Font Size: a A A

Digital Watermarking For Image Processing Algorithm Research And Simulation

Posted on:2011-08-29Degree:MasterType:Thesis
Country:ChinaCandidate:G Y LiFull Text:PDF
GTID:2178360305499380Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years, with the Internet and the rapid development of multimedia technology, various forms of multimedia works, including images, video, audio, to ascertain from the means of dissemination of the network or download it to the people's work and life of the great convenience, but Tong Shi Ye Dai Lai negative Ying Xiang, and that is the original work Intellectual property rights easier. So how to protect in the network currently effective copyright protection and to solve the problem of information security has become an increasingly important issue. Current digital watermarking technology has been considered for digital media copyright protection of the effective means of embedding it into the digital media, and through it the Jiance to determine the media's copyright, and the use of digital media situation, academic value and extensive application. This article is in the context of this study, combined with discrete cosine transform (DCT), Discrete Wavelet Transform (DWT) and the transformation of the digital watermarking algorithm Contour let conducted in-depth study and discussion. The main contents include:(1) A comprehensive summary outlines the basics of digital watermarking, digital watermarking involves the basic concepts and features, basic principles and classification, and performance evaluation of digital watermarking and wide applications, develop a systematic theory of knowledge. And he digital watermarking algorithm described in detail the theoretical basis, easy to readers in-depth understanding of discrete cosine transform, discrete wavelet transform and Contour let transform content.(2) DCT-based Cox algorithm is improved, with the Zig-Zag policy to replace the Cox algorithm embedded in the Max strategy to achieve the blind test results, achieved good robustness. A joint DWT and ICA of multiple digital watermarking algorithm by embedding multiple watermarks to ensure the carrier's more than copyright, and the number of watermark to embed a watermark into a single carrier, the embedded watermark is not visible nature, the various attacks have shown good stability.(3) exploring the transformation of the basic theory Contour let, a Contour let transform based adaptive watermarking algorithm, embedded in the choice of a compromise position to consider the robustness and transparency of the conflict between the watermark embedded in the regional selection play an important role in image reconstruction region is rich in texture regions.A large number of experimental results show that the proposed watermarking algorithm have shown a variety of robust and non-visibility.
Keywords/Search Tags:digital watermarking, discrete cosine transform, discrete wavelet transform, Contour let transform, robustness, invisibility
PDF Full Text Request
Related items