Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電信工程學研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/99123
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor貝蘇章zh_TW
dc.contributor.advisorSoo-Chang Peien
dc.contributor.author廖弈婷zh_TW
dc.contributor.authorYi-Ting Liaoen
dc.date.accessioned2025-08-21T16:28:38Z-
dc.date.available2025-08-22-
dc.date.copyright2025-08-21-
dc.date.issued2025-
dc.date.submitted2025-07-24-
dc.identifier.citation[1] G. Breitenbach. Arnold’s cat map visualization. http://gerdbreitenbach.de/arnold_cat/cat.html, n.d. Accessed: 2025-04-29.
[2] F. Chen, K.-W. Wong, X. Liao, and T. Xiang. Period distribution of the general-ized discrete arnold cat map for n = 2e. IEEE Transactions on Information Theory, 59(5):3249–3255, 2013.
[3] P. Liu, X.-Y. Wang, and Y. Su. Image encryption via complementary embedding algorithm and new spatiotemporal chaotic system. IEEE Transactions on Circuits and Systems for Video Technology, 33(5):1234–1245, 2023.
[4] Y. Tao, W. Cui, and Z. Zhang. Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithm. Journal of Information Security and Applications, 55:102650, Dec. 2020.
[5] Y. Xian and X. Wang. Fractal sorting matrix and its application on chaotic image encryption. Information Sciences, 547:1154–1169, 2021.
[6] Y. Xian, X. Wang, and L. Teng. Double parameters fractal sorting matrix and its application in image encryption. IEEE Transactions on Circuits and Systems for Video Technology, Aug. 2021. early access. 61
[7] Y. Xian, X. Wang, X. Wang, Q. Li, and X. Yan. Spiral-transform-based fractal sorting matrix for chaotic image encryption. IEEE Transactions on Circuits and Systems I: Regular Papers, 69(8):3320–3327, 2022.
[8] Y. Xian, X. Wang, X. Yan, Q. Li, and X. Wang. Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion. Optics and Lasers in Engineering, 134:106202, Nov. 2020.
[9] Y. Xian, X. Wang, Y. Zhang, X. Wang, and X. Du. Fractal sorting vector-based least significant bit chaotic permutation for image encryption. Chinese Physics B, 30(6):060508, June 2021.
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/99123-
dc.description.abstract在這個5G網路飛速成長的時代,影像資訊的安全性已經被大家密切關注及討論。我們透過閱讀影像加密、解密相關的論文來探討如何利用安全的方法傳送加密影像,並且在解密影像的階段也能準確地還原影像。其中,碎形螺旋矩陣和貓圖的概念讓我們有更多想要延伸實作的想法。我們設計了幾個相關的影像加密實驗,與其他較複雜或先進的方法不同的地方是我們結合先前提到的概念以及邏輯互斥或。邏輯互斥或的可逆性讓我們在解密影像的步驟可以更不費力。在評估實驗的方法中,我們運用了多種不同的方法來分析加密影像的安全性。實驗結果顯示我們在資訊熵分析中獲得很高的數值,在相關係數分析中也有呈現出接近零的結果,這表示了提出的方法實作效果不錯。除此之外,我們為了排除最理想的狀況,也加進了雜訊分析,透過雜訊分析可以看出在影像不完美的情況時,這個實驗是否還能順利進行。與傳統方法相比,所提出的方法在安全性與簡潔性之間提供了更好的平衡,使其適用於輕量級影像加密應用 。zh_TW
dc.description.abstractWith the rapid development of 5G networks, the security of image information has received increasing attention. To transmit images that contain important information more securely, we study papers related to image encryption and aim to propose more efficient methods.We designed the experiments based on the concepts of the fractal sorting matrix and Arnold's cat map. Moreover, we explore more diverse approaches to implement image encryption.Instead of applying complicated and state-of-the-art methods, we combine the concept with exclusive OR. With its inherent reversibility, we make no effort to decrypt the encrypted image.To evaluate our implementation, we adopt various approaches to analyze the security of the image encryption. Experimental results show that our method achieves high entropy.In addition, they perform well in the correlation coefficient analysis. Beyond the ideal conditions, we also conducted a robustness analysis to evaluate whether the proposed method can still achieve good reconstruction when the image is partially damaged.Compared to traditional methods, the proposed approach offers a better balance between security and simplicity, making it suitable for lightweight image encryption applications.en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2025-08-21T16:28:38Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2025-08-21T16:28:38Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontentsAcknowledgements i
摘要 iii
Abstract v
Contents vii
List of Figures xi
List of Tables xiii
Chapter 1 Introduction 1
1.1 Research Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Method Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Main Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.1 Expansion of a Fractal-Sorting-Matrix-Based Scrambled Matrix with the XOR Operation . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.2 Expansion of a Cat-Map-Based Scrambled Matrix with the XOR Op-eration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Chapter 2 Related Works 5
2.1 Fractal Spiral Matrix for Chaotic Image Encryption . . . . . . . . . . 5
2.1.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.1.2 Construction of Fractal Sorting Matrix . . . . . . . . . . . . . . . . 6
2.1.3 Example of FSM Construction . . . . . . . . . . . . . . . . . . . . 8
2.2 Arnold’s Discrete Cat Map . . . . . . . . . . . . . . . . . . . . . . . 10
2.2.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.2.2 Properties of Arnold’s cat map . . . . . . . . . . . . . . . . . . . . 11
