Font Size: a A A

Research And Application Of Digital Watermarking

Posted on:2014-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2248330395997473Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Since the1990s, with the transformation of the social background, and increasingpeople’s living standards, the digital watermarking technology is developing rapidly. Since theemergence of the first computer, the rapid progress of digital technology makes humansociety upon which the survival of a variety of media such as text, sound, images and videocan be another form--0\1this form of digitized, stored and dissemination. People by avariety of state-of-the-art multimedia technology of these materials processing, correction,storage, query and transmission. In the past two decades, the emergence of the World WideWeb makes storage, dissemination and become extremely fast and convenient access to theseresources.Great wealth of information as well as the cost to obtain this information and its low cost,at the same time bring great enjoyment to the people, but also created digital resources is easyto copy, easy to modify and easy to spread ills brought many problems and challenges,intellectual property issues such as digital content and digital works, secure transmission,authenticity and integrity issues.The traditional way to solve these problems is evolved by the cryptography dataencryption technology, namely the use of various encryption algorithms to encrypt digitalinformation distributed to legitimate users, and then the corresponding key, no key or keynotis correct is unable to get the digital data of the original. Digital encryption technology tobecome mainstream in the field of digital data security technology, digital encryption,however, has been clearly stipulated period and scope of protection of the original, that islimited to the transmission and distribution process, out of this process can not be theirprotection; at the same time more and more on the network the password cracking also have alarge impact on the practical application of the technology.To address these deficiencies, the digital watermarking technology to develop. Commonredundant data in the digital information, digital watermarking technology will these data andauthentication information, copyright information and other representative, randomly,imperceptible and permanently embedded into the original digital data has reached thepurpose of encryption. The information that is called "embedded watermark information, thisinformation generally does not affect the use of the original data. The rapid development ofintellectual property protection and information security technology in the multimedia data,also used in a number of areas of the hide such as communications, video surveillance,transaction tracking, digital fingerprinting and content identification.This paper is based on this, the performance of the digital watermark, the content and applications, especially for the quantization index modulation watermark QIM and distortioncompensation quantization index modulation watermark DC-of QIM introduced, the analysisand experimental comparison synthesis papers.Chapter I describes the meaning and context of the study of digital watermarking, itssignificance in digital works on property rights and knowledge of safety, and then introducethe concept of digital watermarking and pointed out several key performance of the digitalwatermarking algorithm characteristics. Then, this chapter details the research status at homeand abroad on digital watermarking, including Europe and the United States and Japan andother developed countries engaged in research in this area of digital watermarking supportlarge-scale national projects, as well as domestic and foreign universities, research institutes,and leading academic journals and international conferences. In After This chapter explainsthe digital watermark trends, Finally this paper the main work and innovation, as well as thedetailed structure of the whole paper and the summary of this chapter.Chapter II details the detailed classification and various types of digital watermarkwatermark source, purpose and distinction. Then, this chapter details the general model of thetraditional model of communication systems and digital watermarking system, a combinationof both communication system model is mapped from the digital watermarking system model,pointed out that the watermark embedding step of this model, and detailed instructions thismodel watermark detection and non-blind detection step and flowchart; then given based onthe concept of the digital watermarking model with additional information communicationsystem and its source, is given after watermarking model based on the multiplexedcommunication system concepts, sources, characteristics and differences; Finally, ChapterSummary.Chapter III of this paper begins with a brief introduction of meaningless the watermarksand meaningful watermark. Then, the general model of digital watermarking for the lastchapter, the chapter details the airspace in the digital watermark embedding watermark andtransform domain watermarking method, including their concepts, principles, processes,advantages and disadvantages, and related algorithms, and for airspace watermark in twotypical algorithm LSB algorithm and the Patchwork method, as well as two typical transformdomain watermarking algorithm DCT transform domain watermark DWT transform domainwatermarking detailed description of their sources, the purpose of the basic idea, embedding,extraction and detection process, and detailed examples and conclusions. Next chapter detailsthe meaningless digital watermark detection watermark detection and meaningful watermarkdetection. Meaningless watermark detection in common methods: correlation-basedwatermark detection, the detailed description of its origin, the formula, the correlationdetector configuration diagram of the watermark, the optimum detector conditions, difficulties,advantages and disadvantages, and evaluation criteria, but also to out the probability of falsealarm and missed probability of the detection algorithm schematic and processes, as well asthe corresponding analysis and conclusions, and also to determine the probability of false alarm and missed probability of detection threshold criteria. After a brief introduction of therole and significance of meaningless watermark Finally, Chapter Summary.Chapter IV first introduces quantization watermarking source development, the conceptof the role, advantages and disadvantages related algorithms, followed by quantization indexmodulation QIM algorithm and its development of the distortion compensation-quantizationindex modulation DC-QIM algorithm principles and processes. Next, this chapter shows thatthe two parameters of the trellis code structure, and proposed to evaluate the the QIM hiddenand robust way to self-similar trellis code construction method and "Construction A" trelliscode construction method. After that, this chapter briefly describes the principles andprocesses of the two methods, and at the last Chapter Summary.Chapter V summarizes the two main research for this article, and pointed out that thenext four-point improvement on the proposed algorithm and two improvements on thestructure of the paper.In this paper, digital image processing and other technology, current digital watermarkresearch background, significance, difficult and hot and the main methods were studied indetail, and propose a new algorithm to get a good result in the mainstream library, and in thepaper last give a summary and outlook. Work and contribution of this paper is to broaden theresearch direction of the digital watermark, enrich their research ideas, has a certain meaningand value, as well as its applications in the Internet security provides an effective method andmeans.
Keywords/Search Tags:Digital Watermarking, Quantization Watermarking, Quantization Index, Paradigm, Distortion Compensation
PDF Full Text Request
Related items