Dissertation > Excellent graduate degree dissertation topics show

Research of Image Encryption Algorithm Performance Evalution

Author: WuQiong
Tutor: HanTaiLin
School: Changchun University of Science and Technology
Course: Information and Communication Engineering
Keywords: underdetermined blind separation non-negative matrix factorizationperformance analysis signal to noise ratio singular value decomposition
CLC: TN918.1
Type: Master's thesis
Year: 2012
Downloads: 75
Quote: 0
Read: Download Dissertation

Abstract


Since the encryption technology based on d blind source separation has been proposed, the performance evaluation of these blind theories encryption have become the focus to scholars, the aim of this paper is evaluating the two typical encryption technology using signal to noise ratio, and then singular value decomposition method, aiming at the evaluation of only the image itself, would be proposed in order to expound performance evaluation and comparison of the different blind encryption technologies.This paper describes t he encryption method based on underdetermined blind source separation and blind encryption based on BSS/NMF, and gives detailed argument of ICA and NMF principle which are the theoretical basis of blind encryption. And the MATLAB simulation images of two blind encryption algorithms are given, including explicit images key images, encryption images and decryption images, meanwhile the effect of encryption and decryption from the sensory point of view is given. The focus of the paper is the image encryption evaluation using signal to noise ratio and singular value decomposition. A large number of experimental simulations using Lena, Cameraman and other pictures and image contrast are provided for the detail of two blind encryption algorithm evaluations. The results show that BSS/NMF based blind encryption has, under the same correlation, low signal to noise ratio after encryption, high decryption signal to noise ratio value, and low entropy value of singular, indicating that the BSS/NMF based Blind encryption technology is better than the encryption method which based on underdetermined blind source separation.

Related Dissertations

  1. Packet Loss Recovering Technology for Speech Transmission over Network,TN912.3
  2. Research on Blind Watermarking Technique of Digital Images Based on Contourlet Transform,TP309.7
  3. Astudy and Analysis on the Channel Capacity of MIMO System,TN919.3
  4. Security Performance of Multi-Antenna Wiretap Channel,TN918.91
  5. The Researches of Random Row-column Cyclic Shift Interleaver and Quantum Interleaver,TN911.22
  6. Doppler spectral domain optical coherence tomography imaging algorithm research,TP391.41
  7. Subspace-based analysis of Narrowband Interference Suppression in Spread Spectrum Communications,TN914.42
  8. Hyperspectral Unmixing Based on Nonnegative Matrix Factorization,TP751.1
  9. Influence of Tropical Oceans on Middle and High Latitudes of Atmospheric Circulation Anomalies,P732
  10. Strange Nonsymmetric Algebraic Riccati Equation Numerical Solution,O241.6
  11. Based on the digital watermark information hiding technology,TP309.7
  12. Research on Blind Detection Based on Image Content,TP391.41
  13. Digital Image Watermarking Algorithm Based on DWT and SVD,TP309.7
  14. Design and Implementation of Robust Multi-watermarking Algorithm for Digital Image,TP309.7
  15. Application Research on Quantitative Prediction of Mineral Resources of Non-Negative Matrices Factorization Algorithm Based on GIS,P624.7
  16. Host-based intrusion detection and prediction algorithms,TP393.08
  17. Eigenvalue Problems of Nonnegative Tensors,O183.2
  18. Design and Research of an Underwater Acoustic Communication System Using OMAP,TN929.3
  19. Data fusion - based cooperative spectrum sensing technology research,TN925
  20. Research on Low Signal-To-Noise Ratio Signal Detection Based on Non-Linear Theory,TN911.23
  21. Flaw Detection in High Speed Railway Based on Vibration Signals,TN911.23

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile