簡易檢索 / 詳目顯示

研究生: 謝哲人
Hsieh, Che-Jen
論文名稱: 在網路環境下應用數位版權管理與數位鑑識機制在檔案傳輸之研究
Digital Rights Management and Digital Forensics for Content Delivery in Networks
指導教授: 李忠憲
Li, Jung-Shian
學位類別: 博士
Doctor
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2010
畢業學年度: 99
語文別: 英文
論文頁數: 85
中文關鍵詞: 數位版權管理點對點傳輸數位指紋資料隱藏資料傳送封包層數位鑑識網路鑑識
外文關鍵詞: DRM, P2P, Fingerprint, Data hiding, Content Delivery, Packet-Level Forensic, Network Forensic
相關次數: 點閱:103下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來由於網路通訊快速發展,檔案很容易在網路上大規模的散佈,而具有版權保護的資料在網路上非法散佈已成為重要議題,因此本論文提出在網路具有數位版權管理功能的資料散播架構。我們使用基於拉格朗日多項式插入法的網路編碼方法來增加網路傳遞資料的完整性。當網路的節點下載足夠的編碼的資料片段後,它不只可用有限場高斯消去法來重組原檔案區塊外,並且產生新的編碼資料片段再釋出到網路中,分享給其他的節點使用。結果,原先在網路中提供資料下載的伺服器的下載的負擔,可因為我們提供的方法後大大減少極大地減少,而在網路上編碼資料片段的數量也明顯增加,如此可解決網路上下載的 ”最後一塊的問題”。在我們所提的具有數位版權管理模組的架構中,在網路上我們使用RSA公鑰加密演算法針對每一使用者產生一組唯一的數位指紋,這數位指紋嵌入到每一受保護的音樂檔案中,此種方法可讓音樂提供廠商可使用數位指紋鑑識方法來辨別網路上非法傳遞檔案的使用者。從大量實驗結果證明我們所提供的架構可有效及安全的提供大規模檔案下載保護機制,並且並沒有降低檔案的品質。

    在檔案數位鑑識方面,目前利用網站下載及傳遞JPEG圖像是相當普遍,然而這種方式很容易碰到檔案非法複製、剽竊和色情的泛濫等問題。因此為解決在網路上非法散播檔案的問題,提供數位鑑識是一種解決方法之一。在本論文中,我們提出一個針對JPEG圖像做數位特徵擷取方法去避免在網路上傳遞非法的JPEG圖像。此方法可在網路封包層中擷取出JPEG圖像二進位資料數據並可利用這資料去搜尋可疑的資料封包。根據實驗結果,我們的方法可減少對JPEG檔案儲存空間,並可在網路中有效的擷取出檔案的特徵值。

    Due to rapid advances in the network communications field in recent years, the distribution of large-scale music contents has become easier and more efficient than ever before. However, the unauthorized distribution of copyright-protected content has emerged as a major concern. Accordingly, this paper presents a content distribution framework with a DRM capability for P2P networks. The robustness of the content distribution is ensured by using a network coding approach based on the Lagrange polynomial interpolation method. When the downloading peer within the network receives sufficient coded pieces, it not only reconstructs the associated blocks using a finite field Gaussian elimination method, but also creates its own copies of the coded pieces within these blocks and shares these copies amongst the other peers in the network. As a result, the distribution overhead imposed on the music provider is substantially reduced and the number of coded pieces within the network is significantly increased, thereby overcoming the “last piece problem” inherent in existing P2P schemes. In the DRM module of the framework, the RSA public-key cryptosystem is used to generate a unique digital fingerprint for every user within the network. The fingerprint is embedded within the music file in a protected form such that the music provider can establish the identification of any user performing an unauthorized distribution of the file. The experimental results confirm that the proposed framework provides an efficient and secure means of distributing large-scale copyright-protected music contents with no discernible degradation in the audio quality.
    Aspects of digital forensics in the file, web transmission is common and JPEG image are widespread on the Internet. But digital distribution may suffer problems including illegal duplication, piracy and pornographic inundation. Pictures circulating on the Internet are mostly in JPEG format. It is important for digital forensic measure to provide evidences of illegal distribution. In this paper, a digital feature retrieval scheme for JPEG images is proposed to avoid disseminating unlawful JPEG images. The scheme could extract JPEG binary data at the packet level using a DC feature to search for suspicious files. According to the experiment results, our method could reduce the storage volume of JPEG image files and retrieve effective features quickly from the network.

