1 / 42
文档名称:

DCT域图像数字水印算法的分析和实现毕业论文.docx

格式:docx   页数:42页
下载后只包含 1 个 DOCX 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

DCT域图像数字水印算法的分析和实现毕业论文.docx

上传人:luyinyzha 2015/11/10 文件大小:0 KB

下载得到文件列表

DCT域图像数字水印算法的分析和实现毕业论文.docx

文档介绍

文档介绍:毕业论文
DCT域图像数字水印算法的分析和实现
摘要:随着计算机通信技术和互联网的迅速发展,数字多媒体的传播业越来越方便快捷。但是数字形式的多媒体产品由于可以方便地完全复制并在网络环境下广泛散发,大范围的授权拷贝行为受到了音像、出版、影视和软件等行业的高度关注。为了防止这种情况的发生,人们提出了数字水印的概念。数字水印是目前学术界研究的一个前沿热门方向,可为版权保护等问题提供一个潜在的有效地解决方案。
在本论文中,首先介绍了信息隐藏技术、数字水印技术,并着重介绍了数字水印技术的基本原理、特征、典型算法、评测方法等数字水印技术。然后设计了一种基于DCT的图像数字水印新算法,该算法根据二值水印图像像点取值情况,相应地改变中频段两个位置处DCT系数的大小关系,从而实现水印信息的嵌入。最后在MATLAB中通过编程进行实验仿真,并对其进行性能测试,实现了数字水印的嵌入、提取实验并用攻击实验证明该算法具有较好的不可见性和较好的鲁棒性。
关键词:数字水印; 离散余弦变换(DCT); 鲁棒性
Design and Implement of Digital Image Watermark Based on DCT
Abstract:With the rapid development munication technology and the , digital multimedia broadcasting industry is more and more convenient. However, because the digital forms of multimedia products can be easily pletely and be disseminated widely in worked environment, these acts is concerned widely by authorized audio and video, publishing, film and software industries. In order to prevent this from happening, the concept of digital watermarking was put forward. Digital watermarking is the academic study of popular and the cutting-edged, and also providing a potentially effective solution for copyright protection and other issues. In this paper, firstly introduced the digital watermarking technique for information hiding, digital watermarking technology, and highlighted the basic principles of digital watermarking technology, the characteristics of typical algorithms, and the evaluation methods. And then improved a DCT-based digital image watermarking algorithm, the algorithm based on the binary watermark image pixel value corresponding change in the band two locations at the size of the relationship of the DCT coefficients in order to achieve the watermark information’s embed. Through experimental simulation by programming in MATLAB, and performance testing, the digital watermark embedding and extraction experiments and attack experiments prove that the algorithm has good visibility and good robustness.
Key words: Digital watermarking, discrete cosine transform (