欢迎来到毕设资料网! | 帮助中心 毕设资料交流与分享平台
毕设资料网
全部分类
  • 毕业设计>
  • 毕业论文>
  • 外文翻译>
  • 课程设计>
  • 实习报告>
  • 相关资料>
  • ImageVerifierCode 换一换
    首页 毕设资料网 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    外文翻译---基于数字水印技术的信息隐藏理论研究

    • 资源ID:126246       资源大小:54.16KB        全文页数:10页
    • 资源格式: DOCX        下载积分:100金币
    快捷下载 游客一键下载
    账号登录下载
    三方登录下载: QQ登录
    下载资源需要100金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

    外文翻译---基于数字水印技术的信息隐藏理论研究

    1、天津工业大学本科毕业论文 外文资料 Information Hiding Thieoretic Research Based on Digital Watermark Technology School of Mathematics and Computer Science Ningxia Universit Yinchuan, China Abstract-With rapidly growing interest in ways to hide information, a large number of schemes have been proposed for audio and o

    2、ther multimedia in digital pictures, video, audio and other multimedia objects.In an attempt to overcome this problem, watermarking has been suggested in the literrature as the most effective means for copyright protection and authentication .The main focus of this thesis is the problem of watermark

    3、ing and compression of image due to bandwidth or storage constraints. Keywords: information hiding; digital watermarking; transparency; robustness I. Introduction Due to the rapidly development of the Interest and the World-Wide-Web(WWW),distribution of digital multimedia data to a large population

    4、of users can be done very easily.Moreover,digital data can be duplicated very fast and without any degration in quality-cinsider,forexample,how common the copying of musical CDs has become in the last few years.Naturally,this situation has raised many concerns about possible violations of intellectu

    5、al property rights.Unauthorized duplication and distribution of copyrighted material(photographs,music,movies,etc.),without appropriate compensation to the copyright holders,are becoming increasingly problemtic.In order to fight piracy,many companies(especially in the entertainment and news industri

    6、es)have devoted considerable attention to the development of information hiding (or watermarking)techniques.In plain terms,a watermark is a signal which is hiden inside some multimedia data,and carries information about this data(e.g.,owner,title,data of creation,ect).Thus a watermark uniquely ident

    7、ifies the work being protected,and helps resolve disputes about the ownership of the data. There have been many instances of disputes or litigations on the intellectual ownership of multimedia data.A copyright violations lawsuit that received extensive publicity in the early 2000s,was that against N

    8、apster.And the Digital Video Disk,also known as Digital Versatile Disk(DVD)consortium called for proposals for a copyright marking scheme to enforce serial copy management.The idea is that the DVD players sold to consumers will 天津工业大学本科毕业论文 allow unlimited copying of home videos and time-shifted vie

    9、wing of TV programmers,but cannot easily be abused for commercial priacy.Electronic copyright management schemes have also been proposed by European projects such as Imprimatur and CITED,and American projects such as the proposed by the Working Group on Intellectual Property Rights. Due to its signi

    10、ficance,the watermarking field has grown tremendously in the information hiding theoretic.There are numerous articles(the references therein)and books that explain the basic of watermarking,explore its many practical application,and evaluate the performance of various schemes under a variety of atta

    11、cks. II. Digital Watermarking System A. Watermarking In the communication model for watermarking,the watermark embedder plays the role of the transmitter,the watermark detector plays the role of reciever and the attack represents the communication channel(Fig.1).The objective is to decode the hidden

    12、 message reliably;the original image can be construed of as side information which is always available at the encoder,but is only available at the decoder in the private scenario(not the public one). In this paper, a transmitter sends a signal Xn to a receive (with n transmissions), through 天津工业大学本科

    13、毕业论文 the following channel: Y=Xn+Sn+Zn, where Sn, Zn are independent, i.i.d.Gaussian random vectors.Here, Sn is known to the encoder, while Zn acts as noise known to neither encoder or decoder.It is proved that the capacity of this channel is the same as if Sn were known to the decoderas well. In ge

    14、neral,this number grows linearly with the image size,and the constant of proportionality is known as the capacity C.Practical watermarking implementation embed at a rate R bits/image dimension,where RC.Namely,C=1/2 log( 1+P/N) ,where P is the average( per symbol) power of Xn and N is average of Zn.T

    15、his result is quite surprising because one would expect Sn to act as inteference at the receiver,thushidering the detection scenario,Sn would play the role of the covertext( known to the watermark embedder only),Xn would represent the watermark embedded, and Zn would be the noise added by the attack

    16、er. B. Characteristics of watermarking In the design of watermarking schemes,we mainly think about two key requirements. Transparency: The hidden message should not interfere perceptually with the host signal.This requirement is perfectly justified by the fact that watermarking aims at protecting mu

    17、ltimedia data,which are sensitive,ingeneral,tochanges.In other words,an image or a musical piece could become useless if the introduced artifacts( due to watermarking) exceeded some perceptual threshold.The quality of the watermarked data must thus be comparable to that of the covertext,a requiremen

    18、t which is often expressed in terms of a distorition constraint. Robustness: The message must be detectable in the watermarked image( the covertext is assumed to be an image throughout this thesis,though similar techniques can be applied to other types of multimedia data) ,even after degradation duo

    19、 to malicious attacks or other processing( quantization,D/A conversion,etc) .Of course,detectability of the watermark is closely related to the maxinum amount of distortion that can be introduced by an attacker.A watermarking scheme is robust if it allows the hidden message to be accurately decoded

    20、in a distorted image whose quality is close to that of the watermarked image( this requriement is again expressed in terms of a distortion constraint) . C. Detection scenarios There are two decetionscenarios:private and public.In the private decetionscenario,the original image is available to the de

    21、cetor,in the public scenario,it is not.Although public detection scheme can be more useful in practice(since it is not always possible to have the original image availableduring the decetion),private schemes usually offer more robustness. III. Watermarking Rates In The Presence Of Memoryless Attacks And Gaussian


    注意事项

    本文(外文翻译---基于数字水印技术的信息隐藏理论研究)为本站会员(译***)主动上传,毕设资料网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请联系网站客服QQ:540560583,我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们
    本站所有资料均属于原创者所有,仅提供参考和学习交流之用,请勿用做其他用途,转载必究!如有侵犯您的权利请联系本站,一经查实我们会立即删除相关内容!
    copyright@ 2008-2025 毕设资料网所有
    联系QQ:540560583