指導教授:吳家麟臺灣大學:資訊工程學研究所孫家豪Sun, Jia-HaoJia-HaoSun2014-11-262018-07-052014-11-262018-07-052014http://ntur.lib.ntu.edu.tw//handle/246246/261410數位浮水印技術使得數位內容擁有者得以在傳送數位內容前嵌入智慧財產相關訊息於數位內容中以保護其智慧財產權。隨著數位商務快速發展,數位內容散播成為了產品派送的主流,並使得嵌入浮水印成為保護智慧財產權的必要措施。在如此龐大的系統中,安全性、計算效率、以及通訊成本成為了服務提供者巨大的挑戰。換言之,發展一套穩固、有效率的安全數位內容派送系統有其急迫的必要。本篇論文中提出了一套創新的客戶端浮水印系統。我們描述了傳統浮水印不適合用在上述的大型系統的原因,並且在新系統中提出了相對應的解決方案。由於新提出的系統可以支援可見、不可見兩種浮水印,故新系統非常適用於雲端架構的數位內容散播系統如:Google及Amazon的線上書店、Apple的iTunes、以及Netflix的串流多媒體服務。Digital watermarking techniques enable digital-content owners to protect their property rights by embedding right-related messages into the host content before delivery. With the rapid growth of E-commerce, digital-content broadcasting has become the main stream of product delivering, which makes watermark embedding a must for protecting the owner''s property rights. In such a large service system, security, computational efficiency, and communicational overhead are the most challenging issues to service providers. In other words, there is an urgent need for developing robust and efficient watermark schemes for securing a digital content delivering system. In this paper, a novel secure client side watermarking scheme is proposed. We illustrate the reasons why a traditional watermarking scheme may not suit for a large digital-content broadcasting service and the ways how to fix the associated problems, in the proposed approach. Since the newly proposed scheme can support both visible and invisible watermarks, it is applicable to Cloud-based digital-content broadcasting services, such as Bookstores in Amazon and Google, iTunes in Apple, and Streaming Media in Netflix.口試委員會審定書i 誌謝ii 摘要iii Abstract iv 1 Introduction 1 2 Related Work 5 3 Preliminaries 7 3.1 Lagrange Polynomial Interpolation 7 3.2 Runge’s Phenomenon and the Modified Version of Lagrange Polynomial Interpolation 8 4 The Proposed Watermarking Schemes 11 4.1 Block-diagram of The Proposed Watermarking Scheme 11 4.2 Secure Client Side Visible Watermarking 13 4.2.1 Formulation 13 4.2.2 Analyses of the proposed Secure Client Side Visible Watermark Scheme 14 4.3 Secure Client Side Invisible Watermarking 15 4.3.1 Construction 15 4.3.2 Formulation 17 4.3.3 Analyses of the Proposed Secure Client Side Invisible Watermark Scheme 18 5 Experimental Results 20 5.1 Visible Watermark Scheme 20 5.2 Invisible Watermark Scheme 24 5.2.1 Experiments on system parameters 24 5.2.2 Experiment using optimal settings 28 6 Conclusion 30 Bibliography 312418894 bytesapplication/pdf論文公開時間:2015/08/16論文使用權限:同意有償授權(權利金給回饋學校)密碼學數位智慧財產權管理浮水印安全的客戶端浮水印數位內容散播有限長度金鑰之安全的客戶端浮水印Secure Client Side Watermarking with Limited Key Sizethesishttp://ntur.lib.ntu.edu.tw/bitstream/246246/261410/1/ntu-103-R01922082-1.pdf