透過您的圖書館登入
IP:18.227.102.225
  • 學位論文

基於Triple DES及Logistic map之影像加密方法

An image encryption method based on Triple DES and Logistic map

指導教授 : 涂世雄

摘要


本研究中,提出了一個使用結合Triple DES及Logistic map產生的影像加密方法。透過密碼學中的Triple DES來進行加密,接著使用一維混沌系統Logistic map產生的混沌序列對資料進行XOR運算,提出一個影像加密方法,防止影像在傳輸過程中被窺視、竊取或是竄改。根據研究結果分析,可看出本研究所提出之影像加密方法是可行且具有效益的。 本論文研究分為四部分,第一部分將介紹此論文所提出的影像加密方法流程。第二部分將介紹Logistic map和Triple DES的順序分析。第三部分將混沌序列的參數改善介紹。第四部份為本論文的實驗結果及分析。 本篇論文研究貢獻如下: 1.打破固有加密格式: 有別於目前許多學者先使用混沌系統後使用密碼學進行加密的作法,我們提出的影像加密演算法打破固有的想法,改為先使用密碼學進行加密,再使用混沌系統。 2.提供新的概念: 混沌序列以小數值轉二進制數值生成,並以期望值作為參數更改。

並列摘要


This thesis proposed an image encryption method using a combination of Triple DES and Logistic map. Encryption is performed by Triple DES in cryptography, and then the chaotic sequence generated by the one-dimensional chaotic system Logistic map is used to perform XOR operation on the data. This image encryption method is proposed to prevent the image from being peeped, stolen, or tampered with during transmission. According to the analysis of the research results, the proposed image encryption method in this thesis is feasible and effective. This thesis consists of four parts. In the first part, introduce the process of the Proposed Image encryption method. In the second part, introduce the Analysis of the Order of the Logistic map and Triple DES. In the third part, introduce the improvement of the Randomness of Chaotic Sequence by Expected Values. In the fourth part, introduce the experimental results and analysis of this thesis. The research contributions of this thesis are as follows: 1. Break the inherent encryption format: Different from the current practice of many scholars who use the Chaotic system first and then use cryptography for encryption, our proposed image encryption algorithm breaks the inherent idea and uses cryptography to encrypt first, and then uses the Chaotic system. 2. Provide new concepts: The chaotic sequence is generated by converting decimal values to binary values and is changed with the Expected value as a parameter.

參考文獻


[1] 檔案樂活情報,數位影像資訊隱藏技術與應用( https://www.archives.gov.tw/alohasImages/92/theme.html )
[2] 臺東師範學院資訊教育系,《數位智慧財產權保護之資訊技術》課程( http://www1.nttu.edu.tw/green/www/g02/g02-2/pp/dis/01.pdf )
[3] 數位影像密碼學 (http://scimonth.blogspot.com/2015/05/blog-post_39.html)
[4] 百科知識,混沌密碼學(https://www.easyatm.com.tw/wiki/%E6%B7%B7%E6%B2%8C%E5%AF%86%E7%A2%BC%E5%AD%B8 )
[5] Xiaofeng Li and Yinhui Zhang, "Digital image encryption and decryption algorithm based on wavelet transform and chaos system," 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), 2016, pp. 253-257, doi: 10.1109/IMCEC.2016.7867211.

延伸閱讀