Font Size: a A A

Research On Image Watermarking Technology Based On ECC

Posted on:2007-09-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y GaoFull Text:PDF
GTID:2178360182980780Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network, multimedia and information science, problems about copyright protection and integrity authentication of digital media have attracted more and more attention worldwide. Traditional security systems can only guarantee information transmitting process, but they can't meet the requirements of new conditions. As a key to solve those problems, digital watermarking has become a new research hot-point for researchers in signal processing.This paper addresses the watermarking based on error correcting coding (ECC). It discusses the background of information hiding first, and the basic concepts of information hiding and watermarking. Then it introduced mathematical knowledge involving error correcting coding and the principles of coding and decoding the common error correcting coding in detail. It analyzes the error rate formal of watermarking, which indicated that the watermarking performance is concerned. It provides a theoretical basis for research of watermarks based on the error correcting coding. This article presents an effective blind watermark algorithm. The algorithm is in the context of DCT and DWT, watermarks will be embedded the intermediate frequency coefficient of DCT domain. We applied blind detection technology, which means that original image is unnecessary when non-blind detection in detecting watermark. Many watermarking algorithms apply now needs original image, it limits applications on copyright protection.The paper applies many kinds of error correcting coding (such as hamming code, BCH code, RS code and the convolutional code) in watermarking, intending to lower the detection error rate by correcting some errors, and to improve the robustness of watermarking. Finally, do experiment through a variety of common attacks such as compression, sheared, noise and filter, a conclusion can be made that the proposed technique is practical.
Keywords/Search Tags:watermarking, error-correction coding, DCT, DWT
PDF Full Text Request
Related items