Font Size: a A A

Watermark Pattern Based On Chaos Sequence And Cellular Automata

Posted on:2008-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:F LiuFull Text:PDF
GTID:2178360215487300Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As the development of multimedia such as intemet VOD IPTV, The acquiring and spread of digital media is becoming more and easier. Digital media, e.g. images, audio, and video, are readily manipulated, reproduced, and distributed over information network. These efficiencies lead to problems regarding copyright protection. As a result, creators and distributors of digital data are hesitant to provide access to their digital intellectual property. Technical solutions for copyright protection of multimedia are actively being pursued. Digital watermarking has been proposed as a means to identify the owner and distribution path of digital data. Watermarking is the process of encoding hidden copyright information into digital data by making small modifications to the data sample.A good watermarking algorithm must to both robustness and invisibility and applicability into account. Digital watermarking robustness refers to the detect ability after attack, and invisibility refers the degree of perception after a watermark is embedded. For watermark to copyright protection both the invisibility and robustness are desirable. In design of a watermark scheme, an ingenious watermark pattern, embedding and encrypting algorithm can lead to better robustness and invisibility. In this paper, the applications of chaos sequence and cell automata in digital watermarking were discussed.There are five chapters in this paper, the first discusses the theoretic and the most recently research findings of robust watermark. In the second chapter the theoretic of chaos and cell automata are presented. A new watermark pattern based on chaos and automata is presented too.Applications of the new watermark pattern on image and video are discuss in the third chapter and forth chapter respectively. The conclusion and future work are given in the last chapter.
Keywords/Search Tags:Digital Watermark, Chaos, Cellular Automata, Geometric Attack
PDF Full Text Request
Related items