Font Size: a A A

A User Authentication Scheme Based On Digital Watermarking Technology

Posted on:2010-08-30Degree:MasterType:Thesis
Country:ChinaCandidate:X L ZhangFull Text:PDF
GTID:2178360275479856Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Digital rights management(DRM) problem is a very serious problem in network multimedia.There are many existed technologies for resolving it,and identity authentication which is the first step for digital rights management is very important.As the identity authentication assure a mutual trustful relation between digital work users and DRM system.The digital watermarking technology is also the research focus in copyright protection.It protects the ownership or integrity of digital works through embedding copyright information or integrity information.The research point of this paper is the user authentication scheme based on digital watermarking.Firstly,an identity authentication scheme is designed with robust image watermarking technology.Secondly,a behavior authentication scheme is proposed by fragile watermarking and multiple robust zero watermarking technology.The integrity authentication is also achieved contemporary.In the first chapter,we introduce the summary of digital rights management,including its conception,function,and research information.And the digital watermarking technology is also presented.It involves the basic framework,properties,sorts, guidelines of performance evaluation and research information.The second chapter gives us the preparative knowledge of the user authentication scheme,as identity authentication technology,wavelet transform technology.The NSSK identify authentication scheme and wavelet transform theory are highlighted.The third and forth chapters are the most important part of paper.The identity and behavior authentication scheme are proposed in details.The proposeing identity authentication scheme is based on NSSK classical scheme. For enhancing the secrecy,it replaced the encryption technology by image watermarking. The validity of the scheme is analyzed simultaneously.The robustness and self-adaptive is the focus of image watermarking algorithm.To realize the self-synchronizing,the geometric transformation parameters are calculated before extracting watermark.The affine invariant points which are extracted before embedded watermark and matched by genetic algorithm are used to compute the parmeters.The embedding strength coefficients are self-adapt according to texture masking characteristics.This method has been proved its robustness and invisibility to various attacks through experiments.The behavior authentication scheme is the complement of identity authentication.Its research focus is user but not the digital works.The integrity authentication and behavior authentication is implemented by fragile watermarking and multiple robust zero watermark technology.In this paper,we design two kinds of behavior authentication scheme.One is used to confirm the digital work user weather exceed one's authority,the other is used to confirm a range of users who exceeded their authority.The integrity authentication information is created according to the digital works.The scheme can decide whether a user beyond authority by integrity authentication results and extracted multiple robust zero watermark.And then the root of copyright problem can be found. The experiment results show that the behavior authentication of digital works users can be executed high efficiently and robustly.The work of paper is concluded in the last chapter.And the next study is also prospected.
Keywords/Search Tags:Digital rights management, Identity authentication, Behavior authentication, Digital watermarking
PDF Full Text Request
Related items