簡易檢索 / 詳目顯示

研究生: 王奕凱
Yi-Kai Wang
論文名稱: 基於隨機運算實現渾沌數位電路用於影像加密
Implementation of Chaotic Digital Circuit Based on Stochastic Computing for Image Encryption
指導教授: 楊振雄
Cheng-Hsiung Yang
口試委員: 吳常熙
陳金聖
郭永麟
楊振雄
學位類別: 碩士
Master
系所名稱: 工程學院 - 自動化及控制研究所
Graduate Institute of Automation and Control
論文出版年: 2020
畢業學年度: 108
語文別: 英文
論文頁數: 80
中文關鍵詞: 渾沌系統隨機運算最佳化演算法圖像加密現場可程式邏輯閘陣列
外文關鍵詞: chaos system, stochastic computing, optimization, image encryption, FPGA
相關次數: 點閱:224下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 相較於傳統運算架構,隨機運算可以有效的減少硬體電路使用量。隨機運算的基礎是建立在機率學上的集合理論,透過隨機的二元數列進行計算。因此,本篇論文使用隨機運算架構建立一個二維渾沌系統並將其用於影像加密,並討論其可行性。首先,我們設計了一個新的二維超渾沌系統,並透過相圖、分歧圖與李亞普諾夫指數驗證其渾沌特性。接著我們透過模擬退火法找出近似方程式以及其對應的隨機運算邏輯電路,並設計了一套簡易的加密流程。為了將在FPGA上實現加密系統與隨機運算,我們先在Altera-Modelsim上對所有電路元件進行模擬,並針對開發版特性做靜態時序分析以確保電路穩定性。最後我們分析了電路的成本、運算時間與加密安全性。根據Quartus 16.1的生成報告,隨機運算電路架構的元件組成明顯地低於傳統電路架構的20%。但是儘管使用了平行加速運算,隨機運算的高延遲缺點不能完全解決。因此我們對本篇題目的改進方向提出建議。


    Stochastic computing (SC) is a lower-cost digital computational architecture than conventional computing. The fundamental of SC is based on the set theory of probability and operates on random binary bit streams. Therefore, this thesis proposes a chaotic signal generator based on stochastic implementation and discusses its feasibility.First, we design a novel two-dimension chaotic map for stochastic computing rule and use the optimization algorithm to find the approximate polynomial solution to the objective function. Then, we combine different types of approximations to form a two-dimension hyperchaotic map. We verify chaotic characteristic of the hyperchaotic map by Lyapunov exponent, bifurcation diagram, and phase portrait. Next, we implement the digital circuit in the on FPGA and design an image encryption algorithm. The usage hardware is Altera DE10 standard, and we develop Verilog HDL and the architecture of stochastic computing by Quartus II Prime 16.1.0. Then, we conduct the RTL simulation and static timing analysis of the designed circuit.We verify the feasibility of stochastic computing architecture by Lyapunov exponents and cost evaluation. The hardware footprint of SC is smaller 20% than conventional computing at least. Moreover, we analyze the security of the encryption by performing histogram analysis, correlation analysis, resistance analysis of differential cryptanalysis, and entropy analysis on multiple ciphertexts. Finally, we propose the future improvement direction for the high latency of SC.

    摘要 I ABSTRACT II CONTENTS III List of Figure V List of Table IX Chapter 1 Introduction 1 1.1 Background 1 1.2 Literature Review 1 1.3 Motivation and Purpose 3 1.4 Outline 4 Chapter 2 Encryption Algorithm Design 6 2.1 Fundamental of Stochastic Computing 6 2.2 Two-dimension Hyper Chaos System 8 2.2.1 Bifurcation 10 2.2.2 Lyapunov exponent 15 2.3 Curve Fitting with Simulated Annealing (SA) Algorithm 18 2.4 Simulation of Approximate Chaos System (ACS) 21 2.5 Encryption Algorithm 28 2.5.1 Key generator 29 2.5.2 Z generator 30 Chapter 3 Experimental Implementation 31 3.1 Stochastic Implementation 32 3.1.1 Chaos generator 36 3.1.2 Static timing analysis 41 3.2 Conventional Computing 46 3.3 Demonstration 50 Chapter 4 Analysis 53 4.1 Lyapunov exponents of time series data 53 4.2 Cost estimation 54 4.3 Histogram analysis 56 4.4 Correlation analysis 62 4.5 Resistance of differential cryptanalysis 69 4.6 Shannon entropy analysis 72 Chapter 5 Conclusion and Future Work 74 5.1 Conclusion 74 5.2 Future Work 75 Reference 76

