Font Size: a A A

The Application Of Digital Watermarking On Image Transmission

Posted on:2008-08-14Degree:MasterType:Thesis
Country:ChinaCandidate:X LiFull Text:PDF
GTID:2178360242970127Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The rapid development of Internet exchanges to provide people convenient, but also poses a problem, if we do not protect the information that might be of unauthorized access and caused enormous losses. Therefore, people must take various mechanisms to protect information security.Information Hiding is a new network security technology, it adopted the confidential information to other hidden vector to transmit this is not easily found by others. Digital watermarking technology is one of its major branches. Can be used in different areas, in order to protect the network transfer secret information to digital media as a network communications carrier hidden communication is a good idea, the digital watermark can accomplish this task.This paper studies the digital watermark in network communications applications, the first paper from the current network security needs proceed to the hidden information needs. Then digital watermarking technology basic concepts, basic principles of classification, the development status quo, algorithms and models made general, the formation of this knowledge system.Finally, according to previous knowledge of foreshadowing, a settlement confidential data transmission methods. Transmission is before transceiver discussions by the two sides prior to hide information transmission vector algorithm and the embedded watermark. To enhance safety, the receiver need to know the public key, the sender of the message hidden Scrambling for processing and then be encrypted watermark, the watermark in order to transparency, robustness, capacity to make coordination with adaptive watermarking algorithm. With discrete wavelet change, the embedded watermark completed. The attack, on the one hand without knowing key, and transparency of the well, so it is difficult intercepted information, the final paper to a digital watermark experimental system, proved that the algorithm is feasible.
Keywords/Search Tags:Information Hiding, network security, digital watermarking, confidential communications, Adaptive Watermark, Key, DWT
PDF Full Text Request
Related items