(3.80.6.131) 您好!臺灣時間:2021/05/17 01:43
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:鄧吉斌
論文名稱:混沌系統在工程上之應用-影像加密及RCD緩震器最佳化設計
指導教授:粘孝先黃川桂黃川桂引用關係
學位類別:碩士
校院名稱:建國科技大學
系所名稱:電機工程系暨研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:中文
論文頁數:85
中文關鍵詞:混沌系統影像加密基因演算法順向式轉換器電壓突波
外文關鍵詞:Chaotic systemImage encryptedGenetic algorithmForward converterVoltage spike
相關次數:
  • 被引用被引用:4
  • 點閱點閱:295
  • 評分評分:
  • 下載下載:22
  • 收藏至我的研究室書目清單書目收藏:0
由於混沌系統之動態行為具有不可預測的特性,且對系統變數之初值及參數之變異非常靈敏。因此,本論文將混沌系統應用於影像加密,以提高影像傳輸之安全性。另外,本論文亦提出一種基於混沌-基因演算法之RCD緩震器最佳化設計,並經由實驗結果得知,可大幅降低切換式電源供應器中功率開關兩端之電壓突波。
本論文之研究內容可分為兩個部份。第一部分為影像加密,將混沌變數元素序列製作成混沌碼,對影像進行行列置亂及色階加密,另外,以混沌碼製作成Chaotic-Sub-Box(CSB)矩陣及Chaotic-Sub -Pathway(CSP)矩陣,對影像進行像素混沌置換加密,可使加密影像與原始影像間之輪廓及色階分佈之特徵皆無任何關聯性,具有極佳的加密效果。第二部份為RCD緩震電路之最佳化設計,利用混沌變數元素結合基因演算法,設計具RCD緩震電路之順向式轉換器,以降低功率開關之電壓突波。
Since the unpredictably dynamic response of chaotic system is highly sensitive to initial values and parameters of the system, this thesis conducts Chua system to encrypt color image for enhancing transmission security. In addition, this study also proposes an optimal design method with chaos-based genetic algorithm for RCD snubber design. The experimental results show that the voltage spike on power switch of SMPS is dramatically depressed.
This thesis includes three parts. First part introduces the transformation of the chaotic variable elements to chaotic sequence codes for pixel shuffling and grey-level encrypting, which can eliminate outlines of the encrypted images and blur the distribution characteristics of grey-level matrices. In the second part, Chaotic-Sub-Box(CSB) and the Chaotic-Sub-Pathway(CSP) matrices for the chaotic substitution of each pixel. are made by chaotic codes. Through these matrices, the relations between the plain and the encrypted images are totally vanished. And the results of security analysis revel the excellently communication security. The Finial part presents the application of chaos theory on power electronics. In which an optimizedly-designed RCD snubber for depressing the voltage spike on power switch is implemented.
謝 誌 I
摘 要 II
Abstract III
目錄 IV
圖目錄 VII
第一章 緒論 1
1.1 研究動機及目的 1
1.2 文獻探討 1
1.3 研究方法 5
1.3.1 影像加密之研究方法 5
1.3.2 緩震器設計之研究方法 6
1.4章節概述 6
第二章 基本理論 7
2.1 Chua混沌系統 7
2.2 AES演算法 9
2.3安全性之分析工具 13
2.4基因演算法 17
第三章 影像加密 24
3.1前言 24
3.2 行列位置置亂及色階加密 24
3.2.1 系統之架構 24
3.2.2 加密與解密 25
3.2.3 加密及解密實測 32
3.2.4 安全性分析 36
3.3 像素混沌置換加密 38
3.3.1 系統之架構 38
3.3.2 加密與解密 39
3.3.3 加密及解密實測 46
3.3.4 像素混沌置換之失真測試 48
3.3.5 影像解密之失真測試 49
3.4 討論 50
第四章 RCD緩震電路之最佳化設計 51
4.1前言 51
4.2具RCD緩震電路之順向式轉換器工作原理 51
4.3影響 之電路參數 53
4.4 混沌-基因演算法之最佳化設計 56
4.4.1混沌-基因演算法 57
4.4.2設計流程及步驟 62
4.5實作電路 63
4.5.1 非最佳化RCD緩震電路之順向式轉換器 64
4.5.2 最佳化RCD緩震電路之順向式轉換器 65
4.6討論 67
第五章 結論與未來展望 68
5.1結論 68
5.2未來展望 68
參考文獻 70
[1] M. Xiao, J. Cao, "Synchronization of a chaotic electronic circuit system with cubic term via adaptive feedback control," Communications in Nonlinear Science and Numerical Simulation, vol. 14, pp. 3379-3388, 2009.