2.2.3 Example of Arnold’s cat map . . . . . . . . . . . . . . . . . . . . . 11
Chapter 3 Image Encryption Algorithm and Image Decryption Algorithm 17
3.1 Image Encryption Algorithm Based on an Extension of Fractal Sort-ing Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.1.1 Position Change With Fractal Sorting Matrix . . . . . . . . . . . . . 18
3.1.1.1 Recursive Scramble Matrix Generation . . . . . . . . . 18
3.1.1.2 Image Encryption by Scrambled Matrix with Index Mod-ulation . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.1.2 Pixel Value Change With Fractal Sorting Matrix . . . . . . . . . . . 23
3.1.2.1 Image Encryption by Scrambled Matrix with Exclusive OR . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.1.2.2 Image Encryption by Multiple Scrambled Matrix with Exclusive OR . . . . . . . . . . . . . . . . . . . . . . 25
3.2 Image Encryption Algorithm Based on an Extension of Arnold's Cat Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Chapter 4 Experimental Results and Security Analysis 33
4.1 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
4.1.1 Image Encryption by Scrambled Matrix with Index Modulation . . . 33
4.1.2 Image Encryption by Scrambled Matrix with Exclusive OR . . . . . 34
4.1.3 Image Encryption by Multiple Scrambled Matrix with Exclusive OR 34
4.1.4 Image Encryption Algorithm Based on an Extension of Arnold's Cat Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
4.2 Histogram Statistical Analysis . . . . . . . . . . . . . . . . . . . . . 36
4.2.1 Image Encryption by Scrambled Matrix with Index Modulation . . . 37
4.2.2 Image Encryption by Scrambled Matrix with Exclusive OR . . . . . 37
4.2.3 Image Encryption by Multiple Scrambled Matrix with Exclusive OR 37
4.2.4 Image Encryption Algorithm Based on an Extension of Arnold's Cat Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
4.3 Correlation Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.3.1 Image Encryption by Scrambled Matrix with Index Modulation . . . 39
4.3.2 Image Encryption by Scrambled Matrix with Exclusive OR . . . . . 40
4.3.3 Image Encryption by Multiple Scrambled Matrix with Exclusive OR 40
4.3.4 Image Encryption Algorithm Based on an Extension of Arnold's Cat Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4.4 Entropy Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.4.1 Image Encryption by Scrambled Matrix with Index Modulation . . . 43
4.4.2 Image Encryption by Scrambled Matrix with Exclusive OR . . . . . 43
4.4.3 Image Encryption by Multiple Scrambled Matrix with Exclusive OR 43
4.4.4 Image Encryption Algorithm Based on an Extension of Arnold's Cat Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
4.5 Robustness Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 44
4.5.1 Image Encryption by Scrambled Matrix with Index Modulation . . . 45
4.5.1.1 Cropping Attack . . . . . . . . . . . . . . . . . . . . . 45
4.5.1.2 Noise Attack . . . . . . . . . . . . . . . . . . . . . . . 46
4.5.2 Image Encryption by Scrambled Matrix with Exclusive OR . . . . . 49
4.5.2.1 Cropping Attack . . . . . . . . . . . . . . . . . . . . . 49
4.5.2.2 Noise Attack . . . . . . . . . . . . . . . . . . . . . . . 50
4.5.3 Image Encryption by Multiple Scrambled Matrix with Exclusive OR 52
4.5.3.1 Cropping Attack . . . . . . . . . . . . . . . . . . . . . 52
4.5.3.2 Noise Attack . . . . . . . . . . . . . . . . . . . . . . . 53
4.5.4 Image Encryption Algorithm Based on an Extension of Arnold's Cat Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
4.5.4.1 Cropping Attack . . . . . . . . . . . . . . . . . . . . . 55
4.5.4.2 Noise Attack . . . . . . . . . . . . . . . . . . . . . . . 56
Chapter 5 Conclusion 59
References 61
-
dc.language.isoen-
dc.subject影像加密zh_TW
dc.subject影像解密zh_TW
dc.subject資訊安全性zh_TW
dc.subject還原影像zh_TW
dc.subject影像重建zh_TW
dc.subject碎形螺旋矩陣zh_TW
dc.subject貓圖zh_TW
dc.subject邏輯互斥zh_TW
dc.subject雜訊分析zh_TW
dc.subjectfractal sorting matrixen
dc.subjectimage encryptionen
dc.subjectnoise analysisen
dc.subjectexclusive ORen
dc.subjectcat mapen
dc.subjectimage decryptionen
dc.subjectinformation securityen
dc.subjectimage reconstructionen
dc.subjectimage recovereden
dc.title利用碎形螺旋矩陣及貓圖的影像加密法zh_TW
dc.titleImage Encryption Using Fractal Spiral Matrix and Cat Mapen
dc.typeThesis-
dc.date.schoolyear113-2-
dc.description.degree碩士-
dc.contributor.coadvisor丁建均zh_TW
dc.contributor.coadvisorJian-Jiun Dingen
dc.contributor.oralexamcommittee吳家麟;鍾國亮;杭學鳴zh_TW
dc.contributor.oralexamcommitteeJL Wu;KL Chung;Hsueh-Ming Hangen
dc.subject.keyword影像加密,影像解密,資訊安全性,還原影像,影像重建,碎形螺旋矩陣,貓圖,邏輯互斥,雜訊分析,zh_TW
dc.subject.keywordimage encryption,image decryption,information security,image reconstruction,image recovered,fractal sorting matrix,cat map,exclusive OR,noise analysis,en
dc.relation.page62-
dc.identifier.doi10.6342/NTU202502357-
dc.rights.note未授權-
dc.date.accepted2025-07-28-
dc.contributor.author-college電機資訊學院-
dc.contributor.author-dept電信工程學研究所-
dc.date.embargo-liftN/A-
顯示於系所單位:電信工程學研究所

文件中的檔案:
檔案 大小格式 
ntu-113-2.pdf
  未授權公開取用
7.74 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved