Font Size: a A A

The Study Of Binary Image Authentication Watermarking Based On Chaotic Maps

Posted on:2011-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:T LiFull Text:PDF
GTID:2178330332975485Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
With the multimedia network communication technology, the rapid development of digital information security maintenance issue becomes increasingly prominent. Multimedia information security certification as an important area of information used to verify the authenticity and integrity, has been extensive research and application. In recent years, accompanied by digital watermark technology generation and development of digital watermarking-based image authentication certification in the field of information technology has become a research focus. With the extensive application of binary image, binary image watermarking technology is more and more attention of scholars home and abroad. However, the pixel binary image of non-0 or 1, does not have the abundance of gray image gray level, so how to ensure that the embedded watermark is invisible and the positioning of image tampering, especially in homogeneous areas of protection at home and abroad scholars dedicated to research.In this paper, binary image authentication watermark on several key issues in depth and meticulous research, the introduction of a chaotic system for the watermark generation and embedding, is proposed for two new binary image authentication watermarking algorithm The main research and innovation are as follows:Depth study of the classical binary image authentication watermarking algorithm, Watermark embedding algorithm and the proposed extraction method, the performance of the simulation tests and algorithms in areas such as security analysis carried out a detailed description and analysis, and the advantages and disadvantages of both algorithms and further research directions were studied.Proposed base on Chaotic Scrambling binary image authentication watermarking algorithm. Firstly, pixel expansion difference distortion, the advantages of large capacity, the block of pixels in the image is divided into "can be flipped" and "non-flip", and then mapping the image of chaos scrambling blocks, and then all the encrypted by the watermark information, the four parts of the image block "can be turned" pixels to modify, to complete the embedding. Experimental results show that the algorithm has good visual transparency, able to locate the image content tampering, and while achieving the integrity of the binary image authentication and certification of the dual purpose of the owner. With the existing performance comparison of similar algorithms to verify the algorithm in the watermark invisibility and the superiority of tamper localization capability.Proposed base on the parity of the binary pixel image authentication watermarking. Certification for the binary image watermark is invisible and even the protection of these two key regional issues, the first criterion by PSD pixels in the image block is divided into "can be flipped" and "non-flip", then the image block is divided into two parts, through the modification of pixels can be flipped so that the image block pixel values of two parts meet the requirements of the parity of complete embedded watermark signal. Algorithm has good invisibility of the watermark, can effectively locate tampering, and to address the binary image in the uniform protection of the difficult problems in the region.
Keywords/Search Tags:Digital watermarking, Binary image, Image authentication, Chaos
PDF Full Text Request
Related items