跳到主要內容

臺灣博碩士論文加值系統

(44.220.247.152) 您好!臺灣時間:2024/09/12 05:27
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林鴻鈞
研究生(外文):Hung-Chun Lin
論文名稱:新的數位影像加解密演算法及隱藏式視覺密碼演算法
論文名稱(外文):NEW DIGITAL IMAGE ENCRYPTION/DECRYPTION ALGORITHMS AND HIDDEN VISUAL CRYPTOGRAPHY ALGORITHM
指導教授:汪順祥
指導教授(外文):Shuenn-Shyang Wang
學位類別:碩士
校院名稱:大同大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:121
中文關鍵詞:影像加解密混沌序列視覺密碼學
外文關鍵詞:Chaotic sequenceImage Encryption/DecryptionVisual Cryptography
相關次數:
  • 被引用被引用:0
  • 點閱點閱:176
  • 評分評分:
  • 下載下載:21
  • 收藏至我的研究室書目清單書目收藏:6
近幾年來,隨著網路世界蓬勃的發展及通訊系統與多媒體技術的飛速進步,多媒體通訊已經逐漸成爲人們之間資訊交流的重要管道;因此,資訊的安全與保密顯得越來越重要。尤其是針對影像資訊,由於網路頻寬的普及,影像資料在傳輸過程中容易被非法的使用者竊取、破壞或者更改,所以,對於影像資訊傳輸的保密性是一門越來越被重視的課題。
本論文的目的在於討論利用混沌系統的良好特性來對影像進行加密,進而提高其安全性;除此之外,我們也將討論視覺密碼學相關課題及應用。近年來,許多人開始漸漸應用混沌系統特性於密碼學,由於混沌系統對於初始值的敏感,因此,可以提高已加密資料的安全性,避免被非法使用者竊盜使用,我們會將其利用在Mojette Transform上面,除了可以達到錯誤更正碼的功能更可以增加影像資料上的安全性;另外,在視覺密碼學上,我們可以透過認證碼來判斷影像是否有遭受過變動。
In recent years, owing to the great development of communication system and multimedia technology, the multimedia communication has become an important role in communicating with people. The digital images can be altered and destroyed by the illegal user easily in the data transmission since the communications of digital products over open network occur more and more frequently. Hence, the security of digital images has become a critical issue.
The purpose of this paper intends to take advantage of the features of the chaotic sequences to encrypt the digital images coded by Mojette Transform and to improve the security level. In addition, we will discuss the visual cryptography and its application. The Chaos has been applied to the cryptography in recent years. Chaotic sequences have several good properties including the ease of their generation, their sensitive dependence on their initial condition and noise like. It is very useful to strengthen the security of encrypted data to avoid the attack by the pirate. In this paper, we will achieve the error correcting ability of the received images and enhance the security by applying chaos to the Mojette Transform. On the other hand, we may apply the authentication code to judge the digital image whether has been suffered the change in the visual cryptography.
CHINESE ABSTRACT
ENGLISH ABSTRACT
ACKNOWLEDGEMENTS
TABLE OF CONTENTS
LIST OF FIGURES
LSIT OF TABLES
CHAPTER 1 INTRODUCTION
CHAPTER 2 CHAOS THEORY
2.1 DYNAMIC SYSTEM
2.1.1 Autonomous Dynamical System
2.1.2 Non-autonomous Dynamical System
2.1.3 Discrete-Time Dynamical System
2.2 CHAOS
2.3 One-Dimensional Maps
2.3.1 Tent Map
2.3.2 Logistic Map
2.4 The Applications of Cryptography
CHAPTER 3 MOJETTE TRANSFORM
3.1 DEFINITION
3.1.1 Direct Transform
3.1.2 Inverse Transform
3.2 MOJETTE TRANSFORM ON THE BINARY IMAGE
3.2.1 Definition
3.2.2 The Applications of The Binary Image of Size 2 x 2
3.2.3 The Applications of The Binary Image of Size 3 x 3
CHAPTER 4 DIGITAL IMAGE ENCRYPTION/DECRYPTION ALGORITHMS
4.1 OVERVIEW OF EXISTING TECHNIQUS
4.1.1 The CMLIE Algorithm
4.1.2 The HCIE Algorithm
4.1.3 The BRIE Algorithm
4.2 THE DIGITAL IMAGE ENCRYPTION / DECRYPTION ALGORITHM
4.2.1 Digital Image Encryption Algorithms Based On Chaos
4.2.2 Digital Image Encryption Algorithms Based On Chaos And
Mojette Transformation
4.3 PROPERTIES AND SECURITY
4.4 EXPERIMENTAL RESULTS
CHAPTER 5 HIDDEN VISUAL CRYPTOGRAPHY ALGORITHM
5.1 REVIEW OF ( k , n )-THRESHOLD VISUAL CRYPTOGRAPHY
5.2 HIDDEN VISUAL CRYPTOGRAPHY ALGORITHM
5.3 EXPERIMENTAL RESULTS
CHAPTER 6 CONCLUSION
REFERENCE
[1]Jui-Cheng Yen, J. I. Guo, “A New Chaotic Mirror-Like Image
Encryption Algorithm and its VLSI Architecture,” Pattern
Recognition and Image Analysis, Vol.10, No.2, pp.236-247,
2000.