    [1] J. von Neumann, “Lectures on probabilistic logics and the synthesis of reliable organisms from unreliable components,” Automata Studies, vol. 34, pp. 43–98, 1956.
    [2] B. R. Gaines, “Stochastic computing systems,” Adv. Inf. Syst. Sci. Plenum, vol. 2, no. 2, pp. 37–172, 1969.
    [3] M. van Daalen, P. Jeavons, J. Shawe-Taylor and D. Cohen, "Device for generating binary sequences for stochastic computing," Electronics Letters, vol. 29, no. 1, pp. 80, 7 Jan 1993.
    [4] J. Han and M. Orshansky, “Approximate computing: An emerging paradigm for energy-efficient design,” in 2013 18th IEEE European Test Symposium (ETS), Avignon, pp. 1-6, 2013.
    [5] J. Liang, J. Han, and F. Lombardi, “New metrics for the reliability of approximate and probabilistic adders,” IEEE Transactions on Computers, vol. 62, no. 9, pp. 1760–1771, 2013.
    [6] C. Liu, J. Han and F. Lombardi, "A low-power, high-performance approximate multiplier with configurable partial error recovery," Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, pp. 1–4, 2014.
    [7] P. Li and D. J. Lilja, “Using stochastic computing to implement digital image processing algorithms,” Proc. Intl. Conf. Computer Design, pp. 154–161, 2011.
    [8] P. Li, D. J. Lilja, W. Qian, K. Bazargan and M. D. Riedel, “Computation on Stochastic Bit Streams Digital Image Processing Case Studies,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 22, no. 3, pp. 449–462, March 2014.
    [9] M. Ranjar, M.E. Salehi and M.H. Najafi, “Using stochastic architecture for edge detection algorithms,” in 2015 23rd the Iranian Conference on Electrical Engineering, Tehran, pp. 723–728, 2015.
    [10] R. Akhtar and F. A. Khanday, "Stochastic Computing: Systems, Applications, Challenges and Solutions," 3rd International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, pp. 722-727, 2018.
    [11] H. Joe and Y. Kim, “Novel stochastic computing for energy-efficient image processors,” Electronics, vol. 8(6), pp. 1–11, 2019.
    [12] A. Alaghi and J. P. Hayes, “Computing with Randomness,” IEEE Spectrum, vol. 55, no. 3, pp. 46–51, March 2018.
    [13] R. Seva, P. Metku, and M. Choi, “Energy-Efficient FPGA-Based Parallel Quasi-Stochastic Computing,” Low Power Electron. Appl., July ,2017.
    [14] Y. Liu and K. K. Parhi, “Linear-phase lattice FIR digital filter architectures using stochastic logic”, Signal Process. Syst., vol. 90, no. 5, pp. 791–803, 2018.
    [15] K. Han, J. Hu, J. Chen, Z. Zhang and H. Lu, "A Fast Converging Normalization Unit for Stochastic Computing," IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 65, no. 4, pp. 501–505, April 2018.
    [16] K. Han, J. Hu, J. Chen and H. Lu, “A Low Complexity Sparse Code Multiple Access Detector Based on Stochastic Computing,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 65, no. 2, pp. 769–782, Feb. 2018.
    [17] T. Hirtzlin, B. Penkovsky, M. Bocquet, J. Klein, J. Portal and D. Querlioz, “Stochastic Computing for Hardware Implementation of Binarized Neural Networks,” IEEE Access, vol. 7, pp. 76394–76403, 2019.
    [18] V. Canals, A. Morro, A. Oliver, M. L. Alomar and J. L. Rosselló, “A New Stochastic Computing Methodology for Efficient Neural Network Implementation,” IEEE Transactions on Neural Networks and Learning Systems, vol. 27, no. 3, pp. 551–564, March 2016.
    [19] X. Liu and K. K. Parhi, “Molecular and DNA Artificial Neural Networks via Fractional Coding,” in IEEE Transactions on Biomedical Circuits and Systems, vol. 14, no. 3, pp. 490–503, June 2020.
