Font Size: a A A

Research On Digital Watermarking Application Protocol And Key Technologies

Posted on:2009-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:T Q ZhangFull Text:PDF
GTID:2178360245970062Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the development of information and network technologies, the problem of digital rights management have become increasingly prominent. Cryptography and digital watermarking technologies are considered effective methods to resolve the issue of digital rights management. Traditional cryptography technology focused on the access control and confidentiality communications of digital products, but for authentication and copyright piracy tracing it is insufficient. In the 1990s, as one of the emerging information security technologies, digital watermarking was created and developed to meet the need of digital copyright protection.Compared with the traditional cryptography technologies, digital watermarking has incomparable advantages in the identification of the authenticity of products and pirated control of legitimate users. Therefore digital watermarking technology is paid more attention by a growing number of experts and scholars. But more research of the digital watermarking focus on algorithms and theoretical basis, while ignoring the design of watermark application protocol and implementation. And excellent application protocol and norms are indispensable in the specific application of digital watermarking.Without a safe and efficient watermarking protocol, the best watermarking algorithm in the application may also have security problem. Therefore the research of digital watermarking application protocol is essencial to overcome the current bottleneck of watermarking application.The main works and research results of this article are as follows: (A)The key technologies of the watermarking protocol are introduced, including the basis of cryptography and digital watermarking technology, and the technologises of PKI, digital signatures, fingerprints and digital watermarking attack are analysed with emphasis.(B)In the light of shortcomings of the existing watermarking protocols, the principles of the protocol design and the thinking of creation is proposed.(C)Based on the literature[17], a new digital watermarking application protocol is proposed. Combined with PKI, digital signatures and digital envelope technologies, this watermarking protocol is safe and effective (D)a detailed analysis of the protocol's effectiveness of the copyright management and feasibility. In the aspect of security, this protocol can be resist many kinds of attacks about protocol and intermediate attack, while it has effective protection of copyright, and at the same time focuses on strengthening the protection of the legitimate rights and interests of consumers, controlling fraudulent conduct of merchants and users effectively and realizing the integrated management of objectives and the fairness of the protocol.And the performance and efficiency of the protocol have also been significantly enhanced.
Keywords/Search Tags:digital watermarking, DRM, PKI, digital signature, digital fingerprint, digital envelope
PDF Full Text Request
Related items