ImageVerifierCode 换一换
格式:DOCX , 页数:78 ,大小:51.93KB ,
资源ID:4469625      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bingdoc.com/d-4469625.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(一种稳健的基于小波变换的彩色图像数字水印算法Word文件下载.docx)为本站会员(b****1)主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(发送邮件至service@bingdoc.com或直接QQ联系客服),我们立即给予删除!

一种稳健的基于小波变换的彩色图像数字水印算法Word文件下载.docx

1、paper, A robust wavelet-based color image digital watermarking scheme is proposed. Theproposed digital watermark is a random real number of a sequence of bits embedding intolow frequency of Green component sub-band. The embedding method is based on threelevels Discrete Wavelet Transform (DWT) low co

2、efficient. A threshold is used togenerate frequency of watermarks with the compare of created frequency of DWT inembedding position. Experimental results showed that the embedded watermark is robustagainst various signal processing and compression attacks such as Salt & pepper noiseaddition, Croppin

3、g, Scaling, JPEG compression, Mean filtering, Copying and pasting andso on.Keywords: Digital watermarking, wavelet transform, Color image, Green component,Low frequency and Robustness, information hiding.3List of FiguresFigure 2.1 0.1 Schematic description of steganography.5Figure: 2.2 Communication

4、 channel for cryptosystem7Figure 2.3 Monograms figuring TGE RG.8Figure 2.4 Generic digital watermarking scheme 11Figure 2.5 Generic digital watermarking decoder .11Figure 2.6 Generic digital watermarking scheme 13Figure 2.7 Basic watermark embedding scheme .14Figure 2.8 Basic watermarking Decoding s

5、ystem15Figure 2.9 Classification of watermarking algorithms based on domain used for thewatermarking embedding process .16Figure 2.10 Classification of watermarking based on applications .17Figure 2.11 Digital watermarking requirements triangle 20Figure 3.1 Watermarks in Mark and Dollar bank notes .

6、24Figure 3.2 Visible watermark.24Figure 3.3 Invisible watermark 25Figure 3.4 Delivering Digital data to a trusted End system.26Figure 3.5 Delivering Digital data to the customer26Figure 3.6 Conflict: Alice and Bob can both detect their respective watermark in imageI28Figure 3.7 Image Lena Copying or

7、 distributing in print or electronic forms withoutwritten permission31Figure 3.8 The embedding scheme of the watermarking algorithm as proposed by Cox etal. A lot of the proposed watermarking techniques share the same model.36Figure 3.9 The wavelet pyramid of three-level image decomposition. Each le

8、vel consistsof three detail images, which correspond to horizontal, vertical, and diagonal details ofeach resolution level. xy stands for applying filter x in row direction and filter y in columndirection, where L means low-pass filtering, H high-pass filtering, and C is the coarseimage .384Figure 4

9、.1 DWT three level decomposition flow chat of a color image.40Figure 4.2 Watermark Embedding Algorithm flowchart 42Figure 4.3 Watermark Extraction Algorithm flowchart .44Figure 4.4 Invisibility Experiment (a) Original Image (b) Watermarked Image.45Figure 4.5 Watermarked Image Suffering various kinds

10、 of attacks (a, b, c, d).455List of TableTable 2.1 Number of publications on digital watermarking during the past few yearsaccording to Watermarking world .org .15Table 2.2 Number of publications on digital watermarking during the past few yearsaccording to INSPEC, Jan, 1999. .15Table 4.1 The Detect

11、ion response between the extracted watermarks and the attackedwatermarked image under different types of attacks 46IVHunan UniversityStatement of OriginalityI hereby certify that the thesis submitted is based on the research carried out by myselfindependently under the guidance and supervision of my

12、 supervisor. Any ideas orquotations from the work of other individual and collective works are fully acknowledgedin accordance with the standard referencing practices of the discipline.Authors Signature: Date: -May , 28, 2007Copyright StatementPermission is herewith granted to Hunan University to ci

13、rculate and to have copied fornon-commercial purposes, at its discretion, this thesis upon the request of individuals orinstitutions. The author does not reserve other publication rights and the thesis nor mayextensive extracts from it be printed or otherwise reproduced without the authors writtenpe

14、rmission.This thesis belongs to:1. Secure , and this power of attorney is valid after _.2. Not Secure(Please mark the above corresponding check box) May,_,2007Supervisor May, _,20071Chapter 1 Introduction1.1 PreambleIn recent years, the development of the Internet and multimedia technology, it is ea

15、sier toproduce, distribute, acquire and copy digital media products such as digital text, image,video and audio 1. That is why, it is necessary to protect the digital production. Thedigital watermarking technique can solve the problem. The digital watermark which isrepresents the ownership of the ow

16、ner according to the embedding information into theoriginal image. It can be applied to different applications including digital signatures,fingerprinting, broadcast and publication monitoring, authentication, copy control andsecret communication 2. Usually, an effective digital watermark scheme pro

17、vides thethree major properties 3. (i)Imperceptibility (ii) Robustness and (iii) Un ambiguity. Theembedded watermarking must be imperceptibility and invisible because of two primaryconcerns; firstly we should not lower the quality of the original image or it will the breakthe aesthetic feeling and d

18、iminish the commercial value of the original. Second, if thewatermark embedded is detected by hacker, it will be easily broke or be removed.Watermarked image should be robust. The watermark could still be extracted clearly aftersome digital image processing such as lossy or lossless image compressio

19、n. In thewatermark extraction process, it should be unambiguous to prove the ownership of theowner 3. One of the primary watermarking designing considerations is that theinvisibility and robustness often collide 4. In order to improve the robustness of thewatermarking scheme, we must embed more and

20、more watermark information andtherefore cause the quality of the image lower and lower. It seems like that the originalimage has been interfered with much more noise. On the other hand, in order to keep thequality of the original image, we embed fewer information and high robust ofwatermarking schem

21、e. Usually, there are two kinds of basic watermarking design scheme45, (1) Spatial domain and (2) Transform domain or Frequency domain ( DCT, DWT,DFT). The watermark is more robust in the frequency domain than in the spatial domain.So the method we choose frequency domain to embed the watermark. The

22、re are many2researches and develops have been done grayscale image but the color image is notsufficient. Now a day color image is dominant most of the parts of applications.Embedding information in color image RGB color channel is highly correlated so it is notsuitable for embedding watermark. Some

23、proposed embedding schemes focus onembedding watermarks in the Y component (luminance) in YIQ model. Kutter et al 6embed the watermark by modifying selected set pixels in the blue channel because of itslow sensitivity to human perception. The blue channel is the best choose to JPEGcompression among

24、the RGB because of its low sensitivity to human perception. So thehidden watermark is easy to be lost. Red Channel embedding watermark problem is itsvery large energy loss. During the RGB true color image compressed into JEPG, theembedding watermark in the red channel is easy to lost and difficult t

25、o extract. Otherwisegreen channel can endure JEPG compression and the embedded watermark is robustenough. So our select is Green channel to embed watermark information to examine itscapability.1.2 MotivationModern age is the age of digital technologies. The digital information exchange like asIntern

26、et and multimedia technology becomes easier to produce, distribute, modify,acquire and copy digital media products such as digital text, image, video and audio. Butthese results create serious problem because unauthorized copying and modification ofthe context. Any one can easily copy the digital pr

27、oducts from internet and it becomesvery easy to get benefit from it without owner permission. Even they can claim that theyare the owners of the copyright.For this reason piracy becomes great threat for innovation and business. In order to solveintellectual property problems of the digital age, the owner have the protecti

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2