Font Size: a A A

The Research On Digital Watermarking Technology For Copyright Protection Of Image Resources

Posted on:2016-10-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2297330470969033Subject:Education Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of multimedia information technology, digital learning resourcesare vulnerable to malicious tampering or forgery, which have seriously harm to the interests of copyright holders and other issues related to intellectual property protection has also been increasingly the more attention. This paper centers on “the research on digital watermarking technology for copyright protection of image resources”, conducts an in depth and intensive research on the image copyright protection technique.1.Based on quaternion Exponent moments(QEMs) and least squares support vector machine(LS-SVM), we propose a color image watermarking scheme. In the process of correcting the watermarked image, Calculate 8 low-order quaternion exponent moments modulus of watermarked color image and let them be the input vectors. Then combine with the LS-SVM theory,and the LS-SVM model can be obtained by training. Correct the geometric distortions of watermarked color image and extracted digital watermark. Simulation results show that this method can ensure the digital watermark information and imperceptibility. At the same time, it is robust against the geometrical distortions. This method makes its have the characteristics of blind detection method to extract the watermark, which effectively protect the safety of the digital image copyright.2.A robust digital watermarking algorithm based on local invariant regions is proposed. The algorithm regard the probability density and polar harmonic transforms(PHT) theory as the foundation. First, obtain the feature point set of the original gray image and make them as the center. Then according to the autocorrelation matrix, the local feature region is constructed. Let the constructed oval feature regions mapped to a circular area. Calculating each circular feature area’s PHT and selecting a part of the stable moments of the PHT. Then it takes the method of the quantization for embedding the watermark. Simulation results show that this method can be very good resistance to conventional attacks and geometric attacks. It has effectively improved the accurate rate of this algorithm.
Keywords/Search Tags:Digital Watermarking, Geometric Attacks, Quaternion Fourier Transform, Quaternion Exponent Moments, Polar Harmonic Transforms
PDF Full Text Request
Related items