跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.41) 您好!臺灣時間:2026/01/13 15:20
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:劉哲瑋
研究生(外文):Che-Wei Liu
論文名稱:一種多混沌地圖腦波加密軟體實作
論文名稱(外文):Implementation of a Multimaps Chaos-based Encryption Software for EEG Signal
指導教授:林進豐林進豐引用關係
指導教授(外文):Chin-Feng Lin
學位類別:碩士
校院名稱:國立臺灣海洋大學
系所名稱:電機工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:85
中文關鍵詞:Level-IV混沌地圖腦波加密軟體多混沌映射邏輯映射二次映射
外文關鍵詞:chaos-based level IV EEG encryption softwaremultiple chaotic mapslogic mapquadratic map
相關次數:
  • 被引用被引用:0
  • 點閱點閱:190
  • 評分評分:
  • 下載下載:9
  • 收藏至我的研究室書目清單書目收藏:0
本論文中,我們使用了多種混沌映射應用至腦波圖加密軟體實現,採用的混沌映射為邏輯映射及二次映射來開發Level-IV的腦波加密軟體,也討論了二次映射的Level-I、Level-II、Level-III加密平台效能,總計八種類型的腦波圖加密軟體。我們使用了均方根誤差百分比來估計原始腦波圖與正確解密的腦波圖之間的準確性,而皮爾森係數是用來估計錯誤解密與原始腦波圖的相互關聯性。從測試結果觀察,邏輯映射及二次映射只要有0.0001%和1%的初始錯誤,就不能得到正確解密的腦波圖。二次映射的皮爾森係數在Level-I、Level-II、Level-III裡較邏輯映射為低,邏輯映射跟二次映射的均方根誤差百分比各在Level-I、Level-II、Level-III中皆為 和 ,Level-IV中邏輯-二次映射及二次-邏輯映射的均方根誤差百分比分別為 和 。這些結果顯示,Level-IV映射可以應用於臨床腦波圖診斷中。
In the thesis, we develop a chaos-based electroencephalogram (EEG) encryption software by using multiple chaotic maps for encryption. Further, we adopt a chaos logic map and a quadratic map to develop the chaos-based level IV EEG encryption software. We discuss the encryption performance of the chaos-based level I, II, and III software using the quadratic map. In addition, we discuss the encryption performance of the chaos-based level IV software using logic-quadratic and quadratic-logic maps. Eight types of chaos-based EEG encryption software have been developed. The percent root-mean-square difference is used to estimate the accuracy of a correctly decrypted EEG signal with respect to the original EEG signal. Pearson’s correlation coefficient is used to estimate the correlation between the original EEG signal and an incorrectly decrypted EEG signal. Test results shows that for input parameters with 0.0001% and 1% initial point errors, the use of chaos logic and quadratic maps results in chaotic encryption; thus, the encrypted EEG clinical signals cannot be recovered. Pearson’s correlation coefficient of the original and incorrectly decrypted EEG signals for the chaos-based level I, II, and III software using the quadratic map is lower than that using the chaos logic map. Moreover, Pearson’s correlation coefficient of the original and incorrectly decrypted EEG signals for the chaos-based level IV software using the logic-quadratic map is lower than that using the quadratic-logic map. The percent root-mean-square difference values of the original and correctly decrypted EEG signals for the chaos-based level I, II, and III software using the logic and quadratic maps are , and , respectively. Furthermore, the percent root-mean-square difference values of the original and correctly decrypted EEG signals for the chaos-based level IV software using the logic-quadratic and quadratic-logic maps are , and , respectively. These results indicate that the chaos-based level IV EEG encryption software can be applied to clinical EEG diagnosis.
目錄

要...............................................................................................................I
摘要..............................................................................................................II
Abstract.....................................................................................................III
目錄.............................................................................................................IV
圖目錄.......................................................................................................VII
表目錄.........................................................................................................X
第1章 緒論.................................................................................................1
1.1 前言.................................................................................................1
1.2 研究動機與目的.............................................................................2
1.3 研究方法與步驟.............................................................................2
1.4 各章節內容概述.............................................................................4
第2章 研究背景與原理.............................................................................5
2.1 加密與解密系統.............................................................................5
2.1.1 密碼學...............................................................................5
2.1.2 密碼技術...............................................................................7
2.2 混沌理論.........................................................................................8
2.2.1 背景.........................................................................................8
2.2.2 混沌與密碼學.........................................................................9
2.2.3 邏輯映射.................................................................................10
2.2.4 二次映射.................................................................................13
2.3 開發環境與程式開發語言...........................................................14
2.3.1 開發環境.................................................................................14
2.3.2 開發語言.........................................................................16
第3章 腦波圖混沌加密軟體...................................................18
3.1 系統架構與系統功能...................................................................18
3.2 一維混沌位元流加密機制...........................................................20
3.2.1 一維混沌位元流攪亂器-Level I............................................21
3.2.2 一維混沌位元流攪亂器-Level II..........................................22
3.2.3 一維混沌位元流攪亂器-Level III........................................25
3.2.4 一維混沌位元流攪亂器-Level IV.........................................27
3.2.5 訊號攪亂機制.........................................................................31
第4章 實驗結果與分析...........................................................................32
4.1 腦波圖加密軟體使用方法...........................................................32
4.2 訊號分析…..................................................................................38
4.2.1 均方根誤差百分比.................................................................38
4.2.2 皮爾森相關係數.....................................................................39
4.3 腦波圖加密軟體分析與結果探討...............................................40
4.3.1 腦波圖加密軟體之一維混沌位元流攪亂器- Level I...........41
4.3.2 腦波圖加密軟體之一維混沌位元流攪亂器- Level II.........47
4.3.3 腦波圖加密軟體之一維混沌位元流攪亂器- Level III.......53
4.3.4 腦波圖加密軟體之一維混沌位元流攪亂器- Level IV........60
4.4 一維多混沌腦波加密器LevelI到Level IV討論.......................66
第5章 結論與未來展望...........................................................................68
參考文獻 ................................................................................................69

