期刊文献+

基于机器指纹的版权控制系统的设计与实现 被引量:1

Design and Implementation of Digital Right Management Based onMachine Fingerprint
下载PDF
导出
摘要 设计了一种基于机器指纹的版权控制系统, 该系统采用一种新的许可证密钥产生、分配和认证方法, 使内容许可证跟用户的机器指纹和用户的个人信息绑定. 数字内容采取高强度的对称密钥算法加密, 只能在本地机器按照内容许可证的要求进行解密及可控使用,从而在整个数字内容生命周期实行版权保护. A new_style digital rights management system based on machine fingerprint is designed in this paper.The secure trade and the rights management of digital contents on Internet with binding user's machine fingerprint to license file,using rights management and plug_in technology and encrypting digital contents,are realized in the system.First,a system model and its protocol mechanism are introduced in the paper.The way of digital rights controlling the system use is discussed.The realization of the system and its test conclusion are given.
出处 《汕头大学学报(自然科学版)》 2005年第2期49-55,共7页 Journal of Shantou University:Natural Science Edition
基金 广东省科技计划资助项目(No: 2003C101015) 广东省科技资助项目(No: 2004B10101037)
  • 相关文献

参考文献2

二级参考文献10

  • 1[1]Special Issues on Copyright and Privacy[J].IEEE J Selected Area in Comm, 1998; 16(4)
  • 2[2]J H Morin,D Konstantas. Commercialization of Electronic Information.IEEE Multimedia Systems'99,1taly,Florence,1999
  • 3[3]R Mori,M Kawahara. SuperDistribution:The Concept and the Architecture[J].Transactions of the IEICE, 1990; (7)
  • 4[4]EBX working group The Electronic Book Exchange System(EBX)Version 0.5 Draft May.http ://www.ebxwg.com, 1999
  • 5[5]Zan Olipant. Programming Netscape Plugin[M].Sams Publishing,1996
  • 6[6]H Krawczyk. HMAC:Keyed-Hashing for Message Authentication[S].RFC2104,1997
  • 7[7]Swanson M D et al. Multimedia data-embedding and watermarking technologies[C].In:Proc of the IEEE, 1998 ;86(6): 1064~1087
  • 8http://www.cryptolope.ibm.com/white.htm
  • 9http://www.imprimatur.ales.co.uk
  • 10庄超.一种新型的Internet内容版权保护的计算机制[J].计算机学报,2000,23(10):1088-1091. 被引量:26

共引文献18

同被引文献10

  • 1MEMON N D, WONG P W. A buyer-seller watermarking protocol [ J]. IEEE Transactions on Image Processing, 2001, 10(4) : 643 - 649.
  • 2ZHANG J, KOU W, FAN K. Secure buyer-seller water marking protocol[ J]. IEE Proceedings on Information Security, 2006, 153 (1):15-18.
  • 3HAJI M K N, ESLAMI Z. An efficient buyer-seller watermarking protocol based on proxy signatures [ C]// Proceedings of IEEE the 8th International ISC Conference on Information Security and Cryp- tology. Piscataway, NJ: IEEE Press, 2011 : 73 - 77.
  • 4HU D F, LI Q L. A secure and practical buyer-seller watermarking protocol [ C]// Proceedings of 2009 IEEE International Conference on Multimedia Information Networking and Security. Piscataway, NJ: IEEE Press, 105-108.
  • 5ZHAO W L, VARADHARAJAN V, MU Y. A secure mental poker protocol over the Intemet [ C] //ACSW Frontiers 2003: Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers. New York: ACM Press, 2003, 21:105 -109.
  • 6XIAO M B, ZHANG J. A general platform for e-book transactions with digital rights management [ C]/! Proceedings of the 3rd Inter- national Conference on e-Business and Information System Security. Wuhan: Is. n. ], 2011:218 -221.
  • 7肖芸,肖明波.基于特征图像的数字版权保护系统[J/OL].计算机工程与应用.http://www.cnki.net/kcms/detail/11.2127.TP.20120925.1001.040.html.
  • 8胡玉平,张军.用于盗版追踪的数字水印协议研究[J].计算机科学,2010,37(1):91-94. 被引量:2
  • 9王非,陈虹,肖振久.基于买方卖方的安全数字水印协议[J].计算机应用,2011,31(5):1288-1290. 被引量:6
  • 10闫世斗,刘念,李子臣.公钥密码体制的同态性分析[J].北京电子科技学院学报,2012,20(2):55-59. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部