Font Size: a A A

The Study Of Color Image Encryption Algorithm Based On Chaos Theory

Posted on:2013-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:G L ChenFull Text:PDF
GTID:2248330371987134Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of multimedia and network technologies, We can easily browse to all kinds of information on the network, And digital multimedia information such as audio and video can be disseminate over the Internet conveniently. Being a important multimedia data, Digital image is becoming a primary communication method today.However, there exists potential safety hazards of digital image while brings convenience to our life, The storage and transmitting of the confidential. Digital image through network has been paid much attention. At present, the digital image encryption has become a multimedia network communication technology important research subject.Digital image is due to the intrinsic properties of images such as bulky data capacity, high redundancy and strong correlation among image pixels. The image encryption is very different to the text encryption, the conventional cryptographic algorithm The conventional encryption algorithm itself has a lot of disadvantages, and doesn’t suit for digital image encryption. Therefore, Chaotic maps have many desirable properties such as pseudo-randomness, ergodicity, high sensitivity to initial conditions. That make it particularly suitable for image encryption.The image encryption technologies based on chaos have been studied in this dissertation, To begin, research developments of the digital image encryption, the basic knowledge of chaos and cryptography are given. Then, the knowledge about encryption based on chaos is introduced. Based on this, the image encryption algorithm based on chaos is advanced. At last, the research work is concluded comprehensively in the paper, and the further research direction of the image encryption based chaos is given.
Keywords/Search Tags:Chaotic cipher, Image encryption, Security analysis
PDF Full Text Request
Related items