Search In this Thesis
   Search In this Thesis  
العنوان
Watermarking techniques for image authentication /
المؤلف
Hammouda, Kamal Abdelfattah Hammouda Mohamed.
هيئة الاعداد
باحث / كمال عبدالفتاح حموده محمد حموده
مشرف / بيه السيد الدسوقى
مشرف / محمد محفوظ الموجي
مناقش / محمد حسن حجاج
مناقش / احمد ابو الفتوح صالح
الموضوع
Watermarks - Data processing. Digital watermarking.
تاريخ النشر
2015.
عدد الصفحات
80 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الرياضيات (المتنوعة)
تاريخ الإجازة
01/01/2015
مكان الإجازة
جامعة المنصورة - كلية العلوم - Department of Mathematics
الفهرس
Only 14 pages are availabe for public view

from 98

from 98

Abstract

The security of the watermarking scheme is the most important issue in digital watermarking. Because, the hacker look for weaknesses in the security and can modified the media according to this weaknesses. Therefore, it is necessary to raise the security. A novel hybrid Chaos and Fuzzy c-means clustering technique (FCM) is proposed for improve the security. The watermark, dependents on the plain image is realized by using FCM clustering technique. Also, the watermark cannot be established without the same initial condition values, because Chaotic maps are sensitive to initial values and the Lyapunov exponent is used to get which Chaotic maps is high sensitivity to the initial condition. So, this Chaotic give high security for watermark. The thesis is organized into the following chapters: Chapter 1 describes the introduction to motivation and contribution. Also, gives brief details about the chapters Chapter 2 gives brief details about watermarking technology. The information hiding is presented which contain the cryptography, steganography, and watermarking techniques. Also, the applications of watermarking in the basis of visible watermarks applications and invisible watermarks applications are discussed. After that, we explain the types of watermarking techniques and the classification of them that are multimedia document, working domain, and human perception. The Properties of the watermarking which contain payload encoding, payload capacity, complexity, visual quality, detection reliability, robustness, key capacity, security is explained. Finally, the attacks on watermarking which contain intentional or unintentional attacks are presented. Chapter 3 describes the introduction to Chaos and fuzzy. The ACM transforming, the logistic map and Chaotic map based on Lyapunov exponent are listed In the Background of Chaotic maps. In addition, the difference between crisp sets and fuzzy sets and FCM clustering technique is elucidated. Chapter 4 gives brief details about literature review. Our thesis is a hybrid for the Chaotic maps and FCM clustering technique. Therefore, we will classify this literature into the literature review about Chaos and literature review about fuzzy. Chapter 5 discusses the hydride FCM and Chaotic scheme that apply to the grayscale image. Our works contain two schemes both of them include watermark embedding and tamper detection. The watermark embedding is to embed the watermark to the least significant bit (LSB) planes. In addition, the tamper detection is to define if this image is attacked or not. Chapter 6 gives brief details about experimental results. We will show the original & watermarked image from the first and the second scheme. The very important result to be a show is PSNR for the first & second Scheme. In addition, to achieve the result is good or not it should be a comparison with other about results of PSNR. Performance under attacks such as performance under text addition, performance under copy and paste attack, performance under content removal and performance under the collage attack are discussed. Chapter 7 discusses the conclusion and future research directions. The conclusion of this thesis will be explained in short notes. Finally, the future research directions the idea about this knowledge are focused.