Web Content Security Distribution and Copyright Protection Technology

1. Overview of Intellectual Property Protection on the Internet (l) Problems of Copyright Protection on the Internet Information providers are now refusing to publish valuable media content (such as digital music, digital books, etc.) on the Internet. The main reason for this is digital media. Modifying, copying, and redistributing are easy. In order to be able to commercialize digital media, from the perspective of an information provider, the most important thing is to have means to protect the intellectual property rights of authors and publishers, so that on the one hand, the interests of authors and publishers can be guaranteed, and on the other hand, information consumers must be ensured. The authenticity and integrity of the content of the information accessed are factors that influence and determine the commercialization of online digital media. With the development of e-commerce, the research on electronic payment systems has progressed, and the solution to the technical protection of intellectual property rights is still not mature. With the development of information technology in the direction of international science and economic integration, especially the development of digital libraries, digital video broadcasting, and electronic publishing, the issue of the protection of intellectual property on the Internet has become more important.

(2) Protection of copyright and content by using digital technology Protection of Internet content mainly requires security and ease of use. The main requirements for security are the following:

• The security is no less than that of non-digital publications; for paper publications, it can be copied by cameras, copiers, scanners, etc., but at a certain cost. In an open network environment, the illegal distribution of electronic publications should not be limited.
• Identity and content authentication: Users should be able to authenticate purchased content to prevent tampering in the middle. At the same time, the server should authenticate the identity of the purchasing user to prevent the purchase of counterfeit users.
Different levels of security: Electronic publishing systems should protect different electronic publications at different levels of security while ensuring quality and as much as possible cost.
Anti-design engineering is not profitable: making it difficult and costly to decrypt a file, even if unlocking a file does not affect the security of other files.
• Privacy: Ensure that the type and quantity of electronic publications purchased by users are not disclosed.

(3) The main threat model for content on the Internet: • Unauthorized disclosure: Reading of unauthorized data content;
Unauthorized modifications: Data content is modified and destroyed;
Denial of service: denial of services by both users and content providers;
Trojan horses and viruses: There may be malicious code in the content.

2. The existing classification of copyright protection technology Nowadays, CITED, COPIAC, ACCOPI, TALISMAN, IMPRIMATUR and other research projects have carried out research on the secure distribution of network content and copyright protection. There are also several companies offering related products. Among them are IBM's Cryptptolope technology, Intertrust's Digibox technology, OpenMarket's Folio4 product, and Softlock's Softlock product. The existing copyright protection technologies are mainly divided into three major categories, including security container technology, watermark technology, and mobile agent technology. Below is a brief introduction to these three technologies.

2.1 The Concept of SuperDistribution The concept of SuperDistribution was first proposed by Ryochi Mori in 1987. He provided the most primitive model for encryption-based copyright protection. In 1990, it gradually improved in its designed software service system SSS. Mori observed that it is very difficult for ordinary people to determine whether the software is copying. It is an easy task to detect software replication through a program. It is the use of programs to detect whether software can be copied. This can be extended to become a software copyright protection technology. So, he proposed a model that allows information to be encrypted before it is released. In this way, encrypted information can be widely copied and distributed, but the encrypted information decryption unit is controlled. In Mori's design, he added a hardware device called S-BOx to the computer. Computers can only access and read encrypted electronic information after adding this device. This encrypted program can now be arbitrarily copied and distributed, but the decrypted program section requires special equipment. Mori described four attributes that must be satisfied in the online distribution of software and digital content:

· Electronic publications can be freely published on the Internet. Users of electronic publications need to pay for the use of software products, but users of electronic publications do not own copyright.
· Providers of electronic publications on the Internet can set requirements and fees for users (users) of electronic publications.
• Electronic publications can be run on suitable platforms, but users must meet the conditions set by the electronic publication provider and pay the corresponding fees.
· Electronic publications may need to be processed by a network management system so that users need special equipment (or software platforms) to access and read.

2.2 Secure Container Technology (1) InterTrust's DigiBox Technology DigiBox technology is at the current technology leader. DigiBox's structure is a secure content encapsulation program. In this method, the content is called property, and the measure used to define them is called control. A DigiBox can have one and several assets as arbitrary data. Controls can be transmitted in one DigiBox and can also be transmitted in different DigiBox. Control is linked to property through encryption. Figure 1 illustrates how DigiBox works. DigiBox #1 owns two assets P1 and P2, control set CS1 connects P1, and does not allow users to access property P2. However, another DigiBox2 has two control sets CS1 and CS2, corresponding to the property P1 connected to the assets P2 and DigiBox#. Users can access P1 through CS1 and CS3. Users can also access P2 of DigiBox #1 through Digi2 of DigiBOX #2. In DigiBox, high-level elements such as header information and overall information are encrypted with a transmission key. If necessary, the property can be encrypted with other keys. The transport key consists of two parts, one part stored in the DigiBox and stored in a protected storage in combination with another key, which can be opened via DigiBox. Parts in DigiBox are encrypted using a public key algorithm. The main benefit of doing so is to prevent any two keys from being mutually calculable. However, this method requires the distribution of keys (key management) among different participants. It further requires that each host have a secure store called the InterRight point. The encryption algorithm uses Triple DES and RSA. Integrity authentication uses an encrypted hash function. Once DigiBox is opened, there are two different kinds of information flow that can occur depending on the principle of control: the first is the purpose of billing, and the other is the collection of returned user usage information based on DigiBox's control set requirements. And make users aware of and agree to the role of this information feedback loop. Watermarking technology is now being integrated into DigiBox's content.

(2) IBM's Cryptolope
IBM's Cryptolope technology is characterized by the use of secure encryption technology to encapsulate information technology content to be protected. Cryptolope is a Java-based software that consists of three parts. First Cryptolope Builder is a packaged tool that allows the construction of encrypted packages with business rules and content in use. This part of the tool is for content providers. The second part is designed for consumers of information. The second part of the Cryptolope Player is an interpreter that accesses the contents of Cryptolope. It interacts with the third part of the Cryptolope Clearing Center through an HTML viewer. The third part is a trusted third party. It provides key management, payment system and event login and usage measurement. The main problem with this approach is that it is a closed ownership system. Users are forced to use it in IBM's InfoMarket network environment. This is why the Cryptolope technology is not widely accepted for the time being. The key to the success of this technology is to be able to integrate more business partners, and it is necessary to closely link copyright protection with financial institutions and content providers.

2.3 Watermarking Marking is a copyright protection measure through digital watermarking and digital fingerprinting. However, these methods still have a lot of technical deficiencies. It embeds a piece of information in images, text, video and audio media. This embedded information has features such as invisibility and ease of detection. To a certain extent, it can prevent user infringement. Because when the user holds a watermarked media product, people can extract the watermark through the detection technology to determine the ownership of the media copyright, thereby indicating whether the watermarked digital media product used by the user is illegal. Digital fingerprinting provides embedded serial numbers for the distribution of large quantities of media. Different media products embed different serial numbers. It is not possible to have two products with the same serial number. Watermarking technology and fingerprinting technology are not yet mature technologies for solving media copyright protection. It is also very vulnerable to attack. Watermarking technology is a technology developed in the last two or three years. The universal digital watermarking algorithm contains two basic aspects: watermark embedding and watermark extraction or detection. Watermarks can be composed of a variety of objects, such as random number sequences, digital identities, text, and images. In terms of robustness and security, it is often necessary to randomize and encrypt the watermark.

Watermark embedding can basically be divided into two categories.

(l) The method of the spatial domain One method is that the special-effect watermark is directly superimposed on the spatial domain of the image by some algorithm. Considering the visual invisibility, the watermark is generally embedded in the least significant pixel of the image (such as LSB:Least Significant Bits). The disadvantage of the spatial domain method is that it resists the geometric distortion and noise of the image. And the ability of image compression is poor, and the embeddable watermark capacity is also limited, but the space warfare method's calculation speed is usually faster, and many algorithms extract the watermark and verify the existence of the watermark does not require the original image.

(2) Method of transforming wars Another method is to first perform some kind of transformation on the image (especially orthogonal transform), and then embed the watermark in the transform domain of the image (such as DCT domain, Wavelet transform Domain, Fourier-Melliln domain, Fourier exchange, fractal or other transform domain, etc.) From the current situation, the transform domain method is becoming increasingly common. Because the transform domain method usually has a very good Lu rule, it has a certain resistance to image compression, commonly used image filtering and noise. And some watermark algorithms also incorporate current image and video compression standards (such as JPEG, MPEG, etc.) and thus have great practical significance. When designing a good watermark algorithm, it is often necessary to consider the local statistical characteristics of the image and the human visual model in order to improve the robustness and invisibility of the watermark.

2.3.1 Classification according to the watermark's input and output If the watermarking algorithm is classified according to the input and output, the watermarking algorithm can be divided into the following categories:

(1) Private watermarking system
(I) type systems, which extract watermarks from potentially distorted images, require an original image, such as given I, I, W, and K, to calculate the watermark.
(II) type systems also require W and I, but only generate a 0-l judgment to determine whether the watermark image has a watermark. If the result is 1, there is a watermark, otherwise it is 0, there is no watermark.
(III) type systems, or private systems, do not require the original image for watermark detection.

(2) Public Watermarking System The public watermarking system can extract information from the watermarked image without the need of the original image and the original watermark, so that the public watermarking system is more promising. However, this method also has problems such as robustness and safety.

2.3.2 Watermarking algorithm The earliest proposed watermarking algorithm embeds information in the least significant pixel bits of randomly selected image points, which ensures that the embedded watermark is invisible. However, due to the use of unimportant pixels of the image, the robustness of the algorithm is poor, and the watermark information is easily corrupted by the filtering, image quantization, and geometric deformation operations.

Most watermarking algorithms use spread spectrum communication (Spr

Kids Umbrella

Kids Umbrella,Straight kid umbrella,animal printing kids umbrella,hat head umbrella

Haixin Umbrella Industry Co., Ltd. , http://www.hzfoldumbrella.com