Dissertation > Excellent graduate degree dissertation topics show

Research on Asymmetric Watermarking Based on Wavelet Packet Transform

Author: LiYing
Tutor: JiangJianGuo
School: Xi'an University of Electronic Science and Technology
Course: Applied Computer Technology
Keywords: Asymmetric watermarking Public key Private key Queue scrambling Wavelet packet transform
CLC: TP309.7
Type: Master's thesis
Year: 2008
Downloads: 53
Quote: 1
Read: Download Dissertation


Facilitate the development of digital technology and the Internet for all forms of digital dissemination of works, but digital works can easily be the characteristics of an ideal copy pirates use. The digital watermarking technology is one of the important means of copyright protection. However, the vast majority of existing digital watermarking scheme are symmetrical system, due to security concerns can not provide public detection limits of promotion and application of digital watermarking technology. Asymmetric watermarking scheme is an effective way to solve the symmetric watermark security issues. Asymmetric Digital watermarking technology is still in its infancy, there are to be further studied. This paper analyzes the general principles of digital watermarking technology, and the typical algorithms common attack methods and assessment methods, and focus on the asymmetric digital watermarking technology; wavelet packet analysis theory and the theory of image denoising, given a improved method based on optimal wavelet packet basis modulus maxima image denoising using the denoising method to recover the watermarked image filtering resulting watermark signal estimate, blind detection of the watermark; view of the queue is set scrambling transformation good scrambling effect and infinite key space, proposed a queue scrambling weighted asymmetric watermarking scheme to embed two unrelated and complementary detection performance of the watermark signal weighted way to achieve non- symmetry detection, which is an open secret watermark watermark scrambling version. Above Denoising watermark detection analysis and testing, and the robustness and reliability of the detection of the watermark as well as the security of the scheme; finally designed and implemented a program based on the multiple watermark thought asymmetric watermarking using bipolar jitter methods to quantify the plurality of different versions of the watermark embedded in the wavelet packet transform domain according to the SNR to adaptively determine the quantization step size, discloses a version of the embedded watermark information, to achieve the disclosed detection. Design two asymmetric watermarking scheme, can open detection and blind extraction watermark, the watermark verification convenient, and by the public key can not deduce the private key has a higher security; able to prevent watermarks forged, can be pirated tracking, copyright authentication process efficiency; embedded in the wavelet packet domain adaptive watermark, enlarged watermark embedding space, and improve the transparency and soundness of the watermark. The modulus maxima improved image denoising method based on optimal wavelet packet basis, simplifying the calculation process, improve the speed, and better retention of the details of the image, and get good approximation of the original image. Experimental results show that the two programs designed with reliable detection performance, has better robustness to common image processing attacks, the system is able to provide a minimum security to meet the basic requirements of asymmetric digital watermarking has some practical sex.

Related Dissertations

  1. Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor,TN918.1
  2. The Research of Speech Coding Based on Compressed Sensing,TN912.3
  3. Wireless ad hoc network group key management scheme design and implementation,TN918.82
  4. Crack PGP passphrase -based Research and Implementation,TP309.7
  5. Research and Implementation based the gray theory algebra encryption algorithm,TP393.08
  6. Design and Analysis of Some Security Protocols Based on CPK in Trusted Computing Environment,TP309
  7. USB Key Technology in Digital Library Research and Application of Identity Authentication,TP393.08
  8. Application of MPKCs on Construction of Signature Algorithm and Hash Function,TN918.1
  9. The Study on the Key Authentication Algorithm of Smart Cards Applied for Financial Services System,TN918
  10. Study on Designated-Verifier Proxy Signature System,TP309
  11. Research on Digital Watermarking and Fingerprint Algorithm for Confidential Electronic Document Protection,TP309.7
  12. Research and Implementation on Robust Digital Audio Watermarking Key Technologies,TP309.7
  13. Niederreiter error-correcting codes based on public-key cryptosystem,TN918.1
  14. Standard model safe threshold cryptosystem without certificate,TN918.1
  15. Signcryption scheme of analysis and design,TN918.1
  16. The Research of E-commerce Security Technology Based on SSL,TP393.08
  17. Research of the Identity-based Encryption and Signature,TN918.1
  18. E-government systems in the network investment in applied research,F49
  19. The Research of Access and Control Technology USB Key,TP393.08
  20. The Research of USB Key with Display Based on Z8D168,TP393.08
  21. Multivariate public key cryptosystem based on Boolean algebra under the center of the mapping study,TN918.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net  Mobile