    Abstract VI Contents VIII List of Tables X List of Figures XI Chapter 1 Introduction 1 1.1 Overview of DRM framework for Content Delivery 1 1.2 Overview of Digital Forensics for Content Delivery 3 1.3 Motivation 4 1.4 Contributions 5 1.5 Organization of the Dissertation 6 Chapter 2 A Novel DRM Framework for Peer-to-Peer Music Content Delivery 8 2.1 Related Work 8 2.1.1 Content Distribution 8 2.1.2 DRM 9 2.1.3 Data Hiding 10 2.2 Preliminary Work 11 2.2.1 Lagrange Polynomial Interpolation 11 2.2.2 Finite Field 12 2.2.3 RSA public-key Cryptosystem 13 2.3 System Architecture 14 2.3.1System Requirements 14 2.3.2 Distribution Phase 16 2.3.3 FP Generation Phase 19 2.3.4 FP Embedding/Protection/Checking Phase 21 2.4 Discussions 23 2.4.1 The Last Missing Piece Problem 23 2.4.2 UID Space 24 2.4.3 Security of the Peer Program and ID issues 24 2.4.4 Extensibility to other Types of Multimedia 26 2.4.5 Computational Complexity 27 2.5 Experiments 30 2.5.1 Experimental Environment 30 2.5.2 Execution Times of Piece Partition and Piece Reconstruction Processes 32 2.5.3 SNR of Fingerprinted Music Files 32 2.5.4 Robustness of Fingerprint to Malicious Attack 33 2.5.5 P2P Content Delivery 34 Chapter 3 Digital Evidence Collection for Web Image Access 36 3.1 Related Work 36 3.2 System Architecture 38 3.3 Experiment and Discussion 48 Chapter 4 Improved IPsec Performance Utilizing Transport-Layer-Aware Compression Architecture 55 4.1 Related Work 56 4.2 ES_PIPE Architecture 58 4.3 Experiments 69 4.4 Discussions 76 Chapter 5 Conclusion 78 Bibliography 81

    [1] Lee, Wei-Bin, Chen, Tung-Her, "A Public Verifiable Copy Protection Technique for Still Images." Journal of systems and Software, Vol. 62, No. 3, pp.195-204 2002.
    [2] Eugene, T.L., Reginald, L.L., "Advances in Digital Video Content Protection." Proc. of the IEEE, Special Issue on Advances in Video Coding and Delivery, 2005.
    [3] Grangetto, M., Magli, E., Olmo, G., "Multimedia selective encryption by means of randomized arithmetic coding." IEEE Trans. Multimedia, vol. 8,no. 5, pp. 905-917, 2006.
    [4] Wu, C. -P, Kuo, C.,"Design of integrated multimedia compression and encryption systems." IEEE Trans. Multimedia, vol. 7, pp. 828-839, 2005.
    [5] Li, Shujun, Lo, K., "Security problems with improper implementations of improved FEA-M."Journal of systems and software, vol. 80, no. 5, pp. 791-794, 2007.
    [6] Lan, X., Xue, J., Tian, L., Hu, W., Zheng, N.,"A Peer-to-Peer Architecture for Live Streaming with DRM." 6th IEEE Consumer Communications and networking Conference (CCNC) pp. 10-13, 2009.
    [7] Macq, B., Dittmann, J., Delp, E. J., "Benchmarking of image watermarking algorithms for digital rights management." Proceedings of the IEEE, 2004.
    [8] Lei, B., Soon, I.Y., "Audio Watermarking for DRM based on Chaotic Map."International Conference on Computer Engineering and technology. Vol. 1, 2009.
    [9] Wang, Y., Doherty, J.F., Van-Dyck, R.E., "A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images."IEEE Transactions on Image Processing, 11(2), pp. 77-88, 2002.
    [10] Wagner, N.R., “Fingerprint."Proc.of the 1983 Symposium on Security and privacy, IEEE, 1983.
    [11] Wu, M., Trappe, W., Wang, Z.J., Lin, K.J., "Collusion resistant fingerprint for multimedia."IEEE Signal Process. Mag., vol. 21, no. 2, pp. 15-27, 2004.
    [12] Burges, C., Platt, J., Jana, S., "Distortion Discriminant Analysis for Audio Fingerprinting."IEEE Transactions on Speech and Audio Processing, 2003.
    [13] Luh, W., Kundur, D., "New paradigms for effective multicasting and fingerprinting of entertainment media."IEEE Communications Magazine, pp 77-84, 2005.
