Dissertation > Excellent graduate degree dissertation topics show

Research on Digital Watermarking Technique of Static Image in Wavelet Domain

Author: WangTao
Tutor: MaYiDe
School: Lanzhou University
Course: Communication and Information System
Keywords: digital watermarking DWT copyright protection wavelet zero-tree chaotic human visual system model cascade extraction gray image watermark
CLC: TP309.7
Type: Master's thesis
Year: 2006
Downloads: 91
Quote: 5
Read: Download Dissertation


People are enjoying unprecedented convenience and happiness brought by explosive increase of digital media. At the same time they are also confronted with some new challenges. Especially, Digital media product copyright protection is an impending problem needed to be solved, but it cannot be solved effectively by using Cryptology, Digital Signature and other traditional techniques, a new technique — Digital Watermarking emerged as the times required. The wavelet technology has been improved rapidly since 1980s, and now it has been used widely in image processing. Wavelet transform is the key technologies in the new image compressed standard—JPEG2000, now more and more people focus on the watermarking based on the DWT.In this thesis the techniques of digital watermarking in discrete wavelet transform domain is studied. The contribution of this thesis is following:An image watermarking algorithm based on significant wavelet tree was proposed. The binary watermark images with copyright information were embedded into significant wavelet tree with different chaotic sequences. The extraction of.watermark used the method of cascade extraction and Variance control, improved the accuracy and rate of extraction. Experiments show that the watermarked image is invisible and robust to common image manipulations.The second algorithm used a gray image as the watermark, dealt with it by Arnold confusion and wavelet compression. Based on the human visibility model, watermark was added in sub band images with different directions and levels, improved the robust of watermark. The advantage of the algorithm was it utilized HVS to embedded huge data into original image and experimental results show that our scheme has very excellent effect.

Related Dissertations

  1. The Research on Reliability of Low-Voltage Power Line Communication,TM73
  2. The Design and Implement of Highway Capture with Digital Watermarking Application,TP311.52
  3. On Network Copyright Protection,D923.41
  4. Research on the Chaotic Spread Spcetrum Signals Blind Estimation Algorithm and the Design of Ranging Scheme,TN914.42
  5. Generalized Synchronization of Complex Dynamical Networks,O415.5
  6. Big Bang Search (BBS) Intelligence Optimization and Its Improvement,O224
  7. Study on Short-Term Power Load Prediction Based on Support Vector Regression Modeling Method,TM715
  8. Low Bit-rate and High-fidelity Compression Method for Remote Sensing Image,TP751
  9. Research on Intellectual Property Protection of Computer Software,F49
  10. Research on China’s Ebook Profit Model in the Digital Copyright Environment,G237.6
  11. Design and Implementation of Computer Screen Recorder Based on FPGA and ARM,TP216.2
  12. Research on Watermarking Algorithm for Images Based on DWT and HVS,TP309.7
  13. Research and Improvement of Visible Reversible Digital Watermarking Algorithms,TP309.7
  14. Research and implementation of multi-resolution digital image watermarking algorithm based,TP309.7
  15. Research and Realization on Video Watermarking Techniques,TP309.7
  16. The Watermarking Technology Research of Raster Digital Maps Resisting Cropping Attacks,TP309.7
  17. The Study of Digital Raster Map Watermarking Based on Wavelet Analysis,TP309.7
  18. Digital Watermark Algorithm Based on Wavelet Transfomation,TP309.7
  19. Researches on Spectrum Spreading Code Design for Spectrum Spreading Communication,TN914.42
  20. Study on Symbol Rate Estimation Algorithms of Communication Signals,TN911.23
  21. Research on Industrial Designs Protection of Intellectual Property,D923.4

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net  Mobile