博碩士論文 101522074 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:57 、訪客IP:3.145.79.65
姓名 黃士軒(Shih-syuan Huang)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 支援多行動裝置平台之彈性且輕量的客製化多媒體數位版權管理系統
(A Flexible and Lightweight User-demand DRM System for Multimedia Contents over Multiple Portable Device Platforms)
相關論文
★ 具多重樹狀結構之可靠性群播傳輸★ 在嵌入式行動裝置上設計與開發跨平台Widget
★ 在 ARM 架構之嵌入式系統上實作輕量化的手持多媒體播放裝置圖形使用者介面函式庫★ 基於網路行動裝置所設計可擴展的服務品質感知GStreamer模組
★ 針對行動網路裝置開發可擴展且跨平台之GSM/HSDPA引擎★ 於單晶片多媒體裝置進行有效率之多格式解碼管理
★ IMS客戶端設計與即時通訊模組研發:個人資訊交換模組與即時訊息模組實作★ 在可攜式多媒體裝置上實作人性化的嵌入式小螢幕網頁瀏覽器
★ 以IMS為基礎之及時語音影像通話引擎的實作:使用開放原始碼程式庫★ 電子書嵌入式開發: 客制化下載服務實作, 資料儲存管理設計
★ 於數位機上盒實現有效率訊框參照處理與多媒體詮釋資料感知的播放器設計★ 具數位安全性的電子書開發:有效率的更新模組與資料庫實作
★ 適用於異質無線寬頻系統的新世代IMS客戶端軟體研發★ 在可攜式數位機上盒上設計並實作重配置的圖形使用者介面
★ Friendly GUI design and possibility support for E-book Reader based Android client★ Effective GUI Design and Memory Usage Management for Android-based Services
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 隨著現代科技的快速發展,數位多媒體已經相當普及且隨處可見,透過這些多媒體,我們隨時隨地都可以觀看影片、聽音樂或是閱讀書報,多媒體已經儼然成為我們生活中不可或缺的一環;然而,多媒體帶來的便利也讓盜版變得更加猖獗,例如:我們可以很容易地上傳一部有版權的影片,但卻沒有得到作者的同意,作者及出版商們非常渴望能夠保護他們的智慧財產權或是商業利益,因此,數位版權管理系統因應此種強烈的需求而出現了,數位版權管理是一系列用來限制數位多媒體檔案存取的技術,雖然目前市面上有許多企業級的數位版權管理系統,但這些系統皆無法百分之百地滿足我們的需求,也無法根據這些需求做客製化的修改,有鑑於此,我們設計了一個客製化的數位版權管理系統,這個系統可以限制使用者只能在授權的時間內在授權的設備上播放多媒體檔案,此數位授權管理系統採取了一系列安全有效率的加解密演算法,包括AES、SHA-256以及RSA,我們也將此系統移植到其它作業系統,如:Windows、Android和iOS,除此之外,我們也將系統功能模組化,以便未來開發及維護,在低階設備中,通常性能不如個人電腦,我們藉由改變加密金鑰的長度或是加密的密度來達到提升執行速度的目的,此外,我們也解決了因為隨機訪問檔案產生的遮罩移位問題,最後在我們的分析中證明了此數位版權管理系統有高安全性,在一般設備中執行也都有良好的效能表現。
摘要(英) With the rapid development of technology, digital multimedia has been widely utilized. Accesses of multimedia contents become a daily routine. Although multimedia brings ease and convenience on content sharing, it also makes piracy more feasible. For example, it is easy to upload a copyrighted video to YouTube without the owner’s permission. Authors and merchants are dying for protecting their intellectual property and commercial profits. Digital Right Management (DRM) systems are provided to fulfill the desire. DRM is a collection of techniques used to control access to copyrighted materials. Since current enterprise DRM solutions are not allowed for customized modification, they cannot fit in our considered scenario perfectly. As a result, we proposed a secure DRM system with a design on user demands, where a consumer can access contents only on authenticated devices until the authorization expires. Our DRM scheme involved a series of robust cryptosystems including AES, SHA-256 and RSA. Applications as DRM agents are implemented on Windows, Android and iOS platforms. Moreover, we modularized the DRM components for easy extension and integration. For better performance on low-end devices, parameters of encryption are introduced, namely, the key size and the encryption density. We addressed the Mask Shift Problem caused by random access and implemented the device identifier acquirement. The DRM system are also proved to have high security and nice performance in our analysis.
