Font Size: a A A

Based On Dct Domain Frequency Component To Embed The Binary Watermark Design And Realization

Posted on:2009-10-15Degree:MasterType:Thesis
Country:ChinaCandidate:L N ZhaoFull Text:PDF
GTID:2208360245955945Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The digitalization offered great convenience for storing multimedia material,and greatly increased the accuracy and efficiency of information expression.As Internet become more and more popular,the depth and width of multimedia information's communication has reached a new extent it never had,also,more form of its presentation and publish become present.Now people can present their work,important information and trade via Internet,but the problems coming with such convenience are severe either.Copyrights are more frequently broken;works are easier to be sophisticated.It becomes a emergency that how to protect intellectual property rights for image, audio,video products.Encryption and Copy-proof mechanism cannot completely solve this emergency:encryptions only protect data in transmission,and copy-proof is likely to be breached easily.So,how to efficiently protect intellectual property rights while making full use of Internet, has won great recognition.Digital Watermark technology solved this kind of problem properly.As one of the information security technologies,Digital Watermark effectively bypassed other technologies' drawbacks,and won higher academic and economical value.Digital is a new technology to protect intellectual property rights,it confirm a work's owner by embedding copyright information-the watermark,into the product.Information embedded within are unseen and undetectable by usual means,but can be extracted or detected by equipments.In recent years, this technology has become a hotspot in the field of multimedia information security.This article focuses on the study of digital watermark technology mainly in image protection, it contains the following parts to describe and analyze this technology.At first,we introduced using field of digital watermark and analyzed current situation in the world.Secondly,we introduced the common using attacks technology of digital watermark.Thirdly we introduced evaluation standards and methods for digital watermarking,digital watermarking based on DCT domain,basic idea of DCT watermark algorithm,selection of coefficients and position of watermark embedding. Experiments shows this algorithm not only offer great robustness after embedding but also needs no original image on watermark extraction.At last,Detailed introduction of test and evaluation of image watermark system,based on watermark embedded image quality,robustness test, performance assessing,standardized testing image base and standardized testing software base.
Keywords/Search Tags:the security of information, digital watermark, robustness, DCT(Discrete Cosine Transform), digital watermark attack
PDF Full Text Request
Related items