Font Size: a A A

Study On Image Authentication Model Based On Chaos Theory And Cryptography

Posted on:2012-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:G B WangFull Text:PDF
GTID:2178330338957636Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the deepening process of information, the way of social management, economic and lifestyle have been changing, therefore, the problem of image copyright authentication is no longer of a problem only of academic value, but rather evolves into the forefront of technical problems. Towards this problem, different people propose different solutions following their special way of thinking , academic background and point of view. The richness of the program having existed concerning the problem of image copyright authentication provides a broad view, but also increases the difficulty of selecting the proper program. Summarizing the existing ideas, analysizing and evaluating of existing programs, re-examining the issue of image copyright with the current status is an excellent idea, resisting its complexity and designing a new program on the basis of the existing authentication scheme has become a more practical choice.Cryptography is committed to addressing the problem of the protection of information security, which focuses on protecting the secrecy, integrity, authenticity and effectiveness of information from theft, forgery, tampering and other forms of attacking and destructing. This paper tries to form a new model of the mechanism of non-realtime authentication protocol focusing on authenticity and validity of the sources of the image file from the perspectives of certification requirements, the establishment of an agreement, the demonstration of the safety of the agreement together with considering some form of special types of information attacks, and by logic-based formal verification on security requirements for authentication demonstrated the reliability of the agreement.Specifically, the protocol designed in this paper is a copyright authentication protocol based on both chaos theory and vulnerable transparent watermark.The main contribution made by this paper could be reflected in the following aspects:â—‹1 A new random sequence generating algorithm based on chaos theory is proposed, and the significance of the improvement of the algorithm is analyzed.â—‹2 An embedding and extracting algorithm concerning watermark based on chaos theory and wavelet packet decomposition is improved, and the significance of the improvement of the algorithm is analyzed.â—‹3 Relevant concepts, classification concerning about authentication problem of cryptography is briefly reviewed. Towards the problem of tampering the information hidden in the fragile watermark, considering public-key cryptography and authentication protocol, an authentication procotol with application value which is divided into three parts is proposed.â—‹4 A formal proof based on logic for the established authentication protocol model is given, and the effectiveness of the security goals of the agreement is demonstrated.
Keywords/Search Tags:chaos, fragile transparent watermark, authentication protocol, SVO
PDF Full Text Request
Related items