Font Size: a A A

Information Hiding Technology In Information Security

Posted on:2008-08-23Degree:MasterType:Thesis
Country:ChinaCandidate:Q WuFull Text:PDF
GTID:2208360215997937Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Modern information hiding technology becomes an important research topic becauseit provides effective ways to solve the new problems in the field of information hiding.Digital watermarking technology, one of the important branches of information hiding,is studied in this paper, and some watermarking algorithms are put forward in this paper.These algorithms include:1. A Blind watermarking algorithm based on DCT. Achieving blind extractingwatermarking algorithm would reduce the robustness and invisibility. The key of thisalgorithm is to minimize such losses as much as possible to reach the requirement ofapplications. This paper has taken the following measures to improve the performance ofthe algorithm: Use chaotic sequences to scramble watermark. This. method improves therobustness of the algorithm; Based on making the best of the relationship among the DCTcoefficients and doing many experiments to find the most appropriate DCT coefficients,this algorithm realizes a good compromise between the robustness and invisibility. Theexperiments showed that the performance of the algorithm can reach the designrequirements.2. A blind grayscale digital watermark algorithm. The algorithm attempted to embedDCT coefficients of watermark into the high frequency coefficients of discrete wavelettransform. The algorithm combined the advantages of wavelet transform and DCT andreached a better robustness and invisibility.3. An improving algorithm for grayscale digital watermark. This improved algorithmchose the strongest low-frequency coefficients of discrete wavelet transform and embeddedthe highest-energy DCT coefficients of watermark into these coefficients. Stimulatingexperiments showed that the improved algorithm improved the robustness on the premiseof the same invisibility.
Keywords/Search Tags:Information Security, Information Hiding, Digital Watermarking, Chaotic Shuffle, Discrete Cosine Transform, Wavelet Transform, Robustness, Invisibility
PDF Full Text Request
Related items