数字图像加密算法研究与实现

更新时间:2023-11-14 00:02:01 阅读量: 教育文库 文档下载

说明:文章内容仅供预览,部分内容可能不全。下载后的文档,内容与下面显示的完全一致。下载之前请确认下面内容是否您想要的,是否完整无缺。

海 南 大 学

毕 业 论 文(设计)

题 目:数字图像加密算法研究与实现学 号:姓 名:年 级:二学 院:信息科学技术学院系 别:通专 业:通指导教师:完成日期:

零 一 零 级 信 工 程 系 信 工 程

2014 年 5月 1 日

数字图像加密算法研究与实现

摘 要

近十年来,随着信息网络技术的飞速发展,多媒体技术在各领域的应用可谓是日新月异。数字图像无疑已经成为互联网的主要交互对象之一。数字图像在军事系统、政府机构、医疗系统、国防系统和金融系统等重要机构中得到了广泛应用,这也意味着图像在传输的过程中存在着巨大的安全隐患。若在传输的时候被第三方恶意的拦截、随意篡改、非法拷贝、任意传播,后果将会很严重。所以数字图像的安全传输问题,受到了大众的普遍重视。因此信息安全已成为人们关心的焦点,也是当今的研究热点和难点。 为了实现数字图像保密,实际操作中一般先将二维图像转换成一维数据,再采用传统加密算法进行加密。与普通的文本信息不同,图像和视频具有时间性、空间性、视觉可感知性,还可进行有损压缩,这些特性使得为图像设计更加高效、安全的加密算法成为可能。

本文重点介绍了基于混沌理论的图像加密算法,对比并研究了几个典型的混沌系统:Logistic映射、Hemon映射、Lorenz系统以及猫映射。最后,在matlab7.8环境下,对灰度图像进行了基于Logistic映射的加密解密,并得出正确的结果。

关键词:Logistic映射;图像加密 ;混沌系统 ;位置置乱

数字图像加密算法研究与实现

Abstract

In the past ten years, with the rapid development of information network technology, the application of multimedia technology in all fields is change rapidly. Digital image has become one of the main object of the internet. Interactive image has been widely used in the important organization of military system, government agencies, medical systems defense systems and financial systems, this also means that the image has many security hidden troubles in the interactive process. If the transmission was malicious third party interception, tamper with, illegal copy, spread, the consequences will be very serious. So the digital image security problems of interaction, has attracted much attention from the public. Therefore, information security has become the focus of people's concern is also the hot spot and difficulty. In order to realize the digital image encryption, the actual operation of the video general first two-dimensional image into one-dimensional data then adopts the traditional encryption. Unlike ordinary text, images and with temporal, spatial, visual perceptibility, also can be loss compression, these features make the image encryption algorithm to design more efficient, safe possible. Image encryption algorithm has gained abundant research achievements, people have designed many image encryption algorithm

This paper introduces image encryption algorithm based on chaotic theory, and studied several typical chaotic systems: Logistic mapping; Lorenz system and cat map. In the matlab7.8 environment, Logistic mapping of the encryption and decryption based on a gray image of arbitrary input, and can get the correct results

Keywords: Logistic map; image encryption; chaotic system; position scrambling

数字图像加密算法研究与实现

目 录

1 绪论 ....................................................... (1)

1.1 研究背景 ............................................. (1) 1.2 研究方法 ............................................. (1) 1.3 研究内容 ............................................. (2) 2 数字图像加密理论概述 ....................................... (3)

2.1数字图像的基本知识 .................................... (4) 2.2 数字图加密算法的性能要求 ............................. (4) 2.3 数字图像加密算法的分类 ............................... (5)

2.3.1基于矩阵变换像素置换的图像加密技术 .............. (5) 2.3.2基于秘密分割与秘密共享的图像加密技术 ............ (6) 2.3.3基于现代密码体制的图像加密技术 .................. (6) 2.3.4基于混沌理论的图像加密算法 ...................... (7)

3 基于混沌理论的图像加密算法 ................................. (8)

3.1 混沌的基本理论 ....................................... (8)

3.1.1 Li-Yorke的混沌定义 ............................. (8) 3.1.2 Devaney 的混沌定义 ............................. (9) 3.1.3 Melnikov 的混沌定义 ............................ (10) 3.2混沌的特征 ........................................... (10)

数字图像加密算法研究与实现

3.3常见的混沌系统的研究方法 ............................. (11) 3.4几种典型的混沌系统 ................................... (12)

3.5.1 Logistic映射 .................................. (12) 3.5.2 Henon映射 ..................................... (15) 3.5.3 Lorenz系统 ................................... (155) 3.5.4猫映射 ......................................... (12)

4 基于Logistic映射的图像加密/解密研究与实现 ................ (17)

4.1基于Logistic映射的像素值加密及解密方案 .............. (17) 4.2基于Logistic映射的像素位置加密及解密 ................ (19) 4.2.1具体加密方案 .................................... (20) 4.2.2解密方案 ........................................ (20) 4.3实验结果以及仿真分析 ................................. (21) 4.3.1基于像素点置乱图像加密/解密的实验结果及分析 .... (21) 4.3.2基于像素位置置乱图像加密/解密的实验结果及分析 .. (23) 4.3.3结合像素点与位置的双重置乱分析 ................. (25) 5 总结 ...................................................... (28) 致谢 ........................................................ (28) 参考文献 .................................................... (29)

本文来源:https://www.bwwdw.com/article/jh4v.html

Top