Font Size: a A A

The Study Of Chaos-based Image Encryption Algorithm

Posted on:2015-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:G YuFull Text:PDF
GTID:2268330431451839Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Chaotic functions can quickly generate pseudo-random sequence with excellent stability, and that can meet the needs of pseudo-random sequence for cryptography. So, chaotic theory has been got widespread concern in the field of cryptograph, and chaotic theory has achieved fruitful results in the field of cryptography. Now, even though there were a lot of achievements in research on chaos-based cryptograph, researchers were not relaxed and a more thorough, more in-depth study was going on. On the background of widespread concern on chaos-based cryptography, this paper worked a more in-depth study on chaos-based cryptography.In order to make full use of chaotic theory in the field of cryptography, we made a detailed and in-depth research on chaotic theory, and made a comprehensive analysis of chaotic theory’s application in cryptography to find the attention that we should pay when we designed a chaos-based image encryption, to find the way how to evaluate the safety of such algorithm, In this paper, we worked a more in-depth study on a one-dimensional Logistic chaotic map to find its mathematical realization principle. Based on its mathematical realization principle, we made a comprehensive analysis for image encryption algorithm based on a one-dimensional Logistic chaotic map to find its weakness, and then crack this algorithm by chosen plaintext attack method and chosen ciphertext attack method. As a result, we achieved certain result in the lab environment. We designed a color image encryption algorithm by iterating two Logistic chaotic maps. Through experiments, the algorithm had certain advantages compared with similar algorithms in the security.
Keywords/Search Tags:digital image, cryptanalysis, chaotic map, Logistic
PDF Full Text Request
Related items