Font Size: a A A

Digital Image Watermarking Technology Based On Chaotic Encryption And Wavelet Transform

Posted on:2021-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:J LiuFull Text:PDF
GTID:2518306470962399Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
With the development of global computer technology,e-commerce,finance,and communications have also brought about changes in the times,and the requirements for intellectual property protection are becoming more and more strict.In this regard,many enterprises,scholars and experts at home and abroad have proposed various methods for information security,especially in the prevention of information tampering and the protection of intellectual property rights.For example,digital watermarking is a new type of protection measure.By embedding private information such as secret information and copyright information in digital media such as voice and text,the purpose of protecting copyright and logo is achieved.However,the impact of information embedding is imperceptible to people's eyes,and the information embedded in the carrier has corresponding recovery methods,and this information is imperceptible and invisible to hackers and illegal attackers.It can be seen that digital watermarking technology can effectively protect the copyright of images and media.In order to meet the new demand for digital watermarking technology,two chaotic encrypted image watermarking systems based on discrete wavelet transform are designed in this paper.The design content of this article is as follows:(1)This paper studies a chaotic image encryption algorithm based on three-dimensional Chen-Lai system.The image was divided into Arnold scrambling and Logistic scrambling,and then the modulo diffusion algorithm was used for multiple encryptions.The plain text information was added to the initial conditions to increase the difficulty of decrypting the cipher text.Finally,the correlation test was given.,Attack complexity,differential analysis,key sensitivity test,statistical analysis results.(2)A robust watermarking algorithm is designed.For the gray-scale carrier image,the system uses the image containing copyright information as a watermark and encrypts it using a chaotic encryption system;it uses a watermark embedding technology based on discrete wavelet transform,and uses wavelet to decompose the vast majority of low-band collection images The characteristics of energy are combined with the characteristics of the human visual system model,and the embedded region of the watermark is selected in the low-frequency subband region after multiple wavelet decompositions of the carrier image;at the same time,the characteristics of the human visual system are used to achieve The adaptive embedding of watermark in the original carrier image wavelet domain is introduced.(3)A fragile watermarking algorithm is designed.First,the traditional Mallat algorithm is optimized.Since the mean value of the transform coefficients generated after the image wavelet transform is used as the initial value of the chaotic system,when the image is modified,the mean value of the wavelet coefficients will also change.The condition is extremely sensitive,and the last iteration is two different sequences,so the algorithm has certain sensitivity and positioning effect on tampering.The encrypted watermark is extracted from the image embedded in the watermark,and the encrypted watermark is decrypted by the chaos decryption system to obtain the final watermark information.In terms of the security of the watermark itself,it makes full use of chaotic and complex dynamic characteristics to encrypt it.After statistical characteristics analysis,attack complexity,differential analysis,adjacent pixel correlation analysis and key sensitivity analysis,the algorithm has good Encryption effect.Finally,the test of embedding watermark revolves around four aspects,namely image processing,tampering sensitivity,robustness,and imperceptibility,to test the designed watermark system.The test results show that the two watermarking algorithms have good robustness and vulnerability,and can resist various common signal processing operations.
Keywords/Search Tags:digital watermarking, DWT, chaotic encryption, watermark embedding
PDF Full Text Request
Related items