Font Size: a A A

Research On Algorithm Of Encryption And Decryption Of Public Security Image Information Based On Chaos

Posted on:2018-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y HaoFull Text:PDF
GTID:2358330542950612Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Public security work is an important part of social management,which belongs to the category of social informatization,and social informatization inevitably requires the public security work to realize informatization.Image processing technology applied in the field of public security a lot,such as to criminals face synthesis,recognition,query,fingerprints,seal identification recognition,automatic recognition of license plate number,postal code,identification of fingerprint image,or electronic key lines image is applied.It has asked the contemporary police no longer limited to master the theory and method of digital image processing,but extended to the ability of computer image processing technology,the public security image processing technology has become the foundation of the people's police improve information quality,and improve the level of public security science.Public security work is a sensitive area,and the digital images involved in the work must meet the confidentiality standards.Large amount of information,variety and application of complex,extremely difficult to make guarantee the confidentiality of information,the existing public security departments image transmission between each other,only by a encryption card on the channel,therefore,the research based on chaos adapted to the public security work characteristic of image encryption methods is of great significance.Unique properties of chaotic system such as the initial value sensitivity,ergodicity and pseudo randomness is similar to the basic requirements of the cryptography,has the natural relation between chaos and structure of a certain similarity,developed a new way of thinking for the design of image encryption.
Keywords/Search Tags:Chaos, Public security informatization, Image encryption, Attack
PDF Full Text Request
Related items