Source: - Bo Xiaochen Shen Lin Cheng Changwensen
---- Invention of ancient Chinese printing, the first time, the large-scale copy of the digital work is possible, printing skills
The extensive spread in the world ultimately leads to the establishment of a modern copyright system. Looking at the development of copyright institutional development
History, we can find that there is always a subtle interaction between copyright system and communication technology. On the one hand,
The progress of the revolution and communication methods of broadcasting technology is always an important force that promotes the development of copyright system; on the other hand,
The copyright system has also played an incapacitated role in promoting and promoting the promotion and development of dissemination technology.
---- Century, the emergence of new technologies such as radio broadcast, TV, video, has been to a certain extent
The difficulty of copyright protection is caused, but it is ultimately absorbed and specified by the copyright system. In recent years, digital technology and
The rapid development of the Internet also brought the risk of copyright while maximizing the interests of the rightists.
machine. Digital technology is accurate, cheap, large-scale replication and Internet's global communication skills are existing.
The system has brought unprecedented impact, and the copyright protection of digital works has become a governance, legal industry, and art.
Directors and computer scientists' puzzles.
Challenges of digital technology and Internet
---- One of the most prominent features of the modern copyright system is the special copyright protection technology. In copyright protection
Aspects, there is a close complementary relationship between law and technology, and when the law's deterrent is not enough to stop infringement
Time, technical means is used to make up for the lack of law. With the development of multimedia technology, especially sound image data compression technology
Exhibition, CD music, VCD / DVD disc, computer animation, etc., the digital products, came into people's lives, and the intends
The extensive spread of fierce developed more digital works has created conditions. Digital works relative to other copyright protection objects
There is a series of outstanding features that make it difficult to protect the existing copyright system.
---- 1. Low copy price
---- Copy of traditional artworks such as painting, sculpture, calligraphy is a very professional technology, so that one
Some fakes themselves also have a considerable artistic value. But for digital works, even in large quantities, no
It is a hard work. A computer painting work created, as long as it is part of the webpage, in short
There will be thousands of copies in time, so that anyone who is creator is creator, who is a replication. Cheap complex
The system not only led to the piracy, but also caused difficulties to investigate infringement.
---- 2. Difficulties in judicial identification
---- For the authenticity of paper instruments and traditional artwork, the current judicial appraisal technology has a complete set of integrity
Solution, such as paper appraisal, handwriting identification, etc. For digital works, the original and replica is 100%
In theory, there is no possibility of identification. Although the document itself also carries such as modification time, owner's surname
Additional information such as name, read and write password, but this information is very easy to be tampered with, which can only constitute a fragile protection. Original
It is not only "unclear", but it may be obleging. Therefore, the fake certificate of digital work infringement has been
Become a tricky problem in the process of intellectual property law enforcement.
---- 3. Tampering is convenient
---- For traditional artwork, tampering or quote is very difficult, it is hard to imagine who can put Da Vinci's
Oil painting is partially attached to your own work. However, digital works allow almost all possible forms of editing, this
The integrity of the original work is severely threatened, and the boundary between infringement and reasonable use is also blurred.
---- 4. Puzzle of web protection
---- The rise of e-commerce makes the Internet become the lifeline of the company, and the protection of the web page is very important. apart from
As an online gateway, the web is also condensed with the wisdom and labor of the designer. This wisdom and labor are straight.
Negative economic benefits from enterprises. Therefore, the protection of web pages is both intellectual property protection and commercial profit protection, it
It is inevitably containing two aspects: First, tamper-proof, the second is to use anti-theft. The current network security technology has lacks an automatic detection mechanism for web pages, plus one website is negligible, and often a web page is tampered with hackers.
I was found to seriously damage the economic interests and corporate image of the company. With the piracy of web resources, there is no current
Very good solution. In 1999, several major web infringement cases in China, and it is said to be infringement.
Victory, it is better to say that the plaintiff's reputation has played a major role.
Copyright protection based on digital watermark
---- Digital Watermarking Technology has developed in an amazing speed in recent years, in addition to military, safety
In addition, the main one is the need for digital work copyright protection. In order to solve the increasingly complex copyright dispute
Question, the so-called "technical measures" and "rights management information" in modern copyright law have emerged. technology
Measures and rights management information is the rights protection and labeling measures taken by copyright owners. These two new concepts appear in copyright law.
It is the development of the copyright protection system under the conditions of new technology. Digital watermarks can not only be used as a technical measure for copyright protection
Shi, but also provide comprehensive support for copyright management information and "administrative information" unique to my country.
---- 1. Tamper Tips and Integrity Protection
---- "Fragile Watermark" as an important research branch of digital watermark, can be used to protect digital works
Integrity. Fragile watermark is obtained by the original data of the digital work through a hash function, hidden in public release
Digital works. Image, sound, video and other digital media have been tamper with the attack, even if it is a small change
Move, it will damage the fragile digital watermark. Integrity detecting programs can be judged by reading watermarks in digital works
Whether it has been tampered with.
---- For web protection, you can schedule digital watermarks hidden in the web page, if you suffer
Hit, the system can timely alarm or automatically fix.
