Development of watermarking scheme using wavelet transform for multipurpose applications /

Over the last decade or so, Internet has become very popular phenomenon, where people can share whatever they want of images, videos, documents, etc. hence, protecting publishing copyrights has risen as pressing need. In addition, there has been also a significant demand for information security. F...

全面介紹

Saved in:
書目詳細資料
主要作者: Abdullatif, Mohammad Salah Aldin
格式: Thesis
語言:English
出版: Kuala Lumpur : Kulliyyah of Engineering, International Islamic University Malaysia, 2015
主題:
在線閱讀:http://studentrepo.iium.edu.my/handle/123456789/4691
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:Over the last decade or so, Internet has become very popular phenomenon, where people can share whatever they want of images, videos, documents, etc. hence, protecting publishing copyrights has risen as pressing need. In addition, there has been also a significant demand for information security. For these reasons and many other reasons, digital image watermarking has recently become a very popular solution for these cases. Many researches have gone through this field to propose new techniques, or to enhance current techniques to efficiently solve such problems. The main purpose of this research is to achieve invisible watermarking system to show the ability to embed higher information with less degradation. In addition, to investigate the existing techniques and identify the literature review of watermarking using wavelet technique. Finally, to develop, implement, and evaluate digital image watermarking system using Wavelet Transform by proposing new methods of watermark embedding and extraction. This dissertation proposes digital image watermarking technique using discrete wavelet transform. First, an overview and history of digital image watermarking is underscored with sufficient discussion for the most popular applications of digital image watermarking, the problem statement and its significance are also highlighted. The experimental results show that the proposed method provides accepted level in term of imperceptibility compared to other works. In addition, it provides an acceptable level of robustness. We applied various types of attacks such as Gaussian noise, JPEG compression, and blurring. The results show the ability of the proposed algorithm to resist against several attacks.
實物描述:xiv, 85 leaves : ill. ; 30cm.
參考書目:Includes bibliographical references (leaves 82-85).