Font Size: a A A

Design Of Digital Program Protection System

Posted on:2009-11-07Degree:MasterType:Thesis
Country:ChinaCandidate:H YinFull Text:PDF
GTID:2178360272976644Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Digital programs protection system in order to meet the Digital Cinema and digital television broadcast the needs of the development. The system can provide programs for the source of copyright protection, and the user programs the source of identity for the control of broadcast programs, the certification program features a series of charges and so on. Be able to use different grades of digital cinema, television, including digital broadcast to carry out, such as video-on-demand business.Encryption technology for video files can be encrypted, so from the sender to the recipient will be secret, the secret interception of the text is useless. At the receiving end this close again to decrypt the text dealt with after the declassified documents and source files are the same.Digital watermark in the digital file to add non-visible logo to protect the legitimate rights and interests of the original author. Digital watermarking has the following characteristics: 1. To prove: the watermark can be protected by copyright ownership of information products to provide complete and reliable evidence. 2. Can not be perceived: the perception can not be included in both the meaning and refers to a non-visual perception of (the same hearing on the request), that is, as a result of the embedded watermark images lead to changes in the observer of the visual system is not speaking Aware of, the ideal situation is that the original image and the watermark image visually the same, which is the vast majority of the watermark should be Algorithms to meet the requirements; watermark on the other hand, using statistical methods can not be restored, such as a large number of the same methods Watermark and processed information products that use statistical methods can not extract the watermark or the watermark to determine the existence of. 3. Robustness: robust watermark in terms of issues of great importance. A digital watermark should be able to bear a lot of different physical and geometric distortion, including the intention (for example, malicious attack) or unintentionally (such as image compression, filtering, scanning and copying, noise pollution, changes in the size, etc.).In order to increase the attacker to remove the watermark can not predict the degree of difficulty, to join in the project, extracting the key used to ensure that only the master key personnel allowed to deliver a watermark. Even if they are aware of the watermark embedded in all the details of the algorithm, just do not know the secret key, can not put a watermark or damage. Encryption and watermarking techniques to ensure the security of data transmission, the copy protection works, works to prevent the unauthorized dissemination of copyright infringement, as well as that. System also uses digital signatures and authentication technologies to prevent the misappropriation of legitimate users of illegal users.The program is based on the framework of digital certification and encryption technology and watermarking technology as the core of the program content and game content is encrypted, the program source and the source terminal between the ID number to the core, confirmed the identity in order to protect digital watermarking technology Programs and games on intellectual property rights. In the game shows and programs for the source and the source of the game before SJW47PCI encryption card is encrypted. SJW Series encryption machine is a PC peripherals, and e-commerce for the provision of high-level security. Hardware-based anti-tampering design SJW series with the encryption function of any one (with 232 or PCI slot) connected to the computer. To provide security and support for the certification of electronic wallet, credit card transactions. Much better than the performance of its software products. As the digital video programs on the high bandwidth requirements, according to the needs of different users into 50Mbps, 20Mbps, 10Mbps, 2Mbps and 1Mbps, therefore encryption machine throughput of a direct impact on digital video programming. In order to protect digital video programming broadcast normal programs and security requirements, using high-performance equipment to decrypt particularly important. Encryption card systems do not need to change the existing network topology, users can transparently access network systems, and users can program and the source of the different speeds for different encryption card. 400Mbps can be used for encryption equipment to achieve the program source and the Center for Digital Cinema encryption and decryption programs on demand, 40Mbps using the decryption program editing equipment to achieve the production studio and television broadcast, on-demand programs on the demand for encryption and decryption programs, using the 2Mbps Devices declassification district to achieve VOD service providers, program producers of the show and online programs for crude, ordinary users of the online programs encryption and decryption programs. Use of encryption and decryption equipment and relevant technology, we can apply to the user through the issuance of the key ways to achieve the user to play and control the number of players.High-definition programs close to the speed of 50 megabits / second, SJW47PCI password card to 400 trillion-1G / sec speed encryption does not have to feel that the delay. Registered users receive their ID numbers and the corresponding private key. When his / her application to view or play a game or program, he / she submit their own digital ID, program or game providers to verify the source of his / her ID, through inspection, the source programs / games to business users of the public key Encryption and decryption key and program along with the user to download, users can not download programs to watch, to be their own private key to unlock the encryption keys and decryption key to the program, and pay to watch before. In the end of each program are stored in the form of encryption is, decryption programs and games. Every game from the existence of a secret temporary memory device, one that is used to eliminate automatic, the user can not copy a program or game. He can choose to use the program or game several times, but every time after the decryption program or game is not documented and stream. Program source or sources of the game in the program or game is downloaded before the watermark will be embedded in programs or games, the watermark is hidden watermark, the watermark logo with the definition of a free User. The watermark algorithm to form a special password, do not show the game or damage and reduced distortion, the user can not be detected. Source program or game can detect.System is composed of the following components: 1. User management system: the management of user information, issuing user certificates, user authentication certificate, and other functions. At present the certificate to use IC card storage (can also users in accordance with the needs of a different storage medium). It has good mobility, ease of use, safe, easy access, low-cost advantages. 2. Central control system: central control system to control the dissemination of information, control encryption server, the server watermark, the key request of the server, authentication server and broadcast server. 3. Broadcast management system: the management of video playback time, place, the Office of video players, such as the number of players. The programs broadcast by the broadcast control management system. 4. Certification program system: system certification program to provide reasonable security mechanisms to ensure that the fees program providers. Project design features: 1. Source programs with a high degree of security; 2. A reasonable and safe system of certification fees; 3. Users and programs to be the legitimate source of identity confirmation; 4. Modular design, based on user needs portfolio Configuration, the system has a high scalability and strong business expansion.
Keywords/Search Tags:Digital programming, encryption, digital ID, the watermark technology, testing
PDF Full Text Request
Related items