首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于机器指纹的可信软件水印技术研究
引用本文:王伟,;张毅,;王刘程,;朱健伟. 一种基于机器指纹的可信软件水印技术研究[J]. 信息网络安全, 2014, 0(12): 7-11
作者姓名:王伟,  张毅,  王刘程,  朱健伟
作者单位:[1]同济大学计算机科学与技术系,上海200092; [2]国家高性能计算机工程技术中心同济分中心,上海200092; [3]中标软件有限公司,上海200030
基金项目:国家自然科学基金[61103068];教育部博士点基金【20110072120017】;上海市科技人才计划[13XD1424400];信息安全国家重点实验室开放课题;同济大学中央高校基本科研业务费专项资金
摘    要:随着网络的发展和云计算的到来,互联网用户数量迅速增加。利用互联网传播成本低廉、方便快捷的特点,盗版软件在互联网用户间得到了快速广泛的流传。数字水印技术将一些标识信息直接嵌入数字载体当中或通过修改特定区域的结构来间接表示,且不影响原载体的使用价值。它们不容易被探知和再次修改,但可以被生产方识别和辨认。通过这些隐藏在载体中的信息,可以达到确认内容创建者、购买者,传送隐秘信息或者判断载体是否被篡改等目的。正是因为数字水印技术可以有效地发现数字文件被盗版和篡改等现象,近年来该技术得到了蓬勃的发展。文章在传统数字水印的研究基础上,针对传统数字水印在应对几何攻击和伪造攻击方面鲁棒性和确定性的不足,并结合可信计算技术中可信平台模块(TPM)的设计原理,提出一种全新的基于可信平台模块的数字水印生成方法。由该方法产生的数字水印攻击者难以仿制,同时可以鉴别用户和软件提供商双方的身份和安全状态,从而在保护版权的同时,也避免了软件因遭受感染而对计算机造成破坏,具有更加广泛的适用范围。

关 键 词:可信计算  可信平台模块  软件水印  机器指纹

The Research on Trusted Software Watermarking Based on Machine Fingerprint
Affiliation:WANG Wei, ZHANG Yi, WANG Liu-cheng, ZHU Jian-wei (1. Department of Computer Science and Engineering, Tongji University, Shanghai 200092, China; 2. Tongji Branch of National Engineering & Technology Center of High Performance Computer, Shanghai 200092, China; 3. China Standard Software Co., Ltd., Shanghai 200030, China)
Abstract:In recent years, with the prevalence of the Internet and cloud technology, digital products with copyright generated by people from all of the world, but at the same time the copyright pirate becomes commoner and commoner, which did a great harm to the interest of the providers. The technology of digital watermarking embeds some identifying information directly in a digital carrier or indirectly represents them via modifying the structure of a specific area, and does not affect the original value. The technology can be easily detected by the provider while dififcult to the hackers, so it can completely tell the identiifcation information. After the study of the existing methods of software watermarks which are totally based on the software’s attributes and the analysis of their disadvantages when face distortion attack and adding attack, this paper proposes a new method to generate digital watermarking with the help of the principles of trusted platform module (TPM) in trusted computing system. The digital watermarking generation method we proposed has great security, undetectability and robustness, avoids damages to the computer, and can be used much more broadly.
Keywords:trusted computing  trusted platform module  software watermark  machine ifngerprint
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号