, 18(4): 33-46.
  • 4Bloom J A, Cox I J, Kalker T, et al. Copy Protection for DVD Video[J]. Proceedings of the IEEE, 1999,87(7) : 1267-1276.
  • 5Alessandro Piva. Companies and products for digital watermarking [J/OL]. http://cosimo. die. unifi. it/-piva/Watermarking/wm_sw, html, 2004.
  • 6Katzenbeisser S. On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking [A ].Proceedings of the 5th International Query Processing and Multimedia Issues in Distributed Systems Workshop [C ]. Munich: IEEE Computer Society Press, 2001. 815-819.
  • 7Qiao L T, Nahrstedt K. Watermark schemes and protocols for protecting rightful ownership and customer's rights [ J ]. Journal of Visual Communication and Image Representations, 1998, 9(3) : 194-210.
  • 8Craver S, Memon N, Yeo B L, et al. Resolving rightful ownership with invisible watermarking techniques : limitations, attacks and implications[J].IEEE Journal on Selected Areas in Communications,1998, 16 (4):573-586.
  • 9Davis D.M.Impact of digital rights management on access and distribution of intellectual property in libraries and information centers[J].Technicalities,2000,20(4):5 - 7.
  • 10Bill Rosenblatt,Bill Trippe,Stephen Mooney.Digital Rights Management:Business and Technology[M].New York:Published by M&T Books,2002.

共引文献178

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部