    [20] S. Li, Q. Wang, X. Liu and J. Chen, “Low Cost LSTM Implementation based on Stochastic Computing for Channel State Information Prediction,” 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Chengdu, 2018, pp. 231–234.
    [21] A. Ardakani, F. Leduc-Primeau, N. Onizawa, T. Hanyu and W. J. Gross, “VLSI Implementation of Deep Neural Network Using Integral Stochastic Computing,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 25, no. 10, pp. 2688–2699, Oct. 2017.
    [22] Z. Wang, R. Goh, K. Bazargan, A. Scheel and N. Saraf, “Stochastic Implementation and Analysis of Dynamical Systems Similar to the Logistic Map,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 25, no. 2, pp. 747-759, Feb. 2017.
    [23] C.E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, Oct. 1949.
    [24] H. Li, L. Deng and Z. Gu, “A Robust Image Encryption Algorithm Based on a 32-bit Chaotic System,” IEEE Access, vol. 8, pp. 30127–30151, 2020.
    [25] Y. Guo, S. Jing, Y. Zhou, X. Xu and L. Wei, “An Image Encryption Algorithm Based on Logistic-Fibonacci Cascade Chaos and 3D Bit Scrambling,” IEEE Access, vol. 8, pp. 9896–9912, 2020.
    [26] J. Wang, F. Long and W. Ou, "CNN-based color image encryption algorithm using DNA sequence operations," 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), Shenzhen, pp. 730–736, 2017.
    [27] Z. Hua, F. Jin and B. Xu, “2D Logistic-Sine-coupling map for image encryption,” Signal Process, vol. 149, pp. 148–161, 2018.
    [28] H. Zhu, Y. Zhao and Y. Song, "2D Logistic-Modulated-Sine-Coupling-Logistic Chaotic Map for Image Encryption," IEEE Access, vol. 7, pp. 14081–14098, 2019.
    [29] C. Park and L.L. Huang, “A new color image encryption using combination of the 1D chaotic map” Signal Process, vol. 138, pp. 129–137, 2017.
    [30] C. Yang, H. Wu and S. Su, “Implementation of Encryption Algorithm and Wireless Image Transmission System on FPGA,” IEEE Access, vol. 7, pp. 50513–50523, 2019.
    [31] H.F.V. Bremen, F.E. Udwadia, W. Proskurowski, “An efficient qr based method for the computation of lyapunov exponents,” Physica D, vol. 101, pp. 1–16, 1997.
    [32] A. Alaghi and J. P. Hayes, “Exploiting correlation in stochastic circuit design,” 2013 IEEE 31st International Conference on Computer Design (ICCD), Asheville, NC, pp. 39–46, 2013.
    [33] F. Neugebauer, I. Polian, J.P. Hayes, “S-Box-based random number generation for stochastic computing,” Microprocess Microsyst, vol. 61, pp.316–326, 2018.
    [34] Barker, E. “NIST Special Publication 800-57, Part 1, Revision 4,” [Ebook], pp. 54–57 Available: http://dx.doi.org/10.6028/NIST.Spp.800--57pt1r4.
    [35] Intel Corporation-FPGA University Program, “TimeQuest Timing Analyzer,” [Ebook], Nov., 2016. Available: http://128.148.66.138/classes/EN164S16/Timequest.pdf.
    [36] Intel Corporation-FPGA University Program, “DE 10-standard User Manual.” [Ebook], pp. 110–120, Apr. 2017. Available: https://www.intel.com/content/dam/altera-www/global/en_US/portal/dsn/42/doc-us-dsnbk-42-5505271707235-de10-standard-user-manual-sm.pdf.
    [37] University of Southern California, “The USC-SIPI Image Database,” Available: http://sipi.usc.edu/database/database.php?volume=misc.
    [38] A. Wolf, J.B. Swift, H.L. Swinney, J.A. Vastano, “Determining Lyapunov exponents from a time series,” Phys D, vol. 16, pp. 285–317, 1985.
    [39] Y. Wu, J.P. Noonan, S. Agaian, “NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology,” J. Sel. Areas Telecommun, vol.1, pp. 31–38 ,2011.
    [40] Y. Wu, Y. Zhou, G. Saveriades, “Local Shannon entropy measure with statistical tests for image randomness,” Inf. Sci., vol. 222, pp. 323–342, 2013.

    無法下載圖示 全文公開日期 2025/08/05 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE