Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69425
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor顏嗣鈞
dc.contributor.authorYao-Wen Changen
dc.contributor.author張耀文zh_TW
dc.date.accessioned2021-06-17T03:15:22Z-
dc.date.available2020-08-24
dc.date.copyright2018-08-24
dc.date.issued2018
dc.date.submitted2018-07-06
dc.identifier.citation[1] X. Wu, Y. Li, and J. Kurths. A new color image encryption scheme using cml and a fractional-order chaotic system. PLoS ONE, 10(3), 2015.
[2] A. Yin and S. Wang. A novel encryption scheme based on timestamp in gigabit ethernet passive optical network using aes-128. Optik - International Journal for Light and Electron Optics, 125(3):1361–1365, 2014.
[3] M.W. Salim and Z. Nasharuddin. Rapid encryption method based on aes algorithm for grey scale hd image encryption. Procedia Technology, 11(1):51–56, 2013.
[4] C.H. Liu, J.S. Ji, and Z.L. Liu. Implementation of des encryption arithmetic based on fpga. AASRI Procedia, 5(1):209–213, 2013.
[5] F. Maleki, A. Mohades, S.M. Hashemi, and M.E. Shiri. An image encryption system by cellular automata with memory, 2008.
[6] Y. Kim, K. Moon, and I. Oh. A text watermarking algorithm based on word classification and inter-word space statistics. Proceedings Seventh International Conference on Document Analysis and Recognition, pages 775–779, 2003.
[7] J. Xuehua. Digital watermarking and its application in image copyright protection. International Conference on Intelligent Computation Technology and Automation (ICICTA), pages 114–117, 2010.
[8] N. Checcacci, M. Barni, F. Bartolini, and S. Basagni. Robust video watermarking for wireless multimedia communications. Proceedings IEEEE Wireless Communications and Networking Conference 2000, WCNC. 2000, 3:1530–1535, 2000.
[9] F. Hartung and M. Kutter. Multimedia watermarking techniques. Proc. of IEEE, Tutorial, Survey, and Special Issue on Data Hiding & Security, pages 1079–1107, 1999.
[10] Z. Eslami, S.H. Razzaghi, and J.Z. Ahmadabadi. Secret image sharing based on cellular automata and steganography. 43:397–404, 2010.
[11] D Tralic and S Grgic. Robust image encryption based on balanced cellular automaton and pixel separation. Radio engineering, 25(3):549, 2016.
[12] M. Habibipour, R. Maarefdoust, M. Yaghobi, and S. Rahati. An image encryption system by 2d memorized cellular automata and chaos mapping. Proceedings of the 6th International Conference on Digital Content, Multimedia Technology and Its
Applications (IDC ’10), pages 331–336, 2010.
[13] J. Jin. An image encryption based on elementary cellular automata. Optics and Lasers in Engineering, 50(12):1836–1843, 2012.
[14] A.L.A. Dalhoum, B.A. Mahafzah, A.A. Awwad, I.Aldhamari, A. Ortega, and M. Alfonseca. Digital image scrambling using 2d cellular automata. IEEE MultiMedia, 19:28–36, 2012.
[15] R.J. Chen, Y.H. Chen, C.S. Chen, and J.L. Lai. Image encryption/decryption system using 2-d cellular automata. Proceedings of the IEEE 10th International Symposium
on Consumer Electronics (ISCE ’06), pages 651–656, 2006.
[16] L. Hernandez-Encinas. Encryption of images with 2-dimensional cellular automata. Proceedings of the 8th International Conference on Information Systems Analysis
and Synthesis (ISAS’ 02), pages 471–476, 2002.
[17] C. Oestreicher. A history of chaos theory. Dialogues Clin. Neurosci., 9:279–289, 2007.
[18] J.L. Schiff. 4.2.1 partitioning cellular automata. Cellular Automata: A Discrete View of the World, pages 115–116, 2008.
[19] S. Wolfram. A new kind of science. Wolfram Media, pages 459–464, 2002.
