Font Size: a A A

The Research On Achieving The Application Of Watermark Technology For Communication Hiding

Posted on:2005-11-19Degree:MasterType:Thesis
Country:ChinaCandidate:Q Y LiFull Text:PDF
GTID:2168360152456784Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of internet and communication techniques, the wide application of digital media, including digital image as well as digital video and audio data has led to an increasingly, urgent demand for safe usage of digital media information and protection and authentication of intellectual property right. The traditional information encrypting methods can only guarantee a safe transmission of information. When the data has been accepted and decoded, the methods will be ineffective in protection. Furthermore, the encrypted files tend to stimulate the interests of those with strong desire to decode files of other people. As an effective complement for traditional methods of encryption, digital watermarking is a new technique, which can ensure safe protection of copyright, precise authentication of the source and completion of the data in an open Internet environment. Due to its advantages, digital watermarking has gained much attention and has become a hot issue in the field of multimedia data processing.This article presents a series of systematic introduction of related concepts of secret communication, information hiding and watermarking, describes the history and background of watermarking development; the current domestic and overseas researches on watermarking, the typical algorithms of watermarking scheme; analyzes the lack of encrypting with current equipment after describing the working principle and working process of armor tank transceiver; the scheme on improving the working model of plaintext 2 and cipher text 2.We bring forward encrypting data with the technology of watermarking for the two working model of plaintext 2 and cipher text 2,thanks to the unvisualness of the watermarking, it can not make the enemy discover us in order to baffle the enemy.This article expounds the watermarking scheme based on authentication and information hiding and bring forward a series of Embedding and Extracting algorithm of watermarking; a summary of my work and achievement in the period of my postgraduate study is finally made along with a outlook for my future study.This article also bring forward using pseudo-random sequence for watermarking, Embedding and Extracting algorithm of spatial domain and alternate domain watermarking based on MD5.Transparence and robustness of watermarking can easily be seen through the result of test.We also bring forward a method using secret data for watermarking based on the scheme of information hiding, the Embedding and Extracting algorithm basis of DWT and spatial domain. As a conclusion, I made a brief summary on my work when writing the graduation thesis, the tasks that haven' t been finished, what I have learned and achieved through the work and my viewpoint of the future study as well.
Keywords/Search Tags:Communication
PDF Full Text Request
Related items