| 研究生: |
洪丞甫 Hung, Cheng-Fu |
|---|---|
| 論文名稱: |
具有數位版權功能之MP3音樂散佈系統 Digital Right Management in Large Scale Music Distribution Network |
| 指導教授: |
李忠憲
Li, Jung-Shian |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2007 |
| 畢業學年度: | 95 |
| 語文別: | 中文 |
| 論文頁數: | 76 |
| 中文關鍵詞: | 數位版權管理 、數位指紋 、資料隱藏 、RSA公開金鑰加密系統 |
| 外文關鍵詞: | data hiding, digital right management, RSA public key system, digital fingerprinting |
| 相關次數: | 點閱:71 下載:3 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著網路通訊快速發展,數位內容透過網路傳播也變得越來越容易,所以許多關於數位版權的問題因而產生,目前以侵犯他人智慧財產權、非法散佈授權內容等侵權問題最為嚴重。針對音樂的問題來看,目前許多音樂業者面對此情形卻是無計可施,因此對於業者之商業利益造成極大的損害。
我們則希望提出一套可以確保音樂內容下載完整性並且能夠提供數位版權管理機制的網路系統,以P2P網路為基本架構,除了可以有效提昇資料於網路中的生存時間,降低業者的網路負擔,並且能夠利用P2P網路的特性來避免單點失敗(single point of failure)。我們同時採用RSA公開金鑰加密系統來產生給每位使用者專屬且唯一的數位指紋,並且利用資料隱藏的技術將數位指紋內嵌於音樂檔案之中,我們的數位指紋機制能夠追溯出非法散佈音樂檔案的用戶,並且防止企圖進行惡意攻擊行為的非法使用者。
我們所提出的系統架構除了可以提供給用戶有效率且安全的音樂下載環境,亦能夠維護音樂業者本身的商業利益並能夠協助音樂業者來遏止非法侵權的行為,改善現今音樂的盜版風氣。
With rapid development of network technology, the distribution of digital content becomes simpler and easier. It also results in some problems about the digital right, especially about tort and unauthorized distribution for the digital content. In the point of view about music, many music dealers are powerless to face this situation, so it causes a great cost to the music dealers.
We propose a music distribution system that not only can ensure the completeness of downloading music but also can provide the mechanism of digital right management. Based on P2P network architecture, the proposed system can efficiently extend the data existence time, reduce the network overhead about music dealer, and then avoid the single point of failure in the network. We also adopt the concept of RSA public key system to generate the unique digital fingerprinting for every user and make use of the data hiding technology to embed user’s digital fingerprinting into the downloaded music file. Then, the proposed system can trace the unauthorized user that distributes the music file and prevent the illegal attacking behavior.
Our proposed system can provide the efficient and safe network environment for downloading music, preserve the music dealer’s commercial benefits, and prevent the illegal tort.
[1] W. Luh, D. Kundur, "New Paradigms for Effective Multicasting and Fingerprinting of Entertainment Media", IEEE Communications Magazine, June 2005
[2] D. Kirovski, H. Malvar, Y. Yacobi, "A Dual Watermark-fingerprinting System", IEEE Multimedia, July 2004
[3] M. Schmucker, P. Ebinger, "Promotional and Commercial Content Distribution based on a Legal and Trusted P2P Framework", IEEE International Conference on E-Commerce Technology, July 2005
[4] N. Baaziz, Y. Sami, "Attacks on Collusion-Secure Fingerprinting for Multicast Video Protocols", Proceeding of the First International Conference on Distributed Frameworks for Multimedia Applications, Feb. 2005
[5] Jung-Soo Lee, Ki-Song Yoon, "The system integration of DRM and fingerprinting", Proceeding of the 8th International Conference on Advanced Communication Technology, Feb. 2006
[6] D. Boneh, J. Shaw, "Collusion-Secure Fingerprinting for Digital Data", IEEE Transaction on Information Theory, Sep. 1998
[7] W. Trappe, Min Wu, K.J. Ray Liu , "Collusion-Resistant Fingerprinting for Multimedia", IEEE International Conference on Acoustics, Speech, and Signal Processing, Aug. 2002
[8] J. Ren, T. Li, M. Nadooshan, "A Cryptographic Watermark Embedding Technique", IEEE Conference Record of the 38th Asilomar Conference on Signals, Systems and Computers, Nov. 2004
[9] G. Mandyam, N. Ahmed, N. Magotra, "Lossless Image Compression Using the Discrete Cosine Transform", Journal of Visual Communication and Image Representation, 1997
[10] Chang-Lung Tsai, Kuo-Chin Fan, Char-Dir Chung, T.C. Chuang, "Data Hiding of Binary Images Using Pair-wise Logical Computation Mechanism", IEEE International Conference on Multimedia and Expo, June 2004
[11] T. Mundt, "Location Dependent Digital Rights Management", Proceedings of the 10th IEEE Symposium on Computers and Communications, June 2005
[12] M. Schmucker, P. Ebinger, "Promotional and commercial content distribution based on a legal and trusted P2P framework", Proceedings of the 7th IEEE International Conference on E-Commerce Technology, July 2005
[13] S.K. Nair, B.C. Popescu, Chandana Gamage B. Crispo, A.S. Tanenbaum, "Enabling DRM-preserving digital content redistribution", Proceedings of the 7th IEEE International Conference on E-Commerce Technology, July 2005
[14] Y. Nishimoto, A. Baba, T. Kurioka, S. Namba, A.S. Tanenbaum, "A Digital Rights Management System for Digital Broadcasting Based on Home Servers", IEEE Transactions on Broadcasting, June 2006
[15] M. Pazarci, V. Dipcin, "Data Embedding in Scrambled Digital Video", Proceedings of the 8th IEEE International Symposium on Computers and Communication, July 2003
[16] Jessica Fridrich, Miroslav Goljan, Rui Du, "Lossless Data Embedding-New Paradigm in Digital Watermarking", EURASIP Journal on Applied Signal Processing, Feb. 2002
[17] Zhicheng Ni, Y.Q. Shi, N. Ansari, Wei Su, Qibin Sun, Xiao Lin, "Robust Lossless Image Data Hiding", IEEE International Conference on Multimedia and Expo, June 2004
[18] Xiaoxiao Dong, M.F. Bocko, Z. Ignjatovic, "Data Hiding Via Phase Manipulation of Audio Signals", IEEE International Conference on Acoustics, Speech, and Signal Processing, May. 2004
[19] B. Chen, G.W. Wornell, "digital watermarking and information embedding using dither modulation", IEEE 2nd Workshop on Multimedia Signal Processing, Dec. 1998
[20] S.S. Agaian, D. Akopian, O. Caglayan, Dapos, S.A. Souza, "Lossless Adaptive Digital Audio Steganography", Conference Record of the 39th Asilomar Conference on Signal, Systems and Computers, Nov. 2005
[21] Litao Gang, A.N. Akansu, M. Ramkumar, "MP3 Resistant Oblivious Steganography", IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001
[22] S. Murthy, A. Sen, "A Peer-to-Peer Network Based on Multi-Mesh Architecture", IEEE Global Telecommunications Conference, Dec. 2003
[23] F. Harrell, Y. Hu, G. Wang, H. Xia, "Survey of Locating & Routing in Peer-to-Peer Systems", Department of Computer Science and Engineering University of California, San Diego.
