More attention is paid to the copyright protection of digital products with the rapiddevelopment of E-business. Different ways are used to protect digital copyright fordifferent digital contents. Nowadays, the copyright protection on digital contents ofaudio and video sent by point to point is well studied and applied. However, it is a newfield, too, that how to protect the digital copyright when transferred through internet inthe way of broadcast, and it is just the object that the traitor tracing focuses on. Thetraitor tracing not only provides a new digital copyright protection for broadcast signal,but also promotes the performance improving of existed copyright protectiontechnology. Following are the main achievements of this thesis:Introduce the origin, evolvement, states and existing problems of digital copyright protection in detail.Introduce the origin, evolvement and states of information hiding simply. Summarize and analyze the existing digital fingerprinting schemes, and design a new anonymous fingerprinting scheme. In addition, a digital fingerprinting algorithm based on binary codes is described. Expatiate the backgrounds, states and existing problems of the traitor tracing.Analyze and summarize the performance of the presented traitor tracing schemes in detail.Design two traitor tracing schemes. Design one traitor tracing scheme and two oblivious polynomial protocols in collaboration with tutor.
|