[20] B. Chopard and M. Droz. 2.2.6 the sand pile rule. Cellular Automata Modeling of Physical Systems, pages 42–46, 1998.
[21] J. Durand-Lose. Computing inside the billiard ball model. in Adamatzky, Andrew, Collision-Based Computing, Springer-Verlag, pages 135–160, 2002.
[22] N.H. Margolus. Crystalline computation. in Hey, Anthony J. G., Feynman and Computation, Perseus Books, pages 267–305, 1999.
[23] K. Morita. Reversible simulation of one-dimensional irreversible cellular automata. Theoretical Computer Science, 148(1):157–163, 1995.
[24] T. Toffoli. Computation and construction universality of reversible cellular automata. Journal of Computer and System Sciences, 15(2):213–231, 1977.
[25] S. Wolfram. Computation and construction universality of reversible cellular automata. Nature, 311(1):419–424, 1984.
[26] R. Matthews. On the derivation of a chaotic encryption algorithm. Cryptologia, 4(1):29–42, 1989.
[27] J. Kari. Reversibility of 2d cellular automata is undecidable, cellular automata: theory and experiment (los alamos, nm, 1989). Physica D: Nonlinear Phenomena, 45(1-3):379–385, 1990.
[28] T. Toffoli and N.H. Margolus. Invertible cellular automata: A review, physica dd. Cellular Automata Machines: A New Environment for Modeling, MIT Press, 45(1):229–253, 1990.
[29] B. Feng. Cryptanalysis of a partially known cellular automata cryptosystem. Computers, IEEE Transactions, 53(11):1493–1497, 2004.
[30] Z. Chai, Z. Cao, and Y. Zhou. Encryption based on reversible second-order cellular automata. Parallel and Distributed Processing and Applications (ISPA 2005
Workshops), Lecture Notes in Computer Science, 3759(1):350–358, 2005.
[31] D. Mukhopadhyay. Casbox: A programmable structure to generate sboxes using cellular automata. Indian Institute of Technology, 1(1):1, 2007.
[32] M. Ahmad and A. Chopra. Chaotic dynamic s-boxes based substitution approach for digital images. Department of Computer Engineering, Faculty of Engineering and Technology, 1(1):1, 2017.
[33] J.C.M. Perales. Color image encryption by cellular automata. Contemporary Engineering Sciences, 8(35):1693–1701, 2015.
[34] Z. Xing, Z. Hong, and X. Chungen. Reverse iterative image encryption scheme using 8-layer cellular automata. Ksii Transactions on Internet and Information Systems, 10(7):1693–1701, 2016.
[35] J. Kari. Reversibility of 2d cellular automata is undecidable. Cellular Automata: Theory and Experiment, 45(1-3):379–385, 1990.
[36] J. Kari. Reversibility and surjectivity problems of cellular automata. Journal of Computer and System Sciences, 48(1):149–182, 1994.
[37] L. Gray. A mathematician looks at wolfram’s new kind of science. Not. Amer. Math. Soc., 50(1):200–211, 2003.
[38] J.L. Schiff. 4.2.1 partitioning cellular automata. Cellular Automata: A Discrete View of the World, 1(1):115–116, 2008.
[39] T. Toffoli and N.H. Margolus. Ii.12 the margolus neighborhood. Cellular Automata Machines: A New Environment for Modeling, MIT Press, 1(1):119–138, 1987.
