Font Size: a A A

Research On DRM Technology Based On Digital Watermarking

Posted on:2008-11-25Degree:MasterType:Thesis
Country:ChinaCandidate:L XuFull Text:PDF
GTID:2178360242472346Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
The popularization of the internet made the communication between information of multimedia to a never existed depth and scope before. At the same time, it is the digital technology with the exact, cheap, large-scale function of replication and internet with the power of diffusion in word wide that brings huge impact to the copyright protection. The protection of the digital works has become one of the nuclear problems in information age.Digital Rights Management (DRM) is a scheme that resolves the problem of copyright protection in internet from technology aspect. DRM based on digital watermarking is to be regarded and it is researched deeply in the dissertation. The main content includes:1. The technology of DRM and digital watermarking are researched, and the DRM based on digital watermarking has been proposed in world wide is analyzed. Two important technologies are analyzed: robust watermarking technology and watermarking protocol.2. The geometric attacks bring forward a challenge to the robustness of watermark. The research on the method resisting to the geometric attacks in the world wide are analyzed. Through combining the Radon transformation and Wavelet transformation, the rotation invariant field which is to be embedded watermark in is constructed, and it can combine with the characteristic of images better. The algorithm can resist to rotation and common attacks effectively, and can ensure the good invisibility.3. The method resisting to watermarking protocol attacks and the watermark protocol used to copyright protection are mainly analyzed. An improved buyer-seller copyright protecting protocol is proposed. The time mark and signature are used to resist to protocol attacks; the secret sharing scheme is used to implement absent validation when the pirate work are found, and to ensure the equity of the business.4. A DRM model based on the watermark protocol is built.At last, the developing foreground and researching direction of the DRM technology based on watermark is prospected.
Keywords/Search Tags:Digital Watermarking, DRM, Watermarking Attacks, Watermarking Protocol
PDF Full Text Request
Related items