Font Size: a A A

On Digital Fingerprinting Technology And The Applying To Software Copyright Protection

Posted on:2008-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:D E SheFull Text:PDF
GTID:2178360272968583Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network, information technology and electronic commerce, intellectual property for digital content has been a crucial issue, which contributes an internal impulse to hiding information. Digital fingerprint, one of the digital rights marking technologies in information hiding, is an important method to protect digital rights to the digital content.The protection of software copyright is far more urgent and complicated, for it is a unique kind of secret and high-value content. Therefore, the protection of software copyright becomes an increasingly important and difficult subject these days. With the rapid development of computer network and software industry, web based software architecture become the trend in the future. The applying of digital fingerprinting technology to the software copyright protection is far necessary for it can trace the illegal users and judge by the evidence proved from the embedded digital fingerprints in the software.Digital fingerprinting and its applying to the software copyright protection is focused in this paper, mainly including the following contents: First, the background and significance of hiding information and digital fingerprinting are introduced, and the general situation of both national and international researches on this subject is presented; Second, the principle of digital right marking and digital rights management (DRM) is introduced to propose a kind of P2P-based DRM system architecture and protocol; Then, the basic theory and technology of digital fingerprinting are summarized, including the definition, model, attack, coding and protocol; Finally, the software fingerprinting technologies and implementing methods are given, including two kinds: code-nested fingerprinting and software behavior fingerprinting, and an emulator of the code-nested fingerprinting methods is proceeded to prove the ideas.
Keywords/Search Tags:digital content, information hiding, digital rights marking, digital rights management (DRM), digital fingerprinting, software fingerprinting
PDF Full Text Request
Related items