Font Size: a A A

The Study Of Image Encryption Based On Chaos

Posted on:2010-10-22Degree:MasterType:Thesis
Country:ChinaCandidate:L YangFull Text:PDF
GTID:2178360302460658Subject:Biomedical engineering
Abstract/Summary:PDF Full Text Request
With the development of computer, network communication, people use the digital image more frequently than before, meanwhile how to ensure the safety of the digital image becoming more and more important. Since the image has huge amount of information and high redundancy, the traditional methods have difficulties to encrypt the image. Due to the sensitivity to initial conditions, unpredictability and pseudorandom, chaos-based encryption has suggested a new and efficient way to deal with the intractable problem of fast and highly secure image encryption.This paper do some research on the implication of image encryption based on chaos. The main contents are as follows:The paper proposes an image encryption based on two chaotic systems, in which employing two chaotic maps, Baker map and Logistic map. Baker map to shuffle the positions of image pixels and uses another chaotic map to diffuse the data of image pixels, thereby significantly increasing the resistance to statistical and differential attacks.When chaotic systems are realized in a discrete space with finite states, some degradation will arise. To extend the cycle length of chaotic systems, this paper designs a new chaotic Pseudo-Random Bit Generator using two chaotic system. We employ a secret variant to perturb the chaotic trajectory and the control parameter to lengthen the cycle-length of chaotic trajectory.This paper proposes a new encryption algorithm based on dynamic lookup table, using two one-dimensional chaotic maps. The algorithm also introduces feedback and the multiplication of finite field and change the lookup table randomly.The paper proposed an image encryption on high dimension chaotic system and perceptron model. The high dimension system has more complicated structure and more ruleless for the time series of the system variable. Non-line operation of perceptron effectively cover up original chaotic sequence, meanwhile improving the security of the system...
Keywords/Search Tags:Chaotic Encryption, Pseudo-Random Bit Generator, Look-up table, High Dimensional Chaotic Systems
PDF Full Text Request
Related items