透過您的圖書館登入
IP:18.222.153.166
  • 學位論文

適用於電子出版系統的雲計算智財權保護機制

Cloud-based IPRs Protection Mechanism for the E-publishing System

指導教授 : 吳家麟

摘要


在現代商業模式運作中,創作者產製的數位產品更傾向於部分免費開放給目標客群,目的是為了產生流量和知名度,事先試用產品也能獲取消費者的信任和增加購買意願。創作者再以提供有價值的內容或服務來獲取收益,這已經是現今非常常見的收益模式,因此在本研究中我們將過去的雲端買賣方浮水印協定改進成更適合這套商業模式的機制。引入雲端固然可帶來相當的利益,但是龐大的流量同樣對服務提供者帶來的巨大的挑戰:造成頻寬負荷、計算效率、儲存成本的急遽增長。因此,我們在雲端買賣方浮水印協定的基礎上利用了客戶端浮水印和量化指標調變兩項技術去改善上述問題。基於該協定原有的特性,利用雲端作為買賣方的軟硬體資源的提供者,而且同時也作為一個公平、安全和體驗良好的交易平台。此外,其功能還包括有推播賣方的數位產品和方便消費者選購產品等。換言之,我們提出的電子出版系統是一個對於現代商業模式有效率且平衡各方權益的機制。

並列摘要


In modern business model, digital products produced by creators tend to be freely and partially open to target customers for getting notice. The purpose is to generate and increase traffic and popularity. Trial product distribution in advance can also enhance consumers' experiences and increase their willingness to buy. Creators then get revenue by selling valuable content or services to customers. This is a widespread revenue model today. In this work, we enhanced the previous Cloud-based Buyer-Seller Watermarking Protocols[4] to produce a more suitable mechanism for the Cloud-based E-publishing business model. Besides benefits brought by cloud, the considerable traffic, rapidly increasing bandwidth burden, computing efficiency, and storage costs also challenge service providers. The techniques of Secure Client-Side Watermarking and Quantization Index Modulation[7] are adopted to release the above-mentioned problems. Based on the characteristics of the pre-described protocol, the cloud is treated as a software and hardware resources provider for supporting buyers and sellers. In other words, a system operated under the proposed mechanism can act as a fair, secure, and user-friendly trading platform. It is our belief that our proposed mechanism is helpful to establish an efficient, secure, and rights balanced system for E-publishing.

參考文獻


[1] Celik, M. U., Lemma, A. N., Katzenbeisser, S., Van Der Veen, M. Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks. IEEE Transactions on Information Forensics and Security, 3(3), 475-487, 2008.
[2] Kuribayashi, M., Tanaka, H. Fingerprinting protocol for images based on additive homomorphic property. IEEE Transactions on Image Processing, 14(12), 2129-2139, 2005.
[3] Malvar, H. S., Florencio, D. A. F. Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, 51(4), 898-905, 2003.
[4] Peng, Y.-J., Hsieh, Y.-C., Hsueh, C.-W., Wu, J.-L. Cloud-based buyer-seller watermarking protocols. 2017 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computed, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation, 2017, 2017-08-01.
[5] Sun, J.-H., Lin, Y.-H., Wu, J.-L. Secure Client Side Watermarking with Limited Key Size. In MultiMedia Modeling (pp. 13-24). Springer International Publishing, 2015.

延伸閱讀