Font Size: a A A

Research On Key Technology Of Trusted Wireless Digital Image Acquisition And Transmission System

Posted on:2014-10-06Degree:MasterType:Thesis
Country:ChinaCandidate:H T LiFull Text:PDF
GTID:2268330422450163Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Image acquisition and transmission system is the real-time obtained images transmissionprocess from the camera to the control room, which facilitates the control and management ofthe layout occasions. Because of its strong practicability, convenient layout and simpleoperations, the image acquisition and transmission systems are widely used in many fields,even some important places such as banks, military bases, missile position and so on. Thesystem is very vulnerable to hostile attack, such as data eavesdropping, tampering and forgery.Therefore, in the process of image transmission, many measures should be taken to ensure thesafety, reliability and integrity of the images.The background and significance of the subject, and the research status at home andabroad are introduced first. The necessity of a variety of security measures need to be taken inthe image transfer process is analyzed, as well as the shortcomings of cable wiring and theadvantages of wireless cabling.The advantages and disadvantages of various image acquisition methods are introduced,the V4L2image acquisition method based on the Linux operating system is chosen andtransplanted in the embedded Linux operating system. JEPG compression has been used, andthe compression ratio can reach about90%.The image anti-counterfeiting technology based on digital watermark is introduced, thedisadvantages of watermarking embedding based on DCT transform. With the features ofJPEG compression, a new watermarking embedding method is proposed, which does notaffect the image visual effect. The robustness is strong for JPEG compression. And thewatermark can be extracted to determine the position vector image which has been tampered.The technologies of data encryption and data integrity authentication are introduced, andthe principles and steps of RC6encryption algorithm are introduced in detail. A new blockencryption method based on RC6is put forward. Without the block encryption rules, attackerscould not decode the right data even though they have the secret key. Data integrityauthentication is implemented by means of message authentication codes, which able tocorrectly identify whether the image data has been tampered during transmission.The image data error control in the process of transmission is introduced, the necessity of introducing error control is analyzed. The error control prevent the occurrences of cannotreceive the data packet, repeat receiving and receive in the wrong order, which makes thesystem more stable.At last, the computational results are introduced, and by means of simulated attacks,digital watermarking, data integrity, authentication and data encryption function are verified.
Keywords/Search Tags:Image acquisition, Image compression, Data encryption, Data integrityauthentication, Watermark embedding, Error Control
PDF Full Text Request
Related items