Unlock instant, AI-driven research and patent intelligence for your innovation.

Trading, identifying and arbitraging method, system and equipment based on watermark technology

A technology of watermarking technology and transaction method, which is applied in the field of digital copyright management, can solve problems such as low information bit rate, practical application limitations, high complexity, etc., and achieve good perception effect, great robustness, and reduced complexity.

Inactive Publication Date: 2009-05-06
SHANGHAI JIAO TONG UNIV +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] (1) Piracy tracking problem: When an illegal copy is found in the market, the owner of the content can find the pirate and prove this fact in front of a trusted third party
[0004] (2) Customer rights issue: For an original buyer whose watermark has been found in a pirated copy, the buyer can claim that the pirated copy was produced by the seller, because the seller has the opportunity to contact and produce these copies
[0006] (4) The issue of anonymity: Compared with real life, unless the buyer in the electronic world has been proven to be infringing, the buyer prefers that the identity information will not be exposed
Embedding two watermarks brings great limitations to the practical application of the protocol
Compared with embedding only one watermark in a digital content, embedding two watermarks makes each of the two watermarks have a lower information bit rate or lower robustness; in addition, considering the watermark embedding Is a work that requires a lot of computing resources, embedding two watermarks has higher complexity than embedding one watermark

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trading, identifying and arbitraging method, system and equipment based on watermark technology
  • Trading, identifying and arbitraging method, system and equipment based on watermark technology
  • Trading, identifying and arbitraging method, system and equipment based on watermark technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] see figure 1 , is a flow chart of the transaction method based on the watermark technology provided by the embodiment of the present invention. The embodiment of the present invention provides a transaction method based on watermark technology, the specific steps are as follows:

[0073] First make the following assumptions:

[0074] I) Public key infrastructure is well deployed, so each party to the protocol has a public-private key pair and a digital certificate issued by a trusted CA. In this way, it can be assumed that each party to the communication can authenticate the other, and any two-party communication is secure;

[0075] II) The encryption function E is an embedding operation privacy homomorphism. In addition, before the buyer B and the seller S conduct a transaction, B needs to apply for an anonymous certificate Cert from the CA CA (pk B ). In this way, pk B It can be used not only as B's public key, but also as B's identity.

[0076] Step 101: Th...

Embodiment 2

[0091] see figure 2 , is a flow chart of the authentication and arbitration method based on the watermark technology provided by the embodiment of the present invention. The embodiment of the present invention provides an authentication and arbitration method based on watermark technology. When S discovers an illegal copy Y of X, the method provided by the embodiment of the present invention can be used to find the true identity of the responsible distributor. Specific steps are as follows:

[0092] Step 201: The seller S watermarks the public key pk of the authority WCA WCA Encrypt illegal copy Y and purchased content X respectively to get E pk WCA ( Y ) , E pk WCA ( X ) .

[0093] Wherein, the calculation method used in enc...

Embodiment 3

[0109] see image 3 , is a schematic diagram of a transaction system based on watermark technology provided by an embodiment of the present invention. The embodiment of the present invention provides a transaction system based on watermarking technology, the system includes: a buyer's device 301, a seller's device 302 and a watermarking authority 303, wherein,

[0110] The purchaser device 301 is configured to send a request message, where the request message includes the purchaser's anonymous certificate, the agreement and the purchaser's signature on the agreement;

[0111] The seller's device 302 is used to receive the request message sent by the buyer's device 301, send a watermark request message including the content of the received request message to the watermark authority, and is also used to obtain the encrypted watermark from the watermark authority 303, and convert the encrypted watermark to the watermark authority. Perform watermark embedding in the encryption do...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a transaction method, an authentication and arbitration method, a system and a device based on the watermarking technology, which belongs to the field of digital copyright management. The transaction method comprises the steps: a seller accepts a request message sent by a purchaser, sends a watermarking request message to a watermarking authoritative institution, then obtains an encrypted watermarking, carries out watermarking embedment in an encryption domain and sends the encrypted purchasing content with the watermarking to the purchaser. The authentication and arbitration method comprises the steps: a seller obtains the watermarking of an encrypted illegal copy; an arbitration agency validates whether the watermarking exists in the illegal copy according to a received message; and if the watermarking exists in the illegal copy, the true identity of a buyer can be obtained according to the watermarking content. The transaction system comprises a seller device, a buyer device and a watermarking authoritative institution. Only one watermarking is embedded, the amount of calculation is reduced, the course of transaction is simple, and the complexity of the course of the authentication is reduced, so repeated molestations of a vicious seller to a buyer are effectively prevented.

Description

technical field [0001] The invention relates to the field of digital copyright management, in particular to a method, system and device for transaction, identification and arbitration based on watermark technology. Background technique [0002] In recent years, digital watermarking technology has been proposed to protect multimedia copyright. By embedding in digital data (ie audio, video or images) a watermark that can later be retrieved or detected, the copyright owner can make a certain claim to these digital data. Typically, a watermark is an invisible, key-related pseudo-noise signal that is inseparable from digital data. In the application of copy deterrence, ie watermarking to identify those who legally obtained digital content but illegally redistributed it, many digital watermarking algorithms have been proposed in the past. By embedding a different watermark in each copy of digital content, these watermarking algorithms enable sellers of content to find out who is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/00
Inventor 曹珍富董晓蕾曾鹏位继伟
Owner SHANGHAI JIAO TONG UNIV