Dissertation > Excellent graduate degree dissertation topics show

Digital watermarking for image authentication algorithm

Author: LiuNaiCheng
Tutor: ZhouFeng
School: Kunming University of Science and Technology
Course: Applied Computer Technology
Keywords: Digital watermarking Fragile watermarking Semi- fragile watermarking Image Authentication
CLC: TP309.7
Type: Master's thesis
Year: 2009
Downloads: 30
Quote: 0
Read: Download Dissertation

Abstract


Digital watermarking technology is a new information security technology , copyright protection and content authentication is an effective method , involving a variety of subject knowledge comprehensive, high academic value and economic value . Authentication watermark technology as digital watermarking technology is an important part of the international academic community has become a hot research topic . This paper summarizes the digital watermarking and authentication watermark basics on the basis of in-depth analysis of the various existing typical algorithms home and abroad , pointing out that the main advantages and disadvantages , and through the authentication watermark technology depth research, improvement of proposed two certified for authenticity and integrity of the image digital watermarking algorithms: one is based on block DCT- fragile watermarking , the first use of DCT coefficients and Logistic mapping generation watermark information , and then the watermark information is embedded into selected among the DCT coefficients . Simulation results show that the algorithm has a good sensitivity and tampering localization capability, and image detection is simple, do not need to provide the original image and the watermark. Another is based on the JPEG compression invariant semi-fragile watermarking algorithms, this algorithm is then compressed using the JPEG standard quantization table to quantify the DCT coefficient matrix , then the encrypted matrix encrypted binary watermark information is embedded into the DC coefficient binary sequences lowest level , the algorithm robustness and fragility be fully balanced. Simulation results show that the conventional image processing algorithm is robust , while the replacement , shear and other malicious tampering with strong sensitivity and positioning capabilities . A meaningful binary watermark image as watermark information , more practical value .

Related Dissertations

  1. Research on Contourlet Transform and Its Application on Image Processing,TP391.41
  2. Nonlinear color image watermarking detection program of study,TP309.7
  3. Research on Security Policy in Wireless Sensor Networks Based on Digital Watermarking Technology,TN915.08
  4. The Design and Implement of Highway Capture with Digital Watermarking Application,TP311.52
  5. SIFT-based digital watermarking algorithm,TP309.7
  6. Digital watermarking-based content protection system terminal digital interface,TP309.7
  7. Protection for critical electronic document grouping anti-collusion digital fingerprinting algorithm,TP309.7
  8. A Vector Map Digital Watermarking Algorithm Based on N-point Mean Value,TP309.7
  9. Research on Digital Image’s Robustness Watermarking Algorithm Based on QR Barcode,TP309.7
  10. Copyright Protection Technology Research of E-book,D913
  11. Adaptive image watermarking in wavelet domain,TP391.41
  12. Digital watermarking and encryption techniques based on mobile DRM System,TN929.5
  13. The Design and Implementation of 2D Barcode Watermarking System Based on Nios Ⅱ,TP391.44
  14. A wavelet-based color image with HVS adaptive digital watermarking algorithm,TP309.7
  15. Based on SOPC implementation of digital image watermarking,TP309.7
  16. Combined with dual chaotic systems with digital signature authentication algorithm,TP309.7
  17. Watermarking technique based on military information systems security research,TP309.7
  18. H.264/SVC based digital watermarking technology research,TP309.7
  19. 3D mesh model watermarking algorithm,TP309.7
  20. Based on Chaos and Discrete Fractional Fourier Transform Digital Watermarking Algorithm,TP309.7

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net  Mobile