Font Size: a A A

Design And Implementation Of Chaotic Image Encryption Algorithm

Posted on:2014-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:X W HanFull Text:PDF
GTID:2268330425959105Subject:Education Technology
Abstract/Summary:PDF Full Text Request
In recent years, with the rapid development of computer network technology and multimedia IT, the dissemination of images, video and other multimedia information on the network has become one of the main ways that people communicate and share information. Although it is convenient and fast, information during transmission is vulnerable to the lawless interception, viewing, malicious tampering and destruction, and the information security is paid more and more attention. Digital image, as one of the main ways people exchange information, which contains a large amount of information and high redundancy. Traditional encryption techniques (such as, DES, IDEA, AES, etc.) are designed to encrypt the one-dimensional data (such as text stream), and encrypted two-dimensional data efficiency is relatively low. And therefore they are not suitable for the encryption of the digital image. Chaotic system has the characteristics of the initial value sensitivity, pseudo-randomness and uncertainty, and is ideal for digital image encryption. Thus, based on the chaotic image encryption system has been widespread and in-depth research.The content of this paper is based on the chaotic digital image encryption technology. The article first analyzes the research status of the chaotic image encryption, and then describes the basic theoretical knowledge of chaos. Secondly it introduces the basic knowledge and basic principles based on the chaotic digital image encryption technology. On this basis the article proposes two chaotic image encryption algorithm based on Chen’s system, and makes the simulation and security analysis for the algorithm, and proves the security of the algorithm. Finally, the article gives the full text of the summary and outlook, and point out the further research directions and ideas of chaotic image encryption.
Keywords/Search Tags:Digital image, Chaotic Encryption, Chaotic sequence, Safety analysis
PDF Full Text Request
Related items