教育論文網

An Eclectic Image Encryption Scheme Depending on Chaos Algorithm

碩士博士畢業論文站內搜索    
分類:教育論文網→工業技術論文→自動化技術、計算機技術論文計算技術、計算機技術論文一般性問題論文安全保密論文加密與解密論文
An Eclectic Image Encryption Scheme Depending on Chaos Algorithm
論文目錄
 
摘要第1-7頁
Abstract第7-14頁
List of Abbreviations第14-15頁
CHAPTER 1 Introduction第15-22頁
  1.1 Background第15-17頁
  1.2 Motivation第17-18頁
  1.3 Image encryption第18-19頁
  1.4 Selective image encryption第19頁
  1.5 Multimedia Encryption第19-20頁
  1.6 Aim of Thesis第20頁
  1.7 Outline of the Thesis第20-22頁
CHAPTER 2 Fundamentals of Chaotic Cryptography & Transformations and related work第22-38頁
  2.1 Introduction To Chaos第22頁
  2.2 Chaotic Maps第22-29頁
    2.2.1 One-Dimensional Chaotic Maps第23頁
    2.2.2 Two-Dimensional Chaotic Maps第23-25頁
    2.2.3 Relationship between Cryptosystems and Chaotic Systems第25-27頁
    2.2.4 Chaotic Confusion and Diffusion Process for Image第27-28頁
    2.2.5 Introduction to Hyper-Chaotic System第28-29頁
  2.3 Color Masking第29-31頁
    2.3.1 YUV Representation第30-31頁
  2.4 Discrete Cosine Transform(DCT)第31-32頁
  2.5 Quantization第32-33頁
  2.6 Cryptanalysis of Chaos-Based Image Cryptosystems第33-34頁
  2.7 Related Work第34-37頁
  2.8 Summary第37-38頁
CHAPTER 3 Design and Implementation of the Proposed Scheme第38-65頁
  3.1 Introduction第38頁
  3.2 Design Considerations第38頁
  3.3 Tools And Requirements第38-39頁
  3.4 Architecture of the Proposed Scheme第39-59頁
    3.4.1 Image Loading第41-42頁
    3.4.2 Transform RGB Image to YUV Color Space Format第42-43頁
    3.4.3 Decompose Y Matrix to(8×8)Blocks第43-44頁
    3.4.4 DCT Implementation第44-46頁
    3.4.5 Quantization第46-47頁
    3.4.6 Diffusion Process Based on Hyper- Chaotic第47-53頁
    3.4.7 The Inverse of DCT(IDCT)第53-54頁
    3.4.8 Reconstruct Y' Component第54-55頁
    3.4.9 Confusion Process(Based on 2D Chaotic Standard Map)第55-57頁
    3.4.10 Transforming Y'U'V' Color Space Format into an Encrypted RGB第57-59頁
  3.5 Decryption Module第59-64頁
  3.6 Summary第64-65頁
CHAPTER 4 Evaluation of Proposed Encryption Scheme第65-79頁
  4.1 Introduction第65頁
  4.2 Evaluation Criteria of General Image Encryption第65-75頁
    4.2.1 Correlation Coefficient第65-68頁
    4.2.2 Key Sensitivity第68-70頁
    4.2.3 Exhaustive Key第70-71頁
    4.2.4 Encryption Quality第71-74頁
    4.2.5 Speed performance第74頁
    4.2.6 Avalanche effect第74-75頁
  4.3 Evaluation Criteria of Eclectic Encryption第75-77頁
    4.3.1 Tunability第75頁
    4.3.2 Encryption Ratio第75頁
    4.3.3 Information Entropy Analysis第75-76頁
    4.3.4 Error Tolerance第76-77頁
  4.4 Summary第77-79頁
CHAPTER 5 Conclusions and Suggestions for Future Works第79-81頁
  5.1 Conclusions第79-80頁
  5.2 uggestions for Future Works第80-81頁
References第81-86頁
ACKNOWLEDGEMENT第86頁

本篇論文共86頁,點擊這進入下載頁面
 
更多相關論文
An Eclectic Image Encryption Sch
Energy-Efficient Resource Alloca
Embeddings Based Models-for Pred
Face Attribute Classifiers based
Network Topology Discovery Based
Cooperative Spectrum Sensing in
Design and Implementation of A G
Fractal Analysis of Datasets Usi
Converting Relational Database i
Web-based Movie Recommender Syst
Point of Interest Recommendation
Building Comparable Corpora Base
Cancer Cure Decision Support Sys
WordNet Based Multi Aspects Sent
Design and Implementation of Cen
Gamified Web Application System
A Supervised Road Traffic Accide
Effect of Operation Parameters o
Design and Implement of Instant
Investigation of Efficient Depth
Visual Object Tracking Using Col
Nutr-Hydr,A Nutrition Software A
Implementation and Performance A
Proposed Secure WLAN Architectur
An Analytical Assessment and Exa
欄 目 導 航
 
 
選擇圖像加密 局部加密 無序映射系統 離散余弦變換
版權申明:目錄由用戶提供,www.yhqmct.live僅收錄目錄,作者需要刪除這篇論文目錄請點擊這里
| 設為首頁||加入收藏||站內搜索引擎||站點地圖||在線購卡|
版權所有 教育論文網 Copyright(C) All Rights Reserved
吉林快3走势图下载安装