[40] N.H. Margolus. Physics-like models of computation. Physica D, 10, 1(1):81–95, 1984.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69425-
dc.description.abstract細胞自動機是一種離散模型,已經成功地應用在許多物理系統及科
學問題中,例如數學、生物學都有其相關研究。它的三個重要特徵:
平行計算、變化局部性及規則一致性使得其非常適合應用在圖像加密
上,大多數現代圖像加密方法依賴於靜態數學原理來模糊數據,相比
之下細胞自動機不是基於公式來演化,它依賴於先前的鄰域狀態進行
下一個狀態的計算,具有混亂及不可預測性。本論文提出了一種基於
Margolus 細胞自動機之可逆圖像加密方法,Margolus 細胞自動機易於
找到可逆規則的特性使得密鑰可簡單得到,方法結合了R、G、B 顏色
通道之隨機排列增加整體的加密複雜度。本論文針對加密後之圖像做
了多種實驗分析,結果顯示所提出的方法具有高度的安全性可抵擋差
異攻擊及暴力攻擊,並且加密圖像可以零失真還原,平行化計算也使
得方法與序列執行相比具有更高的效率。
zh_TW
dc.description.abstractCellular automata represent a discrete model which has been successfully applied to many physical systems and scientific problems in mathematics and biology. Its three important features, namely parallel computing, changing locality and regularity, make it ideal for image encryption. Most modern image encryption methods rely on static mathematical principles to obfuscate data, whereas cellular automatons do not rely on the evolution of formulas, instead, they use previous neighborhood states for the next state calculation, exhibiting randomness and unpredictability. A new reversible color image
encryption method based on Margolus cellular automata is proposed. Margolus cellular automata make it easy to find reversible rules. The method combines the random shuffle of R, G, B color channels to increase the overall encryption complexity. By conducting experiment analysis on a wide variety
of encrypted images, our results show that the proposed method has a high degree of security to withstand differences in differential attacks and violent attacks. Furthermore, the encrypted image can be decrypted without data loss, and parallel calculation also makes the method efficient.
en
dc.description.provenanceMade available in DSpace on 2021-06-17T03:15:22Z (GMT). No. of bitstreams: 1
ntu-107-R05921108-1.pdf: 21371849 bytes, checksum: f75e5a15fa58d1a31ad23d970e64726c (MD5)
Previous issue date: 2018
en
dc.description.tableofcontents口試委員會審定書i
誌謝ii
摘要iii
Abstract iv
1 Introduction 1
2 Related Work 4
3 Proposed Method 7
3.1 Cellular Automata . . . 7
3.1.1 Common Neighborhood . . . 8
3.1.2 Margolus Neighborhood . . . 9
3.2 Our Proposed Image Encryption Algorithm . . . 11
3.2.1 Encryption Procedure . . . 12
3.2.2 A Channel Shuffling Technique . . . 13
3.3 CPU-Parallelism Design . . . 13
4 Performance and Security Analysis 16
4.1 Histogram Analysis . . . 17
4.2 Correlation Analysis . . . 17
4.3 Information Entropy Analysis . . . 18
4.4 Differential Attack Analysis . . . 22
4.5 Key Sensitivity Analysis . . . 23
4.6 Noise Addition Test . . . 30
4.7 Key Space Analysis . . . 30
5 Conclusion 36
Bibliography 37
dc.language.isoen
dc.subject統計分析zh_TW
dc.subject圖像安全zh_TW
dc.subject圖像加密zh_TW
dc.subject統計分析zh_TW
dc.subject細胞自動機zh_TW
dc.subject細胞自動機zh_TW
dc.subject圖像加密zh_TW
dc.subject圖像安全zh_TW
dc.subjectcellular automataen
dc.subjectimage encryptionen
dc.subjectstatistical testsen
dc.subjectimage securityen
dc.subjectimage securityen
dc.subjectstatistical testsen
dc.subjectimage encryptionen
dc.subjectcellular automataen
dc.title基於Margolus 細胞自動機結合通道隨機排列之可逆圖像加密方法zh_TW
dc.titleA Reversible Color Image Encryption Scheme Using Margolus Cellular Automata and a Channel Shuffling Techniqueen
dc.typeThesis
dc.date.schoolyear106-2
dc.description.degree碩士
dc.contributor.oralexamcommittee雷欽隆,郭斯彥,王勝德,莊仁輝
dc.subject.keyword細胞自動機,圖像加密,圖像安全,統計分析,zh_TW
dc.subject.keywordcellular automata,image encryption,image security,statistical tests,en
dc.relation.page40
dc.identifier.doi10.6342/NTU201801355
dc.rights.note有償授權
dc.date.accepted2018-07-09
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-107-1.pdf
  未授權公開取用
20.87 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved