- 1、本文档共40页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
分形插值函数在图像加密中的应用-应用数学专业论文
汕
汕 头 大 学 硕 士 学 位 论 文
PAGE
PAGE VI
Abstract
With the rapid development of multimedia technology, digital image processing and transmission have also been considerable developed and image security gains more and more attention. Over the past decades, many image encryption schemes have been proposed, such as Baker map’s itinerary based encryption, 3D chaotic map based encryption, Arnold transform based encryption, etc.
The inherent features of chaotic sequence, such as ergodicity, sensitivity to initial conditions and control parameters, parameter controllability and pseudo-randomness, etc. meet the two basic principles of cryptography: diffusion and confusion. Application of chaotic sequence in image encryption is a promising research field.
The main contribution of this thesis is as follows.
Chapter III studies the fractal interpolation function and its inverse function, specially, we pay more attentions to the chaotic dynamical properties of the inverse function. The inverse function of fractal interpolation function is used to generate random number sequences, which are applied to realize image encryption. The proposed image encryption consists of two processes: scrambling the image pixel positions and diffusing the pixel values. Security analysis of the proposed scheme has been performed, including key space analysis, key sensitivity analysis, statistical analysis, differential attack, information entropy analysis, etc. The simulations show that the encryption scheme has a large key space, high sensitivity to initial conditions and control parameters, good statistical properties and therefore can resist brute-force attack, statistical analysis attack, differential attack, etc.
In Chapter IV, a new iterated function system is proposed. The constructed iterated function system is then used to generate fractal interpolation function. Properties of the dynamical system yielded by the inverse fractal interpolation function have been studied. With the help of the
您可能关注的文档
- 分布式喷泉码在分布式存储系统中的应用模型与方法研究-通信与电子工程专业论文.docx
- 分布式喷泉码在无线传感器网络中的应用-通信与信息系统专业论文.docx
- 分布式图像检索训练系统的设计与实现-软件工程专业论文.docx
- 分布式喷泉码在深空通信中的应用研究-通信与信息系统专业论文.docx
- 分布式图像管理系统的设计与实现软件工程专业论文.docx
- 分布式图并行计算框架的调度分析与优化-软件工程专业论文.docx
- 分布式图像管理系统的设计与实现-软件工程专业论文.docx
- 分布式图计算系统的容错机制研究-软件工程专业论文.docx
- 分布式地图切片系统的设计与实现-计算机系统结构专业论文.docx
- 分布式基站设备仿真系统的设计与实现-软件工程专业论文.docx
文档评论(0)