Dissertation > Excellent graduate degree dissertation topics show

Research on Public Key Digital Watermarking Based on ECC

Author: WangYu
Tutor: JiangJianGuo
School: Xi'an University of Electronic Science and Technology
Course: Applied Computer Technology
Keywords: Digital Watermarking Public key Arnold transformation Elliptic Curve Cryptography Hadamard transform
CLC: TP309.7
Type: Master's thesis
Year: 2008
Downloads: 70
Quote: 0
Read: Download Dissertation


With digital products copyright protection has become increasingly important digital watermarking as an effective means to solve the problem attracted universal attention . Most of the current research is based on symmetric watermarking model , the algorithm can not open , and watermark can only be extracted by the owner himself . In addition , research is concentrated in the watermark embedding and extraction algorithm , there is little research on watermarking model and implementation of the agreement . In fact, the absence of the model and the implementation of the agreement to do to protect , and then a robust algorithm also amounted to less than effective copyright protection purposes , thereby constraining the practical application of digital watermarking technology . This paper analyzes the the digital watermarking basic principle and the typical algorithm , and put forward the Arnold transform an improved algorithm ; summarizes the a common digital watermark performance assessment method , provided the basis for subsequent watermark performance evaluation ; analysis of the basic theory of elliptic curve cryptography elliptic curve cryptography public key digital watermarking proposed two ways to achieve ; Finally for current symmetric watermarking model , drawing on the thinking of public key cryptography , the public key based on elliptic curve cryptosystem digital watermarking model , and an implementation agreement for the introduction of a central regulatory body is constructed on the basis of the model . The watermarking model proposed in this paper , the watermark verification convenient ability of anti - explanatory attack , and can track the illegal copying and dissemination . Use of elliptic curve public key cryptography algorithm , watermark security processing decryption speed . Arnold transformation algorithm , improved to increase the key space , and to strengthen the security of the algorithm . Use of the second-order Hadamard transform watermark hybrid coding the double watermark embedding and independently extracted , and laid the foundation for the establishment of the model . Experimental results show that the model has a strong robustness to common image processing attacks , the implementation of the agreement has good reliability and practicality . The model of this paper to achieve a public key digital watermarking thinking , but it is the help of public key cryptography algorithm based on public key digital watermarking , there is a certain distance . This will be the future research directions .

Related Dissertations

  1. Research on Contourlet Transform and Its Application on Image Processing,TP391.41
  2. Nonlinear color image watermarking detection program of study,TP309.7
  3. Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor,TN918.1
  4. Single-Channel Color Image Encryption Algorithms with Chaos and Fractional Fourier Transform,TP309.7
  5. A Class of Fractional Orthogonal Transforms and Their Applications,TN911.7
  6. Research on Security Policy in Wireless Sensor Networks Based on Digital Watermarking Technology,TN915.08
  7. Research of the Identity-based Encryption and Signature,TN918.1
  8. The Design and Implement of Highway Capture with Digital Watermarking Application,TP311.52
  9. A Video Copyright Registration and Identification System Based on Copy Detection,TP311.52
  10. Identity-based NVD remote key system design and implementation,TN918.2
  11. Identity-Based Authentication System Research and Implementation,TN918.1
  12. E-government network security instant messaging system design and implementation,TP393.08
  13. Blackberry mobile phone operating system based on Security Mechanism,TP309.7
  14. Iris feature -based digital watermarking algorithm,TP309.7
  15. Based on the H.264 standard video watermarking technology in the network learning platform in the Application and Implementation,TP309.7
  16. Digital watermarking based on neural network algorithm and implementation,TP309.7
  17. Chaotic systems based digital image watermarking algorithm,TP309.7
  18. PetroChina Xinjiang Branch Certificate Application Management System Design and Implementation,TP311.52
  19. Research and Implementation based the gray theory algebra encryption algorithm,TP393.08
  20. Design and Implementation of E-Document Transfers System Base on PKI,TP393.08
  21. SVD -based digital watermarking algorithm,TP309.7

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net  Mobile