本科毕业设计论文《基于混沌序列的加密图像隐藏技术的设计与实现》我要分享

Undergraduate graduation thesis "design and implementation of encrypted image hiding technology base

chaos-encryption Image-Encryption 噪声图像加密 信息隐藏技术 混沌加密论文

关注次数: 586

下载次数: 10

文件大小: 4400KB

代码分类: 电子书籍

开发平台: matlab

下载需要积分: 1积分

版权声明:如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

代码描述

中文说明:

这是我本科毕业设计论文《基于混沌序列的加密图像隐藏技术的设计与实现》,就是把一张图片加密后隐藏在载体图像中,可以抵御各种攻击,用到了Matlab,里面包括开题报告,论文,可执行程序。本文系统介绍了混沌加密、信息隐藏技术。归纳了混沌加密、信息隐藏的分类、特性与应用,给出了混沌加密、信息隐藏的原理和基本框架以及其性能的评价方法,介绍了几种图像的攻击方法。实现了一种混沌加密和图像隐藏的方法。使用混沌加密对待隐藏图像进行加密后嵌入载体图像中,并对嵌入待隐藏图像的载体图像进行了几种攻击以验证其鲁棒性。本系统运用MATLAB编程实现对图像的混沌加密,运用LSB算法将加密后图像嵌入载体图像中,并能承受图像剪切,图像增亮,图像变暗,增加对比度,减低对比度,添加积性噪声,添加高斯噪声,旋转45度,直方图均衡化等一定程度的毁损和各种攻击检测,仍然能解密得到原图像,原图像清晰可辨,鲁棒性非常好。总之本文较好的实现了基于混沌序列的加密图像隐藏技术。


English Description:

This is my undergraduate graduation project thesis "design and implementation of encrypted image hiding technology based on chaotic sequence", which is to hide an image in the carrier image after encryption, which can resist various attacks. MATLAB is used, including the opening report, thesis and executable program. This paper systematically introduces the chaotic encryption and information hiding technology. The classification, characteristics and applications of chaotic encryption and information hiding are summarized. The principle, basic framework and performance evaluation methods of chaotic encryption and information hiding are given. Several image attack methods are introduced. A method of chaotic encryption and image hiding is realized. Chaotic encryption is used to encrypt the image to be hidden and embed it into the carrier image. Several attacks are carried out on the carrier image embedded in the image to verify its robustness. This system uses MATLAB programming to realize chaotic encryption of the image, and uses LSB algorithm to embed the encrypted image into the carrier image, and can withstand image cutting, image brightening, image darkening, increasing contrast, reducing contrast, adding product noise, adding Gaussian noise, rotating 45 degrees, histogram equalization and other certain degree of damage and various attack detection, and can still decrypt The original image is clear and robust. In a word, this paper realizes the encryption image hiding technology based on chaotic sequence.


代码预览

上传

....\可执行程序

....\..........\Contoh_WPhaseCorrelation.m

....\..........\Correlation.m

....\..........\ExtPhaseCorrelation.m

....\..........\j.mat

....\..........\m.mat

....\..........\main.fig

....\..........\main.m

....\..........\main2.fig

....\..........\main2.m

....\..........\mm.mat

....\..........\mm.txt

....\..........\n.mat

....\..........\psnr.m

....\..........\s.mat

....\..........\test2.fig

....\..........\test2.m

....\..........\test3.m

....\..........\w.mat

....\..........\xiangguanxing.m

....\..........\安装使用说明书.txt

....\..........\源程序.txt

....\基于混沌序列的加密图像隐藏技术的设计与实现论文.docx

....\张三开题1.pptx

....\张三开题报告5.doc