Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/13513
Title: Image Authentication and Protection based on DWT Watermarking Technique
Other Titles: توثيق وحمـاية الصـورإعتماداً علي التقنية العلامات المائية
Authors: Azrag, Etidal Altom Kunna
Supervisor, Faisal Mohammed Abdalla
Keywords: Protect images
Watermarks
Multimedia
Illegal copies
Issue Date: 10-Dec-2015
Publisher: Sudan University of Science and Technology
Citation: Azrag , Etidal Altom Kunna . Image Authentication and Protection based on DWT Watermarking Technique / Etidal Altom Kunna Azrag ; Khartoum: Sudan University of Science and Technology, college of Computer science and information technology, 2015 .- 54p. :ill. ;28cm .-M.Sc.
Abstract: Due to the rapid development in communication and multimedia technology, different techniques are used for copyright protection and monitoring illegal copying of these media. One of the most important techniques is digital watermarking. As a result of the development in data transfer technology a cross multimedia and internet, it has became possible to access and copy these information in unauthentic manner. This leads to penetrate digital multimedia security problem. In this research I used the technique DWT discrete wavelet transformation is used in images and it gives good results in increasing the amount of generated information, Increase the efficiency of the image, increase reliability, and reduce the uncertainty surrounding some of the features in the images which are not clear. The method efficiency is measured using Peak Signal - to - Noise Ratio (PSNR (and mean squared error (MSE).
Description: Thesis
URI: http://repository.sustech.edu/handle/123456789/13513
Appears in Collections:Masters Dissertations : Computer Science and Information Technology

Files in This Item:
File Description SizeFormat 
Image Authentication and ....pdfTitle78.85 kBAdobe PDFView/Open
Abstract.pdfAbastract178.65 kBAdobe PDFView/Open
Chapter One.pdfchapter38.42 kBAdobe PDFView/Open
Chapter Two.pdfchapter267.79 kBAdobe PDFView/Open
Chapter Four.pdfchapter696.78 kBAdobe PDFView/Open
Chapter Five.pdfchapter26.61 kBAdobe PDFView/Open
Reference.pdfRefernce20.04 kBAdobe PDFView/Open
Appendix.pdfAppendix10.09 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.