Font Size: a A A

The Watermark Image Watermarking Algorithm Based On Vector

Posted on:2010-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:X R MaFull Text:PDF
GTID:2208360272494549Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of the multimedia technology and Internet, the e-commerce, distance education, digital libraries and the distribution of the electronic audio-visual products had also been developed. Meanwhile, the information security has increasingly become one of people's concerns. Security problems are solved to some extent through traditional encryption methods. And the rapid development of computer technology has provided a powerful tool for code-breaking, so password security base on the conventional traditional encryption methods is facing a tremendous challenge, Digital watermark technology, a new generation of information security technology, is regarded as an effective way to protect copyright and track down the violation of copyright protection. However, the method request algorithm has strong anti-attack capability, especially for various forms of geometric attacks.This paper is based on the theory of wavelet analysis. With the stationary image digital watermark algorithm, the author proposes a digital watermark algorithm based on the vector watermark image. Firstly, the author makes an analysis on wavelet decomposition. The image is decomposed into high frequency sub-images and low frequency sub-images. Secondly, the author studies on the original watermark for vector decomposition and gets two vector sub-watermark image. Then according to the characteristics of high-frequency images, in order to improve the security of algorithm, the sub-watermark image is embedded in the use of two keys corresponding to the two sub-image. At the same time, the author makes the operation of the vector watermark and its transpose product, puts the sub-watermark image coefficients into disorder, and finally gets the image with the watermark.In order to test the robustness of the algorithm, through a series of simulation experiments on some attack methods of simple attack, removal attacks and synchronous attack, experiments show that the algorithm on a variety of attacks with high robustness, and finally the paper makes use of relevant evaluation criteria as a objective description to measure the algorithm. In short, the algorithm of thesimulation regardless of the actual or specific applications, have achieved betterresults.
Keywords/Search Tags:digital watermark, vector watermark, Wavelet decomposition, robustness
PDF Full Text Request
Related items