Discrete wavelet transform digital watermarking algorithm based on HVS
|School||Central South University|
|Course||Information and Communication Engineering|
|Keywords||DWT information hiding HVS watermark Logistic|
The digitization of the information media make information access and exchange more convenient, but also significantly improve the efficiency and accuracy of information dissemination. But at the same time, greatly facilitated by the rapid development of digital and network for the dissemination of information, communication, also derived from piracy and security issues, and has begun to affect the information industry, health and sustainable development. In this context, digital watermarking as an effective means of protecting intellectual property rights, low cost, simple has now become the research focus of the people.The digital watermarking system and model for the study, analyzed the various types of digital watermarking technology, proposed a watermark embedding algorithm based on human visual system in a variety of grayscale images. The algorithm first Logistic chaotic encryption and Arnold transform pretreatment operation to break the binary watermark image watermark images airspace between the pixels in the original correlation, so that the energy segment more evenly in the invisibility and robustness to find a balance between, and the related parameters are stored as a key. Two wavelet transform and then the host image by masking characteristics of human visual location information embedded in the second stage of the three detail wavelet transform subgraph, especially the direction of45degree angle, the details of the sub-picture shows the preferred further enhance the digital The watermark is not visible. During the extraction process, the need to use the carrier of the original picture, the original image and watermarked image are the two wavelet transform, binary sequence, and then key the inverse transform, restore the watermark information. Matlab simulation experiments prove the algorithm to ensure that the watermark is not visible under the premise improve the security of the watermark, reflects the strong robustness to JPEG compression, cut, add the image noise common attacks. To some extent, both have invisibility and robustness with good practice.Finally, the development and classification of electronic documents, given the design of authentication based on digital watermarking technology, digital watermarking algorithm as described in this paper and the core algorithm is applied in the electronic document authentication system. NET platform to achieve development of embedded modules and authentication modules.