Font Size: a A A

Based On The Study Of DCT And Digital Image Watermarking Techniques

Posted on:2006-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:N LiFull Text:PDF
GTID:2178360182972669Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The rapid growth of the information technology, the development of e-commerce, the increasingly easy access to digital media, and the increasingly powerful digital media manipulation tools have made media security have been proposed, especially in the application of intellectual property right protection, copyright protection and Tamper-proofing. Information hiding and digital watermarking are new measures of digital media protection, which are processes of embedding hidden messages within digital media such as text, images, video and audio. The hidden messages could be copyright information, user distributor identification number, company logo, personal signature, control bits, or any information considered useful for a specific application.As main application in computer multimedia of information hiding, the digital watermarking technique makes it possible embed an invisible digital to the multimedia data such as image, audio and video. The digital water marking technique has been proposed as a valid solution for the need of copyright protection and authentication of multimedia data in a networked environment, since ft makes possible to identify the author, owner, distributor or authorized consumer of a multimedia data. So it has drawn extensive attention in resent years. An introductory review on the digital watermarking techniques including the definition, chrematistics and main application domains of digital watermarking was made and the fundamental principles of digital watermarking algorithm in detail such as the general framework, classification and the typical algorithm was analyzed in thispaper. DCT arithmetic was used to come true inserting and distilling of the digital watermarking. The Robust of watermarking was validated by used some kinds of methods include cut compression and adding noise.
Keywords/Search Tags:Information hiding, Watermarking, DCT
PDF Full Text Request
Related items