跳到主要內容

臺灣博碩士論文加值系統

(44.213.60.33) 您好!臺灣時間:2024/07/22 16:13
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:董子儀
研究生(外文):Tung,Tzu-Yi
論文名稱:結合渾沌和盲源分離法之多圖像加密技術
論文名稱(外文):A combination of chaos and blind source separation for multiple images encryption
指導教授:許隆結
指導教授(外文):Sheu,Long-Jye
學位類別:碩士
校院名稱:中華大學
系所名稱:機械工程學系碩士班
學門:工程學門
學類:機械工程學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:39
中文關鍵詞:圖像加密盲源分離渾沌
外文關鍵詞:image encryptionblind source separationchaos
相關次數:
  • 被引用被引用:0
  • 點閱點閱:188
  • 評分評分:
  • 下載下載:19
  • 收藏至我的研究室書目清單書目收藏:0
本論文提出一個新架構利用渾沌訊號和盲源分離法來做圖像加密之方法。原始圖像利用渾沌訊號做重新排列接著使用金鑰圖像作混合,在接收端,先利用盲源分離法將混合在加密圖像中的原始圖像之成份分離出來,再利用渾沌訊號重新排列將原始圖像復原。實驗的結果證明,鑰匙空間足夠大可以預防暴力攻擊,加密圖像有一個類似隨機行為分佈的灰階值,破密分析也顯示本方法具有足夠安全性,可有效阻隔唯密文攻擊、已知明文攻擊、選擇明文/密文攻擊。
This thesis proposes a new perspective on image encryption using chaotic signal and blind source separation. The original images are permuted by the chaotic signal and then mixed with key images. In the receiver, blind source separation technique is used to separate the components of the original image from the ciphertexts. Then chaotic signals are again used to restore the pixels to recover the original image. The experimental simulations demonstrate that the key space is large enough to resist the brute force attack and the distribution of gray values of the encrypted image has a random-like behavior. Results of cryptanalysis show that the present method increases the security to resist ciphertext only attack, known plaintext attack and chosen plaintext/ciphertext attack.
摘 要 ................................................................. i
ABSTRACT ............................................................. ii
誌 謝 ................................................................ iii
目 錄 ................................................................. iv
圖 目 錄 .............................................................. vi
第一章 緒論 ............................................................ 1
1.1研究動機 ............................................................ 1
1.2文獻回顧 ............................................................ 2
1.3研究目的 ............................................................ 3
1.4研究方法 ............................................................ 4
第二章 密碼學加密理論與盲源分離法 ......................................... 5
2.1密碼學架構種類 ....................................................... 5
2.2密碼破解方法種類 ..................................................... 7
2.3盲源分離法 .......................................................... 8
第三章 加密架構 ........................................................ 12
3.1發送端 ............................................................. 12
3.2接收端 ............................................................. 13
第四章 結果與討論 ...................................................... 15
4.1結果與討論 ......................................................... 15
4.2加密過程 ........................................................... 22
4.3加密圖像的應用 ...................................................... 25
4.4雜訊 ............................................................... 26
第五章 破密分析 ........................................................ 28
5.1金鑰空間 ........................................................... 28
5.2密碼破解分析 ........................................................ 28
第六章 結論 ............................................................ 33
6.1結論 ............................................................... 33
6.2未來研究 ........................................................... 33
參考文獻 .............................................................. 37
1. http://zh.wikipedia.org/wiki/%E5%AF%86%E7%A0%81%E5%88%86%E6%9E%90#.E9.9D.9E.E5.B0.8D.E7.A8.B1.E5.AF.86.E7.A2.BC.E5.AD.B8.E7.9A.84.E5.AF.86.E7.A2.BC.E5.88.86.E6.9E.90
