透過您的圖書館登入
IP:3.23.59.191
  • 學位論文

渾沌影像加密之研究

A Study of Chaotic Image Encryption

指導教授 : 涂世雄
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


在本篇論文中,我們應用渾沌的特性,包括:不可預測性的行為、非線性的轉換 ‥等,來研究影像加密。我們藉由渾沌的特性,並以使用者的鑰匙,來作影像加密。將原來的影像像素的位置和值重新安排過,經MATLAB的模擬,證實我們所提出的渾沌影像加密的方法確實可以得到很好的影像加密的效果。

並列摘要


In this thesis, the chaotic image encryption is studied by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. By these chaotic properties, the positions and values of the pixels of original image are randomly rearranged with the user key. As a result, the cipher image is able to reach a good properties of diffusion and confusion. Our proposed new scheme of chaotic image encryption can be briefly described as follows. At first, we utilize the one-dimensional logistic map to generate the encryption key, scrambling image table and noise image. Then, the source image (i.e., plaintext) is scrambled with scrambling image table and performed exclusive OR operation with the encryption key. Furthermore, several transformed images according above procedures are embedded into a noise image by watermarking techniques to form a pre-encryption image. Finally, scrambling processes and exclusive OR operations with key length of 256, 512 and 1024 bits are executed to obtain the encryption image. Our contribution of the proposed new chaotic image encryption scheme is that, by MATLAB simulation, the cipher images have 6 good characteristics as follows. (1)The correlation between source image and cipher image is very small, almost equal to zero. That is, the source image and cipher image are mostly independent. In addition, the correlation among the cipher images is almost zero. This represents the cipher images are mostly independent, too. (2)The histogram of cipher image pixels is uniform nearly. Namely, our cipher image holds a good confusion property on the statistics. (3)From the simulation of the two-dimensional discrete Fourier transform and shift zero-frequency component of discrete Fourier transform to center of spectrum, we can discovery the energy at the spectrum is consistent, i.e., our cipher image possesses good diffusion property on the statistics. (4)The size of the noise image is able to be adjusted (the size of noise image must equal to or bigger than the size of source image) to protect the source image (plain image). Via the noise image, it lets us to get excellent confusion and diffusion properties of cipher images according to the MATLAB simulations. That is to say, our encryption method derives a good security on communication. (5)Our encryption algorithm is easy to implement on the IC chip. (6)The encryption performance is nice. To sum up, for our proposed new scheme of the chaotic image encryption, the noise image plays a important role. The cipher image characteristic of statistics on confusion and diffusion become excellent due to join the noise image. That is, our new chaotic image encryption method can acquire very fine ciphertext and communication safety.

參考文獻


[ 2] Guanrong Chen; Yaobin Mao; Charles K. Chui; “A symmetric image encryption scheme based on 3D chaotic cat maps,” Elsevier Ltd., chaos, Solitons and Fractals 21, 2004, pp. 749-761.
[ 4] Jui-Cheng Yen and Jiun-In Guo; “A new hierarchical chaotic image encryption algorithm and its hardware architecture,” In Proc. 9th (Taiwan) VLSI Design/CAD Symposium, 1998.
[ 5] Jui-Cheng Yen and Jiun-In Guo; “A new chaotic image encryption algorithm,” In Proc. (Taiwan) National Symposium on Telecommunications, 1998, pages:358–362.
[ 7] Jiun-In Guo and Jui-Cheng Yen; “A new mirror-like image encryption algorithm and its VLSI architecture,” In Proc. 10th (Taiwan) VLSI Design/CAD Symposium, 1999, pages:327–330.
[ 8] Jui-Cheng Yen and Jiun-In Guo; “A chaotic neural network for signal encryption /decryption and its VLSI architecture,” In Proc. 10th (Taiwan) VLSI Design/CAD Symposium, 1999, pages:319-322.

延伸閱讀


國際替代計量