Font Size: a A A

Research On Chaotic Encryption And Hiding Technology Based On Compressed Image

Posted on:2022-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:M N ShiFull Text:PDF
GTID:2510306614456074Subject:Computer Software and Application of Computer
Abstract/Summary:PDF Full Text Request
Images are widely used in data communications and are vulnerable to the risk of disclosure and damage during network transmission,putting data privacy and security at risk.The secure transmission of digital images requires addressing the dual security issues of content confidentiality and appearance confidentiality,and encryption and information hiding technologies are often used to secure images.As well,emerging compressed sensing technology can reduce the resource space available for image information transmission and storage,thereby reducing the cost of data processing.Based on this,this paper investigates chaotic encryption and hiding techniques for compressed images.The main research content is as follows:(1)An image compression and encryption algorithm using hourly hand print disruption is introduced.To overcome the limitation that the entire measurement matrix is used as a key,a chaotic system is used to construct the measurement matrix for compressed sensing,using fewer parameters as keys to generate a pseudo-random sequence to construct the measurement matrix.The Gaussian matrix,Bernoulli matrix and the chaotic matrix constructed by the Logistic-Chebyshev system are acted upon in the image compression and encryption scheme,and the performance of the chaotic matrix and the classical measurement matrix is compared by the quality of the reconstructed images.Simulation results show that the measurement matrices constructed by the chaotic system have an advantage over conventional matrices in the field of encryption based on compression sensing.(2)The image compression and encryption algorithm is proposed using a hourly hand print disruption.To enhance the irrelevancy between image pixels,a hourly hand printing method for scrambling the position of image elements is proposed on the traditional framework of dislocation diffusion.Firstly,the plain image is sparified,the sparse transform is the Discrete Wavelet Transform(DWT),then the sparsity of the sparse matrix is increased by zigzag confusion,and the sparse matrix is projected and measured using a measurement matrix constructed by a 4D chaos system to produce a compressed image.The initial values of the 4D chaotic system are correlated with plain images and can improve the algorithm's resistance to plaintext attacks.The compressed image is encrypted to produce a noise-like secret image.Simulation results and security analysis demonstrate that the encryption algorithm has excellent security properties,a large key space and is resistant to various attack tests.(3)An image hiding algorithm incorporating region energy is proposed.To achieve further protection of the secret image in(2),it will be hidden in the carrier image.In order to improve the flexibility of the hiding algorithm embedding position,by calculating the regional energy values of the secret image block and the carrier image,according to the energy value mapping,the secret image is embedded by block in the medium frequency matrix block after the secondary DWT of the carrier image,and finally the in secret image with visual meaning is composed.The simulation results and analysis show that the invisibility and attack resistance of the proposed hiding algorithm are good and the key space is large enough.(4)An image hiding algorithm based on the integer wavelet transform(IWT)and LSB is proposed.To combine the embedding capacity and invisibility of the hiding algorithm,the carrier image is processed in the transform domain by the integer wavelet transform,and then the two IF matrices of the secret image and the carrier transform coefficients are converted to 4-bit quadrature,each bit of the secret pixel quadrature is replaced by the lowest bit of the IF matrix quadrature,and the visually meaningful carrier image is generated by the inverse quadrature and inverse integer wavelet transform.The purpose of this algorithm is to combine the embedding capacity and invisibility of the hiding algorithm.Simulation results and analysis show that the proposed algorithm satisfies both the embedding capacity and invisibility requirements of the hiding algorithm,and that the algorithm runs with excellent efficiency.In view of the above,the research content of this paper can successfully address the dual security requirements of images,and the simulation results prove that the proposed encryption and hiding algorithm has high security,robustness,invisibility and implementability.
Keywords/Search Tags:Compressed sensing, Chaotic systems, Image encryption, Information hiding
PDF Full Text Request
Related items