博碩士論文 102522608 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:32 、訪客IP:3.144.16.254
姓名 史莉雅(Sagarika Dash)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 設計為非AACS會員企業之藍光可錄光碟的AACS防拷貝技術
(Design of AACS Protection Duplication on Blu-Ray Recordable Disc for non-AACS LA Enterprise)
相關論文
★ 具多重樹狀結構之可靠性群播傳輸★ 在嵌入式行動裝置上設計與開發跨平台Widget
★ 在 ARM 架構之嵌入式系統上實作輕量化的手持多媒體播放裝置圖形使用者介面函式庫★ 基於網路行動裝置所設計可擴展的服務品質感知GStreamer模組
★ 針對行動網路裝置開發可擴展且跨平台之GSM/HSDPA引擎★ 於單晶片多媒體裝置進行有效率之多格式解碼管理
★ IMS客戶端設計與即時通訊模組研發:個人資訊交換模組與即時訊息模組實作★ 在可攜式多媒體裝置上實作人性化的嵌入式小螢幕網頁瀏覽器
★ 以IMS為基礎之及時語音影像通話引擎的實作:使用開放原始碼程式庫★ 電子書嵌入式開發: 客制化下載服務實作, 資料儲存管理設計
★ 於數位機上盒實現有效率訊框參照處理與多媒體詮釋資料感知的播放器設計★ 具數位安全性的電子書開發:有效率的更新模組與資料庫實作
★ 適用於異質無線寬頻系統的新世代IMS客戶端軟體研發★ 在可攜式數位機上盒上設計並實作重配置的圖形使用者介面
★ Friendly GUI design and possibility support for E-book Reader based Android client★ Effective GUI Design and Memory Usage Management for Android-based Services
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 從過去十年中,多媒體技術已經取得了長足的進步。因此,防止這些多媒體資料被任意拷貝也成為數位內容產業的一大挑戰。所以最近幾年出版業者與數位娛樂產業的首要任務,就是制定出有效的內容保護機制,並建立良好的數位版權管理系統。在多媒體數位內容發行系統中,物理內容發行系統是其中的一個方式,例如使用數碼多功能影音光碟或是藍光光碟…等等。而高階內容訪問系統(AACS) 則是一種用於這類高畫質數碼多功能影音光碟和藍光光碟的限制訪問與防拷貝的技術,而在這個對於數位出版商來說具有挑戰性的時代,這項防拷貝技術更是扮演了一個至關重要的角色。
在本文中,我們提出了一項針對可錄式介質的AACS防拷貝架構的分層式設計,其特點為無須從AACS的授權管理者拿到認證金鑰。這將會為非AACS的授權會員企業提供一個強大、高相容性且高性價比的內容保護機制。本文中也提及了如何在非AACS認證的影音撥放器上撥放有AACS保護機制的藍光可錄光碟的技術。藉由本論文提出的技術,將能夠方便得讓許多中小型非AACS會員企業也能夠在藍光可錄光碟上添加AACS保護。
摘要(英) Multimedia technology is the essential part of home entertainment and it makes a great progress from last decade. Content distribution systems are essentially content protection systems that protect premium multimedia content from being illegally distributed. So, it becomes a challenge for digital industries to give protection to their content and the physical distribution system. Devising effective Content Protection mechanisms and building satisfactory Digital Rights Management (DRM) systems have been top priorities for the Publishing and Entertainment Industries in recent years. Advanced Access Content System (AACS) is intended to restrict access to and copy protection of HD-DVD and Blu-ray, which is playing a crucial role in copyright protection during this challenging era for much-renowned companies.
In this thesis, we propose a step-by-step design that adopts the AACS copy protection architecture for recordable media, without getting key authorization from AACS LA, which will provide a robust, high compatible and cost-effective content protection system for non-AACS LA enterprise. We emphasize on how to play the BD-R with AACS protection on an unauthenticated AACS player. The result of our design is to protect the BD-R with AACS, which can be easily used by the small and medium non-AACS LA enterprises.
關鍵字(中) ★ 藍光光碟
★ 藍光可錄光碟
★ 藍光
★ 高階內容訪問系統
★ 資料加密
★ 數位版權管理
★ 內容保護
關鍵字(英) ★ BD
★ BD-R
★ Blu-ray
★ AACS
★ Data encryption
★ digital rights Management
★ content protection
論文目次 摘要 I
ABSTRACT IV
TABLE OF CONTENTS VI
1. INTRODUCTION 1
2. BACKGROUND DETAILS OF BLU-RAY AND AACS 5
2.1 BD 5
2.2 DRM 8
2.3 AACS 8
2.4 NON-AACS LA ENTERPRISE 12
3. RELATED WORKS 15
4. SYSTEM DESIGN 19
4.1 SYSTEM GOAL 19
4.2 SYSTEM ARCHITECTURE 20
4.3 SYSTEM OVERVIEW 25
5. IMPLEMENTATION PROCEDURE 27
5.1 ENCRYPTION PROCEDURE 27
5.2 DECRYPTION PROCEDURE 34
6. CHALLENGES 36
6.1 PROCESSING KEY 36
6.2 MEDIA KEY BLOCK 36
6.3 HOST-DRIVEN AUTHENTICATION 37
6.4 SOLUTION 38
7. CONCLUSION 40
LIST OF REFERENCE 41
參考文獻 [1] bccResearch, "Digital Entertainment in the Home: Technologies and Global Markets," bccResearch, January 2014. [Online]. Available: http://www.bccresearch.com/market-research/information-technology/digital-entertainment-home-ift069b.html. [Accessed 27 Jun. 2016].
