Font Size: a A A

Research On Public Key Digital Watermarking Based On ECC

Posted on:2009-06-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2178360272978037Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the copyright protection of digital production becomes more and more important. Digital watermarking technology, as an effective method to solve the problem, has been paid much more attention to. But the studies on digital watermarking are mostly based on symmetrical watermarking model, and the algorithm of watermarking is private. The key is just can be given by the copyright owner to retrieve the watermarking. Otherwise, though there are many papers about how to embed and retrieve watermarking, there is little research about the application protocol of watermarking. Without the protocol protection, the algorithm can not provide copyright protection even if it is much robust. This blocked the widely use of digital watermarking technology in practice.The principle and the typical algorithm of digital watermarking technology is analyzed. And the Arnold algorithm is improved. Digital watermarking capability evaluation methods are discussed. After analyzing the basic principle of Elliptic Curve Cryptography, it studied how to apply the algorithm of Elliptic Curve Cryptography to digital watermarking, and offered two ideas for application. Then, a new public digital watermarking model is proposed, which is based on Elliptic Curve Cryptography. At last,The model is built upon public key, and an application protocol of digital watermarking is built on the basis of the model.The watermarking model established in this paper is much more convenient to validate watermarking. It also can resist interpretative attack and pursue the spread of illegal copy. The application of Elliptic Cryptography algorithm will improve the safety of digital watermarking, so do the speed of encryption and decryption. The improved Arnold algorithm, having more extensive scopes, enhances the safety of watermarking.With Hadamard Transform, public and private watermarking can be embedded simultaneously And retrieved respectively. The model established in this paper is proved steady to deal with the usual attack to images. The application protocol also possesses better dependability and practicability.The model in this paper, which is built on the basis of public key Cryptography algorithm, has distance with perfect public digital watermarking. This will be the main contents for further research.
Keywords/Search Tags:Digital Watermarking, Public Key, Arnold Transform, Elliptic Curve Cryptography, Hadamard Transform
PDF Full Text Request
Related items