請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69425完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 顏嗣鈞 | |
| dc.contributor.author | Yao-Wen Chang | en |
| dc.contributor.author | 張耀文 | zh_TW |
| dc.date.accessioned | 2021-06-17T03:15:22Z | - |
| dc.date.available | 2020-08-24 | |
| dc.date.copyright | 2018-08-24 | |
| dc.date.issued | 2018 | |
| dc.date.submitted | 2018-07-06 | |
| dc.identifier.citation | [1] X. Wu, Y. Li, and J. Kurths. A new color image encryption scheme using cml and a fractional-order chaotic system. PLoS ONE, 10(3), 2015.
[2] A. Yin and S. Wang. A novel encryption scheme based on timestamp in gigabit ethernet passive optical network using aes-128. Optik - International Journal for Light and Electron Optics, 125(3):1361–1365, 2014. [3] M.W. Salim and Z. Nasharuddin. Rapid encryption method based on aes algorithm for grey scale hd image encryption. Procedia Technology, 11(1):51–56, 2013. [4] C.H. Liu, J.S. Ji, and Z.L. Liu. Implementation of des encryption arithmetic based on fpga. AASRI Procedia, 5(1):209–213, 2013. [5] F. Maleki, A. Mohades, S.M. Hashemi, and M.E. Shiri. An image encryption system by cellular automata with memory, 2008. [6] Y. Kim, K. Moon, and I. Oh. A text watermarking algorithm based on word classification and inter-word space statistics. Proceedings Seventh International Conference on Document Analysis and Recognition, pages 775–779, 2003. [7] J. Xuehua. Digital watermarking and its application in image copyright protection. International Conference on Intelligent Computation Technology and Automation (ICICTA), pages 114–117, 2010. [8] N. Checcacci, M. Barni, F. Bartolini, and S. Basagni. Robust video watermarking for wireless multimedia communications. Proceedings IEEEE Wireless Communications and Networking Conference 2000, WCNC. 2000, 3:1530–1535, 2000. [9] F. Hartung and M. Kutter. Multimedia watermarking techniques. Proc. of IEEE, Tutorial, Survey, and Special Issue on Data Hiding & Security, pages 1079–1107, 1999. [10] Z. Eslami, S.H. Razzaghi, and J.Z. Ahmadabadi. Secret image sharing based on cellular automata and steganography. 43:397–404, 2010. [11] D Tralic and S Grgic. Robust image encryption based on balanced cellular automaton and pixel separation. Radio engineering, 25(3):549, 2016. [12] M. Habibipour, R. Maarefdoust, M. Yaghobi, and S. Rahati. An image encryption system by 2d memorized cellular automata and chaos mapping. Proceedings of the 6th International Conference on Digital Content, Multimedia Technology and Its Applications (IDC ’10), pages 331–336, 2010. [13] J. Jin. An image encryption based on elementary cellular automata. Optics and Lasers in Engineering, 50(12):1836–1843, 2012. [14] A.L.A. Dalhoum, B.A. Mahafzah, A.A. Awwad, I.Aldhamari, A. Ortega, and M. Alfonseca. Digital image scrambling using 2d cellular automata. IEEE MultiMedia, 19:28–36, 2012. [15] R.J. Chen, Y.H. Chen, C.S. Chen, and J.L. Lai. Image encryption/decryption system using 2-d cellular automata. Proceedings of the IEEE 10th International Symposium on Consumer Electronics (ISCE ’06), pages 651–656, 2006. [16] L. Hernandez-Encinas. Encryption of images with 2-dimensional cellular automata. Proceedings of the 8th International Conference on Information Systems Analysis and Synthesis (ISAS’ 02), pages 471–476, 2002. [17] C. Oestreicher. A history of chaos theory. Dialogues Clin. Neurosci., 9:279–289, 2007. [18] J.L. Schiff. 