Font Size: a A A

The Study Of Image Encryption Algorithm On Network Communication Security

Posted on:2016-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y T ZhangFull Text:PDF
GTID:2308330470982832Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the development of technology, the Internet has captured the people’s lives, network information security has also caused more and more people’s attention. Dissemination of information in the network, the security of image spreading is particularly important. Because of the convenience,fast speed and high security, a large number of image encryption algorithms are based on end-to-end encryted mode designing. So far encryption mode is variable, including scan pattern, Double Phase Encoding Encryption Technique, iterative random decoding and rotary converter, vector quantization coding, quad tree encoding, chaos function coding, Kolmogorov flow and etc. Among them, the inherent sensibility of chaos function to initial value makes it especially suited for encryption technology, so encryption based on chaos are being valued now.This paper presents two image encryption methods based on end-to-end encrypted model used chaos equations. One is chaos System itself to encrypt, and through experiment to perform concrete encryption, anti-interference capability, security cryptanalysis and case execution time analysis and etc. The experiment reveals that there should be a further investigation to effectiveness of the algorithm. Through comparative analysis, we found that in order to gain better results, existing methods are normally using many encryption without an effective way to ensure how many times are valid, which in turns needs human eyes to testify. Therefore, this essay focus on a new way to encryption from the aspect of the balance of image pixels based on chaos, to ensure the valid times of encryption. This investigation engages in one dimension logistic equation for chaos, calculation methods like iterative functional equation, XOR operation and a lot of simulation experiment inclusive of encryption impact, security and etc. The result shows that the method proposed here has feasibility and validity.
Keywords/Search Tags:network communication security, image encryption, chaos theory, balance of pixel, Logistic map
PDF Full Text Request
Related items