The Study of Digital Watermarking and Image Hiding Techniques
碩士 === 國立屏東科技大學 === 資訊管理系 === 93 === Abstract: As rapid evolution of Internet technology, the transmission of digital multimedia become easier and fast. So, how to protect the security of information transmission and make sure the completeness of copyright are becoming popular search subject in rece...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/60306176735899474912 |
id |
ndltd-TW-093NPUST396026 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093NPUST3960262016-12-22T04:11:08Z http://ndltd.ncl.edu.tw/handle/60306176735899474912 The Study of Digital Watermarking and Image Hiding Techniques 數位浮水印與影像隱藏技術研究 Wen-Yi Yang 楊文懿 碩士 國立屏東科技大學 資訊管理系 93 Abstract: As rapid evolution of Internet technology, the transmission of digital multimedia become easier and fast. So, how to protect the security of information transmission and make sure the completeness of copyright are becoming popular search subject in recent year. Information hiding technology provide good way to solve the kind of problem. In general, information hiding technology divide into two type applications. One can apply for copyright protection, we call it as digital watermarking. The robustness of the embedded watermark is the major consideration. The other can apply for secret communication, we call it as steganography. The steganographic image quality and embedding capacity of the cover-image are the focus of attention. Hence, concerning this problem we propose good approach for digital watermarking and image steganography individual. In the digital watermarking topic, our method located frequency domain to process image information. The watermarking method combines the discrete cosine transform (DCT) and singular value decomposition (SVD) to be presented. First we compute color cover-image DCT coefficient by DCT and obtain coefficient’s singular value after decomposing coefficient . Then the watermark need to be embedded into singular value. After experimental test proved that the quality of watermarked cover-image is better than other method and the robustness of embedding watermark is high. In the image steganography topic, our method located spatial domain to process image information. Cover-image and secret-image are color image which been proposed in our approach. We utilize the edge detection method to distinguish edge blocks and smooth blocks. As human eyes are less sensitive to modification in the edge block and more sensitive to modification in the smooth block. We embed the secret message into cover-image mobility. It means we embed more message in edge block than smooth block. Our approach may reduce the distortion of stego-image and the capacity of embed message is quite obviousness. The experimental result showed the above method we propose could be ensure successfully for the copyright protection, secret information communication and data management. Cheng-Fa Tsai 蔡正發 2005 學位論文 ; thesis 103 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立屏東科技大學 === 資訊管理系 === 93 === Abstract:
As rapid evolution of Internet technology, the transmission of digital multimedia become easier and fast. So, how to protect the security of information transmission and make sure the completeness of copyright are becoming popular search subject in recent year. Information hiding technology provide good way to solve the kind of problem. In general, information hiding technology divide into two type applications. One can apply for copyright protection, we call it as digital watermarking. The robustness of the embedded watermark is the major consideration. The other can apply for secret communication, we call it as steganography. The steganographic image quality and embedding capacity of the cover-image are the focus of attention. Hence, concerning this problem we propose good approach for digital watermarking and image steganography individual.
In the digital watermarking topic, our method located frequency domain to process image information. The watermarking method combines the discrete cosine transform (DCT) and singular value decomposition (SVD) to be presented. First we compute color cover-image DCT coefficient by DCT and obtain coefficient’s singular value after decomposing coefficient . Then the watermark need to be embedded into singular value. After experimental test proved that the quality of watermarked cover-image is better than other method and the robustness of embedding watermark is high.
In the image steganography topic, our method located spatial domain to process image information. Cover-image and secret-image are color image which been proposed in our approach. We utilize the edge detection method to distinguish edge blocks and smooth blocks. As human eyes are less sensitive to modification in the edge block and more sensitive to modification in the smooth block. We embed the secret message into cover-image mobility. It means we embed more message in edge block than smooth block. Our approach may reduce the distortion of stego-image and the capacity of embed message is quite obviousness.
The experimental result showed the above method we propose could be ensure successfully for the copyright protection, secret information communication and data management.
|
author2 |
Cheng-Fa Tsai |
author_facet |
Cheng-Fa Tsai Wen-Yi Yang 楊文懿 |
author |
Wen-Yi Yang 楊文懿 |
spellingShingle |
Wen-Yi Yang 楊文懿 The Study of Digital Watermarking and Image Hiding Techniques |
author_sort |
Wen-Yi Yang |
title |
The Study of Digital Watermarking and Image Hiding Techniques |
title_short |
The Study of Digital Watermarking and Image Hiding Techniques |
title_full |
The Study of Digital Watermarking and Image Hiding Techniques |
title_fullStr |
The Study of Digital Watermarking and Image Hiding Techniques |
title_full_unstemmed |
The Study of Digital Watermarking and Image Hiding Techniques |
title_sort |
study of digital watermarking and image hiding techniques |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/60306176735899474912 |
work_keys_str_mv |
AT wenyiyang thestudyofdigitalwatermarkingandimagehidingtechniques AT yángwényì thestudyofdigitalwatermarkingandimagehidingtechniques AT wenyiyang shùwèifúshuǐyìnyǔyǐngxiàngyǐncángjìshùyánjiū AT yángwényì shùwèifúshuǐyìnyǔyǐngxiàngyǐncángjìshùyánjiū AT wenyiyang studyofdigitalwatermarkingandimagehidingtechniques AT yángwényì studyofdigitalwatermarkingandimagehidingtechniques |
_version_ |
1718401668647747584 |