    [14] Kundur, D., Karthik, K., "Video fingerprinting and encryption principles for digital rights management."Proc. IEEE, vol. 92, no. 6, pp. 918-932, 2004.
    [15] Napster protocol open specification, http://opennap.sourceforge.net/ napster.txt., 2000.
    [16] Ripeanu, M., Foster, I., "Mapping the Gnutella network."IEEE Internet Computing, vol. 6, pp. 50-57, 2002.
    [17] Lukas J, Fridrich J, Goljan M.,"Digital camera identification from sensor pattern noise.", IEEE Trans. Information Forensic and Security, June 2006, 1(2): 205-214
    [18] Luo Weiqi , Qu Zhenhua , Pan Feng, and Huang Jiwu, "A survey of passive technology for digital image forensic", Frontiers of Computer Science in China, May 2007, Volume 1, 2007, pp. 166-179
    [19] Neelamani R, de Queiroz R, Fan Z, et al."Jpeg compression history estimation for color images.", IEEE Trans. Image Processing, June 2006, 15(6): 1365-1378
    [20] Lie, W., Lin, G., Wu, C., Wang, T., "Robust image watermarking on the DCT domain. "Proceedings of ISCAS 2000 Geneva. IEEE International Symposium on, Volume 1, 28-31, 2000.
    [21] Shirani S., F. Kossentini, and R. Ward."Reconstruction of baseline JPEG coded images in error prone environments." IEEE Trans. Image Process, 9(7):1292-1299, July 2000.
    [22] Helton, R., Helton, J., "Java Security Solutions."Published by Wiley Publishing, Inc., Indianapolis, 2002.
    [23] Kuribayashi, M., Tanaka, H., "Fingerprinting protocol for images based on additive homomorphic property."IEEE Trans. Image Processing, vol. 14, no. 12, pp. 2129-2139, 2005.
    [24] Peng, G., "CDN: Content Distribution Network."Technical Report TR-125, Experimental Computer Systems Lab, Department of Computer Science, State University of New York, Stony Brook, 2003.
    [25] Vakali, A., Pallis, G., "Content Delivery Networks: Status and Trends."IEEE Internet Computing, IEEE Computer Society, pp. 68-74, 2003.
    [26] Douglis, F., Kaashoek, M.F., "Scalable Internet Services."IEEE Internet Computing, vol. 5, no. 4, pp. 36-37, 2001.
    [27] Akamai, http://www.akamai.com., 2008.
    [28] Arlitt, M., Jin, T., "A Workload Characterization Study of 1998 World Cup Web Site." IEEE Network, pp. 30-37, 2000.
    [29] Cohen, B., "Incentives build robustness in bittorrent."In P2P Economics Workshop, Berkeley, CA, 2003.
    [30] Subramanya, S., Yi, B., "Digital rights management."Potentials, IEEE, vol. 25, pp. 31-34, 2006.
    [31] Torres, V., S., Carlos, Dias, M., Delgado, J., "Open DRM and the Future of Media."IEEE Multimedia, vol.15. pp. 28-36, 2008.
    [32] Van, M., Veen, D., Kalker, T., Lemma, A., "Watermarking and fingerprint for electronic music delivery."Security and Watermarking of Multimedia Content VI, vol. 5306, pp. 200-211, 2004.
    [33] iTunes, iTunes Plus DRM-free tracks expanding, dropping to 99 cents. Apple News from ARS Technica, 2007.
    [34] Microsoft. Windows Media Digital Rights Management. http://www.microsoft.com/windows/windowsmedia/forpros/drm/default.mspx, 2008.
    [35] RealNetworks. HelixCommunity - The Foundation of Great Multimedia Applications. https://helixcommunity.org, 2008.
    [36] Tsai, C., Fan, K., Chung, C., Chuang, T., "Data Hiding of Binary Images Using Pair-wise Logical Computation Mechanism." IEEE International Conference on Multimedia and Expo, 2004.
    [37] Pazarci, M., Dipcin, V., "Data Embedding in Scrambled Digital Video."Proceedings of the 8th IEEE International Symposium on Computers and Communication, 2003.
    [38] Ni, Z., Shi, Y., Ansari, N. Su, Wei, Sun, Q., Lin, X., "Robust Lossless Image Data Hiding."IEEE International Conference on Multimedia and Expo, 2004.
    [39] Dong, X., Bocko, M.F., Ignjatovic, Z., "Data Hiding Via Phase Manipulation of Audio Signals."IEEE International Conference on Acoustics, Speech, and Signal Processing, 2004.
