Font Size: a A A

Research On Digital Image Encryption Algorithm Based On Double Logistic Chaotic Map

Posted on:2018-08-23Degree:MasterType:Thesis
Country:ChinaCandidate:F LiFull Text:PDF
GTID:2348330518499326Subject:Information security
Abstract/Summary:PDF Full Text Request
In the network era, digital image encryption technology is an important method and means to realize the problem of image information security. In recent years, the number of digital image encryption technology and quality of programs have a rapid increase with the development of technology. In those technologies, the Chaotic encryption technology in digital image encryption technology is used more and more widely through the features of good randomness and stream encryption. The chaotic image encryption technique mainly uses the pseudo-random sequence number generated by the chaotic map to carry on the image pixel diffusion and scrambling processing. So, it has the advantage of clear encryption flow, random and strong, high security, etc.In the study work of this thesis, the research on image chaotic encryption technology in recent years is introduced firstly, including the basic concepts and characteristics of chaos theory, the existing chaotic system and the basic principles of digital image chaos encryption technology, etc. And based on the above work, a digital image encryption scheme based on double Logistic chaotic map is proposed in this thesis. The two-level Logistic chaotic map is used to create the pseudo-random sequence number in the scheme, and the number of random sequences of image diffusion and scrambling is obtained by two creation processes.The key used in the scheme is the calculation parameters of the first-order Logistic chaotic map and the initial value of the second-order Logistic chaotic map. And in the encryption and decryption process, and the encryption process includes the two steps of proliferation and scrambling. Through the encryption scheme in the. NET platform for experimental simulation, the program encryption effect is good, and it also can complete the correct completion of the image decryption processing.At last, the security and reliability of the scheme are analyzed and studied in detail in this thesis, including the key space size of the scheme, the sensitivity of the scheme to the key, the pixel correlation of the encrypted image and the information entropy, etc. The reliability and security performance in the program is relatively good through the above analysis work.
Keywords/Search Tags:Digital Image, Chaotic System, Chaotic Encryption, Logistic Chaotic Map
PDF Full Text Request
Related items