Dissertation > Excellent graduate degree dissertation topics show
Research on Dual Watermarking Image Authemtication Algorithm Based on DWT
Author: WangJunQiang
Tutor: LiaoShuJian
School: Taiyuan University of Technology
Course: Signal and Information Processing
Keywords: DWT LSB Dual watermarking Image Authentication Image restoration
CLC: TP309.7
Type: Master's thesis
Year: 2010
Downloads: 83
Quote: 2
Read: Download Dissertation
Abstract
Unsatisfactory status quo for digital image authentication algorithm based on digital watermarking ability to restore the original image content, this paper presents the three digital image authentication algorithm based on discrete wavelet transform, they have strong tamper detection and recovery capabilities. To achieve the recovery of the tampered image, there should be a sufficient number of image information. And an image data embedding capacity is limited, all the information of the To image selfembedding, without affecting the visibility of the image, and must be efficient data compression. Wavelet transform multiresolution decomposition of the good characteristics of both a significant compression of image data, but also good to keep the image of the majority of the information. The latest image compression standard JPEG2000 is based on discrete wavelet transform. Thus article choose to use a discrete wavelet transform to perform the extraction of the image content, i.e. through two discrete wavelet transform, to obtain the lowfrequency subband of the image, as a digital watermark from embedded in the image itself. The first algorithm is the least significant bit of the airspace embedding algorithm, the image extracted through the second wavelet transform of the image information of the embedded image. To achieve an effective data embedded embedded Information and embedded space must first treat the study to see if the two match. Select 5 512 × 512 256 gray standard test images to study lowfrequency subband image obtained after secondary discrete wavelet transform information. After the study found that 5 image transform low frequency sub band wavelet coefficients are nonnegative, and strictly between 01024, most of which coefficient distribution between 100800. If the low frequency wavelet coefficient matrix binary bit plane decomposition, you can get 10 binary matrix equal to the low frequency coefficient matrix size. And the original image after a second wavelet decomposition, the coefficient matrix size of the lowfrequency subband becomes 1/16 of the original image. Binary matrix, to be embedded in the least significant bits of the original image plane 10 matrix size of the low frequency coefficients of the capacity of the space is sufficient, but also a sufficient margin on the embedding position encryption choices. So the watermarking algorithm is feasible. Are without loss of information due to the watermark embedding and extraction process, so eventually the complete image information extracted from the watermarked image. The second algorithm is DWT transform domain embedding algorithms. As the human eye is more sensitive to lowfrequency information, in which the embedded watermark information, it is easy to be noticed. The high frequency information easily by low pass filtering filtered off. Then select the watermark information is embedded into the intermediate frequency subband. This article select LH2, HL2, HH2 sub to bring embedded watermark information LL2. The LL2 wavelet coefficients than larger range of 01024 embed difficult. This paper presents a thought LL2 wavelet coefficients of ten one hundred decomposition, thus effectively reducing the embedded difficulty. LL2 decomposed into a matrix, respectively, after the scrambling key participation of all median, respectively embedded in LH2, HL2, an HH2 subband of the bits of the wavelet coefficients, and then carried out the second wavelet inverse transform embedded watermark information matrix. The third algorithm is effective integration of the first two the airspace and transform domain algorithm proposed dual the versatility watermark digital image authentication algorithm. This algorithm can be provided from the the exact certification and the two levels of the selective authentication for authentication of the image, effectively improve the amount of image watermark information embedding and image tamper detection and recovery, has a good effect.

Related Dissertations
 Research on LearningBased LowLevel Vision Problem,TP391.41
 Image Restoration Method Research and Its Application Based on Probability PCA,TP391.41
 Based on public safety characteristics of millimeterwave radiation image,TP391.41
 Helicopter main gearbox fault diagnosis and failure prediction technology research,V267
 Low Bitrate and Highfidelity Compression Method for Remote Sensing Image,TP751
 Design and Implementation of Computer Screen Recorder Based on FPGA and ARM,TP216.2
 Research on Watermarking Algorithm for Images Based on DWT and HVS,TP309.7
 Study on Symbol Rate Estimation Algorithms of Communication Signals,TN911.23
 Research on Image Watermarking Against Geometric Attacks Based on Dual Transform Domains and Fractal,TP309.7
 The Study of Binary Image Authentication Watermarking Based on Chaotic Maps,TP309.7
 Research on the Approaches of Digital Audio Watermarking,TP309.7
 Study on Lowpower DWT Architecture and Hardware Implementation for JPEG2000,TP391.41
 Multispectral Palmprint Recognition Using the Quaternion Model,TP391.41
 Research on Application of Text Digital Watermarking Technique in Military Communication,TP309.7
 The Algorithm of Digital Watermark Technology on Image Authentication,TP309.7
 VLSI Implementation of JPEG2000 Image Encoder,TN919.81
 Research on Communication Method of Audio Information Hiding,TN919.8
 Digital Watermarking Technology Based on Support Vector Machine,TP309.7
 Research on Application of Digital Watermark in Variable Data Printing,TS805
 Research on Digital Image’s Robustness Watermarking Algorithm Based on QR Barcode,TP309.7
 Research on Algorithm of Embedding Watermark in Digital Audio Signal,TP309.7
CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net Mobile