    [40] Agaian, S.S., Akopian, D., Caglayan, O., Dapos, Souza, S.A., "Lossless Adaptive Digital Audio Steganography."Conference Record of the 39th Asilomar Conference on Signal, Systems and Computers, 2005.
    [41] Venkatachalam, V., Cazzanti, L., Dhillon, N., Wells, M., "Automatic Identification of Sound Recordings."IEEE Signal Processing Magazine, 2004.
    [42] Lu,Z., Wang, J., Liu, B., "An improved lossless data hiding scheme based on image VQ-index residual value coding."Journal of systems and software, Vol. 82, No. 6, pp.1016-1024, 2009.
    [43] Wagner, R., The Laws of Cryptography with Java Code. http://www.cs.utsa.edu/~wagner/ lawsbookcolor/laws.pdf, 2003.
    [44] Shamir, A., "How to share a secret."Comm. of the ACM, 22(1), pp.612-613, 1979.
    [45] Federal Information Processing Standards Publication 197, Announcing the ADVANCED ENCRYPTION STANDARD (AES). http://csrc.nist.gov/publications/fips/fips197 /fips-197.pdf, 2001.
    [46] Cohen, B., BitTorrent protocol specification. http://www.bittorrent.org/beps/ bep_0003.html, 2009.
    [47] Kulbak, Y., Bickson, D., "The emule Protocol Specification.", 2005
    [48] Fabien, P., MP3Stego http://www.petitcolas.net/fabien/steganography/ mp3steg, 2004.
    [49] [14] Gkantsidis, C., Rodriguez, P., "Network coding for large scale content distribution." In Proc. INFOCOM, vol.4, 2005.
    [50] Wang, Mea, Li, Baochun, "How practical is network coding?" in Fourteenth IEEE international Workshop on Quality of Service 2006, Yale University, New Haven, Connecticut, pp.19-21, 2006.
    [51] Bharambe, A., Herley, C., Padmanabhan, V.N., "Analyzing and Improving BitTorrent Performance."Tech. Rep. MSR-TR-2005-03, Microsoft Research, 2005.
    [52] [31] Mikhail, D., Atallah, J., Stytz, M., "A survey of Anti-Tamper technologies."The journal of Defense software Engineering, 2004.
    [53] Naumovich, G., Memon, N., "Preventing piracy, reverse engineering, and tampering."IEEE Computing., vol. 36, pp. 64-71, 2003.
    [54] Arbaugh, W., Farber, D., Smith., J., "A Secure and Reliable Bootstrap Architecture."Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, 1997.
    [55] Zhang, X., Chen, S., Sandhu, R., "Enhancing data authenticity and integrity in P2P systems."IEEE Internet Computing, pp. 42-49. 2005.
    [56] Press, W., Teukolsky, S., Vetterling, W., Flannery, B., "Numerical Recipes in C."Cambridge Univ. Press, 1998.
    [57] Testbed, Taiwan Network Security Testbed. http://twanst.icsc.ncku.edu.tw, 2009.
    [58] Katzenbeisser, S., Petitcolas, F., "Information Hiding Techniques for Steganography and Digital Watermarking."Artech House, Inc., Canton Street, Norwood MA, 2000.
    [59] Boneh D., J. Shaw, "Collusion-Secure Fingerprinting for Digital Data", IEEE Transaction on Information Theory, Sep. 1998
    [60] Pei-Te Chen and Chi-Sung Laih, "IDSIC: an intrusion detection system with identification capability", International Journal of Information Security, 2008
    [61] Luh W., D. Kundur, "New Paradigms for Effective Multicasting and Fingerprinting of Entertainment Media", IEEE Communications Magazine, June, 2005
    [62] Chin-Chen Chang, Jun-Chou Chuang, Yih-Shin Hu, "Retrieving digital images from a JPEG compressed image database", Image and Vision Computing 22, pp.471-484, 2004.
    [63] R.J. Anderson, F.A.P. Petitcolas, "On The Limits of Steganography", IEEE Journal on Selected Areas in Communications, May, 1998
    [64] Venkatachalam V., L. Cazzanti, N. Dhillon, M. Wells, "Automatic Identification of Sound Recordings", IEEE Signal Processing Magazine, Mar, 2004
    [65] Hartung F, Kutter M. "Multimedia watermarking techniques." Proc. IEEE, 87(7): 1079-1107, July, 1998.
    [66] Kirovski D., H. Malvar, Y. Yacobi, "A Dual Watermark-fingerprinting System", IEEE Multimedia, July, 2004.