[2] T. Botmart, P. Niamsup, "Adaptive control and synchronization of the perturbed Chua’s system," Mathematics and Computers in Simulation, vol. 75, pp. 37-55, 2007.
[3] C. H. Chen, L. J. Sheu, H. K. Chen, J. H. Chen, H. C. Wang, Y. C. Chao, Y. K. Lin, "A new hyper-chaotic system and its synchronization," Nonlinear Analysis: Real World Applications, vol. 10, pp. 2088-2096, 2009.
[4] W. Li, X. Chen, "Projective synchronization of Chua’s chaotic system with dead-zone in the control input," Communications in Nonlinear Science and Numerical Simulation, vol. 14, pp. 3100-3107, 2009.
[5] A. Rogers, J. Keating, R. Shorten, "A novel pattern classification scheme using the Baker’s map," Neurocomputing, vol. 55 , pp. 779-786, 2003.
[6] S. Lian, J. Sun, Z. Wang, "Security analysis of a chaos-based image encryption algorithm," Physica A: Statistical Mechanics and its Applications, vol. 351, pp. 645-661, 2005.
[7] H. Zhang, X. F. Wang, Z. H. Li, D. H .Liu, Y. C. Lin, "A new image encryption algorithm based on chaos system," International Conference on Robotics, Intelligent Systems and Signal Processing, vol. 2, pp. 778-782, 2003.
[8] Z. H. Guan, F. Huang, W.Guan, "Chaos-based image encryption algorithm," Physics Letters A, vol. 346, pp. 153-157, 2005.
[9] G. Peterson , "Arnold’s cat map," (http://online.redwoods.cc.ca.us/ins truct/darnold/laproj/Fall97/Gabe/catmap.pdf), 1997.
[10] F. Han, X. Yu, S. Han, "Improved Baker map for image encryption," International Symposium on Systems and Control in Aerospace and Astronautics, pp. 1273-1276, 2006.
[11] Y. Feng, L. Li, F. Huang, "A symmetric image encryption approach based on line maps," International Symposium on Systems and Control in Aerospace and Astronautics, pp. 1362-1367, 2006.
[12] M. R. Zhang, G. C. Shao, K. C. Yi, "T-matrix and its applications in image processing," Electronics Letters, vol. 40, pp. 1583-1584, 2004.
[13] J. F. Barrera, M. Tebaldi, R. Torroba, N. Bolognini, "Multiplexing encryption technique by combining random amplitude and phase masks," International Journal for Light and Electron Optics, vol. 120, pp.1-5, 2009.
[14] W. A. Yang, D. M. Yuan, "A new method of key generation based on chaotic sequence," China Academic Journal Electronic Publishing House, Mathematics In Practice and Theory, vol. 36, pp. 160-164, 2006.
[15] V. Patidar, N.K. Pareek, K.K. Sud, "A new substitution-diffusion based image cipher using chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 14, pp. 3056-3075, 2009.
[16] X. Tong, M. Cui, "Image encryption with compound chaotic sequence cipher shifting dynamically," Image and Vision Computing, vol. 26, pp. 843-850, 2008.
[17] N. K. Pareek, V. Patidar, K. K. Sud, "Image encryption using chaotic logistic map," Image and Vision Computing, vol. 24, pp. 926-934, 2006.
