Font Size: a A A

Study On Multimedia Information Hiding Algorithm Based On Chaotic Dynamical Systems

Posted on:2010-11-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q XuFull Text:PDF
GTID:2178360275950042Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
The 3G era is coming. The multimedia information, such as image,audio,video used for transmission medium, which is widely used for communication technology and products is becoming more and more popular. Because of the improvement of the information technology, people feel more comfortable and convenience. But, the security of the information which is related to people's life is also meet stricter requirements. This paper describes the relevance technology of information hiding,the relevance theory of chaotic dynamical system and it's advantage in the information security field. The paper is focus on information hiding algorithm based on chaotic dynamical system, part five have set up a wireless communication system, a kind of algorithm which can encrypt and decrypt text information is achieved on it . The achievement of the communication system take the algorithm which is based on chaotic system to a higher degree of practical application.The main contribution of this paper are as follows:1. A detail comparative analysis on the feature of encryption algorithm based on the one-dimensional Logistic system and the two-dimensional Logistic system. In the information security field, it is thought that if the algorithm is complex enough, the security of the information is higher. So far, most encryption algorithm based on chaotic system is one-dimensional Logistic system. Because one-dimensional Logistic system is relatively simple, and the sequence is more similar with the property of noise, but it's too simple that it's safety is weak; The two-dimensional Logistic System which is more complex can be more safe, but the x_k,y_k sequences are not perfect. In this paper, an algorithm based ontwo-dimensional Logistic system was introduced , the algorithm has not only improved the characteristic of the chaotic sequences, but also have stronger security. We also test the algorithm with several kinds of attack method which are commonly used (such as add noise, compression, cut, etc).2. Achieve an algorithm based on chaotic system which can encrypt and decrypt test information on the hardware platform. In order to verify the feasibility and practicality of the algorithm, a wireless transmission system which is composed by the S3c4510b processor, nRF2401 wireless transceiver modules, ST7920 LCD controller and PS/2 keyboard is built. The algorithm has been transplanted on the platform, we have verified the feasibility of the algorithm, but the limitations of the algorithm through the realization are also exposed and the analysis is given.
Keywords/Search Tags:Chaos, Two-dimensional Logistic system, Hiding of image, Encrypt of binary information, Wireless transfer
PDF Full Text Request
Related items