[2]M. Salleh, S. Ibrahim, I.F. Isnin, ”Enhanced chaotic image
encryption algorithm based on Baker's map,” IEEE,
Proceedings of the 2003 International Symposium on Circuits
and Systems, Vol.2, pp.508-511, May 2003.
[3]J.-C. Yeo, J.-I Guo, ”Efficient hierarchical chaotic image
encryption algorithm and its VLSI realization,” Vision,
Image and Signal Processing, IEE Proceedings, Vol.147,
pp.167-175, April 2000.
[4]Jiri Fridrich, ”Image encryption based on chaotic maps,”
IEEE , International Conference on Systems, Man, and
Cybernetics, 1'Computational Cybernetics and Simulation',
Vol. 2, pp.1105 – 1110, Oct.1997.
[5]Jiri Fridrich, ”Symmetric ciphers based on two dimensional
chaotic maps,” International Journal of Bifurcation and
Chaos (IJBC) in Applied Sciences and Engineering, Vol. 8 ,
No. 6, 1998.
[6]Jui-Cheng Yen, Jiun-In Guo, “A new image encryption
algorithm and its VLSI architecture,” Workshop on IEEE
Signal Processing Systems, pp.430 – 437, 20-22 Oct. 1999.
[7]S. Su, A. Lin, Jui-Cheng Yen, “Design and realization of a
new chaotic neural encryption/decryption network,” The 2000
IEEE Asia-Pacific Conference on Circuits and System,
pp.335 – 338, 4-6 Dec. 2000.
[8]Jui-Cheng Yen, Jiun-In Guo, “A new chaotic key-based design
for image encryption and decryption,” The 2000 IEEE
International Symposium on Circuits and Systems, Vol. 4,
pp.49 – 52, May 2000.
[9]Shujun Li, Xuan Zheng, “Cryptanalysis of a chaotic image
encryption method,” ISCAS 2002, IEEE International
Symposium on Circuits and Systems, Vol. 2, pp.708-711, May
2002.
[10]C.J. Kuo, M.S Chen, “A new signal encryption technique and
its attack study,” IEEE International Carnahan Conference
on Security Technology, pp.149 – 153, Oct. 1991.
[11]F. Autrusseau, J. Guedon, “A joint multiple description-
encryption image algorithm,” Image Processing, Vol. 3, pp.
269-272, Sept. 2003.
[12]P. Verbert, J. Guedon, “N dimensional Mojette transform.
Application to Multiple Description,” Digital Signal
Processing, Vol. 2, pp.1211-1214, July 2002.
[13]Jianhua Wu, Olivier, C.; Chatellier, C.; Poussard, A.-M,
“Redundant transformation on the binary data and its
applications to image coding and transmission,” IEEE
APCCAS 2000, pp. 763-766, Dec 2000.
[14]N.J. Shannon “Encryption by random rotations,” in Proc.
Workshop on Cryptography, eds. Goos G.,Hartmanis,j. &
Feuerstein, B. pp.71-128, 1983.
[15]R. Matthews, “On the derivation of a ‘chaotic’
encryption algorithm,” cryptologia XIII(1), pp.29-43, 1989.
[16]Chang-Chou Lin, Wen-Hsiang Tsai, “Visual cryptography for
gray-level images by dithering techniques,” Pattern
Recognition Letters Vol. 24, pp. 349-358, January 2003.
[17]Chin-Chen Chang, Jun-Chou Chuang, “An image intellectual
property protection scheme for gray-level images using
visual secret sharing strategy,” Pattern Recognition
Letters Vol. 23, pp.931-941, June 2002.
