基于混沌与变换域的信息隐藏技术研究及应用
发布时间:2018-02-14 19:27
本文关键词: 信息隐藏 NSCT_SVD 校正技术 混沌映射 混沌神经网络 出处:《南京航空航天大学》2016年硕士论文 论文类型:学位论文
【摘要】:伴随着信息技术的网络化、数字化和自动化的进一步发展,大量的秘密信息之间不断进行着相互地传输与交流,因而对信息安全的要求也变得新益求新。信息安全是信息技术发展的保障,而信息技术的发展又是信息安全的最终目的。以传统密码学为基础的信息安全技术已很难满足如今安全领域复杂多变的各种需求。信息隐藏技术改变了传统信息安全技术伪装的思路,扩展使用一些常见信号中的冗余信息来实现秘密信息隐藏,实现了保密通信、内容认证等功能,很大程度上提高了信息系统的安全性。本文在对海事船舶船岸通信系统中秘密图像信息传输过程的安全隐患分析的基础上,设计并实现了基于混沌和变换域的信息隐藏技术并将其应用到具体的信息隐藏系统当中。论文的主要研究内容如下:首先,在深入分析了当前海事船舶船岸通信系统中图像传输安全需求的基础上,设计了信息隐藏系统的总体框架,阐述了该系统的关键技术。其次,提出了一种基于NSCT_SVD和校正技术的几何鲁棒水印算法。该算法通过非下采样Contourlet变换提取出载体图像的低频区域,通过量化每块奇异值矩阵的欧氏范数来嵌入水印,结合图像不变质心在几何攻击前后相对位置不变的特性和Zernike矩对旋转、缩放攻击的不变性,对载密图像进行几何攻击校正,恢复水印的同步信息后再提取水印。实验结果显示,该算法对各类几何攻击都具有很好的鲁棒性。然后,研究了数字图像内容的完整性认证问题,提出了一种使用双混沌映射与混沌神经网络的水印算法来实现对数字图像恶意篡改定位。该算法根据图像象素灰度值通过Lozi和Logistic的双混沌映射迭代和混沌神经网络训练学习形成最终水印,并把水印嵌入到图像的LSB位置,然后提取水印,对图像进行相关的篡改定位实验。该算法利用混沌映射的初始参数敏感性、非周期性及混沌神经网络的不可预测性,能够精确地定位对加入水印图像的篡改。最后,依托于某海事船舶船岸通信子系统完成了系统的设计与实现,给出了系统主要功能的运行实例。初步应用的结果表明本文研究的关键技术具有良好的安全性与实用性。
[Abstract]:With the networking of information technology and the further development of digitization and automation, a large number of secret information are continuously transmitted and exchanged between each other. As a result, the requirements for information security have also become new and innovative. Information security is the guarantee of the development of information technology. The development of information technology is the ultimate goal of information security. The information security technology based on traditional cryptography has been difficult to meet the needs of the complex and changeable security field today. Information hiding technology has changed the traditional information. The idea of security technology camouflage, The extension uses redundant information in some common signals to hide secret information and implements functions such as secure communication, content authentication, etc. To a great extent, the security of the information system is improved. Based on the analysis of the hidden dangers of the secret image information transmission process in the maritime ship shore communication system, The information hiding technology based on chaos and transform domain is designed and implemented and applied to the specific information hiding system. The main contents of this paper are as follows: first of all, Based on the deep analysis of the security requirements of image transmission in the current maritime ship shore communication system, the general framework of the information hiding system is designed, and the key technologies of the system are expounded. A geometric robust watermarking algorithm based on NSCT_SVD and correction techniques is proposed, which extracts the low frequency region of the carrier image by non-downsampling Contourlet transform and embeds the watermark by quantizing the Euclidean norm of each singular value matrix. Combined with the invariance of the relative position of the image before and after the geometric attack and the invariance of the Zernike moment to the rotation and scaling attacks, the geometric attack correction of the secret image is carried out, the synchronization information of the watermark is restored and the watermark is extracted. The experimental results show that, The algorithm is robust to all kinds of geometric attacks. Then, the integrity authentication problem of digital image content is studied. A watermarking algorithm based on double chaotic mapping and chaotic neural network is proposed to locate maliciously tampered digital images, which is based on image pixel grayscale by double chaotic mapping iteration of Lozi and Logistic and chaotic neural network. Network training learning to form the final watermark, The watermark is embedded into the LSB position of the image, then the watermark is extracted, and the tamper localization experiment is carried out on the image. The algorithm utilizes the sensitivity of the initial parameters of the chaotic map, aperiodic and the unpredictability of the chaotic neural network. It can accurately locate the tampering of the added watermark image. Finally, the system is designed and implemented based on the ship-shore communication subsystem of a maritime ship. The application results show that the key technologies studied in this paper have good security and practicability.
【学位授予单位】:南京航空航天大学
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:TP309.7
,
本文编号:1511430
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/1511430.html