參考文獻

[1] Lin C. F., “Chaos-based 2D Visual Encryption Mechanism for ECG Medical signals,” Horizons in Computer Science Research, Volume 4, Eds: Thomas S. Clary , pp. 205-217, USA, Nova Science Publishers, 2012.
[2] Lin C. F., and Wang B. S. H.,” A 2D Chaos-based Visual Encryption Scheme for Clinical EEG Signals,” Journal of Marine Science and Technology, 19(6), 2011, pp.666-672.
[3] Lin C. F., Chung C. H., and Lin J. H., “A Chaos-based Visual Encryption Mechanism for Clinical EEG Signals,” Medical & Biological Engineering & Computing, 47(7), pp.757-762, 2009.
[4] Lin C. F., Chung C. H., Chen Z. L., Song, C. J. and Wang Z. X., “A Chaos-based Unequal Encryption Mechanism in Wireless Telemedicine with Error Decryption, ” WSEAS Transactions on Systems, Feb, 2008, pp.49-55.
[5] Lin C. F., W. Chang T., and Li C. Y., “A Chaos-based Visual Encryption Mechanism in JPEG2000 Medical Images,” J. of Medical and Biological Engineering, 27(3), pp.144-149, 2007.
[6] 林進豐和鍾承興, 一種心電圖/腦波圖混沌視覺加密方法與裝置,中華民國發明專利, I 338845, 2011年3月11日至2026年11月9日。
[7] Lin C. F., and Chang C. Y., “Implementation of a Chaos-based Encryption Software for Electroencephalogram Signals,” Advances in ECWAC, vol.1, (MEAEI2011, China), Eds: D. Jin, and S. Lin, pp.147-150, Springer-Verlag, 2012.
[8] 密碼學,http://zh.wikipedia.org/wiki/
[9] Yang Bourbakis, M. N. and S. Li., “Data-image-video encryption,”
IEEE Potentials, vol.23, pp.28-34, 2004.
[10] 混沌理論,http://zh.wikipedia.org/wiki/
[11] Kocarev, L., “Chaos-Based Cryptography : A Brief Overview”, IEEE Circuits and System Magazine , vol.1, pp. 6-21, 2001 .
[12] Klomkarn, K., Jansri, A. and Sooraksa, P.,A “Design of Stream Cipher Based on Multi-Chaotic Function”, International Symposium on Communications and Information Technologies , pp.26-29 , 2004.
[13] 邏輯映射,http://www.wikilib.com/wiki/
[14] Microsoft Visual Studio,http://zh.wikipedia.org/wiki/
[15] 曹祖聖、蔡文龍,“Microsoft Visual C# 2008基礎必修課”,碁峯資訊股份有限公司
[16] Visual C#,http://msdn.microsoft.com/zh-tw/library/kx37x362.aspx
[17] MSDN,http://msdn.microsoft.com/zh-tw/vstudio/default
[18] Klomkarn, K., Jansri, A., and Sooraksa, P., “A Design of Stream Cipher Based on Multi-Chaotic Function”, International Symposium on Communications and Information Technologies , pp.26-29 , 2004.
[19] Yen, J. C. and Guo, J. I., “A New Chaotic Key-Based Design for Encryption and Decryption”, IEEE International Symposium on Circuits and System, pp. 28-31, 2000.
[20] Zou, J., Xiong, C., Qi, D. and Ward, R. K., “The Application of Chaotic Maps in Image Encryption”, IEEE Northeast Workshop on Circuits and Systems ,2005 .
[21] Tang, K. W. and Tang, W. K. S., “A Chaos-based Secure Voice Communication System”, IEEE International Conference on Industrial Technology, pp.571-576, 2005.
[22] Li, Y., liang, L., Su, Z. and Jiang, J., “A New video Encryption Algorithm for H.264” IEEE Information Conference on Information and Communications Security, pp.1121-1124, 2005.
[23] Chen Ching-Kun and Lin Chun-Liang, “Text Encryption Using ECG signals ”IEEE Conference on Industrial Electronics and Applicationsis, pp.1741-1746, 2010.
[24] 洪國勝,Microsoft Visual C# 2008程式設計範例教本,旗標出版股份有限公司
[25] Yang, M., Bourbakis, N. and Li, S., “Data-image-video encryption” IEEE Potentials ,vol.23,pp.28-34, 2004.
[26] 多字元加密法,http://killerjims.blogspot.com/2008/09/
vigenere-cipher-to-be-or-not-to-be-that.html
[27] Pearson's correlation,http://en.wikipedia.org/wiki/
Correlation_and_dependence

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top