[18]Ren-Junn Hwang, “A Digital Image Copyright Protection
Scheme Based on Visual Cryptography,” Thamkang Jourmal of
Science and Engineering, Vol. 3, pp. 97-106, 2000.
[19]Chi-Kwong Chan, L.M. Cheng,” Hiding data in images by
simple LSB substitution,” Pattern Recognition Vol. 37,
Issue: 3, pp. 469-474, March 2004.
[20]Der-Chyuan Lou, Jiang-Lung Liu,” Steganographic Method for
Secure Communications,” Computers and Security Vol. 21,
Issue: 5, pp.449-460, 1 October 2002.
[21]Ping Wah Wong, N. Memon, “Secret and public key image
watermarking schemes for image authentication and ownership
verification,” IEEE Transactions on Image Processing, Vol.
10, pp. 1593-1601, Oct. 2001.
[22]N. Naor, A. Shamir, “Visual Cryptography, Advances in
Cryptography: Eurocrypt,“ In: Lecture Note in Computer
Science. Springer, Perugia, Italy, pp.1-12, 1994.
[23]E. N. Lorenz, “Deterministic Nonperiodic Flow,” Journal
of the Atmospheric Sciences, Vol. 20, pp.130-141, 1963.
[24]T.S. Parker, L.O. Chua, “Chaos—A Tutorial for
Engineers,” Proc. IEEE, Vol. 75(8), pp. 982–1008, 1987.
[25]G. Heidari-Bateni, C.D. McGillem, “Chaotic sequences for
spread spectrum: an alternative to PN-sequences,” Wireless
Communications, pp.437-440, June 1992.
[26]S.Neil Rasband, Chaotic Dynamics of Nonlinear Systems, New
York, 1992.
[27]Yaobin Mao, Guanrong Chen, “Chaos-Based Image
Encryption,” Handbook of Computational Geometry for
Pattern Recognition,Computer Vision, Neural Computing and
Robotics, 2003.
[28]Jeanpierre Guedon, Y. Bizais “Band-limited and Haar
filtered backprojection reconstructions,” IEEE
Transactions on Medical Imaging, Vol. 13, Number 3, pp.430-
440, November 1994.
[29]C.-C. Chen, J.S. DaPonte, M.D. Fox,” Fractal feature
analysis and classification in medical imaging,” IEEE
Transactions on Medical Imaging, Vol. 8, pp.133-142, June
1989.
[30]William Stallings, Cryptography And Network Security:
Principles and Practice, Upper Saddle River, N.J., 1999.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文
 
1. 洪懿妍(2003)。貼近自然,開發感受力—進入美學世界的基本功。美育,132期,頁14-21。
2. 周儒(1995)。民間團體與環境教育的推展。臺灣教育,532期,37-46。
3. 吳崑玉(2001)。酒神文化與體驗行銷—體驗行銷大師在台演講記實。突破雜誌,191=263:128-129。
4. 吳忠宏(2001)。解說在自然保育上的應用。自然保育季刊,36期:6-13。
5. 石之瑜(2003)。超越主客二元對立—理論與實踐相互構成的知識觀。理論與政策,十六卷四期,1-14。
6. 凌德麟,洪得娟(1998)。使用者之都市公園綠覆地體驗影響因素之研究。戶外遊憩研究,11:1,頁43-64。
7. 孫治本(2001)。疆界毀壞與生活風格—社會學應如何看待「生活風格現象」。當代,168期,頁26-39。
8. 陳佩正(1992)。他山之石—談美國環境教育演變史。市師環教季刊,第六期,頁10-16。
9. 陳佩正(1992),環境教育融入式教學的迷惑。市師環教季刊,第九期,頁4-13。
10. 陳雪雲(2000)。經驗、自我與學習。社會教育學刊,29期,57-92。台灣師範大學社會教育學系。
11. 陳雪雲(2002)。全球風險、知識與終身學習。社會教育學刊,31期,19-36。台灣師範大學社會教育學系。
12. 黃明月(2000)。成人經驗學習理論之探討。社會教育學刊,29期,35-56。台灣師範大學社會教育學系。
13. 楊冠政(1999)。邁向全球化的環境倫理。哲學雜誌,30期,4-32。
14. 劉維公(2001)。何謂生活風格—論生活風格的社會理論意涵。當代,168期,頁10-25。
15. 鄭一青(1998)。留下一片荒野。天下雜誌。文載於荒野內部刊物:荒野,是萬物生命的源頭,是人類古老的鄉愁:12。北市:荒野保護協會。