研究生: |
張逸仲 Yi-Chung Chang |
---|---|
論文名稱: |
應用渾沌訊號於影像加解密處理器之研究及其FPGA實驗驗證 Development of Image Encryption and Decryption Processor by Using Chaotic Signal and Its FPGA Experimental Verification |
指導教授: |
楊振雄
Cheng-Hsiung Yang |
口試委員: |
陳金聖
Chin-Sheng Chen 郭永麟 Yong-Lin Kuo 徐勝均 Sheng-Dong Xu |
學位類別: |
碩士 Master |
系所名稱: |
工程學院 - 自動化及控制研究所 Graduate Institute of Automation and Control |
論文出版年: | 2017 |
畢業學年度: | 105 |
語文別: | 英文 |
論文頁數: | 92 |
中文關鍵詞: | 渾沌系統 、渾沌通訊 、渾沌加密 、彩圖加密 、位元級 、FPGA |
外文關鍵詞: | Chaos, Chaotic Communication, Chaotic Encryption, Color Image Encryption, Bit-level, FPGA |
相關次數: | 點閱:917 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在信息技術蓬勃發展之下,個人資訊的數位化已成現代人日常生活的一部分,但在便攜式數據儲存設備、網際網路與雲端服務普及之下,資訊安全儼然成為一個重要的議題,其中數據加密更是一個蓬勃發展的項目。
本文對於硬體通訊上的安全性,提供了一個基於四維度渾沌系統的並列埠傳輸技術,首先透過二維相圖、對稱性分析、平衡點分析、散度分析與Lyapunov指數圖,分析本文提出的新四維度渾沌系統,模擬並確認其渾沌特性可透過尤拉法則產生渾沌序列,作後續加密處理之用。
在密碼學中,混淆(confusion)與擴散(diffusion)是設計加密演算法的主要方法;在本實驗中,首先透過渾沌系統產生的亂數序列,對原始數據進行位元級的排列置換,為混淆階段的方法,接著再以渾沌系統產生的亂數對數據作取代置換,為擴散階段的方法。該密碼系統實現於Altera DE2-115 FPGA的開發板上,是一支持並列埠傳輸的渾沌加密處理器。
為了針對上述加密演算法作安全性分析,實驗中以BMP彩色圖片作為原始數據,經由加密處理後儲存至SD卡中,再以Matlab作圖片加密效果分析,最終可從實驗中驗證透過此新四維度的渾沌加密方法,是一個設計簡單且效果良好的加密處理器。
With the rapid development of information technology, portable data storage devices, Internet and cloud services have become a part of human daily life. For the digitization of personal information, information security has become a significant issue, in which data encryption is one of the popular research object.
In this study, a parallel port transmission technique based on four-dimensional chaotic system is proposed for the security of hardware communication. Applying the Matlab to analyze the new 4D chaotic system’s properties which include 2D phase portraits, symmetry and invariance, divergence analysis, equilibrium analysis and Lyapunov exponent diagrams.
First, through the two-dimensional phase portraits, divergence analysis, equilibrium analysis and Lyapunov exponent diagram, the new four-dimensional chaotic system is simulated and confirmed that its chaotic properties can be used to generate chaotic sequences through the Euler’s method as the shuffle sequence.
In cryptography, confusion and diffusion operations are the main methods for designing the encryption algorithm. In this experiment, all the encryption operation is performed by generating chaotic sequence. In the confusion phase, the characteristic of chaotic pseudorandom sequence is used to shuffle the data content by bit-level permutation. Next, the pixel characters are also substituted by using chaotic pseudorandom number in diffusion phase. All the function for cryptosystem is implemented by Altera DE2-115 FPGA which supports the chaotic secure on parallel transmission.
In order to analyze the security of proposed encryption algorithm, a BMP color image will be encrypted and accessed through FPGA. Finally, result of the Matlab analysis, we can get the conclusion of the new 4D chaotic system is a high security and simple-design for a cryptosystem.
[1]. An Wang, Zheng Li, Xianwen Yang, Yanyan Yu “New attacks and security model of the secure flash disk” Mathematical and Computer Modelling, vol. 57, pp2605-2612, 2011
[2]. An Wang, Zheng Li, Xianwen Yang, Boang Feng “A New Security Problem of USB Monitoring Cable Attack and Countermeasures” Proceedings of the 2012 International Conference on Information Technology and Software Engineering, pp 129-137, 2012
[3]. Yi Wang, Yajun Ha “FPGA-Based 40.9-Gbits/s Masked AES With Area Optimization for Storage Area Network” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 60, pp 36-40,2013
[4]. Antonio de la Piedra, An Braeken, Abdellah Touhafi, Karel Wouters “Secure event logging in sensor networks” Computers & Mathematics with Applications, vol. 65, pp762-773, 2013
[5]. Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar “STES A Stream Cipher Based Low Cost Scheme for Securing Stored Data” IEEE Transactions on Computers, vol.64, pp 2691-2707, 2015
[6]. K. Klomkarn, A. Jansri, P. Sooraksa “A design of stream cipher based on multi-chaotic functions” Communications and Information Technology, 2004. ISCIT 2004. IEEE International Symposium on, vol.2, pp 931-935, 2004
[7]. Ninan Sajeeth Philip, K. Babu Joseph “Chaos for Stream Cipher” Cornell University Library, 2001
[8]. N.KPareek, VinodPatidar, K.KSud “Discrete chaotic cryptography using external key” Physics Letters A, vol.309, pp 75-82, 2003
[9]. Sahar Mazloom, Amir-Masud Eftekhari-Moghadam “Color Image Cryptosystem using Chaotic Map” Computational Intelligence for Multimedia, Signal and Vision Processing (CIMSIVP), 2011 IEEE Symposium on, pp 142-147, 2011
[10]. M.D. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou, C.E. Goutis “Comparison of the hardware architectures and FPGA implementations of stream ciphers” Electronics, Circuits and Systems, 2004. ICECS 2004. Proceedings of the 2004 11th IEEE International Conference on, pp 571-574, 2004
[11]. Himan Khanzadi, Mohammad Eshghi & Shahram Etemadi Borujeni “Design and FPGA Implementation of a Pseudo Random Bit Generator Using Chaotic Maps” IETE Journal of Research, vol.59, pp 63-73, 2014
[12]. Qianxue Wang, Simin Yu, Chengqing Li, Jinhu Lü, Xiaole Fang, Christophe Guyeux, Jacques M. Bahi “Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems” IEEE Transactions on Circuits and Systems I: Regular Papers, vol.63 pp 401-412, 2016
[13]. S. Vaidyanathan. “Analysis and adaptive synchronization of eight-term 3-D polynomial chaotic systems with three quadratic nonlinearities” The European Physical Journal Special Topics, vol. 223, pp 1519–1529, 2014
[14]. Shannon C. E. “Communication theory of secrecy systems” Bell System Technical Journal, vol. 28(4), pp 656–715, 1949
[15]. Manju Rani. “A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher” Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on, pp 1442-1447, 2015
[16]. Xuanping Zhang, Zhongmeng Zhao. “Chaos-based image encryption with total shuffling and bidirectional diffusion” Nonlinear Dynamics, vol. 75, pp 319-330, 2014
[17]. Yueping Li, Chunhua Wang, Hua Chen. “A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation” Optics and Lasers in Engineering, vol. 90, pp 238-246, 2017
[18]. Xingyuan Wang, Guoxiang He, “Cryptanalysis on a novel image encryption method based on total shuffling scheme” Optics Communications, vol. 284, pp 5804-5807, 2011
[19]. H. H. Nien, W. T. Huang, C. M. Hung. “Hybrid image encryption using multi-chaos-system” Information, Communications and Signal Processing, 2009. ICICS 2009. 7th International Conference on, pp 1-5, 2009
[20]. Zhi-liang Zhu, Wei Zhang, Kwok-wo Wong, Hai Yu “A chaos-based symmetric image encryption scheme using a bit-level permutation” Information Sciences, vol. 181, pp 1171-1186, 2011
[21]. Yushu Zhang, Di Xiao “An image encryption scheme based on rotation matrix bit-level permutation and block diffusion” Communications in Nonlinear Science and Numerical Simulation, vol. 19, pp 74-82, 2014
[22]. Wei Zhang, Kwok-wo Wong, Hai Yu, Zhi-liang Zhu “An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion” Optics Communications, vol. 285, pp 2343-2354, 2012
[23]. Enzeng Dong, Zhihan Liang, Shengzhi Du, Zengqiang Chen “Topological horseshoe analysis on a four-wing chaotic attractor and its FPGA implement” Nonlinear Dynamics, vol.83, pp 623-630, 2016
[24]. LuXu, ZhiLi, JianLi, WeiHua “A novel bit-level image encryption algorithm based on chaotic maps” Optics and Lasers in Engineering, vol.78, pp 17-25, 2016
[25]. Ramzi Guesmi, Mohamed Amine Ben Farah, Abdennaceur Kachouri, Mounir Samet “Hash key-based image encryption using crossover operator and chaos” Multimedia Tools and Applications, vol.75, pp 4753-4769, 2016
[26]. Akram Belazi, Majid Khan, Ahmed A. Abd El-Latif, Safya Belghith “Efficient cryptosystem approaches S-boxes and permutation–substitution-based encryption” Nonlinear Dynamics, vol.87, pp 337-361
[27]. XiangjunWu, DaweiWang, JürgenKurths, HaibinKan “A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system” Information Sciences, vol.349-350, pp 137-153, 2016
[28]. XingyuanWang, YuanyuanZhao, HuiliZhang, KangGuo “A novel color image encryption scheme using alternate chaotic mapping structure” Optics and Lasers in Engineering, vol.82, pp 79-86, 2016
[29]. Yue Wu “NPCR and UACI Randomness Tests for Image Encryption” Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), pp 31-38, 2011