跳到主要內容

臺灣博碩士論文加值系統

(44.212.96.86) 您好!臺灣時間:2023/12/07 01:53
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:范馨勻
研究生(外文):FAN, SIN-YUN
論文名稱:基於Triple DES及Logistic map之影像加密方法
論文名稱(外文):An image encryption method based on Triple DES and Logistic map
指導教授:涂世雄涂世雄引用關係
指導教授(外文):TWU, SHIH-HSIUNG
口試委員:李維平王佳盈
口試委員(外文):LEE, WEI-PINGWANG, JIA-YIN
口試日期:2022-07-21
學位類別:碩士
校院名稱:中原大學
系所名稱:電機工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2022
畢業學年度:110
語文別:英文
論文頁數:53
中文關鍵詞:影像加密混沌理論Logistic map密碼學Triple DES
外文關鍵詞:Image EncryptionChaos TheoryLogistic mapCryptographyTriple DES
DOI:10.6840/cycu202201588
相關次數:
  • 被引用被引用:0
  • 點閱點閱:135
  • 評分評分:
  • 下載下載:14
  • 收藏至我的研究室書目清單書目收藏:0
本研究中,提出了一個使用結合Triple DES及Logistic map產生的影像加密方法。透過密碼學中的Triple DES來進行加密,接著使用一維混沌系統Logistic map產生的混沌序列對資料進行XOR運算,提出一個影像加密方法,防止影像在傳輸過程中被窺視、竊取或是竄改。根據研究結果分析,可看出本研究所提出之影像加密方法是可行且具有效益的。

本論文研究分為四部分,第一部分將介紹此論文所提出的影像加密方法流程。第二部分將介紹Logistic map和Triple DES的順序分析。第三部分將混沌序列的參數改善介紹。第四部份為本論文的實驗結果及分析。


本篇論文研究貢獻如下:
1.打破固有加密格式:
有別於目前許多學者先使用混沌系統後使用密碼學進行加密的作法,我們提出的影像加密演算法打破固有的想法,改為先使用密碼學進行加密,再使用混沌系統。
2.提供新的概念:
混沌序列以小數值轉二進制數值生成,並以期望值作為參數更改。

This thesis proposed an image encryption method using a combination of Triple DES and Logistic map. Encryption is performed by Triple DES in cryptography, and then the chaotic sequence generated by the one-dimensional chaotic system Logistic map is used to perform XOR operation on the data. This image encryption method is proposed to prevent the image from being peeped, stolen, or tampered with during transmission. According to the analysis of the research results, the proposed image encryption method in this thesis is feasible and effective.

This thesis consists of four parts. In the first part, introduce the process of the Proposed Image encryption method. In the second part, introduce the Analysis of the Order of the Logistic map and Triple DES. In the third part, introduce the improvement of the Randomness of Chaotic Sequence by Expected Values. In the fourth part, introduce the experimental results and analysis of this thesis.

The research contributions of this thesis are as follows:
1. Break the inherent encryption format:
Different from the current practice of many scholars who use the Chaotic system first and then use cryptography for encryption, our proposed image encryption algorithm breaks the inherent idea and uses cryptography to encrypt first, and then uses the Chaotic system.
2. Provide new concepts:
The chaotic sequence is generated by converting decimal values to binary values and is changed with the Expected value as a parameter.

摘要 I
Abstract II
致謝 IV
Content V
List of Figures VII
List of Tables X
Chapter1 Introduction 1
1.1 Research Background 1
1.2 The Proposed Schemes 3
1.3 Organization of This Thesis 4
Chapter2 Theoretical Background 5
2.1 Image Encryption 5
2.2 Cryptography 6
2.3 Chaos theory 7
2.4 Triple DES 8
2.5 Logistic map 10
2.6 MD5 Message-Digest Algorithm 11
Chapter3 The Proposed Image encryption method 12
3.1 Encryption and Decryption Process 12
3.2 The Analysis of the Order of Logistic map and Triple DES 17
3.3 Improvement of the Randomness of Chaotic Sequence by Expected Values 29
Chapter4 Experimental Results and Analysis 35
4.1 Histogram Analysis 35
4.2 Correlation Analysis 37
4.3 Secret Key Space 39
Chapter5 Conclusions and Future Research 40
References 41


