Font Size: a A A

The Study And Implementation Of The Algorithm Of Digital Image Watermarking Based On Double Encryption

Posted on:2013-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:J F HuiFull Text:PDF
GTID:2248330395955591Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and internet, the security of digital products andcopyright protection faces a serious challenge. This problem needs to be solved urgently.Digital watermarking technology is a new and effective way to protect digital products.Therefore, the study of digital watermarking technology becomes a focus in the filed ofinformation security. The main contents include the following:(1) This paper briefly introduces the basic knowledge of the digital watermarkingtechnology and makes an analysis of the theory, characteristics, classification, frame andtypical algorithm of this technology, it also illustrate the outside malicious attack.(2) By study the shuffling techniques and chaotic system, this paper introduces thealgorithm of digital image watermarking based on double encryption. This algorithm usesthe Arnold transformation to make watermarking information position scrambling, and thusrealizing the first encryption. By the application of chaotic system in the sequence ofLogistic, the second encryption is realized. By using the features of human visual systemand wavelet technology and analyzing the coefficients after wavelet decomposition toextract image texture in the region, where the double encrypted watermark is embedded, thispaper has designed the algorithm of digital image watermarking based on double encryption.It is very effective to prevent common outside malicious attacks.(3) Through Matlab simulation experiment and the results analysis of experimentaldata and comparison with the similar algorithms, the proposed algorithm has betterrobustness. It can fully protect the important texture region of the image and achieve theexpected design target.
Keywords/Search Tags:digital watermarking, Double encryption, discrete wavelet transformrobustness
PDF Full Text Request
Related items