Font Size: a A A

Anonymous And Traceable Copyright Protection Protocol Based On Mobile Devices

Posted on:2013-10-02Degree:MasterType:Thesis
Country:ChinaCandidate:K JiangFull Text:PDF
GTID:2248330362965489Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Computer network technology is developing rapidly. Along with the digital content beingdisseminating widely in the network, digital products have been produced. The purchase ofdigital products in the network brings convenience to people’s lives, as well as security risks. Soboth the parties that participate in the digital product transaction begin to worry about their rightsand benefits can be threatened and compromised. In this case, the protection of digital rightsbecomes one part of study about information security. With the development of mobile Internetdevices, Transactions of digital products by using mobile Internet devices transfer people’sattention to copyright protection of mobile devices. The study about digital copyright protectionbased on mobile devices is becoming more and more meaningful.This paper focuses on the copyright protection based on mobile devices. The mainly works arethe following aspects:1.This paper analyzes a secure and traceable E-DRM system based on mobile device putforward by Chin-Ling Chen, and points out the existence of security risks in the system.2.This paper puts forward an anonymous and traceable copyright protection protocol based onmobile devices. The protocol uses transformable temporary identity, one time password, one-wayhash function authentication, copyright watermarking and fingerprint watermark embeddingtechnology. On the basis of ensuring the protocol safety, it achieves anonymity of user to preventillegal tracing, reducing the computation and storage, and tracking the traitor effectively.3.This paper uses the Android development platform to develop a digital rights managementsystem of pictures transaction. Experiment shows that this program is feasible, security andpractical.
Keywords/Search Tags:Copyright watermark, Fingerprint watermark, Traitor tracing, Copyright protection
PDF Full Text Request
Related items