Font Size: a A A

Identity Authentication Technology Based On The Fragile Digital Watermark

Posted on:2006-12-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y CaiFull Text:PDF
GTID:2168360155965836Subject:Computer applications
Abstract/Summary:PDF Full Text Request
As the information age's arrival, our life is changing swiftly on the way to the electronic modernization. The applications of electronic commerce, electronic government affairs, electronic medical affairs, and electronic education are going deep into every corner of our life. As a result of the computer network's particularity that the information's communication is not face-to-face, so we must validate the other side's identity when we exchange the sensitive information and carry on the sensitive operations. Because it is quite different between the identity authentication under the computer network's circumstance and the traditional identity authentication , so seeking one kind of identity authentication technology which is safe, effective, and convenient is a very important premise that will impel the digitized course of our life quickly. Along with the rapid improvement of the computer's calculation ability, the computer's widespread popularization as well as the Internet's rapid development, the security of the individual information varies between the beetle and the block. The traditional data encryption technology may overcome the information's random spread in the certain degree, but as the rapid development of decryption technology and the improvement of the computer's calculation ability, nearly any kind of the data encryption can not guarantee it is safe. And many hackers can not help trying decrypt the data as they see the encryption data, so the original data is as dangerous as the encrypted ones. As the development of the modern technology of the data hiding, we can deal with the information by using the similar principle of nature protective color, which enormously reduces the risks. First, only if the author himself, others cannot know that there is some information in the data, so it can't stimulate the hackers to decrypt the information. Next, even if the carrier data are destroyed, the information will not spread. The digital watermark technology is one kind of information hiding technology. This kind of technology will append the needed data to the carrier data, and we can check the hiding information at any time in the certain method. Therefore, we must guarantee that the needed data can't breach the carrier data so that it can achieve the hiding request of the sensitive information. The traditional methods for identity authentication usually depend on the user name and his passwords, which send the user name and the passwords directly by the definite text or the scrambled text. So these methods can easily draw the aggressors' attention and make the information intercepted, decrypted and then fabricated. This thesis proposes one kind of new technology for identity authentication based on the frail digital watermark, which encrypts "the unique user's identity mark" needed in the dealing, hides it in the corresponding carrier document by the frail digital watermark and establishes the safe transfer passage for the identity information, the transaction information and such sensitive information. This kind of new technology has the following merits: 1.It can realize hiding transmission of the identity information; 2.once the carrier document is revised illegally, the hiding information will be invalidated. Thus it can prevent the tampering action powerfully, make it more difficult to decode the mechanism for identity authentication, and also makes it impossible to counterfeit. So it provides the powerful technical support for the safe communication of the users' sensitive information in the network transmission. Also this thesis expound and analysis the key technology such as SOCKET programming, the frail digital watermark, technology of encryption and decryption, the technology of the image set at the chaotic for this identity authentication system. At the same time this thesis provides the essential code and annotation of the identityauthentication system's realization based on the technology of the frail digital watermark which is compiled by the VS.NET,MICROSOFT Corporation. At the end of the thesis, the author analysis the security of this kind of technology and discussed the results.
Keywords/Search Tags:Fragile digital watermark, Information security, Identity authentication, Hiding correspondence
PDF Full Text Request
Related items