Font Size: a A A

The Study On Image Data Hiding Technology

Posted on:2006-09-04Degree:MasterType:Thesis
Country:ChinaCandidate:X J TongFull Text:PDF
GTID:2178360212982271Subject:Physical Electronics
Abstract/Summary:PDF Full Text Request
In modern communications, the application of Information Hiding Technology provides a completely new way to effectively protect information authentication. It not only become a key research field on Digital Image Processing, but also has been a hot issue on multi-media information security. Moreover, its importance is gradually embodied in practice.Generally speaking, Information/Data Hiding Technology can be divided into two general categories in terms of the embedding process: acting directly in the spatial domain and others, working in a transform domain. First of all, in this paper the above two ways to implement Information Hiding are fully mooted including its background, characteristics, difficulties, requirements and several approaches to accomplish Information Hiding. This paper also presents several new methods mainly processing in the spatial domain. According to Isopreferemce Curves, which are concluded by Mr. Heuang through a variety of experiments, and which imply the relationships between the spatial distinguishing ratio as well as the gray level distinguishing ratio and the quality of subject sensation, we analyze how to implement the data conceal/Data Hiding with regard to the different traits of different images and to solve the problem of Data Embedding Payload. At the same time, the difficulty of avoiding increasing the communication expenditure is put off. Additionally, the satisfactory result can be obtained after we apply the technology of data conceal to adding harass. What's more, when the technology of information hiding is utilized by image false prevention, we discuss the problem of image degradation. Furthermore, we put forward a novel method of adaptive image data conceal. This algorithm harmonizes the relationships between the Security, Perceptual Transparency, Robustness, Real Time and Data Embedding Payload.While we focus on the methods operating in transform domain, at first, its general procedure are generalized. And then, a novel scheme which based on Discrete Fourier Transform and Spread Spectrum Communication Technology is mainly introduced. It is called the Advanced Scheme of Circular Symmetry Spread Spectrum Digital ImageWatermark. By contrast, this scheme can make embedding information gain stronger robustness. For the sake of the integrality of this paper, the courses using Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) to realize information hiding are simply recommended.As a result, we summarize the respective property of these two methods and compare each other in the tag so that we can design different Information Hiding Systems to satisfy different needs.
Keywords/Search Tags:Digital Image Processing, the Isopreference Curves, Data/Information Hiding, Adding Harass, False Prevention, Spread Spectrum Communication Technology, Discrete Fourier Transform, Discrete Cosine Transform, Discrete Wavelet Transform
PDF Full Text Request
Related items