Font Size: a A A

Study Based On The The Shamir Theory Of Digital Watermarking Technology

Posted on:2011-10-11Degree:MasterType:Thesis
Country:ChinaCandidate:Q J YuFull Text:PDF
GTID:2208360305459374Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of networks technology and computer information technology, human society has already entered into a new one era of digital information. With easy access, copying simple and rapid dissemination, the works based on digital media have enriched the people's life enormously. But the benefits of digital works'composers and users are injured seriously because of malicious acts in the opened and shared computer networks. Therefore, the protection problem of the owners having the rights with multimedia information becomes one of the most important research subjects.In this paper, the static image watermarking techniques are studied, mainly the following:(1) Introduced the concepts of digital watermarking, research background and the present status.(2) Compared the definitions, classifications, applications and versatile models in different watermarking system, and introduced some common attack methods, evaluation criteria and typical algorithms in digital watermarking.(3)A more detailed description, in wavelet analysis theory, was introduced. It is include the concept and properties of wavelets, the application in digital image processing and the features of multi-resolution.(4) Analyzed the shamir theory and threshold scheme, and proposed DWT-based digital watermarking algorithm. Based on the idea of secret sharing information divided-storage technology, the secret information could be embedded into the carrier images.(5) Improved the image watermarking scheme in the previous of non-blind detection, and designed a new blind detection arithmetic based on shamir theory. Experiments prove that this algorithm is not only good for the invisibility of digital image watermarking, but also has a better robustness in image noise, compression and cutting.(6) To improve the robustness of the rotation attack, the scheme of DWT and SVD based on shamir theory was proposed. Experiments show that the algorithm has good robustness.
Keywords/Search Tags:Digital watermarking, Singular value decomposition, Shamir theory, Information divided-storage, Wavelet transform
PDF Full Text Request
Related items