透過您的圖書館登入
IP:52.14.25.155
  • 學位論文

數位版權雙重保護機制—以文物圖片存取管理為例

A DOUBLE-LAYERED DIGITAL RIGHTS PROTECTION FRAMEWORK—BY EXAMPLE OF ACCESS CONTROL FOR ANTIQUE IMAGES

指導教授 : 陳志誠
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


由於網際網路快速發展,為了使民眾更容易接近珍貴的典藏,重要文物數位化已經成為世界的潮流。在網路上可以發現越來越多的數位內容資源,而其中以圖書館與博物館為首的數位化計畫下所建置的網站,不但資源豐富且具規模。目前網路上所提供的保護機制,有數位浮水印、加密、驗證、授權等技術,確實提高了數位內容在網路上的安全性、完整性和正確性;但是當面對合法使用者,能夠控管他們瀏覽數位內容時行為的監控功能,卻是不足的。浮水印的技術在數位版權當中,屬於發生數位內容所有權爭議時,究竟誰是原創作者的方法;如何積極的防護使整套版權機制更加完整,就是本研究的動機來源。 本研究提出一套雙層式架構,第一道使用浮水印來保護已經遭到竊取的數位內容,有助於在未來發生爭議時證明所有權歸屬;第二道防線以API Hook(Application Programming Interface Hook)偵測使用者行為,當使用者使用截取畫面功能時,便會將所偵測到的違反數位版權事件回傳至伺服器端;在伺服器接收到之後,就能對於該使用者的帳號作權限上的修改,讓該使用者因為權限已被刪除而無法盜取其他的數位內容。

並列摘要


With increasing population in using network, abundant digital content is available on network for people’s share, whereas copyright problems accompanied by it become more and more serious. Currently, digital right protection mechanisms including watermark, encryption. validation and authorization technologies highlights how to completely and safely deliver digital content required by users to authorized people. Even though such mechanisms increase safety of digital content on cyberspace, its controllable range is limited to provide protection on digital content access control, application control and starting time, however, at the time of browsing, in case users occur ultra vires act, monitor is still deficient. Current technology of monitoring acts are mainly applied to anti-block virus, trojan, worm invasion or analyze users with abnormal authorization, seldom applied to digital right management. This study tries to detect user behavior through API Hook(Application Programming Interface Hook), which indicates that during using capture function, users will return events in violation of digital rights detected to server;upon receipt by server, account number of such users will be controlled and managed, leading to users can’t access other digital content due to authority limits. After steal acts of users are prevented, data received from server will be used to check identify of users. This study creates a software to monitor user behavior, namely a online real-time system of protecting copyright which is constituted by monitor through program, keyboard and mouse, combining with monitor under state of linking to server;as user browse network through built-in browser in monitor system, if they happen to use built-in screen capture function in operating system or do act of capturing software, they will be determined as intentionally stealing digital content by system. Meanwhile, through on-line state monitor, problem that event return to server is interrupted possibly through blocking packages by users will be solved; target webpage is only browsed through built-in browser in monitor system after delivery of parameters and database. However, this system mainly regards webpage as protected units, thus in principle, various kinds of files are protected to avoid real-time capture as long as through newly increment of database in capture software, covering from picture-type digital content to video and audio streams. Finally, this system is to evaluate how to strengthen monitor to user behaviors unavailable in applicable digital right management, with the aim to understand values of this study.

參考文獻


[3]行政院經濟建設委員會,2005,「挑戰2008:國家發展重點計劃2002-2007」。
[14]劉用貴、許通安,2004,「應用小波轉換於彩色圖片數位浮水印之研究」,中原大學資訊管理學系碩士論文。
[13]廖鴻圖,郭明煌,劉淑君,2006,「數位出版品版權發行管理機制」,銘傳大學國際學術研討會。
[16]賴俊豪、陳奕明,2007,「以支援向量機技術偵測微軟作業系統中非授權使用之研究」,國立中央大學資訊管理學系碩士論文。
[18]Ahmed, N., Natarajan, T., and Rao, K.R., 1974 “Discrete Cosine Transform”, IEEE Trans. Computer, Vol. C-23, pp.90-93.

被引用紀錄


魏華儀(2010)。科技旅遊景點導覽之商業模式設計〔碩士論文,國立臺北大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0023-2107201012571100
葉士豪(2011)。數位內容商業模式之分析與設計〔碩士論文,國立臺北大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0023-1508201116302000

延伸閱讀