Font Size: a A A

Dual Authentication Algorithm LSB And Research Combined DWT Watermark Image

Posted on:2014-12-15Degree:MasterType:Thesis
Country:ChinaCandidate:L F WangFull Text:PDF
GTID:2268330425983701Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The development of modern information technology and the emergence of a variety of image processing software, so that the image of false images and tampering becomes increasingly easy, how to identify the received image is the original image been tampered with, whether it is a man-made forged through a variety of image acquisition device images collected various pictures and spread through the network is real, become the subject of attention. Thus making the image verification has become a hot research topic.This issue through research and analysis of the current mainstream image verification technology, drawing on digital watermark authentication technology and information hiding technique proposed combination of LSB and DWT digital watermark verification technology, the implementation of the original image by combining the advantages of the airspace transform domain twofold watermark embedding, the first heavy watermark based on DWT transform domain embedding the second weight watermark embedding based on LSB airspace, in order to improve the security Department and hidden watermark, the first re-DWT domain watermarking chaotic encryption, the first double LSB domain watermark Arnold scrambling. Dual watermarking has semi-fragile characteristics, while a relatively large embedded watermark information amount. And experimental verification for the the common shear coverage tampering image means better watermark extraction and tampered region localization and tampering recovery.By experiment, the airspace and transform domain watermarking algorithm has the advantage of the proposed algorithm can be combined with higher peak signal-to-noise ratio and low missed rate and false alarm rate compared to other multiple watermark embedding algorithm. Embedding the dual watermark the original image based on the human visual system, there is no significant distortion and image quality, and the basic integrity of the extracted watermark information, effective in the recovery of the tampered image. The proposed dual watermarking algorithm achieved a certain robustness in the with good watermark invisibility prerequisite to achieve a large watermarking capacity.
Keywords/Search Tags:Digital watermarking, Robustness, LSB, DWT, Multiple watermarking
PDF Full Text Request
Related items