一种稳健的基于小波变换的彩色图像数字水印算法.docx

上传人:b****1 文档编号:2391961 上传时间:2023-05-03 格式:DOCX 页数:78 大小:51.93KB
下载 相关 举报
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第1页
第1页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第2页
第2页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第3页
第3页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第4页
第4页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第5页
第5页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第6页
第6页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第7页
第7页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第8页
第8页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第9页
第9页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第10页
第10页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第11页
第11页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第12页
第12页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第13页
第13页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第14页
第14页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第15页
第15页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第16页
第16页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第17页
第17页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第18页
第18页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第19页
第19页 / 共78页
一种稳健的基于小波变换的彩色图像数字水印算法.docx_第20页
第20页 / 共78页
亲,该文档总共78页,到这儿已超出免费预览范围,如果喜欢就下载吧!
下载资源
资源描述

一种稳健的基于小波变换的彩色图像数字水印算法.docx

《一种稳健的基于小波变换的彩色图像数字水印算法.docx》由会员分享,可在线阅读,更多相关《一种稳健的基于小波变换的彩色图像数字水印算法.docx(78页珍藏版)》请在冰点文库上搜索。

一种稳健的基于小波变换的彩色图像数字水印算法.docx

一种稳健的基于小波变换的彩色图像数字水印算法

I

ABSTRACT

Therevolutionofthedigitalinformationhasbroughtbigchangesinourlivesandour

society.Thedigitalinformationhasalsogeneratednewchallengesandnewopportunities

forinnovation.Thisthesisdiscussestheissuesregardinginformationhidinginthedigital

imageanditsapplicationforsecurethedigitalmultimedia,addressingboththeoretical

andpracticalaspectsandtackingbothdesignandattackproblems.Inthefundamental

part,wediscussthekeyelementsofwatermarkinganditsapplicationindigitalimage.In

thedesignpart,wepresentnewinformationhidingalgorithmfordigitalcolorimage.The

designprovidesconcreteexamplesregardingthechoiceofembeddingandextraction

mechanisms.Withthegrowthofnetworkedmultimediasystems,theneedofsecure

communicationanddatatransfergoincreasingly.Applicationsarenumerousandvarious

likesatelliteormedicalimagery,orremotemonitoring.Duringimagestransfer,data

integrityisnotreallysecure.Watermarkingcanbeananswertosuchproblems.Inthis

paper,Arobustwavelet-basedcolorimagedigitalwatermarkingschemeisproposed.The

proposeddigitalwatermarkisarandomrealnumberofasequenceofbitsembeddinginto

lowfrequencyofGreencomponentsub-band.Theembeddingmethodisbasedonthree

levelsDiscreteWaveletTransform(DWT)lowcoefficient.Athresholdisusedto

generatefrequencyofwatermarkswiththecompareofcreatedfrequencyofDWTin

embeddingposition.Experimentalresultsshowedthattheembeddedwatermarkisrobust

againstvarioussignalprocessingandcompressionattackssuchasSalt&peppernoise

addition,Cropping,Scaling,JPEGcompression,Meanfiltering,Copyingandpastingand

soon.

Keywords:

Digitalwatermarking,wavelettransform,Colorimage,Greencomponent,

LowfrequencyandRobustness,informationhiding.

3

ListofFigures

Figure2.10.1Schematicdescriptionofsteganography………………………………..5

Figure:

2.2Communicationchannelforcryptosystem…………………………………7

Figure2.3MonogramsfiguringTGERG……………………………………………….8

Figure2.4Genericdigitalwatermarkingscheme………………………………………11

Figure2.5Genericdigitalwatermarkingdecoder……………………………………..11

Figure2.6Genericdigitalwatermarkingscheme………………………………………13

Figure2.7Basicwatermarkembeddingscheme……………………………………….14

Figure2.8BasicwatermarkingDecodingsystem………………………………………15

Figure2.9Classificationofwatermarkingalgorithmsbasedondomainusedforthe

watermarkingembeddingprocess……………………………………………………….16

Figure2.10Classificationofwatermarkingbasedonapplications…………………….17

Figure2.11Digitalwatermarkingrequirementstriangle………………………………20

Figure3.1WatermarksinMarkandDollarbanknotes………………………………...24

Figure3.2Visiblewatermark…………………………………………………………..24

Figure3.3Invisiblewatermark…………………………………………………………25

Figure3.4DeliveringDigitaldatatoatrustedEndsystem……………………...........26

Figure3.5DeliveringDigitaldatatothecustomer……………………………………26

Figure3.6Conflict:

AliceandBobcanbothdetecttheirrespectivewatermarkinimage

I…………………………………………………………………………………………28

Figure3.7ImageLenaCopyingordistributinginprintorelectronicformswithout

writtenpermission………………………………………………………………………31

Figure3.8TheembeddingschemeofthewatermarkingalgorithmasproposedbyCoxet

al.Alotoftheproposedwatermarkingtechniquessharethesamemodel……………..36

Figure3.9Thewaveletpyramidofthree-levelimagedecomposition.Eachlevelconsists

ofthreedetailimages,whichcorrespondtohorizontal,vertical,anddiagonaldetailsof

eachresolutionlevel.xystandsforapplyingfilterxinrowdirectionandfilteryincolumn

direction,whereLmeanslow-passfiltering,Hhigh-passfiltering,andCisthecoarse

image…………………………………………………………………………………….38

4

Figure4.1DWTthreeleveldecompositionflowchatofacolorimage………………...40

Figure4.2WatermarkEmbeddingAlgorithmflowchart………………………………42

Figure4.3WatermarkExtractionAlgorithmflowchart……………………………….44

Figure4.4InvisibilityExperiment(a)OriginalImage(b)WatermarkedImage………...45

Figure4.5WatermarkedImageSufferingvariouskindsofattacks(a,b,c,d).....45

5

ListofTable

Table2.1Numberofpublicationsondigitalwatermarkingduringthepastfewyears

accordingtoWatermarkingworld.org………………………………………………..15

Table2.2Numberofpublicationsondigitalwatermarkingduringthepastfewyears

accordingtoINSPEC,Jan,1999.……………………………………………………….15

Table4.1TheDetectionresponsebetweentheextractedwatermarksandtheattacked

watermarkedimageunderdifferenttypesofattacks……………………………………46

IV

HunanUniversity

StatementofOriginality

Iherebycertifythatthethesissubmittedisbasedontheresearchcarriedoutbymyself

independentlyundertheguidanceandsupervisionofmysupervisor.Anyideasor

quotationsfromtheworkofotherindividualandcollectiveworksarefullyacknowledged

inaccordancewiththestandardreferencingpracticesofthediscipline.

Author'sSignature:

Date:

-May,28,2007

CopyrightStatement

PermissionisherewithgrantedtoHunanUniversitytocirculateandtohavecopiedfor

non-commercialpurposes,atitsdiscretion,thisthesisupontherequestofindividualsor

institutions.Theauthordoesnotreserveotherpublicationrightsandthethesisnormay

extensiveextractsfromitbeprintedorotherwisereproducedwithouttheauthor'swritten

permission.

Thisthesisbelongsto:

1.Secure,andthispowerofattorneyisvalidafter____________.

2.NotSecure

(Pleasemarktheabovecorrespondingcheckbox)

Author'sSignature:

Date:

May,___,2007

Supervisor'sSignature:

Date:

May,___,2007

1

Chapter1Introduction

1.1Preamble

Inrecentyears,thedevelopmentoftheInternetandmultimediatechnology,itiseasierto

produce,distribute,acquireandcopydigitalmediaproductssuchasdigitaltext,image,

videoandaudio[1].Thatiswhy,itisnecessarytoprotectthedigitalproduction.The

digitalwatermarkingtechniquecansolvetheproblem.Thedigitalwatermarkwhichis

representstheownershipoftheowneraccordingtotheembeddinginformationintothe

originalimage.Itcanbeappliedtodifferentapplicationsincludingdigitalsignatures,

fingerprinting,broadcastandpublicationmonitoring,authentication,copycontroland

secretcommunication[2].Usually,aneffectivedigitalwatermarkschemeprovidesthe

threemajorproperties[3].(i)Imperceptibility(ii)Robustnessand(iii)Unambiguity.The

embeddedwatermarkingmustbeimperceptibilityandinvisiblebecauseoftwoprimary

concerns;firstlyweshouldnotlowerthequalityoftheoriginalimageoritwillthebreak

theaestheticfeelinganddiminishthecommercialvalueoftheoriginal.Second,ifthe

watermarkembeddedisdetectedbyhacker,itwillbeeasilybrokeorberemoved.

Watermarkedimageshouldberobust.Thewatermarkcouldstillbeextractedclearlyafter

somedigitalimageprocessingsuchaslossyorlosslessimagecompression.Inthe

watermarkextractionprocess,itshouldbeunambiguoustoprovetheownershipofthe

owner[3].Oneoftheprimarywatermarkingdesigningconsiderationsisthatthe

invisibilityandrobustnessoftencollide[4].Inordertoimprovetherobustnessofthe

watermarkingscheme,wemustembedmoreandmorewatermarkinformationand

thereforecausethequalityoftheimagelowerandlower.Itseemslikethattheoriginal

imagehasbeeninterferedwithmuchmorenoise.Ontheotherhand,inordertokeepthe

qualityoftheoriginalimage,weembedfewerinformationandhighrobustof

watermarkingscheme.Usually,therearetwokindsofbasicwatermarkingdesignscheme

[4][5],

(1)Spatialdomainand

(2)TransformdomainorFrequencydomain(DCT,DWT,

DFT).Thewatermarkismorerobustinthefrequencydomainthaninthespatialdomain.

Sothemethodwechoosefrequencydomaintoembedthewatermark.Therearemany

2

researchesanddevelopshavebeendonegrayscaleimagebutthecolorimageisnot

sufficient.Nowadaycolorimageisdominantmostofthepartsofapplications.

EmbeddinginformationincolorimageRGBcolorchannelishighlycorrelatedsoitisnot

suitableforembeddingwatermark.Someproposedembeddingschemesfocuson

embeddingwatermarksintheYcomponent(luminance)inYIQmodel.Kutteretal[6]

embedthewatermarkbymodifyingselectedsetpixelsinthebluechannelbecauseofits

lowsensitivitytohumanperception.ThebluechannelisthebestchoosetoJPEG

compressionamongtheRGBbecauseofitslowsensitivitytohumanperception.Sothe

hiddenwatermarkiseasytobelost.RedChannelembeddingwatermarkproblemisits

verylargeenergyloss.DuringtheRGBtruecolorimagecompressedintoJEPG,the

embeddingwatermarkintheredchanneliseasytolostanddifficulttoextract.Otherwise

greenchannelcanendureJEPGcompressionandtheembeddedwatermarkisrobust

enough.SoourselectisGreenchanneltoembedwatermarkinformationtoexamineit’s

capability.

1.2Motivation

Modernageistheageofdigitaltechnologies.Thedigitalinformationexchangelikeas

Internetandmultimediatechnologybecomeseasiertoproduce,distribute,modify,

acquireandcopydigitalmediaproductssuchasdigitaltext,image,videoandaudio.But

theseresultscreateseriousproblembecauseunauthorizedcopyingandmodificationof

thecontext.Anyonecaneasilycopythedigitalproductsfrominternetanditbecomes

veryeasytogetbenefitfromitwithoutownerpermission.Eventheycanclaimthatthey

aretheownersofthecopyright.

Forthisreasonpiracybecomesgreatthreatforinnovationandbusiness.Inordertosolve

intellectualpropertyproblemsofthedigitalage,theownerhavetheprotecti

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 工程科技 > 能源化工

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2