List of Figures
Fig 2.2.1 schematic diagram of the cryptography system [10] 6
Fig 2.4.1 DES Encryption Flowchart [15] 8
Fig 2.4.2 Triple DES Encryption Flowchart [13] 9
Fig 2.4.3 Triple DES Decryption Flowchart [13] 9
Fig 2.5.1 Branch graphs generated at different values r in the Logistic map [21] 10
Fig 3.1.1 The encryption flow chart of the proposed image encryption algorithm 12
Fig 3.1.3 The decryption flow chart of the proposed image encryption algorithm 15
Fig 3.2.1 (a) image of plain – Lenna (b) Method (1): Cipher image – Lenna 18
Fig 3.2.2 (a) image of plain – Pepper (b) Method (1): Cipher image – Pepper 18
Fig 3.2.3 (a) the value histogram of image of plain – Lenna (b) Method (1): the value histogram of Cipher image – Lenna 19
Fig 3.2.4 (a) the value histogram of image of plain – Pepper(b) Method (1): the value histogram of Cipher image – Pepper 19
Fig 3.2.5 (a) image of plain – Lenna (b) Method (2): Cipher image – Lenna 20
Fig 3.2.6 (a) image of plain – Pepper (b) Method (2): Cipher image – Pepper 21
Fig 3.2.7 (a) the value histogram of image of plain – Lenna (b) Method (2): the value histogram of Cipher image – Lenna 21
Fig 3.2.8 (a) the value histogram of image of plain – Pepper(b) Method (2): the value histogram of Cipher image – Pepper 22
Fig 3.2.9 (a) image of plain – Lenna (b) Method (3): Cipher image – Lenna 22
Fig 3.2.10 (a) image of plain – Pepper (b) Method (3): Cipher image – Pepper 23
Fig 3.2.11 (a) the value histogram of image of plain – Lenna (b) Method (3): the value histogram of Cipher image – Lenna 23
Fig 3.2.12 (a) the value histogram of image of plain – Pepper(b) Method (3): the value histogram of Cipher image – Pepper 24
Fig 3.2.13 (a) image of plain – Lenna (b) Method (4): Cipher image – Lenna 25
Fig 3.2.14 (a) image of plain – Pepper (b) Method (4): Cipher image – Pepper 25
Fig 3.2.15 (a) the value histogram of image of plain – Lenna (b) Method (4): the value histogram of Cipher image – Lenna 26
Fig 3.2.16 (a) the value histogram of image of plain – Pepper (b) Method (4): the value histogram of Cipher image – Pepper 26
Fig 3.2.17 (a) image of plain – Lenna (b) Method(1): Cipher image – Lenna (c) Method(4): Cipher image – Lenna (d) the value histogram of image of plain – Lenna (e) Method (1): the value histogram of Cipher image – Lenna (f) Method (4): the value histogram of Cipher image – Lenna 27
Fig 3.2.18 (a) image of plain – Pepper (b) Method(1): Cipher image – Pepper (c) Method(4): Cipher image – Pepper (d) the value histogram of image of plain – Pepper (e) Method (1): the value histogram of Cipher image – Pepper (f) Method (4): the value histogram of Cipher image – Pepper 28
Fig 3.3.1 (a) image of plain – Lenna (b) the Quartering method: Cipher image – Lenna (c) the new Quartering method: Cipher image – Lenna (d) the value histogram of image of plain – Lenna (e) the Quartering method: the value histogram of Cipher image – Lenna (f) the new Quartering method: the value histogram of Cipher image – Lenna 33
Fig 3.3.2 (a) image of plain – Pepper (b) the Quartering method: Cipher image – Pepper (c) the new Quartering method: Cipher image – Pepper (d) the value histogram of image of plain – Pepper (e) the Quartering method: the value histogram of Cipher image – Pepper (f) the new Quartering method: the value histogram of Cipher image – Pepper 34
Fig 4.1.1 (a) image of plain – Lenna (b) Cipher image – Lenna 35
Fig 4.1.2 (a) image of plain – Pepper (b) Cipher image – Pepper 36
Fig 4.1.3 (a) the value histogram of image of plain – Lenna (b) the value histogram of Cipher image – Lenna 36
Fig 4.1.3 (a) the value histogram of image of plain – Pepper (b) the value histogram of Cipher image – Pepper 37
Fig 4.2.1 (a) Correlation Analysis of image of plain – Lenna (b) Correlation Analysis of Cipher image – Lenna 38
Fig 4.2.2 (a) Correlation Analysis of image of plain – Pepper (b) Correlation Analysis of Cipher image – Pepper 38


List of Tables
Table 3.3.1 Number analysis table for the Dichotomous method and the Quartering method 31
Table 3.3.2 Number analysis table for the New Dichotomous method and the New Quartering method 33
Table 4.2.1 Correlation coefficient table of the image of plain and the Cipher image 39

