Font Size: a A A

Information Confidentiality And Copyright Protection Of New Ideas

Posted on:2003-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:N LiFull Text:PDF
GTID:2208360122966734Subject:Computer Science
Abstract/Summary:PDF Full Text Request
The opening of TCP/IP protocol makes Internet the largest computer network all over the world. However ,owing to its opening, , the information which is published on internet subject to many attacks, such as unauthorized wiretapping, intercepting, destroying, copyright infringing, abusing, hacker attaching and virus infecting, etc. Because digital information on Internet can be copied, modified and transmitted, copyright infringing on internet is becoming more and more serious; now information tech is used more and more in the society, domain that internet concerns spreads fast, it play an important role in many fields, such as bank, business , government , army and so on. In these fields, demand of keeping secret is increasingly imminent.Now tech of keeping secret is based on cryptography, but datum that has been encrypted is always in disorder and is easily paid attention to by information spy. In the meanwhile, with the fast growth of computer processing ability, this method, which increased secrecy degree depend on increasing the length of key , is becoming more and more insecure. Furthermore, increasing the length of key also brings large-extent growth of calculation and cost of encryption and decryption.Research content of my paper is a new mechanism of keeping secrecy and protectingcopyright--watermarking tech; Recur to watermarking tech, we can place the information wewant to manage in its secure system, we can use it to prove originator's owner to Digital media that he creates, the watermark can be proof of authentication and prosecuting illegal copyright infringing. Besides, through detecting and analyzing watermark, it can be decided whether digital media should be recorded and played, in this way digital media which are copied and downloaded illegally is refused to use, we can limit illegal copy > modification and transmission of digital information.Watermarking can also be used in label cryptic" authentication and cryptic communication. Cryptic Watermarking means secret information can be hidden in public data as watermark, so observer and monitor system can not be conscious of existence of secret information, then we can realize cryptic communication and secrecy storage.My paper lists some watermarking algorithms which are advanced and often used now, analyze attacks which watermark often suffered, put some corresponding measures; analyze robustness of these watermarking algorithms, finds out their shortcoming, and improve these algorithms, improved algorithms have better cryptic and robustness. We must analyze those content theoretically,and make experiment. 1 put forwards a project of information hiding, which can hide a file in an image.The main production of this paper is below:(1): put forwards a project of information hiding, combine cryptography and watermarking. In this project, we use IDEA and spread RSA .(2): Combine watermarking tech and communication theory to research robustness of watermarking. And use this theory to improve an adaptive watermarking algorithm. I use theoretical analyse and experiment to prove that improved algorithm has stronger robustness.(3): Use knowledge of Euclid space, make theoretical analyse to an index which reflects robustness of inserted watermark.(4): analyze a DCT algorithm, find out its leaks and improve this #. I use theoretical analyse and experiment to prove that improved algorithm has stronger robustness and crypticness.(5): analyze a DWT watermarking algorithms; I use theoretical analyze an experiment to prove that DWT watermarking algorithms is more advanced than DCT watermarking algorithms. I combine SNR (Signal to Noise Ratio), put forward an improved DWT algorithm.
Keywords/Search Tags:watermark, image, multi-media, robustness, DCT, wavelet, information hiding, cryptography
PDF Full Text Request
Related items