Font Size: a A A

Research On Digital Image Multiple Watermarking Method Based On Wavelet Domain

Posted on:2015-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:H R XuFull Text:PDF
GTID:2268330428490999Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Today Information hiding technology is one of the most important research fields of theinformation science. Its main purpose is to hide the secret information which our eyes can’tsee. Digital watermark technology plays more emphasis on the robustness of the secretinformation compared to the information hiding technology. The hidden information can’t befound by our eyes, we can obtain the information by the method of detection. This techniqueplays a crucial role in copyright protection. Digital watermarking appends some informationinto the digital information to be protected directly to realize the copyright protection andinformation security,which was invented in the initial stages of the last decade of20thcentury with the rapid development of Internet and multimedia and soon brought a researchupsurge. Digital watermarking can be widely used in many ways, such as copyright protection,fingerprint adding, caption and remark, tamper prevention, access control, communicationsecurity and so on.Wavelet analysis is a new kind of time-frequency technology, its basis is FourierTransform. The space-frequency location has been widely used in image processing. Digitalwatermarking schemes in transform domain mainly was based on Discrete Fourier Transform(DFT) and Discrete Cosine Transform (DCT) ago,now Discrete Wavelet Transform (DWT)becomes primary too.In this paper, the work mainly focuses on the research of wavelet domain, and the binaryimage is selected as the watermark and an algorithm embedding multiple watermarks basedon DWT is designed in the paper. The used watermarks contain visible watermark, invisiblerobust watermark and invisible fragile watermark. Firstly the visible watermark is embeddedinto the original image, and then the invisible watermarks are embedded. Before the invisiblewatermarks are embedded, the Arnold must be scrambled. Finally a set of algorithms havebeen realized by simulating some common attack using Matlab combined with the Cprogramming language, and the results have been evaluated.The simulating results show that the algorithm can withstand some common attacks and issafe and robust, has practical application value.
Keywords/Search Tags:DWT, robust watermark, fragile watermark, Scrambling
PDF Full Text Request
Related items