天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁 > 科技論文 > 軟件論文 >

基于混沌與變換域的信息隱藏技術(shù)研究及應(yīng)用

發(fā)布時(shí)間:2018-02-14 19:27

  本文關(guān)鍵詞: 信息隱藏 NSCT_SVD 校正技術(shù) 混沌映射 混沌神經(jīng)網(wǎng)絡(luò) 出處:《南京航空航天大學(xué)》2016年碩士論文 論文類型:學(xué)位論文


【摘要】:伴隨著信息技術(shù)的網(wǎng)絡(luò)化、數(shù)字化和自動(dòng)化的進(jìn)一步發(fā)展,大量的秘密信息之間不斷進(jìn)行著相互地傳輸與交流,因而對(duì)信息安全的要求也變得新益求新。信息安全是信息技術(shù)發(fā)展的保障,而信息技術(shù)的發(fā)展又是信息安全的最終目的。以傳統(tǒng)密碼學(xué)為基礎(chǔ)的信息安全技術(shù)已很難滿足如今安全領(lǐng)域復(fù)雜多變的各種需求。信息隱藏技術(shù)改變了傳統(tǒng)信息安全技術(shù)偽裝的思路,擴(kuò)展使用一些常見信號(hào)中的冗余信息來實(shí)現(xiàn)秘密信息隱藏,實(shí)現(xiàn)了保密通信、內(nèi)容認(rèn)證等功能,很大程度上提高了信息系統(tǒng)的安全性。本文在對(duì)海事船舶船岸通信系統(tǒng)中秘密圖像信息傳輸過程的安全隱患分析的基礎(chǔ)上,設(shè)計(jì)并實(shí)現(xiàn)了基于混沌和變換域的信息隱藏技術(shù)并將其應(yīng)用到具體的信息隱藏系統(tǒng)當(dāng)中。論文的主要研究?jī)?nèi)容如下:首先,在深入分析了當(dāng)前海事船舶船岸通信系統(tǒng)中圖像傳輸安全需求的基礎(chǔ)上,設(shè)計(jì)了信息隱藏系統(tǒng)的總體框架,闡述了該系統(tǒng)的關(guān)鍵技術(shù)。其次,提出了一種基于NSCT_SVD和校正技術(shù)的幾何魯棒水印算法。該算法通過非下采樣Contourlet變換提取出載體圖像的低頻區(qū)域,通過量化每塊奇異值矩陣的歐氏范數(shù)來嵌入水印,結(jié)合圖像不變質(zhì)心在幾何攻擊前后相對(duì)位置不變的特性和Zernike矩對(duì)旋轉(zhuǎn)、縮放攻擊的不變性,對(duì)載密圖像進(jìn)行幾何攻擊校正,恢復(fù)水印的同步信息后再提取水印。實(shí)驗(yàn)結(jié)果顯示,該算法對(duì)各類幾何攻擊都具有很好的魯棒性。然后,研究了數(shù)字圖像內(nèi)容的完整性認(rèn)證問題,提出了一種使用雙混沌映射與混沌神經(jīng)網(wǎng)絡(luò)的水印算法來實(shí)現(xiàn)對(duì)數(shù)字圖像惡意篡改定位。該算法根據(jù)圖像象素灰度值通過Lozi和Logistic的雙混沌映射迭代和混沌神經(jīng)網(wǎng)絡(luò)訓(xùn)練學(xué)習(xí)形成最終水印,并把水印嵌入到圖像的LSB位置,然后提取水印,對(duì)圖像進(jìn)行相關(guān)的篡改定位實(shí)驗(yàn)。該算法利用混沌映射的初始參數(shù)敏感性、非周期性及混沌神經(jīng)網(wǎng)絡(luò)的不可預(yù)測(cè)性,能夠精確地定位對(duì)加入水印圖像的篡改。最后,依托于某海事船舶船岸通信子系統(tǒng)完成了系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn),給出了系統(tǒng)主要功能的運(yùn)行實(shí)例。初步應(yīng)用的結(jié)果表明本文研究的關(guān)鍵技術(shù)具有良好的安全性與實(shí)用性。
[Abstract]:With the networking of information technology and the further development of digitization and automation, a large number of secret information are continuously transmitted and exchanged between each other. As a result, the requirements for information security have also become new and innovative. Information security is the guarantee of the development of information technology. The development of information technology is the ultimate goal of information security. The information security technology based on traditional cryptography has been difficult to meet the needs of the complex and changeable security field today. Information hiding technology has changed the traditional information. The idea of security technology camouflage, The extension uses redundant information in some common signals to hide secret information and implements functions such as secure communication, content authentication, etc. To a great extent, the security of the information system is improved. Based on the analysis of the hidden dangers of the secret image information transmission process in the maritime ship shore communication system, The information hiding technology based on chaos and transform domain is designed and implemented and applied to the specific information hiding system. The main contents of this paper are as follows: first of all, Based on the deep analysis of the security requirements of image transmission in the current maritime ship shore communication system, the general framework of the information hiding system is designed, and the key technologies of the system are expounded. A geometric robust watermarking algorithm based on NSCT_SVD and correction techniques is proposed, which extracts the low frequency region of the carrier image by non-downsampling Contourlet transform and embeds the watermark by quantizing the Euclidean norm of each singular value matrix. Combined with the invariance of the relative position of the image before and after the geometric attack and the invariance of the Zernike moment to the rotation and scaling attacks, the geometric attack correction of the secret image is carried out, the synchronization information of the watermark is restored and the watermark is extracted. The experimental results show that, The algorithm is robust to all kinds of geometric attacks. Then, the integrity authentication problem of digital image content is studied. A watermarking algorithm based on double chaotic mapping and chaotic neural network is proposed to locate maliciously tampered digital images, which is based on image pixel grayscale by double chaotic mapping iteration of Lozi and Logistic and chaotic neural network. Network training learning to form the final watermark, The watermark is embedded into the LSB position of the image, then the watermark is extracted, and the tamper localization experiment is carried out on the image. The algorithm utilizes the sensitivity of the initial parameters of the chaotic map, aperiodic and the unpredictability of the chaotic neural network. It can accurately locate the tampering of the added watermark image. Finally, the system is designed and implemented based on the ship-shore communication subsystem of a maritime ship. The application results show that the key technologies studied in this paper have good security and practicability.
【學(xué)位授予單位】:南京航空航天大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2016
【分類號(hào)】:TP309.7
,

本文編號(hào):1511430

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/1511430.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶cacd2***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com