Font Size: a A A

Digital Image Hiding Technology Based On Human Vision System

Posted on:2006-10-09Degree:MasterType:Thesis
Country:ChinaCandidate:W H GouFull Text:PDF
GTID:2178360212982778Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
Information hiding techniques have recently become important in a number of application areas .Digital audio ,video ,and images are increasingly furnished with distinguishing but imperceptible marks, which many contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly .Military communications systems make increasing use of traffic security techniques which ,rather than merely concealing the content of a message using encryption ,seek to conceal its sender ,its receiver ,or its very existence .These accelerate the development of information hiding technology .We select the convert communication as our research field and focus our research on the image transparence in the vision based on the convert communication and information hiding technology feasibility .We firstly give an overview of the field and some typical data encryption algorithm .and apply to images encryption domain .secondly Analyze and introduced the information hiding technical development history and present conditions again immediately after, and introduced part in brief in each realm of lay particular emphasized on and several classical algorithm .Afterwards we discuss the human vision system (HVS )in space domain and frequency domain respectively ;We provide some algorithms to embed the information using the HVS models ,analyzing the algorithm flow and correctness of the extracted data .and the encryption concept is led to DCT domain algorithm ,which the password will be used in imbeds to withdraw from the carrier .and the Multi-dimension ,Multi-redundancy is led to DWT domain algorithm ,increasing the robustness . To under the different parameter transformation condition we carried on the quantitative analysis to the influence of image imbed and withdraw .Besides that we think over the carrier capacity and give some estimating methods ,which gives a quantitative basis to select appropriate carrier to embed the information .At last we implement the technology in a software ,and in the thesis we give a software frame to explain how to implement the data-encryption and the data-hiding technique in software .
Keywords/Search Tags:data-encryption, information hiding, copyright protect, steganography, convert communication, human visual system, watermarking, visual masking, adaptive, chaos
PDF Full Text Request
Related items