    [67] Ventura, H. E., Miller, J. M., & Deflem, M. "Governmentality and the War on Terror: FBI Project Carnivore and the Diffusion of Disciplinary Power." Critical Criminology, 13(1), pp. 55-70, 2005.
    [68] Tcpdump. Available from: <http://www.tcpdump.org/>
    [69] Felix Fuentes, Dulal C. Kar, "Ethereal vs. Tcpdump: a comparative study on packet sniffing tools for educational purpose", Journal of Computing Sciences in Colleges, Volume 20 , Issue 4 , pp. 169-176, April, 2005
    [70] Wireshark: Available from: <http://www.wireshark.org/>
    [71] G. Theo, W.M. Arnold, "PicToSeek: combining color and shape invariant features for image retrieval", IEEE Transactions on Image Processing, 9 (1), pp. 102-119, 2000.
    [72] Palmer G., "A Road Map for Digital Forensic Research," Technical Report DTR-T0010-01, DFRWS." Report from the First Digital Forensic Research Workshop (DFRWS), November, 2001.
    [73] Impulseadventure. Available from: <http://www.impulseadventure.com/photo/jpeg-snoop.html>
    [74] R. Atkinson, "IP Encapsulating Security Payload", RFC 1827, 1995.
    [75] ITU Recommendation G.711 (11/88): Pulse code modulation (PCM) of voice frequencies, available at http://www.itu.int/rec/T-REC-G.711/e
    [76] ITU Recommendation G.729: Coding of speech at 8 kbit/s using conjugate-structure algebraic-code-excited linear prediction (CS-ACELP), available at http://www.itu.int/rec/T-REC-G.729/e
    [77] Y. Yang, C. Martel, Z. Fu, and S. Wu, "IPsec/VPN security policy correctness and assurance." Journal of High Speed Networks, 15, Issue 3, pp. 275, 2006.
    [78] W. B. Diab, S. Tohme, C. Bassil, "Critical VPN Security Analysis and New Approach for Securing VoIP Communications over VPN Networks ", in proc. of the 3rd ACM workshop on Wireless multimedia networking and performance modeling (WMuNeP’ 07), pp.92 – 96, 2007
    [79] Lothar Fritsch, Arne-Kristian Groven, Lars Strand, Wolfgang Leister, and Anders Moen Hagalisletto Norsk "A Holistic Approach to Open Source VoIP Security: Results from the EUX2010SEC Project." International Journal on Advances in Security, vol 2 no 2&3, 2009.
    [80] C. Shue, Y. Shin, M. Gupta, J. Y. Choi, "Analysis of IPsec Overheads for VPN Servers". In Proc. of Secure Network Protocols, 2005. (NPSec). 1st IEEE ICNP Workshop, pp. 25- 30, Nov. 2005.
    [81] D. Zhang and D. Ionescu "Online Packet Loss Measurement and Estimation for VPN-Based Services." IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 8, 2010.
    [82] S. Ayed, A. Minaburo, L. Toutain, "Enhancing robust header compression over IEEE 802 networks." in proc. of Wireless and Mobile Computing, Networking and Communications (WiMob'2006). IEEE International Conference, pp.380-385, Jun. 2006.
    [83] E. Ertekin, C. Christou, B. A. Hamilton, "Internet Protocol Header Compression, Robust Header Compression, and Their Applicability in the Global Information Grid." In proc. of Communications Magazine, IEEE, Volume: 42, Issue: 11, pp.106- 116, Nov. 2004.
    [84] Tin-Yu Wu, Han-Chieh Chao and Chi-Hsiang Lo "Providing Efficient Secured Mobile IPV6 by SAG and Robust Header Compression." Journal of Information Processing System, Vol.5, No.3, 2009.
    [85] D. Harkins, D. Carrel, "The Internet Key Exchange (IKE) ", RFC 2409, 1998.
    [86] S. Kent, R. Atkinson, "Security Architecture for the Internet Protocol", RFC 2401, 1998.
    [87] R. Friend R., Monsour, "IP Payload Compression Using LZS", RFC 2395, 1998.
    [88] L.Strand, "Mobile IPv6 Linux HOWTO", http://www.gnist.org, 7th Nov, 2003.
    [89] OpenSER: the Open Source SIP Server, available at http://www.openser.org/
    [90] StrongSwan:the OpenSource IPsec-based VPN Solution for Linux, available at http://www.strongswan.org/
    [91] Minisip: SIP based phone, available at http://www.minisip.org/

    無法下載圖示 校內:2016-01-14公開
    校外:不公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE