Font Size: a A A

Study On Image Digital Watermark Algorithm

Posted on:2005-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:W F SuFull Text:PDF
GTID:2168360125963822Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the popularization of Internet and the development of multimedia techniques, digital multimedia (image, graphics, audio, video, etc.) has become main means of information communication. While one can acquire a wide range of multimedia data through the Internet, various problems (copyright violation, illegal copying, easy forging, etc.) arises naturally that seriously harm the benefit of the author or the copyright owner. How to protect multimedia data from violation has become an important issue in information security field. As a main application of information hiding technique to multimedia copyright protection, the digital watermarking technique, which embeds an invisible signal (watermark) to the original multimedia data (image, audio, and video), has been proposed as a viable solution for the copyright protection and authentication of multimedia data in a networked environment since it makes it possible to identify the author, owner, distributor or authorized consumer of multimedia data. So it has drawn extensive attention in recent years and has been widely applied.Digital watermark is a new direction in the information security field.It's a new technology which can protect copyright and authentication source.The author's personal copyright information can be embedded in the products.But we can't percept it,only special software can pick it up.In this paper, the author first makes an overall review on the digital watermarking techniques, including the definition, characteristics, and main application domains of digital watermarking. Then the author analyzes fundamental principles of digital watermarking algorithm in detail such as the general framework, classification, and the typical algorithm. Finally, a new image watermarking scheme is proposed by incorporating the DCT transform, an edge detection technique and a HVS model. Experimental results indicate that this method is more robust against the common signal processing attacks than the traditional DCT method.
Keywords/Search Tags:Digital Watermark, Watermarking Algorithm, Discrete Cosine Transform, Edge Detection, Human Visual System
PDF Full Text Request
Related items