Font Size: a A A

Based On Statistical Analysis Of The Digital Watermark Detection Technology

Posted on:2008-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhangFull Text:PDF
GTID:2208360215497813Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of digital technology and networking technology, Solving thecorrelative problems, such as copyright protection, intergrality authentication, privacycommunication and etc,, is becoming more and more urgent. Information hiding can solvethese problems. Digital watermarking, which originates from steganography, provides anovel way for the protection of intellectual property rights, and becomes a hot spot in theresearch field of multimedia data security in recent years.We first describe the basic concepts of Steganography and digital watermarking, andintroduce some basic concepts of digital image watermarking. Then we expound thedefinition, background, classification and requirements about digital watermarking . Wepropose a general framework of digital watermarking system. Then, we analyze the state ofart of digital watermarking algorithms. Following this, we give a discussion about therobustness of watermarks, i.e., attack analysis. We still discuss some possible researchdirections. Finally, we outline the thesis.We present the idea of Stegnalysis of digital image watermarking. We first introducethe background of Stegnalysis and some related work. By constructing a algorithms ofStegnalysis, all kinds of image frequency-domain watermarking can be detected. Thealgorithms described in the following chapters are all based on this parameterizationalgorithm. We introduce the background and related work about DCT-based andDWT-based digital watermarking technology. Then we apply the algorithms in Chapter 2to detect the Steganography of digital image watermarking. The experimental results showthat the algorithm is effective and robust.We also present the related work to do with the digital image watermarking afterStegnalysis. We introduce the change of watermarking by noise added to the digital image.
Keywords/Search Tags:Digital Steganography, Digital Watermarking, Attack analysis, Cryptography, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Steganalysis
PDF Full Text Request
Related items