---- 2. Act as the right management information
---- Right management information refers to the name, creative time and other information indicated by the work, mainly for insurance
The economic interests of the protection of the ownership. Copyright Act has the role of protection of the right to protect the right to protect the rights management information.
---- Directly mark the rights management information on digital works will significantly damage the quality of the work, and the document
Additional information is called copyright. In contrast, use the number without more damage to the quality of the work.
Watermarking technology is a very ideal solution to the secret embedding data of rights management information. First, digital water
Print is invisible or undersiscovered, so the interests of consumers do not constitute an infringement; secondly, digital watermarks have almost no
It can be sexy, the difficulty of stealing watermark is very difficult, and the management information is very safe. In addition, with digital watermarking technology
The research is in-depth, digital watermark anti-various signal deformed ability is getting stronger and stronger, if you want to remove rights management through active attack
If the information, it has to be considered at the expense of the quality of the work, so it is difficult to construct the rights of the economic interests of the rights.
Threate.
---- 3. Administrative Information and Digital Watermark
---- For my country's legal system, rights management information or new concepts, but my country's existing "administrative tube
The information "can protect the right to protect the law and to some extent within a period of time.
Similarly, the labeling of administrative information is not completed, but a national behavior. As early as 1995, my country
The replication production unit that stipulates that the domestic laser digital storage disc must be etched on its production mold "source identification
Code ", the SID code.
---- That is the same as the rights management information, digital watermark is also an ideal technique for identifying administrative management information on digital works.
Surgery pathway.
Attack-oriented solution
---- Similar to password technology, digital watermarks must be all kinds of attacks in practical applications. Piracy
The huge profits of profits and curiosity of new technologies will become the motive of the attack copyright protection. Currently in digital watermark
In the study, it is difficult to solve the following attacks:
---- 1. Second Watermark Attack
---- Really safe digital watermark technology should be an open algorithm, and its security is only dependent on the key generated by the watermark. However, public algorithms can also lead to out of control of technology, not all people have the ability to crack the watermark of others, but
Each person who can read the watermark algorithm can join his own watermark in a digital work that has hidden watermarks.
The confusion of the right management information is launched. Solving the secondary watermark problem needs to be combined with a variety of digital watermarking technologies.
This is one of the focus of digital watermarking technology research.
---- 2. Splicing attack
---- Pirates of web resources can divide the stolen digital image or sound into a number of small files, followed by
Splicing on the webpage, which does not affect the visual and auditory effects, but it constitutes a strong number of digital water printers
Threate.
---- Digital watermark of anti-splicing attacks must have redundant data when encoding, while redundant data is too many
The amount of information on the watermark. How to solve this contradiction, but also the researchers need to consider.
---- 3. Multi-picture average attack
---- If the attacker gets a number of copies of the same digital work containing watermarks through the legal path, he
These replicas can be operated average, and the watermark can be removed by watermarking.
---- Way to solve multi-graph average attacks is to use "content" digital watermark, make digital watermarks and media
The body data has a certain degree of extent, this related hidden information can be an average of multiple graphs.
standardization
---- As a technique of relationship judicial certification, especially as a means of signing administrative information, numbers
The standardization of watermark is very important. From the perspective of market economy, the standardization of watermarking technology also means corresponding products.
Monopoly, who's technology has become a standard of legal recognition, and whoever will enjoy huge market share. Because of
Therefore, IBM and NEC and other information industry giants have been actively involving the development of copyright protection watermarking technology standards.
---- In 1998, the US Copyright Protection Technical Organization (CPTWG) established a data hidden group (DHSG),
Attack the technical standards of copyright protection watermarks. In seven technical programs from major companies, DHSG determines its
Three three as a candidate standard. These three programs are:
a .. IBM and NEC jointly developed technical solutions;
b .. Macrovision, Digimarc and Philips jointly formulated;
c .. Hitachi, Pioneer and Sony develop together.
---- Although DHSG has made a lot of technical investigation, it does not formulate the right to technical standards, and finally
Digital Watermarking Standard is the US Copyright Protection Advisory Committee (CPAC). IBM, HP, Apple,
Microsoft, Intel, Zoran, ATI Tech., Mediamatics and STMicroelectronics, etc.
Well-known companies are members of the committee.
---- In addition, in London, International Photography Industry Alliance (IFPI) and Digital Audiovisual Committee (Davic)
The formulation of digital watermark criteria has also begun.
---- Although there is no final technical standard for digital watermarking, DHSG has been clarified for the version
Some basic conditions for digital watermarks that must be protected, including:
a .. Hidden in digital works and not as well;
b .. Can be dedicated digital circuit identification;
c .. You do not have to get complete data, only digital watermarks can only be detected from the data stream;
d .. You can mark "No Copy", "You can copy once" and "no longer replication".
;
e .. The probability of misking; <> Li has robustness for common signal processing processes;
f .. Watermark content (field) must be reasonable;
g .. Embed or detect watermarks using mature techniques.
---- In my country, intellectual property issues is a sensitive topic, only in-depth research of digital watermarking technology, developing my country's copyright protection watermarking standards to make our possible international intellectual property disputes in the future
Once the right authority.