2. S. Li, G. Chen, and X. Zheng, “Chaos-based encryption for digital images and videos,” in Multimedia Security Handbook, B. Furht and D. Kirovski, Eds. Boca Raton, Florida: CRC PressLLC,ch.4, pp. 133–167, 2004
3. S. S. Maniccam, N. G. Bourbakis, “mage and video encryption using SCAN patterns,” Pattern Recognition, Vol. 37, pp. 725-737, 2004.
4. C. C. Chang, M. S. Hwang and T. S. Chen, “A new encription algorithm for image cryptosystems,” Journal of System Software, Vol. 58, pp. 83-91, 2001.
5. N. Bourbakis and C. Alexopoulos, “Picture data encryption using SCAN patterns,” Pattern Recognition, Vol. 25, pp. 567-581, 1992.
6. H. Cheng and X.B. Li, “Partial encryption of compressed image and videos,” IEEE Trans. Signal Processing, Vol. 48, pp. 2439-2451, 2000.
7. J.-F. Cardoso, “Blind signal separation: Statistical principles,” Proc.IEEE, vol. 86, no. 10, pp. 2009–2025, 1998.
8. S. Li and X. Zheng, “Cryptanalysis of a chaotic image encryption method,” in Proc IEEE Int. Symposium on Circuits and Systems, vol. II, pp. 708–711., 2002.
9. M. Prasad and K. L. Sudha, “Chaos Image Encryption using Pixel shuffling,”, Computer Science &; Information Technology, DOI: 10.5121/csit.2011.1217.
10. Q. H. Lin and F. L. Yin, T. M. Mei and H. Liang, “A blind source separation based method for speech encryption,” IEEE Trans. Circuits System, Vol. 53, pp. 1320–1328, 2006.
11. Q. H. Lin and F. L. Yin, T. M. Mei and H. Liang, “A blind source separation-based method for multiple images encryption,” Image and Vision Computing, Vol. 26, pp. 788-798, 2008.
12. S. Li, C. Li, K. T. Lo and G. Chen,“ Cryptanalyzing an encryption scheme based on blind source separation,” IEEE Trans. Circuits System, Vol. 55, pp. 1055-1062 ,2008.
13. B. Schneier, Applied Cryptography - Protocols, Algorithms, and Souce Code in C, 2nd ed. New York: John Wiley &; Sons, Inc., 1996.
14. Haojiang Gao *, Yisheng Zhang, Shuyun Liang, Dequn Li, “A new chaotic algorithm for image encryption,” Chaos, Solitons &; Fractals, pp. 393-399, 2006.
15. 粘孝先, “以渾沌變數序列應用於影像像素位置之行列置亂加密,” 建國科大, 建國科大學報, 彰化市, 2008。
16. Tiegang Gao, Zengqiang Chen, “A new image encryption algorithm based on hyper-chaos,” Physics Letters A 372 , pp.394–400 , 2008.
17. F. Yong, L. Linjing ,H. Feng, “A Symmetric Image Encryption Approch based on Line Maps,” 1st International Symposium on, Systems and control in Aerospace and Astronautics, pp. 1362-1367 , 2006
18. C. X. Zhu, Z. G. Chen, and W. W. Ouyang, “A new encryption algorithm based on general Chen’s chaotic system,” Cent. Southuniv (Science and Technology), Vol. 37, No.6, pp. 1142-1148 , 2006
19. W. Zhang and R. C. He, “an encryption and hiding algorithm based on Logistic chaotic sequences,” journal of Lanzhou Jiaotong University (Natural Sciences), Vol. 25, No. 4, pp. 80-82, aug. ,2006
20. Z. Yong-Hong, K. Bao-Scheng, Z. Xue-Feng, “Image Encryption Algorithm based on Chaotic Sequence,” IEEE International Conference on Artificial Reality and Telexistence –workshops, 2006
21. 廖文全, “以渾沌為基礎之安全影像通訊之研究,” 國立雲林科技大學電機工程系碩士班, 碩士論文,雲林縣, 2010。
22. 藍翎爾, “隱蔽訊號分離問題-利用模糊決策機制分析非稀疏信號成份,” 國立東華大學電機工程學系,第17屆模糊理論及其應用研討會, 花蓮縣, 2009.
23. C. Jutten and J. Herault, “Blind separation of sources, Part 1: an adaptive algorithm based on neuromimetic architecture,” Signal Processing, Vol.24,pp.1-10,1991
24. H. K. Chen and C. I. Lee,“Anti-control of chaos in rigid body motion,” Chaos, Solitons &; Fractals, Vol. 21, pp. 957-965, 2004.
25.C. Moler, Random thoughts, Matlab News &; Notes, pp. 12–13, 1995.
26.A. Hyvarinen and E. Oja, “A Fast Fixed-Point Algorithm for Independent Component Analysis,” Neural Computation, Vol. 9, pp. 1483-1492, 1997.
27.http://research.ics.tkk.fi/ica/fastica/index.shtml

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top