[1]檔案樂活情報,數位影像資訊隱藏技術與應用( https://www.archives.gov.tw/alohasImages/92/theme.html )
[2]臺東師範學院資訊教育系,《數位智慧財產權保護之資訊技術》課程( http://www1.nttu.edu.tw/green/www/g02/g02-2/pp/dis/01.pdf )
[3]數位影像密碼學 (http://scimonth.blogspot.com/2015/05/blog-post_39.html)
[4]百科知識,混沌密碼學(https://www.easyatm.com.tw/wiki/%E6%B7%B7%E6%B2%8C%E5%AF%86%E7%A2%BC%E5%AD%B8 )
[5]Xiaofeng Li and Yinhui Zhang, "Digital image encryption and decryption algorithm based on wavelet transform and chaos system," 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), 2016, pp. 253-257, doi: 10.1109/IMCEC.2016.7867211.
[6]Wenting Yuan, Xuelin Yang, Wei Guo and Weisheng Hu, "A double-domain image encryption using hyper chaos," 2017 19th International Conference on Transparent Optical Networks (ICTON), 2017, pp. 1-4, doi: 10.1109/ICTON.2017.8025092.
[7]W. c. QIU and S. jun YAN, "An image encryption algorithm based on the combination of low - dimensional chaos and high - dimensional chaos," 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE), 2019, pp. 684-687, doi: 10.1109/EITCE47263.2019.9094882.
[8]Y. -Q. Zhang, J. -L. Hao and X. -Y. Wang, "An Efficient Image Encryption Scheme Based on S-Boxes and Fractional-Order Differential Logistic Map," in IEEE Access, vol. 8, pp. 54175-54188, 2020, doi: 10.1109/ACCESS.2020.2979827.
[9]Z. Mu and H. Liu, "Research on digital media image encryption algorithm based on Logistic chaotic map," 2020 International Conference on Robots & Intelligent System (ICRIS), 2020, pp. 108-111, doi: 10.1109/ICRIS52159.2020.00035.
[10]密碼學(一):古典密碼學 (https://justreadwithme.medium.com/%E5%AF%86%E7%A2%BC%E5%AD%B8-%E4%B8%80-%E5%8F%A4%E5%85%B8%E5%AF%86%E7%A2%BC%E5%AD%B8-455e43038241)
[11]應用密碼學入門 (https://hitcon.org/2018/CMT/slide-files/d1_s2_r4.pdf)
[12]聽起來好像很厲害的 - 密碼學 (https://ithelp.ithome.com.tw/articles/10248442)
[13]密碼學基本概念 (https://hackmd.io/@DIuvbu1vRU2C5FwWIMzZ_w/ByUf1sdRr)
[14]維基百科,3DES,2021 (https://zh.wikipedia.org/wiki/3DES)
[15]楊吳泉,1994,現代密碼學入門及程式設計,全華科技圖書股份有限公司。
[16]賴溪松、韓亮、張真誠,1995,近代密碼學及其應用,松崗電腦圖書資料股份有限公司。
[17]百科知識,混沌理論 ( https://www.easyatm.com.tw/wiki/%E6%B7%B7%E6%B2%8C%E7%90%86%E8%AB%96 )
[18]維基百科,混沌理論 ( https://zh.wikipedia.org/zh-tw/%E6%B7%B7%E6%B2%8C%E7%90%86%E8%AE%BA )
[19]何謂”混沌理論”? 何謂”蝴蝶效應”? ( https://yauli25.pixnet.net/blog/post/38821905-%E4%BD%95%E8%AC%82%EF%BB%BF%E2%80%9D%E6%B7%B7%E6%B2%8C%E7%90%86%E8%AB%96%EF%BB%BF%E2%80%9D%EF%BC%9F-%E4%BD%95%E8%AC%82%EF%BB%BF%E2%80%9D%E8%9D%B4%E8%9D%B6%E6%95%88%E6%87%89 )
[20]孫克輝、王會海、賀少波,2021,混沌及其信息安全應用,清華大學出版社。
[21]維基百科,單峰映射 ( https://zh.m.wikipedia.org/zh-tw/%E9%80%BB%E8%BE%91%E6%96%AF%E8%B0%9B%E6%98%A0%E5%B0%84 )
[22]維基百科,雜湊函式 ( https://zh.wikipedia.org/wiki/%E6%95%A3%E5%88%97%E5%87%BD%E6%95%B8 )
[23][資料結構] 雜湊 (Hash) ( https://ithelp.ithome.com.tw/articles/10208884 )
[24]維基百科,MD5 ( https://zh.wikipedia.org/zh-tw/MD5 )
[25]密碼系统的攻擊 (https://learnku.com/articles/47101)
[26]常見圖像加密性能評價指標(https://www.cxymm.net/article/qq_41137110/115675014)

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top