簡易檢索 / 詳目顯示

研究生: 陳冠臻
Chen, Guan-Zhen
論文名稱: 四像素縮圖保留輕量影像加密法於空拍影像模擬
Four-Pixel Thumbnail-Preserving Lightweight Image Encryption (4PX-TPE) for Aerial Imagery Simulation
指導教授: 廖德祿
Liao, Teh-Lu
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系
Department of Engineering Science
論文出版年: 2025
畢業學年度: 113
語文別: 中文
論文頁數: 52
中文關鍵詞: 縮圖保留加密輕量影像加密空拍影像
外文關鍵詞: Thumbnail-Preserving Encryption, Lightweight Image Encryption, UAV Imagery
相關次數: 點閱:31下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著無人機與雲端儲存技術的普及,空拍影像廣泛應用於環境監測、城市巡查與災後勘查等場景,多透過無線網路即時上傳至雲端,然而影像常含有地理資訊與人員活動等敏感內容,若未經妥善加密即上傳,將可能造成隱私洩漏與資訊安全風險;傳統圖像加密方法雖具高度保密性,但其全遮蔽式特性使雲端無法預覽影像內容,不利於快速檢索與即時應用。
    為兼顧影像的安全性與可用性,本論文提出以縮圖保留為核心的輕量影像加密架構,稱為4PX-TPE(Four-Pixel Thumbnail-Preserving Encryption)方案,以四像素為加密單元,結合混沌置換與總和保留加密(Sum-Preserving Encryption, SPE),保留加密後影像的低解析度視覺輪廓,並透過像素組生成公式化,提升處理效率與結構可逆性。
    本論文於Raspberry Pi嵌入式平台整合相機模組與加密演算,模擬無人機端即時拍攝、加密與雲端上傳流程,驗證4PX-TPE在維持隱私保護的同時,可保留縮圖辨識性並具即時處理能力,具備應用於智慧城市、空拍巡查與圖像授權平台等場景之潛力。

    With the widespread development of UAV imaging and the proliferation of cloud storage services, aerial images are increasingly used in environmental monitoring, urban inspection, and disaster response. These images, often transmitted via wireless networks and stored in the cloud, commonly include sensitive information such as geographic coordinates and human activities. If uploaded without proper protection, they pose severe privacy and security risks. Traditional encryption methods, although highly secure, render images unreadable and remove all visual features, making them incompatible with cloud preview and unsuitable for resource-constrained or real-time applications.
    To address these challenges, this thesis proposes 4PX-TPE (Four-Pixel Thumbnail-Preserving Encryption), a lightweight encryption architecture designed to preserve thumbnail-level visual structure while protecting content. The method adopts four-pixel units, combining chaotic permutation and formula-based sum-preserving encryption (SPE) to maintain visual consistency and reversibility.
    The 4PX-TPE scheme is implemented on a Raspberry Pi embedded platform integrated with a camera module, simulating UAV-based real-time image capture, encryption and cloud upload. The system aims to enable low-resolution recognizability without disclosing sensitive image content. Experimental results demonstrate that 4PX-TPE provides a practical trade-off between usability and privacy, making it suitable for smart city surveillance, cloud-based preview systems, and secure aerial data services.

    摘要 I EXTENDED ABSTRACT II 致謝 VI 目錄 VII 圖目錄 IX 表目錄 X 第一章 緒論 1 1.1 研究背景與動機 1 1.2 文獻探討 1 1.3 研究貢獻及論文組織 2 第二章 縮圖保留加密(Thumbnail-Preserving Encryption, TPE) 4 2.1 TPE定義 4 2.2 總和保留加密(Sum-Preserving Encryption, SPE) 5 2.2.1 排名後加密法(Rank-then-Encipher, RtE) 6 2.2.2 基於數學式的SPE(Formula-based SPE) 7 第三章 輕量影像加密(Lightweight Image Encryption) 8 3.1 定義與設計原則 8 3.2 嵌入式設備之影像加密挑戰 8 3.3 基於4PX-TPE之輕量影像加密商業運用 9 第四章 4PX-TPE方案設計架構 11 4.1 參數生成 12 4.1.1 參數設計機制 12 4.1.2 參數運算示例 12 4.2 區塊劃分 13 4.3 混沌置換(chaotic permutation) 14 4.3.1 Logistic映射與混沌序列生成 15 4.3.2 區塊內像素置換流程 15 4.4 4PX-SPE(Sum-Preserving Encryption)替換 16 4.4.1 加密單元構成原則 16 4.4.2 4PX-SPE數學表達式 17 4.4.3 4PX-SPE公式可行性證明 20 第五章 空拍模擬實驗設計 21 5.1 實驗環境與系統整合 21 5.2 實驗設計流程 22 第六章 實驗與分析 23 6.1 空拍模擬實驗分析 23 6.1.1 實驗環境 24 6.1.2 加密效能分析 27 6.1.3 影像品質評估 28 6.1.4 安全性分析 30 6.2 不同TPE方案效能比較分析 36 6.2.1 資料預處理 36 6.2.2 加密效能比較 37 第七章 結論與未來展望 38 7.1 結論 38 7.2 未來展望 38 參考文獻 39

