| In recent years, digital watermarking technology has become a hot research field in information security. Being a multi-media copyright protection and the effective method of authentication information, digital watermarking technology is an emerging area of research with high scientific value and business potential. And there are many contents needed to be studied. Improving the robustness and seeking for better watermarking algorithms are researching goals. Digital watermarking gray image is studied in this paper .Both the Wavelet transform algorithm and the Fourier transform algorithm are studied. The improved application of the algorithms is also addressed.The digital watermarking technology's background was analysised. The brief description of the information hiding and digital watermarking technology's basic concept, the conditions of digital watermarking, the digital watermarking technology features, and the system model were described. According to digital watermarking technology development and application areas, this thesis focus on the following object: static gray image digital watermarking. Based on the theory of wavelet transform and Fourier transform, this thesis attempt to apply the different frequency bands, the wavelet transform, and the Fourier Transform to the gray scale image at the same time. This thesis describes the methods of design principles, the specific steps and methods embedded extraction process, and the advantages of the above method.Matlab 7 is chosed as the simulation tool and the test edge testing tool is Prewitt. Some basic concrpts of Matlab is introduced, including its main and the developmement procedures. Some example codes of the simulations are describpted. To test its feasibility, a large number of experiments and the correlation test results were given. The experimental results proved that our method can meet the basic requirement and has good robustness.It is suggested that the image digital watermarking technology can be further changed to improve, watermark information other attributes such as color, vector method can also be added in the model to enhance the anti-attack capability; they can even work with artificial intelligence technology, such as in the development of new key. |