[24] K. Lua, J. Crowcroft, M. Pias, R. Sharma, S. Lim, "A Survey and Comparison of Peer-to-Peer Overlay Network Schemes", IEEE Communications Surveys and Tutorials, 2nd Quarter 2005
[25] R.J. Anderson, F.A.P. Petitcolas, "On The Limits of Steganography", IEEE Journal on Selected Areas in Communications, May 1998
[26] C. Gkantsidis, P.R. Rodriguez, "Network Coding for Large Scale Content Distribution", IEEE INFOCOM 2005
[27] C. Gkantsidis, P.R. Rodriguez, "Cooperative Security for Network Coding File Distribution", IEEE INFOCOM 2006
[28] V. Venkatachalam, L. Cazzanti, N. Dhillon, M. Wells, "Automatic Identification of Sound Recordings", IEEE Signal Processing Magazine, Mar. 2004
[29] Adi Shamir, "How to share a secret", Comm. of the ACM, 22(1), pp612–613, 1979
[30] H. hua Chu, L. Qiao, K. Nahrstedt, "A secure multicast protocol with copyright protection", Proc. SPIE Security Watermarking of Multimedia Contents, Jan. 1999
[31] I. Brown, C. Perkins, J. Crowcroft, "Watercasting: Distributed watermarking of multicast media", Proc. Networked Group Communication 1999
[32] Inoue. H., Miyazaki. A., Yamamoto. A., Katsura. T., "A digital watermark based on the wavelet transform and its robustness on image compression", IEEE International Conference on Image Processing, 1998
[33] N.R. Wagner, "Fingerprinting", Proc.of the 1983 Symposium on Security and privacy, (Oakland, California), IEEE, April 1983
[34] P.H.W. Wong, O.C. Au, Y.M. Yeung, "Novel blind multiple watermarking technique for images", IEEE Transactions on Circuits and Systems for Video Technology, Volume 13, Issue 8, Aug. 2003
[35] R.L. Rivest., A. Shamir., L.A. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Comm. of the ACM, Vol.21, Nr.2, 1978
[36] Wen-Nung Lie, Guo-Shiang Lin, Chih-Liang Wu, Ta-Chun Wang, "Robust image watermarking on the DCT domain", Circuits and Systems, 2000. Proceedings of ISCAS 2000 Geneva. The 2000 IEEE International Symposium on, Volume 1, 28-31 May 2000
[37] 洪丞甫,謝哲人,李忠憲,劉奕賢, "分散式數位版權管理網路系統", TANET, Hualien, Taiwan, 2006
[38] Jung-Shian Li, Chih-Hung Chao, "A Robust Peer-to-Peer Scheme Based on Network Coding with Lagrange Polynomial Interpolation in Galois Extension Field", submitted to IEEE Transactions on Systems, Man and Cybernetics, Part A, 2007
[39] Rich Helton, Johennie Helton, "Java™ Security Solutions", Published by Wiley Publishing, Inc., Indianapolis, 2002
[40] 賴溪松,韓亮,張真誠,"近代密碼學及其應用",旗標出版股份有限公司,2003
[41] http://www.cs.utsa.edu/~wagner/lawsbookcolor/laws.pdf
[42] http://www.iis.fhg.de/amm/techinf/layer3/index.html
[43] http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
[44] http://mathworld.wolfram.com/LagrangeInterpolatingPolynomial.html
[45] www.bittorrent.com
[46] http://www.emule-project.net/home/perl/general.cgi?l=16
[47] http://www.petitcolas.net/fabien/steganography/mp3stego/
[48] http://mathworld.wolfram.com/Gauss-JordanElimination.html
[49] http://math.fullerton.edu/mathews/n2003/GaussianJordanMod.html
[50] http://indigo.ie/~mscott/
[51] http://www.kkbox.com.tw/
[52] http://tw.music.yahoo.com/
[53] http://web.ezpeer.com/
[54] http://www.kuro.com.tw/
[55] http://www.microsoft.com/
[56] http://www.apple.com.tw/