Font Size: a A A

Digital Media Copyright Online Certification System Design And Implementation

Posted on:2011-08-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y L HuFull Text:PDF
GTID:2208360308475763Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technologies, people have an increasing dependency on information systems. Security problems are attracting more attention while people are enjoying the conveniency brought by computer technologies. As the kernel component of information systems, database contains data of different degree of importance and confidentiality and plays a crucial role in the construction and application of the whole information systems. The Internet brings us convenient services, but also to the security of these digital works a tremendous challenge, copyright issues has become increasingly a cause for concern. How to protect and certification of these figures the copyright has become an urgent problem. The main purpose of this paper is to study how the Internet copyright of these digital media certification. Research include the following: the basic framework of digital watermarking system and performance characteristics; watermarking algorithm and key technical analysis; image watermarking method commonly attacked; ensure the integrity and confidentiality of information using encryption technology to implement digital signature , for authentication. Guarantee the controllability of electronic information systems can be effectively used to implement password and key management.This paper, different encryption, encryption algorithm and encryption granularity of the data encryption system architecture, function modules and system performance were analyzed, CBC mode based on the modified design of the database encryption system, and gives in Oracle and SQL Server database implementation method. To address the demand database interface, security requirements, system requirements and system reliability needs of subordinates and so needs to discuss how to use the dictionary implementation based on XML encryption key management and access control.This article, the application of the system architecture, development platform and software architecture analysis and selection. The system technology and Web page development application server, database, IDE and supporting plug-ins such as do some analysis and make a choice. Then do the logical structure of system analysis, process analysis and database logic analysis and implementation, in the above analysis made on the basis of specific design.Specific system implementation is included user registration and management functions; photo album management; copyright authentication and other digital media as a realization of the common features. Have some representation.
Keywords/Search Tags:database encryption, query system on encrypted databases, index, query optimiza
PDF Full Text Request
Related items