關鍵字(中) ★ 數位版權管理
★ 內容保護
★ 數位簽章
★ 版權
★ 智慧財產權
關鍵字(英) ★ digital right management
★ DRM
★ content protection
★ digital signature
★ copyright
★ intellectual property
論文目次 摘要 II
Abstract III
致謝 V
Table of Contents VI
List of Figures VIII
List of Tables X
1. Introduction 1
2. Background and Related Work 6
2.1 Existing DRM Solutions 7
2.2 Content Protection Techniques 15
2.3 Rights Management Techniques 20
2.3.1 Rights Expression Language 20
2.3.2 License Validation 22
3. System Design 24
3.1 System Overview 24
3.2 Encryption Scheme 26
3.3 License Scheme 31
3.4 Security 34
4. System Implementation 37
4.1 Implementation Overview 37
4.2 DRM Module 39
4.2.1 Implementation of Encryption 40
4.2.2 Implementation of Digital Signature 44
4.2.3 Implementation of License Validation 46
4.2.4 Device Identifier Acquirement 47
4.3 DRM Host 49
4.4 DRM Client 50
5. Performance Evaluation 53
6. Conclusion 56
List of References 57
參考文獻 [1] Diehl, Eric. Securing Digital Video: Techniques for DRM and Content Protection. Springer, 2012.
[2] Bhatt, Siddharth, Radu Sion, and Bogdan Carbunar. "A personal mobile drm manager for smartphones." Computers & Security 28.6 (2009): 327-340.
[3] Ku, William, and Chi-Hung Chi. "Survey on the technological aspects of digital rights management." Information Security. Springer Berlin Heidelberg, 2004. 391-403.
[4] "Nickolova, Maria, and Eugene Nickolov. "Verification and Application of Conceptual Model and Security Requirements on Practical DRM Systems in E-Learning." (2007).," [Online].
[5] A. Gal, "Reconciling Mozilla’s Mission and W3C EME," 14 5 2014. [Online]. Available: https://hacks.mozilla.org/2014/05/reconciling-mozillas-mission-and-w3c-eme/. [Accessed 1 7 2014].
[6] Schneier, Bruce, and Doug Whiting. "A Performance Comparison of the Five AES Finalists." AES Candidate Conference. 2000.
[7] Han, Jung Kyu, et al. "EMCEM: an efficient multimedia content encryption scheme for mobile handheld devices." Information Science and Security, 2008. ICISS. International Conference on. IEEE, 2008.
[8] Cheng, Howard, and Xiaobo Li. "Partial encryption of compressed images and videos." Signal Processing, IEEE Transactions on 48.8 (2000): 2439-2451.
[9] Shi, Changgui, and Bharat Bhargava. "A fast MPEG video encryption algorithm." Proceedings of the sixth ACM international conference on Multimedia. ACM, 1998.
[10] Kim, Gunhee, Dongkyoo Shin, and Dongil Shin. "An efficient methodology for multimedia digital rights management on mobile handset." Consumer Electronics, IEEE Transactions on 50.4 (2004): 1130-1134..
[11] Nurseitov, Nurzhan, et al. "Comparison of JSON and XML Data Interchange Formats: A Case Study." Caine 2009 (2009): 157-162.
[12] VideoLAN, "VLC media player," [Online]. Available: http://www.videolan.org/vlc/index.html. [Accessed 1 7 2014].
[13] Michiels, Sam, et al. "Digital rights management-a survey of existing technologies." CW Reports (2005).
[14] "The pros, cons, and future of DRM," 7 8 2009. [Online]. Available: http://www.cbc.ca/news/technology/the-pros-cons-and-future-of-drm-1.785237. [Accessed 1 7 2014].
[15] F. v. Lohmann, "Fair Use and Digital Rights Management: Preliminary Thoughts on the (Irreconcilable?) Tension between Them," 11 3 2005. [Online]. Available: https://www.eff.org/wp/fair-use-and-digital-rights-management-preliminary-thoughts-irreconcilable-tension-between-them. [Accessed 1 7 2014].
[16] Rune Hammersland and Jonas Strømstad, Rune Hammersland, and Jonas Strømstad. "Digital Rights Management" (2008).
[17] Herman, Bill D. "A Political History of DRM and Related Copyright Debates, 1987-2012." Yale Journal of Law and Technology 14.1 (2012): 2.
[18] FABLET, Maël. "The implementation of Digital Rights Management (DRM) by the Information Society Directive: a necessary evil?." (2007).
[19] Taylor, Jim, Mark R. Johnson, and Charles G. Crawford. DVD demystified. Vol. 1981. New York: McGraw-Hill, 2001.
[20] "How FairPlay Works: Apple′s iTunes DRM Dilemma," 26 2 2007. [Online]. Available: http://www.roughlydrafted.com/RD/RDM.Tech.Q1.07/2A351C60-A4E5-4764-A083-FF8610E66A46.html. [Accessed 1 7 2014].
