Copyright Protection Schemes for Digital Multimedia
博士 === 國立中興大學 === 資訊科學研究所 === 93 === As easiness and rapidness of distribution for digital multimedia data over communication networks enrich the daily lives of people, the challenges of multimedia security are rising such as confidentiality, authentication, integrity, non-repudiation and copyright...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/41198803464846197046 |
id |
ndltd-TW-093NCHU0394002 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093NCHU03940022016-06-13T04:17:15Z http://ndltd.ncl.edu.tw/handle/41198803464846197046 Copyright Protection Schemes for Digital Multimedia 數位多媒體著作權保護技術 Tzung-Her Chen 陳宗和 博士 國立中興大學 資訊科學研究所 93 As easiness and rapidness of distribution for digital multimedia data over communication networks enrich the daily lives of people, the challenges of multimedia security are rising such as confidentiality, authentication, integrity, non-repudiation and copyright protection. The first four issues can be well addressed mainly by means of cryptographic tools. However, even well-defined cryptographic tools can not be adopted to settle copyright protection directly. Digital copyright protection in multimedia data has not only drawn a lot of attention in recent years but also, unfortunately, obstructed the rapid development of computer and communication networks at the same time. This dissertation deals with digital copyright protection in terms of watermarking techniques with public verification and watermarking protocols with asymmetry and anonymity. In the first part, a copyright message is embedded in digital images, audio and video in an imperceptible way so as not to interfere with the normal usage of the protected media while its existence can discourage the manner of violating rightful copyright. This technique, so-called digital watermarking, should at least satisfied four essential requirements: transparency, robustness, security and blindness. In our research, robustness enhancement, public verification and multiple watermarking have been found as main three trends of digital watermarking for copyright protection. Based on this observation, a multiple watermarking scheme is firstly proposed in Chapter 2 to enhance the robustness of a watermark by simultaneously benefiting public verification and several valuable advantages from introducing visual secret sharing. Taking account of some malicious attacks, a lossless copyright-protection scheme, distinct from conventional watermarking techniques, is secondly proposed in Chapter 3 to resist against StirMark attacks, counterfeit attacks, copy attacks, BPM attacks, etc. It’s worthwhile to note that the protected media is lossless, i.e., it is the same as the original. This property is considerably important for the situations, high-quality art, medical application and military application, in particular. This scheme not only meets all of the watermarking properties but also answer the above three trends: robustness enhancement, public verification and multiple watermarking. Next, we also observe that watermarking alone is not sufficient to resolve rightful copyright of digital media. Therefore, Chapter 4 and 5 present two watermarking protocols with asymmetry and anonymity. Firstly, a buyer-reseller watermarking protocol, which is based on a public key cryptosystem that is a privacy homomorphism with respect to the watermark insertion operator, supports the digital media redistribution in the first-hand and second-hand markets over the Internet. Secondly, a lightweight watermarking protocol, which is based on a secret key cryptosystem and a tamper-resistant device, is proposed to adjust itself to the device equipped with a low computation capability. Finally, the dissertation ends with some future research topics as an extension of our current research. Our goal, in sum, is to position digital watermarking as a complement of cryptography. We believe that the security and reliability of copyright protection can benefit from a combination of cryptography and watermarking techniques. Gwoboa Horng 洪國寶 2005 學位論文 ; thesis 171 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立中興大學 === 資訊科學研究所 === 93 === As easiness and rapidness of distribution for digital multimedia data over communication networks enrich the daily lives of people, the challenges of multimedia security are rising such as confidentiality, authentication, integrity, non-repudiation and copyright protection. The first four issues can be well addressed mainly by means of cryptographic tools. However, even well-defined cryptographic tools can not be adopted to settle copyright protection directly.
Digital copyright protection in multimedia data has not only drawn a lot of attention in recent years but also, unfortunately, obstructed the rapid development of computer and communication networks at the same time.
This dissertation deals with digital copyright protection in terms of watermarking techniques with public verification and watermarking protocols with asymmetry and anonymity.
In the first part, a copyright message is embedded in digital images, audio and video in an imperceptible way so as not to interfere with the normal usage of the protected media while its existence can discourage the manner of violating rightful copyright. This technique, so-called digital watermarking, should at least satisfied four essential requirements: transparency, robustness, security and blindness.
In our research, robustness enhancement, public verification and multiple watermarking have been found as main three trends of digital watermarking for copyright protection. Based on this observation, a multiple watermarking scheme is firstly proposed in Chapter 2 to enhance the robustness of a watermark by simultaneously benefiting public verification and several valuable advantages from introducing visual secret sharing.
Taking account of some malicious attacks, a lossless copyright-protection scheme, distinct from conventional watermarking techniques, is secondly proposed in Chapter 3 to resist against StirMark attacks, counterfeit attacks, copy attacks, BPM attacks, etc. It’s worthwhile to note that the protected media is lossless, i.e., it is the same as the original. This property is considerably important for the situations, high-quality art, medical application and military application, in particular. This scheme not only meets all of the watermarking properties but also answer the above three trends: robustness enhancement, public verification and multiple watermarking.
Next, we also observe that watermarking alone is not sufficient to resolve rightful copyright of digital media. Therefore, Chapter 4 and 5 present two watermarking protocols with asymmetry and anonymity. Firstly, a buyer-reseller watermarking protocol, which is based on a public key cryptosystem that is a privacy homomorphism with respect to the watermark insertion operator, supports the digital media redistribution in the first-hand and second-hand markets over the Internet.
Secondly, a lightweight watermarking protocol, which is based on a secret key cryptosystem and a tamper-resistant device, is proposed to adjust itself to the device equipped with a low computation capability.
Finally, the dissertation ends with some future research topics as an extension of our current research.
Our goal, in sum, is to position digital watermarking as a complement of cryptography. We believe that the security and reliability of copyright protection can benefit from a combination of cryptography and watermarking techniques.
|
author2 |
Gwoboa Horng |
author_facet |
Gwoboa Horng Tzung-Her Chen 陳宗和 |
author |
Tzung-Her Chen 陳宗和 |
spellingShingle |
Tzung-Her Chen 陳宗和 Copyright Protection Schemes for Digital Multimedia |
author_sort |
Tzung-Her Chen |
title |
Copyright Protection Schemes for Digital Multimedia |
title_short |
Copyright Protection Schemes for Digital Multimedia |
title_full |
Copyright Protection Schemes for Digital Multimedia |
title_fullStr |
Copyright Protection Schemes for Digital Multimedia |
title_full_unstemmed |
Copyright Protection Schemes for Digital Multimedia |
title_sort |
copyright protection schemes for digital multimedia |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/41198803464846197046 |
work_keys_str_mv |
AT tzungherchen copyrightprotectionschemesfordigitalmultimedia AT chénzōnghé copyrightprotectionschemesfordigitalmultimedia AT tzungherchen shùwèiduōméitǐzhezuòquánbǎohùjìshù AT chénzōnghé shùwèiduōméitǐzhezuòquánbǎohùjìshù |
_version_ |
1718303587142991872 |