Font Size: a A A

Design And Implementation Of Image Encryption Tools Based On Chaos

Posted on:2017-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:D Y ChangFull Text:PDF
GTID:2348330533450656Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of communication technology and multimedia technology improved, multimedia communication has become the primary way between people's communicate, which has a lot of information translated on a carrier image. However, with the development of transmission and receiving equipment, illegal access to data through the communication network has become increasingly easy. Transmission between the information will often attract a variety of man-made attacks, including data tampering, theft, Trojan horses and viruses embed, the image transmission in the network security has become a serious problem.The complexity of the image encryption with text encryption is very different. Image has a large amount of data, redundancy, high correlation between pixels and strong features, such as regular text encryption algorithms RSA, DES, etc. can not meet the image information confidential. And chaotic encrypted with a pseudo randomness, sensitivity to initial value, ergodicity and other features, closely linked to the characteristics and principles of diffusion and confusion, the chaos is well suited to the image encryption.Based on chaotic image encryption as the research object, this paper realize the confidential treatment of the images. Cryptography and chaos system is simply introduced in this paper, and the status quo of chaotic encryption, both at home and abroad, explained the basic knowledge and principle of chaotic encryption, etc. This paper selection Arnold mapping and Logistic mapping as a research object. Pixels in an image map by Arnold scrambling encryption image in order to achieve the purpose of encryption, but Arnold map to encrypt image does not change the image pixel values, which makes the encrypted image still retain some of the features of the original image; so use Logistic Mapping chaotic sequence to change the pixel values, and further the image encryption. Combination of the two algorithms of image processing, ensure the safety of image information.
Keywords/Search Tags:Chaotic encryption, Arnold mapping, Logistic mapping
PDF Full Text Request
Related items