[21] "Crosby, Scott, et al. "A cryptanalysis of the high-bandwidth digital content protection system." Security and Privacy in Digital Rights Management. Springer Berlin Heidelberg, 2002. 192-200.," [Online].
[22] Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 2010.
[23] Diffie, Whitfield, and Martin E. Hellman. "Exhaustive cryptanalysis of the NBS data encryption standard." Computer 10.6 (1977): 74-84.
[24] Fluhrer, Scott, Itsik Mantin, and Adi Shamir. "Weaknesses in the key scheduling algorithm of RC4." Selected areas in cryptography. Springer Berlin Heidelberg, 2001.
[25] Grosul, Alexander L., and Dan S. Wallach. "a related-key cryptanalysis of rc4." (2000).
[26] Dworkin, Morris. Recommendation for block cipher modes of operation. methods and techniques. No. NIST-SP-800-38A. NATIONAL INST OF STANDARDS AND TECHNOLOGY GAITHERSBURG MD COMPUTER SECURITY DIV, 2001.
[27] Tang, Lei. "Methods for encrypting and decrypting MPEG video data efficiently." Proceedings of the fourth ACM international conference on Multimedia. ACM, 1997.
[28] Liu, Yang, Chun Yuan, and Yuzhuo Zhong. "A new digital rights management system in mobile applications using H. 264 encryption." The 9th International Conference on Advanced Communication Technology. Vol. 1. 2007.
[29] Iwakiri, Munetoshi, and Ta Minh Thanh. "Fundamental incomplete cryptography method to digital rights management based on JPEG lossy compression." Advanced Information Networking and Applications (AINA), 2012 IEEE 26th International Conference on. IEEE, 20.
[30] Chodowiec, Pawel R. Comparison of the hardware performance of the AES candidates using reconfigurable hardware. Diss. George Mason University, 2002.
[31] Zhang, Yi, Xiaoguang Wei, and Shu Zhao. "Research on ODRL Connecting with Application Scenarios." Proceedings of the 2008 International Seminar on Future Information Technology and Management Engineering. IEEE Computer Society, 2008.
[32] Yang, Zongkai, Xiaoguang Wei, and Yi Zhang. "Research on REL Connecting with Application Scenarios in Education." Knowledge Acquisition and Modeling, 2008. KAM′08. International Symposium on. IEEE, 2008.
[33] Maeda, Kazuaki. "Performance evaluation of object serialization libraries in XML, JSON and binary formats." Digital Information and Communication Technology and it′s Applications (DICTAP), 2012 Second International Conference on. IEEE, 2012..
[34] McCullagh, Adrian, and William Caelli. "Non-repudiation in the digital environment." First Monday 5.8 (2000).
[35] Yi, Xun. "Hash function based on chaotic tent maps." Circuits and Systems II: Express Briefs, IEEE Transactions on 52.6 (2005): 354-357.
[36] Zhou, Jianying, and Kwok-Yan Lam. "Securing digital signatures for non-repudiation." Computer Communications 22.8 (1999): 710-716.
[37] G. Jain, "Digital Signature Algorithm," International Journal of Innovations in Computing, 2001.
[38] Vaudenay, Serge. "Security Flaws Induced by CBC Padding—Applications to SSL, IPSEC, WTLS..." Advances in Cryptology—EUROCRYPT 2002. Springer Berlin Heidelberg, 2002.
[39] Rogaway, Phillip. "Evaluation of some blockcipher modes of operation." Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan (2011)..
[40] Alghazzawi, Daniyal M., Syed Hamid Hasan, and Mohamed Salim Trigui. "Advanced Encryption Standard-Cryptanalysis research." Computing for Sustainable Global Development (INDIACom), 2014 International Conference on. IEEE, 2014.
[41] Bellare, Mihir, et al. "A concrete security treatment of symmetric encryption." Foundations of Computer Science, 1997. Proceedings., 38th Annual Symposium on. IEEE, 1997.
[42] McGrew, David. "Counter mode security: Analysis and recommendations." Cisco Systems, November (2002)..
[43] "OpenSSL," [Online]. Available: https://www.openssl.org/. [Accessed 1 7 2014].
[44] "smartmontools," [Online]. Available: http://www.smartmontools.org/.
[45] A. SDK, "Settings.Secure," [Online]. Available: http://developer.android.com/reference/android/provider/Settings.Secure.html. [Accessed 1 7 2014].
[46] i. D. Library, "UIDevie Class Reference," [Online]. Available: https://developer.apple.com/library/ios/documentation/uikit/reference/UIDevice_Class/Reference/UIDevice.html#//apple_ref/occ/instp/UIDevice/identifierForVendor.
指導教授 吳曉光(Hsiao-kuang Wu) 審核日期 2014-7-16
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明