Dissertation > Excellent graduate degree dissertation topics show

Image Authentication Algorithm Based on Momentinvariant of Histogram and SVD

Author: HanXiuLi
Tutor: ZhangCaiMing
School: Shandong University
Course: Applied Computer Technology
Keywords: Image Authentication Digital watermarking Histogram invariant moments Singular Value Decomposition Geometric attacks
CLC: TP391.41
Type: Master's thesis
Year: 2010
Downloads: 67
Quote: 0
Read: Download Dissertation

Abstract


For the purposes of the multimedia data, the authenticity of the data is particularly important, in many cases, we need to verify the authenticity of the image (also called integrity). The current image authentication based on digital watermarking method introduced mainly singular value decomposition combined with PKI robust image authentication method based on JPEG image authentication methods and invariants and digital watermarking based on histogram invariant moments and singular Value Decomposition image authentication method. Image authentication system performance evaluation and analysis of the advantages and disadvantages of these three methods can be seen more in line with the performance indicators of the image authentication system image authentication method based on the histogram invariant moments and singular value decomposition. The histogram invariant moments and singular value decomposition-based image authentication method conducted in-depth research, and a definite improvement. Since the histogram of the image invariant moments having constant characteristics, so here we proposed using histogram invariant moments a new image as a watermark authentication method using histogram information to define the invariants. The numerical analysis of the singular value decomposition (SVD) is a matrix diagonalization of numerical algorithms. Using singular value decomposition of the operator and the inverse to the watermark embedding and extraction, in order to achieve certification to the image. First, the image is divided into blocks, were extracted from each image histogram invariant moments, combined as a digital watermark, the watermark embedded in the original image and then use the method of singular value decomposition, and finally through the Y value of the image has been tampered with and calculating a correlation coefficient of two methods to determine the graphic has been tampered with, and has been tampered with specific location. Resistance to several attack capability of this method of theoretical analysis and experiments were carried out in Matlab7.0 In the trial, the embedded watermark image tampering, analysis of the image and the original image has been tampered with, Y value and the correlation coefficient to determine whether the image has been tampered with, as well as the position has been tampered with, then the image has been tampered with transposition, mirroring zoom back geometrical attacks can still be detected by the Y value and the correlation coefficient whether the image has been tampered with and position has been tampered with. The experimental results show that this algorithm is applicable to a BMP image tamper detection, and can accurately determine the position of the image has been tampered with, and the ability of the algorithm to resist geometric attacks of.

Related Dissertations

  1. Research on Contourlet Transform and Its Application on Image Processing,TP391.41
  2. Nonlinear color image watermarking detection program of study,TP309.7
  3. Research on Security Policy in Wireless Sensor Networks Based on Digital Watermarking Technology,TN915.08
  4. The Design and Implement of Highway Capture with Digital Watermarking Application,TP311.52
  5. Research on Approaches of the Subjective Automated Assessment,TP391.1
  6. SIFT-based digital watermarking algorithm,TP309.7
  7. Digital watermarking-based content protection system terminal digital interface,TP309.7
  8. Protection for critical electronic document grouping anti-collusion digital fingerprinting algorithm,TP309.7
  9. Based on kernel regression and non- local method of image denoising,TP391.41
  10. Web news hot discovery system design and implementation,TP393.09
  11. Blackberry mobile phone operating system based on Security Mechanism,TP309.7
  12. Iris feature -based digital watermarking algorithm,TP309.7
  13. Subspace-based analysis of Narrowband Interference Suppression in Spread Spectrum Communications,TN914.42
  14. Based on the H.264 standard video watermarking technology in the network learning platform in the Application and Implementation,TP309.7
  15. Digital watermarking based on neural network algorithm and implementation,TP309.7
  16. Chaotic systems based digital image watermarking algorithm,TP309.7
  17. Signal Processing Method Based on Singular Value Decomposition and Its Application to Mechanical Fault Diagnosis,TH165.3
  18. The literature of resources for research and application clustering system,TP391.1
  19. Research on Subspace Analysis Based Face Recognition Algorithm,TP391.41
  20. Geometrically Robust Image Watermarking Algorithm,TP309.7
  21. SVD -based digital watermarking algorithm,TP309.7

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Information processing (information processing) > Pattern Recognition and devices > Image recognition device
© 2012 www.DissertationTopic.Net  Mobile