4.2.1 partitioning cellular automata. Cellular Automata: A Discrete View of the World, pages 115–116, 2008. [19] S. Wolfram. A new kind of science. Wolfram Media, pages 459–464, 2002. [20] B. Chopard and M. Droz. 2.2.6 the sand pile rule. Cellular Automata Modeling of Physical Systems, pages 42–46, 1998. [21] J. Durand-Lose. Computing inside the billiard ball model. in Adamatzky, Andrew, Collision-Based Computing, Springer-Verlag, pages 135–160, 2002. [22] N.H. Margolus. Crystalline computation. in Hey, Anthony J. G., Feynman and Computation, Perseus Books, pages 267–305, 1999. [23] K. Morita. Reversible simulation of one-dimensional irreversible cellular automata. Theoretical Computer Science, 148(1):157–163, 1995. [24] T. Toffoli. Computation and construction universality of reversible cellular automata. Journal of Computer and System Sciences, 15(2):213–231, 1977. [25] S. Wolfram. Computation and construction universality of reversible cellular automata. Nature, 311(1):419–424, 1984. [26] R. Matthews. On the derivation of a chaotic encryption algorithm. Cryptologia, 4(1):29–42, 1989. [27] J. Kari. Reversibility of 2d cellular automata is undecidable, cellular automata: theory and experiment (los alamos, nm, 1989). Physica D: Nonlinear Phenomena, 45(1-3):379–385, 1990. [28] T. Toffoli and N.H. Margolus. Invertible cellular automata: A review, physica dd. Cellular Automata Machines: A New Environment for Modeling, MIT Press, 45(1):229–253, 1990. [29] B. Feng. Cryptanalysis of a partially known cellular automata cryptosystem. Computers, IEEE Transactions, 53(11):1493–1497, 2004. [30] Z. Chai, Z. Cao, and Y. Zhou. Encryption based on reversible second-order cellular automata. Parallel and Distributed Processing and Applications (ISPA 2005 Workshops), Lecture Notes in Computer Science, 3759(1):350–358, 2005. [31] D. Mukhopadhyay. Casbox: A programmable structure to generate sboxes using cellular automata. Indian Institute of Technology, 1(1):1, 2007. [32] M. Ahmad and A. Chopra. Chaotic dynamic s-boxes based substitution approach for digital images. Department of Computer Engineering, Faculty of Engineering and Technology, 1(1):1, 2017. [33] J.C.M. Perales. Color image encryption by cellular automata. Contemporary Engineering Sciences, 8(35):1693–1701, 2015. [34] Z. Xing, Z. Hong, and X. Chungen. Reverse iterative image encryption scheme using 8-layer cellular automata. Ksii Transactions on Internet and Information Systems, 10(7):1693–1701, 2016. [35] J. Kari. Reversibility of 2d cellular automata is undecidable. Cellular Automata: Theory and Experiment, 45(1-3):379–385, 1990. [36] J. Kari. Reversibility and surjectivity problems of cellular automata. Journal of Computer and System Sciences, 48(1):149–182, 1994. [37] L. Gray. A mathematician looks at wolfram’s new kind of science. Not. Amer. Math. Soc., 50(1):200–211, 2003. [38] J.L. Schiff. 4.2.1 partitioning cellular automata. Cellular Automata: A Discrete View of the World, 1(1):115–116, 2008. [39] T. Toffoli and N.H. Margolus. Ii.12 the margolus neighborhood. Cellular Automata Machines: A New Environment for Modeling, MIT Press, 1(1):119–138, 1987. [40] N.H. Margolus. Physics-like models of computation. Physica D, 10, 1(1):81–95, 1984. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69425 | - |
| dc.description.abstract | 細胞自動機是一種離散模型,已經成功地應用在許多物理系統及科
學問題中,例如數學、生物學都有其相關研究。它的三個重要特徵: 平行計算、變化局部性及規則一致性使得其非常適合應用在圖像加密 上,大多數現代圖像加密方法依賴於靜態數學原理來模糊數據,相比 之下細胞自動機不是基於公式來演化,它依賴於先前的鄰域狀態進行 下一個狀態的計算,具有混亂及不可預測性。本論文提出了一種基於 Margolus 細胞自動機之可逆圖像加密方法,Margolus 細胞自動機易於 找到可逆規則的特性使得密鑰可簡單得到,方法結合了R、G、B 顏色 通道之隨機排列增加整體的加密複雜度。本論文針對加密後之圖像做 了多種實驗分析,結果顯示所提出的方法具有高度的安全性可抵擋差 異攻擊及暴力攻擊,並且加密圖像可以零失真還原,平行化計算也使 得方法與序列執行相比具有更高的效率。 | zh_TW |
| dc.description.abstract | Cellular automata represent a discrete model which has been successfully applied to many physical systems and scientific problems in mathematics and biology. Its three important features, namely parallel computing, changing locality and regularity, make it ideal for image encryption. Most modern image encryption methods rely on static mathematical principles to obfuscate data, whereas cellular automatons do not rely on the evolution of formulas, instead, they use previous neighborhood states for the next state calculation, exhibiting randomness and unpredictability. A new reversible color image
encryption method based on Margolus cellular automata is proposed. Margolus cellular automata make it easy to find reversible rules. The method combines the random shuffle of R, G, B color channels to increase the overall encryption complexity. By conducting experiment analysis on a wide variety of encrypted images, our results show that the proposed method has a high degree of security to withstand differences in differential attacks and violent attacks. Furthermore, the encrypted image can be decrypted without data loss, and parallel calculation also makes the method efficient. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-17T03:15:22Z (GMT). No. of bitstreams: 1 ntu-107-R05921108-1.pdf: 21371849 bytes, checksum: f75e5a15fa58d1a31ad23d970e64726c (MD5) Previous issue date: 2018 | en |
| dc.description.tableofcontents | 口試委員會審定書i
誌謝ii 摘要iii Abstract iv 1 Introduction 1 2 Related Work 4 3 Proposed Method 7 3.1 Cellular Automata . . . 7 3.1.1 Common Neighborhood . . . 8 3.1.2 Margolus Neighborhood . . . 9 3.2 Our Proposed Image Encryption Algorithm . . . 11 3.2.1 Encryption Procedure . . . 12 3.2.2 A Channel Shuffling Technique . . . 13 3.3 CPU-Parallelism Design . . . 13 4 Performance and Security Analysis 16 4.1 Histogram Analysis . . . 17 4.2 Correlation Analysis . . . 17 4.3 Information Entropy Analysis . . . 18 4.4 Differential Attack Analysis . . . 22 4.5 Key Sensitivity Analysis . . . 23 4.6 Noise Addition Test . . . 30 4.7 Key Space Analysis . . . 30 5 Conclusion 36 Bibliography 37 | |
| dc.language.iso | en | |
| dc.subject | 統計分析 | zh_TW |
| dc.subject | 圖像安全 | zh_TW |
| dc.subject | 圖像加密 | zh_TW |
| dc.subject | 統計分析 | zh_TW |
| dc.subject | 細胞自動機 | zh_TW |
| dc.subject | 細胞自動機 | zh_TW |
| dc.subject | 圖像加密 | zh_TW |
| dc.subject | 圖像安全 | zh_TW |
| dc.subject | cellular automata | en |
| dc.subject | image encryption | en |
| dc.subject | statistical tests | en |
| dc.subject | image security | en |
| dc.subject | image security | en |
| dc.subject | statistical tests | en |
| dc.subject | image encryption | en |
| dc.subject | cellular automata | en |
| dc.title | 基於Margolus 細胞自動機結合通道隨機排列之可逆圖像加密方法 | zh_TW |
| dc.title | A Reversible Color Image Encryption Scheme Using Margolus Cellular Automata and a Channel Shuffling Technique | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 106-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 雷欽隆,郭斯彥,王勝德,莊仁輝 | |
| dc.subject.keyword | 細胞自動機,圖像加密,圖像安全,統計分析, | zh_TW |
| dc.subject.keyword | cellular automata,image encryption,image security,statistical tests, | en |
| dc.relation.page | 40 | |
| dc.identifier.doi | 10.6342/NTU201801355 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2018-07-09 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-107-1.pdf 未授權公開取用 | 20.87 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
