Search In this Thesis
   Search In this Thesis  
العنوان
Chinese Remainder Theorem Based on Combined Discrete Wavelet Transform – Discrete Cosine Transform Algorithm Watermarking Scheme \
المؤلف
Abed, Asmaa Mohamed Ramadan.
هيئة الاعداد
باحث / أسماء محمد رمضان عابد
مشرف / محمد رزق محمد رزق
mrmrizk@ieee.org
مشرف / هانية حسن احمد عبد المنعم فرج
hamia_Farag@alexuedu.eg
مناقش / السيد مصطفى سعد
مناقش / السيد احمد بوسف
الموضوع
Electrical Engineering.
تاريخ النشر
2014.
عدد الصفحات
81 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الهندسة (متفرقات)
تاريخ الإجازة
1/10/2015
مكان الإجازة
جامعة الاسكندريه - كلية الهندسة - الهندسة الكهربائية
الفهرس
Only 14 pages are availabe for public view

from 32

from 32

Abstract

In the age of universal electronic connectivity, electronic connectivity, electronic eaves dropping, and electronic frauds, security is vital for any success. Designing a secure way to talk, taking in our account that other parties hear but the one who understands is the one you are talking to. Developing a secure way to be published all over the world, while nobody can break what two parties decided to protect. These are our endeavor.
This thesis consists of six chapters, discussing the following topics:
Introduction, Introduction to digital image watermarking techniques, Image compression and discrete cosine transform, discrete cosine transform domain Chinese Remainder Theorem based watermarking scheme, and Chinese Remainder Theorem based the combined DCT-DWT algorithm watermarking scheme and Conclusions and future work.
The first chapter discusses a brief introduction about thesis contribution and the proposed algorithm.
The second chapter discusses seventh points which can be considered as a brief introduction to the science of watermarking, these points are as follows: first, requirements for watermarking to achieve the copyright protection. Second point discusses Classifications of watermarking techniques. Third point discusses properties of watermarking systems associated with a watermark embedding process. Fourth point discusses attacks on watermarks. Fifth point discusses the applications of digital watermarking. Sixth point discusses spatial domain watermarking techniques which embedding inserts message into image pixels. Seventh point discusses Frequency Domain Watermarking Techniques which embeds a message by modifying the transform coefficients of the cover message as opposed to the pixel values.
The third chapter discusses concept of data (image) compression, processing steps for DCT-based coding, image compression − JPEG standard, compression and picture quality and parameter estimation for image compression that are used in calculation of image compression and conclusions.
The fourth chapter discusses Chinese remainder theorem, applications of Chinese remainder theorem CRT, mathematics equation of Chinese remainder theorem and equation that used in DCT, the CRT-based watermarking in the spatial domain advantage of the scheme is very fast and computationally efficient. CRT technique in the DCT domain, the same domain in which JPEG compression algorithm is based on. After the embedding process, the watermarked DCT blocks will then undergo inverse DCT to construct the watermarked image.
The fifth chapter consists of two parts; first part discusses brief introduction to discrete wavelet transform that contains these points are as follows: first point, History of Wavelets, then the Fourier transform is a useful tool to analyze the frequency components of the signal, Short-Time Fourier Transform analysis, then Wavelet analysis represents the next logical step, Scaling a wavelet simply means stretching (or compressing) it. Then the scaling function, Wavelet analysis, compression between wavelets with sine waves, the discrete wavelet transform, Wavelet reconstruction, types of wavelet filters ( Haar wavelet, Daubechies wavelet, Symlet wavelet, Morlet wavelet, Meyer wavelet, Biorthogonal wavelet
Coiflets wavelet, Mexican Hat wavelet), An application Overview of Wavelets. Second part discusses the proposed scheme CRT-based on combined DWT-DCT algorithm watermarking scheme, Discrete Wavelet Transform domain, watermark insertion process based on CRT technique in the combined DWT-DCT algorithm, The reconstruction process is reverse of the watermark insertion process, simulation results and the proposed scheme is more robust than against severe noise attacks compared to CRT in discrete cosine transform.
The six chapters contain conclusions and future works.