Font Size: a A A

An Image Information Hiding And Extraction Algorithm Based On The Chaotic Mapping

Posted on:2013-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:C LiFull Text:PDF
GTID:2218330374459287Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the continuous advancement of society, science and technology, the way of men's study, work and lifestyle have increasingly been being changed by information technology, meanwhile, serious difficulties and challenges have also been brought to information security. Therefore, in recent years, much attention from the researchers in homeland and board has been paid to information security. The image information hidden in a large number of high-speed digital information dissemination also has been developed unprecedentedly. The chaos is the inherent randomness of a deterministic system to produce external complex nonlinear dynamics of a behavior. The chaos technology is a good information hiding theory and technology program. On the basis of widely used image, combined with digital image transformation techniques and chaos theory, to conduct in-depth study. The paper focuses on the hidden and extraction of image information, the proposed algorithm based on image hidden image information of chaotic mapping.Mainly done work and results as follows:1. The analysis of the chaos and chaotic mappingBased on the analysis of the chaos and chaotic mapping from chaos theory, the basic characteristics of the chaotic system application are discussed, taking into account the characteristics of the image information, focused on the chaotic map and for the chaotic system requirements, selection of the Logistic map pretreatment.2. Based on chaos mapping image information hiding and extraction implementationThis paper points out the secret image processing requirements, the development of information hiding and general mode and process flow, introduces some common transform domain algorithms and experimental study to analyze its characteristics. Open carrier hidden image was extracted from the anti-geometric attacks, anti-shearing attack, and add noise experiments, peak signal to noise ratio PSNR, the root mean square error RMSE and run the program time three to compare, because we have sensitive on the initial value of chaotic map, after being attacked also want to be able to better extract the image information, confirming the effective feasibility and robustness of the subjects of this study. Security in the image distortion effects and robustness have a good advantage.Combination of chaotic maps, airspace and frequency domain transform of features and image transformation effects, and proposed an effective Logistic map interpolation structure, the image by the proportion of mixed-factor processing, image transform, hidden in the open image carrier to the image information hidden, and finally the experimental simulation analysis to verify.
Keywords/Search Tags:Information Hidden and Extraction, Logistic Chaos Mapping, Geometric Attacks, Shear Attack
PDF Full Text Request
Related items