Font Size: a A A

Research On Image Encryption Method Based On Chaos And Preserving

Posted on:2016-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:B Y ZhuFull Text:PDF
GTID:2208330461989755Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Today, the network information communication technology develops with high speed. In information communication, digital image is one of the most important forms of information transmission. However, the Internet is not absolute security, in the process of digital image transmission, there is a risk of information leakage. According to the statistics, there are hundreds of millions hacker attacks all around the world every year. In order to protect the security of image information, the domestic and foreign researchers are trying to explore the methods to protect the security of image information. On the issue of protecting the security of image information, there are three directions: digital image information hiding, digital image watermarking and digital image encryption. In view of the digital image encryption technology, there are four main ideas: The first is based on chaos theory; The second is based on modern cryptography; The third is based on secret sharing and segmentation; The fourth is based on pixel permutation and matrix transformation. This thesis proposes an image encryption method which is a combination of image sharing technology and chaos theory.The image sharing technology is a hot research topic in the digital image encryption, and its theoretical basis is secret sharing. Secret sharing is an important part of cryptographic protocols, as people for the further research of secret sharing scheme and the development of social demand, the researchers gradually apply the idea to the image encryption technology, and good results have been achieved. In addition to image sharing technology, the chaos theory is applied to image encryption technology, which is a popular direction of researchers. This paper presents an image encryption method based on chaos theory and image sharing. First, dividing the secret image into blocks and coding the blocks, reconstituting the blocks by pseudo random sequences which is generated by Qi hyperchaotic system; Then, processing the restructuring image by the image sharing technology, generating several shadow images; Finally, the shadow images are embedded into the cover images by LSB algorithm for network transmission. Through the experimental test, the method can encrypt the digital image, and it is able to resist some attacks.
Keywords/Search Tags:Chaos encryption, Image sharing, Qi hyperchaotic system, Information security
PDF Full Text Request
Related items