[18] NIST FIPS PUB 46-3, "Data Encryption Standard (DES)," National Institute of Standards and Technology, U. S. Department of Commerce, 1999.
[19] NIST FIPS PUB 197, "Announcing the Advanced Encryption Standard (AES),” National Institute of Standards and Technology, U. S. Department of Commerce, 2001.
[20] S. Morioka, A. Satoh, "A 10-Gbps full-AES crypto design with a twisted BDD S-box architecture," Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, pp. 686-691, 2004.
[21] Z. Liu, Y. Zeng, X. Zou, Y. Han, Y. Chen, "A high-security and low-power AES S-box full-custom design for wireless sensor network," Wireless Communications, Networking and Mobile Computing, pp. 2499-2502, 2007.
[22] J. Qiu, X. Liao, P. Wang, "A method to construct dynamic S-box based on chaotic map," Eighth ACIS International Conference, vol. 3, pp. 522-525, 2007.
[23] G. D. Natale, M. L. Flottes, B. Rouzeyre, "A novel parity bit scheme for Sbox in AES circuits," Design and Diagnostics of Electronic Circuits and Systems, pp. 1-5, 2007.
[24] G. Chen, Y. Chen, X. Liao, "An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps," Chaos, Solitons and Fractals, vol. 31, pp. 571-579, 2007.
[25] M. Asim, V. Jeoti, "On image encryption: comparison between AES and a novel chaotic encryption scheme," International Conference on Signal Processing, Communications and Networking, pp. 65-69, 2007.
[26] M. Ashtiyani, P. M. Birgani, H. M. Hosseini, "Chaos-based medical image encryption using symmetric cryptography," Information and Communication Technologies: From Theory to Applications 3rd, pp. 1-5, 2008.
[27] C. M. Ou, "Design of block ciphers by simple chaotic function," IEEE Computational intelligence magazine, vol. 3, pp. 54-59, 2008.
[28] S. J. Finney, B. W. Williams, T. C. Green, "The RCD snubber revisited," Industry Applications Society Annual Meeting, vol. 2, pp. 1267-1273, 1993.
[29] S. J. Finney, B. W. Williams, T. C. Green, "RCD snubber revisited," Transactions on Industry Applications, vol. 32, pp. 155-160, 1996.
[30] C. D. Bridge, "Clamp voltage analysis for RCD forward converters," Applied Power Electronics Conference and Exposition, vol. 2, pp. 959-965, 2000.
[31] Y. Gu, X. Gu, L. Hang, Y. Du, Z. Lu, Z. Qian, "RCD reset dual switch forward DC/DC converter," Power Electronics Specialists Conference, vol. 2, pp. 1465-1469, 2004.
[32] J. A. Cobos, O. Garcia, J. Sebastian, J. Uceda, "RCD clamp PWM forward converter with self driven synchronous rectification," International Conference on Industrial Electronics, Control, and Instrumentation, vol. 2, pp. 1336-1341, 1993.
[33] T. Matsumoto, L. O. Chua, M. Komuro, "The double scroll," IEEE Trans Circ System, vol. 32, pp. 798-818, 1985.
[34] C. E. Shannon, "A mathematical theory of communication," Reprinted with cor- rections from The Bell System Technical Journal, vol. 27, pp. 379–423, 623–656, 1948.
[35] A. G. Bluman, "Elementary statistics," McGraw-Hill, New York, 1998.
[36] G. Chen, Y. B. Mao, C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons and Fractals, vol. 21, pp. 749-761, 2004.
[37] H. S. Kwok, Wallace K. S. Tang, "A fast image encryption system based on chaotic maps with finite precision representation," Chaos Solitons and Fractals, vol. 32, pp. 1518-1529, 2007.
[38] D. E. Goldberg, Genetic algorithms in search, optimization and machine learning, MA, Addison-Wesley, 1989.
[39] A. Hren, J. Korelic, M. Milanovic, "RC-RCD clamp circuit for ringing losses reduction in a flyback converter," IEEE Transactions on Circuits and systems - II:Express briefs, vol. 53, pp. 369-373 2006.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