[2] “Optical Disc”, [Online]. Available:
http://searchstorage.techtarget.com/definition/optical-disc. [Accessed 30 Jun. 2016].
[3] "New Digital Home Entertainment Systems Market Report," ConnectedHome-World.com, 22 Feb. 2014. [Online]. Available: http://www.connectedhomeworld.com/content/new-digital-home-entertainment-systems-market-report. [Accessed 30 Jun. 2016].
[4] Wikipedia, "Video game console," 27 Jun. 2016. [Online]. Available: http://en.wikipedia.org/wiki/Video_game_console. [Accessed 30 Jun. 2016].
[5] Wikipedia, "Blu-ray," [Online]. Available: https://en.wikipedia.org/wiki/Blu-ray. [Accessed 28 6 2016].
[6] Wikipedia, "Advanced Access Content System," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Advanced_Access_Content_System. [Accessed 29 6 2016].
[7] Wikipedia, "Small and medium-sized enterprises," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Small_and_medium-sized_enterprises. [Accessed 29 6 2016].
[8] Wikipedia, "Small office/home office," 11 Jun. 2014. [Online]. Available: http://en.wikipedia.org/wiki/Small_office/home_office. [Accessed 30 Jun. 2016].
[9] S. O. Hwang, "How Viable Is Digital Rights Management?," Computer (Volume:42 , Issue: 4 ) , pp. 28-34, April 2009.
[10] Wikipedia, "Digital rights management," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Digital_rights_management. [Accessed 30 6 2016].
[11] “DVD vs. BD” [Online]. Available:
http://www.which.co.uk/reviews/blu-ray-dvd-players/article/blu-ray-versus-dvd
[Accessed 2 Jul. 2016].
[12] AACSLA, "Pre-recorded Video Book," [Online]. Available: http://www.aacsla.com/specifications/AACS_Spec_Prerecorded_Final_0.953.pdf. [Accessed 30 6 2016]
[13] AACSLA, "Recordable Video Book," [Online]. Available: http://www.aacsla.com/specifications/AACS_Spec_Recordable_Final_0_953.pdf. [Accessed 30 6 2016].
[14] “AACS LA Group” [Online]. Available: http://www.aacsla.com/home [Accessed 30 6 2016].
[15] Kevin Henry, Jiayuan Sui, Ge Zhong, "An Overview of the Advanced Access Content System (AACS)," David R. Cheriton School of Computer Science, Waterloo, ON, N2L 3G1, Canada, 2007
[16] "AACS Key Order Form," 27 Feb. 2012. [Online]. Available: http://www.aacsla.com/license/AACS_Key_Order_Form_120227.pdf. [Accessed 30 Jun. 2016].
[17] "AACS for independent producers," Sony Creative Software, Inc., 2014. [Online]. Available: http://www.sonycreativesoftware.com/dostudio/aacs_for_independent_producers. [Ac-cessed 30 Jun. 2016].
[18] Wikipedia, "BD+," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/BD%2B. [Accessed 29 6 2016].
[19] "Cinavia," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Cinavia. [Accessed 1 7 2016].
[20] 莊凱迪, “An Efficient and Non-Encrypted Blu-ray Video Duplication Protection Development.” (2015, NCU, Taiwan).
[21] “Advanced Encryption Standard” Wikipedia, [Online]. Available:
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
[22] Dumbere, Dhananjay M., and Nitin J. Janwe. "Video encryption using AES algorithm." Current Trends in Engineering and Technology (ICCTET), 2014 2nd International Conference on. IEEE, 2014.
[23] Pseudorandom key generation :https://tools.ietf.org/html/rfc4086
[24] CMAC calculation :http://tools.ietf.org/html/rfc4493
[25] Naqvi, Syeda Iffat, and Adeel Akram. "Pseudo-random key generation for secure HMAC-MD5." Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE, 2011.
[26] Nallanthighal, Raghava, and Vijeta Rani. "Pseudorandom Binary Key Generation from Binary Files." Computational Intelligence and Communication Networks (CICN), 2011 International Conference on. IEEE, 2011.
[27] Matsumoto, Makoto, and Takuji Nishimura. "Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator."ACM Transactions on Modeling and Computer Simulation (TOMACS) 8.1 (1998): 3-30.
[28] Bertoni, Guido, et al. "Error analysis and detection procedures for a hardware implementation of the advanced encryption standard." IEEE Transactions on Computers 52.4 (2003): 492-505.
[29] Zhang, Xinmiao, and Keshab K. Parhi. "High-speed VLSI architectures for the AES algorithm." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 12.9 (2004): 957-967.
[30] Teoh, Andrew BJ, David CL Ngo, and Alwyn Goh. "Personalised cryptographic key generation based on FaceHashing." Computers & Security23.7 (2004): 606-614.
[31] “Station-to-Station key agreement protocol” Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Station-to-Station_protocol
[32] Yi, Qingqing, Huaqun Guo, and Wai-Choong Wong. "Design and implementation of Sub-Cover difference broadcast encryption algorithm."Information, Communications and Signal Processing (ICICS) 2011 8th International Conference on. IEEE, 2011.
[33] Parsons, June Jamrich, and Dan Oja. New Perspectives on Computer Concepts 2012: Introductory. Cengage Learning, 2011.
[34] Intel Corp., International Business Machines Corp., Microsoft Corp., Panasonic Corp., Sony Corp., Toshiba Corp., The Walt Disney Company, and Warner Bros, “AACS Introduction and Common Cryptographic Elements Book,” September 2009.
[35] Myska, M.: The True Story of DRM. Masaryk UJL & Tech. 3, 267 (2009)
指導教授 吳曉光(Eric Hsiao-Kuang Wu, PhD) 審核日期 2016-7-27
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明