    [1] C. Yan, L. Fu, J. Zhang, and J. Wang, "A Comprehensive Survey on UAV Communication Channel Modeling," IEEE Access, vol. 7, pp. 107769-107792, 2019, doi: 10.1109/ACCESS.2019.2933173.
    [2] J. D. a. V. Rijmen, The Design of Rijndael: AES—The Advanced Encryption Standard. Berlin: Springer Science & Business Media, 2002.
    [3] R. L. a. S. Rivest, A. and Adleman, L., "A method for obtaining digital signatures and public-key cryptosystems," vol. 21, 1978, doi: 10.1145/359340.359342.
    [4] C. V. Wright, W.-c. Feng, and F. Liu, "Thumbnail-preserving encryption for JPEG," in Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015, pp. 141-146.
    [5] K. Tajik et al., "Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption," IACR Cryptol. ePrint Arch., vol. 2019, p. 295, 2019.
    [6] R. Zhao, Y. Zhang, X. Xiao, X. Ye, and R. Lan, "TPE2: Three-Pixel Exact Thumbnail-Preserving Image Encryption," Signal Processing, vol. 183, p. 108019, 2021/06/01/ 2021, doi: https://doi.org/10.1016/j.sigpro.2021.108019.
    [7] B. Marohn, C. V. Wright, W.-c. Feng, M. Rosulek, and R. B. Bobba, "Approximate thumbnail preserving encryption," in Proceedings of the 2017 on Multimedia Privacy and Security, 2017, pp. 33-43.
    [8] Y. Zhang, R. Zhao, X. Xiao, R. Lan, Z. Liu, and X. Zhang, "HF-TPE: High-Fidelity Thumbnail- Preserving Encryption," IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 3, pp. 947-961, 2022, doi: 10.1109/TCSVT.2021.3070348.
    [9] R. Lei, L. Liu, X. Huang, B. Jin, Z. Zhu, and L. Fan, "Thumbnail-preserving encryption by sum-preserving within blocks based on exponential chaotic map," Nonlinear Dynamics, vol. 112, pp. 14573-14592, August 01, 2024 2024, doi: 10.1007/s11071-024-09841-z.
    [10] Y. Zhang, W. Zhou, R. Zhao, X. Zhang, and X. Cao, "F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption," IEEE Transactions on Multimedia, vol. 25, pp. 5877-5891, 2023, doi: 10.1109/TMM.2022.3200310.
    [11] R. L. Gregory, "Knowledge in perception and illusion," Philosophical Transactions of the Royal Society of London. Series B: Biological Sciences, vol. 352, no. 1358, pp. 1121-1127, 1997.
    [12] M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers, "Format-Preserving Encryption," in Selected Areas in Cryptography, Berlin, Heidelberg, M. J. Jacobson, V. Rijmen, and R. Safavi-Naini, Eds., 2009// 2009: Springer Berlin Heidelberg, pp. 295-312.
    [13] V. A. Thakor, M. A. Razzaque, and M. R. A. Khandaker, "Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities," IEEE Access, vol. 9, pp. 28177-28193, 2021, doi: 10.1109/ACCESS.2021.3052867.
    [14] N. I. o. S. a. T. (NIST). "Lightweight Cryptography Project." NIST Computer Security Resource Center. https://csrc.nist.gov/projects/lightweight-cryptography (accessed.
    [15] R. M. May, "Simple mathematical models with very complicated dynamics," Nature, vol. 261, no. 5560, pp. 459-467, 1976/06/01 1976, doi: 10.1038/261459a0.
    [16] I. Skorokhodov, G. Sotnikov, and M. Elhoseiny. "Landscapes dataset (LHQ 1024×1024)." Kaggle. https://www.kaggle.com/datasets/dimensi0n/lhq-1024 (accessed.
    [17] L. Liu, "Thumbnail-preserving encryption by sum-preserving within blocks based on exponential chaotic mapping," 2023.

    無法下載圖示 校內:2028-08-01公開
    校外:2028-08-01公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE