Font Size: a A A

Research Of Watermarking Based Image Authentication Technology

Posted on:2017-12-05Degree:MasterType:Thesis
Country:ChinaCandidate:J Z HeFull Text:PDF
GTID:2348330536476735Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology,multi-media technology and internet technology,The storage,reproduction and transmission of the Digital multimedia information has become very convenient.As the main multimedia product on the internet,Digital images can be edited,modified,copied and distributed with no restriction by the image processing tools such as PS.Made it difficult to determine the authenticity and reliability of the image content.Thus,How to protect the authenticity and completeness of the multimedia information data effectively has attracted people's highly attention.As a research hot spot in recent years,Digital watermarking based image content authentication technology plays an important role in protection of the multimedia information's security and authentication of the multimedia data content's reliability and integrity.This paper mainly studies in the digital watermarking based image content authentication technology,The main work includes the following several aspects.Firstly,Research background and research significance and development situation at home and abroad of the digital image watermarking technology is introduced,and we also gives a lot of digital image watermarking's characteristics,classification,basic principle,and performance measurements.Secondly,The characteristics of human eye vision system in the wavelet domain is been Studied,On the basis of that,An HVS features based harf-fragile digital watermarking algorithm is proposed.The detection watermarking is generated from the image content features,And is embedded into the low frequency subband after the image's wavelet decomposition.In the process of embedding,The watermark's embedding strength is been controlled according to the JND value of the wavelet coefficients at the embedding location.Experiments shows that our algorithm has good invisibility and robustness,and is able to resist the common image processing operations such as JPEG compression,Median filtering.and also has good effect in detect malicious tampering.Thirdly,Based on the analysis of the existing image authentication watermarking algorithm which based on the compressed sensing,A CS-DWT based content recoverable watermarking algorithm for image authentication is proposed,The block by block compressed sensing is been used to generate the recovery watermarking for each image block.And the recovery watermarking is then embedded into the CbCr component of each image block's mapping block.The detection watermarking is generated from the image content features,And is embedded into the low frequency subband after the image's wavelet decomposition.Experiment results show that our algorithm can not only has good robustness to conventional image processing operation such as JPEG compression,Filtering,Noise addition.but is also can detection and positioning and recovering the vicious tampering.Then,Based on the analysis of existing image authentication watermarking algorithm based on the Contourlet domain,A contourlet transform based watermarking algorithm for image authentication is proposed.The recovery watermarking is generated from the low-frequency subband coefficient after image block's contourlet transform,And is embed into the direction detail subband of each image block's mapping block after Contourlet transform.Then the tampering detection watermarking is embedded into the low frequency sub-band of the carrier image after Contourlet transform.Simulation results show that the algorithm has good robustness to conventional image processing operation such as JPEG compression,Filtering,Noise addition while ensure the invisibility of the watermarking.And can positioning and recovery the malicious tamped area precisely at the same time.At last,We summarized the research contents of this paper,And made a prospects for future research.
Keywords/Search Tags:Image authentication, Semi-fragile watermarking, Tampering detection, Tampering location, Tampering recovery
PDF Full Text Request
Related items