| 研究生: |
李俊德 Li, Chun-Te |
|---|---|
| 論文名稱: |
基於混沌系統之JPEG2000編碼串流相容加密 Compliant Encryption of JPEG2000 Image Code-Streams Based on Chaotic System |
| 指導教授: |
陳進興
Chen, Chin-Hsing |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2008 |
| 畢業學年度: | 96 |
| 語文別: | 英文 |
| 論文頁數: | 82 |
| 中文關鍵詞: | 相容加密 、JPEG2000 、混沌 |
| 外文關鍵詞: | compliant encryption, JPEG2000, chaotic |
| 相關次數: | 點閱:62 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著多媒體通訊的快速發展,影像跟視訊扮演一個極重要的角色,因為它們可以提供我們很富豐的資訊。因此,保護數位資訊對抗非法的拷貝跟散佈變得極度地重要。JPEG2000是最新的國際影像壓縮標準而且可以被運用在許多的應用上。近年來,許多JPEG2000加密系統的研究陸續被提出,其中F&S加密系統不僅格式相容還能在計算上有效率。F&S系統使用計數器模式AES產生金匙流。計數器模式AES雖然能提供高安全性,但它在速度上卻不是那麼有效率,因此我們代之以雙混沌假隨機位元產生器(CCS-PRBG)以加快處理速度。再者,我們在F&S系統上增加迴授加密以增加其安全性。
本論文提出的使用雙混沌假隨機位元產生器(CCS-PRBG)的迴授加密系統在金鑰空間上有些微的降低,但是它的安全性仍足夠抵抗目前所有已知的攻擊並仍具有相當大的金鑰空間。AES和我們提出的加密系統分別用來加密Lena, Baboon and Peppers這三張圖以比較其效能。在加密時間上,後者將前者分別由1.935159秒降到0.348148秒、1.942963秒降到0.350751秒、1.940321秒降到0.352586秒。換言之,速度效能的提升為五至六倍。另外,我們提出的系統有良好的統計特性、它通過FIPS 140-1的測試以及理想的線性複雜度。因此,我們提出的系統能降低加密時間但不會損失安全性。
With the rapid growth of multimedia communication, images and videos play important roles because they can provide very rich information for us. Therefore, protection of digital information against illegal copying and distribution has become extremely important. JPEG2000 is the latest international still image compression standard and it can be used in many applications. Many researches about JPEG2000 encryption scheme have been proposed recently. Among them, the F&S encryption scheme is not only fully format compliant but also computationally efficient. The counter mode AES employed in the F&S system can provide high security but its speed performance is not efficient. Therefore, we replace it by the CCS-PRBG as the key generator to increase the processing speed. Further more, feedback encryption is built into F&S system to increase the security.
Although the key space of our proposed encryption scheme by using the CCS-PRBG decrease a little, its security is good enough to resist all known attacks and its key space is still very large. The AES and the proposed scheme using CCS-PRBG were compared by testing them on three images: Lena, Baboon and Peppers. The encryption time of the later compared with that of the former decreases from 1.935159 (sec) to 0.348148 (sec), from 1.942963 (sec) to 0.350751 (sec), and from 1.940321 (sec) to 0.352586(sec), that is, the speed lift is between 5 to 6 times. Besides, the proposed scheme using the CCS-PRBG has good statistical properties, it passes FIPS 140-1 test, and has linear complexity profile. Therefore, our proposed scheme reduces the processing time for encryption but not sacrifice security.
[1]G. Alvarez and S. Li, “Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems,” International Journal of Bifurcation and Chaos, Vol. 16, No. 8, Pages: 2129 - 2151, 2006.
[2]J. Fang and J. Sun, “A Format-Compliant Encryption Framework for JPEG2000 Image Code-Streams in Broadcasting Applications,” Advances in Multimedia Information Processing - PCM, Lecture Notes In Computer Science, Springer, Berlin, Pages: 64 - 71, 2006.
[3]J. Fang and J. Sun, “Compliant Encryption Scheme for JPEG 2000 Image Code Streams,” Journal of Electronic Imaging, Vol. 15, No. 4, Pages: 043013-1 - 043013-4, Oct. - Dec. 2006.
[4]C. Fu and Z. Zhu, “An Improved Chaos-based Stream Cipher Algorithm,” Proceedings of IEEE Third International Conference on Natural Computation, Vol. 3, Pages: 179 - 183, Aug. 2007.
[5]C. Fu, Z. Zhang and Y. Cao, “An Improved Image Encryption Algorithm Based on Chaotic Maps,” Proceedings of IEEE Third International Conference on Natural Computation, Vol. 3, Pages: 189 - 193, Aug. 2007.
[6]M. Grangetto, A. Grosso and E. Magli, “Selective Encryption of JPEG 2000 Images by Means of Randomized Arithmetic Coding,” 2004 IEEE 6th Workshop on Multimedia Signal Processing, Pages: 347 - 350, Oct. 2004.
[7]R. Grosbois, P. Gerbelot and T. Ebrahimi, “Authentication and Access Control in the JPEG 2000 Compressed Domain,” In Proceedings of the SPIE 46th Annual Meeting, Applications of Digital Image Processing XXIV, San Diego, Vol. 4472, Pages: 95 - 104, 2001.
[8]Z. H. Guan, F. Huang and W. Guan, “Chaos-Based Image Encryption Algorithm,” Physics Letters A, Vol. 346, No. 1-3, Pages: 153 - 157, Oct. 2005.
[9]ISO/IEC JTC 1/SC 29/WG 1, ISO/IEC FCD 15444-1: Information tech.-JPEG 2000 image coding system: Core coding system, Mar. 2000.
[10]K. Kelber and W. Schwarz, “General Design Rules for Chaos-Based Encryption Systems,” 2005 International Symposium on Nonlinear Theory and Its Applications (NOLTA2005), Pages: 465 - 468, Oct. 2005.
[11]Z. Kotulski and J. Szczepanski, “Discrete Chaotic Cryptography,” Annalen der Physik, Vol. 6, No. 5, Pages: 381 - 394, 1997.
[12]C. S. Laih, L. Harn and C. C. Chang, “Contemporary Cryptography and It's Application,” Flag, Taiwan, 2003.
[13]P. L'Ecuyer, “Testing Random Number Generators,” Winter Simulation Conference: Proceedings of the 24th conference on Winter simulation,” Pages: 305 - 313, 1992.
[14]S. Li, “Analyses and New Designs of Digital Chaotic Ciphers,” Ph. D. Dissertation, School of Electronics and Information Engineering, Xi’an Jiaotong University, Xi’an, China, Jun. 2003.
[15]S. Li, G. Chen and X. Zheng, “Chaos-Based Encryption for Digital Images and Videos,” in Multimedia Security Handbook, CRC Press, LLC, Pages: 133 - 167, 2004.
[16]S. Li, X. Zheng, X. Mou and Y. Cai, “Chaotic Encryption Scheme for Real-Time Digital Video,” Proceedings of SPIE, Vol. 4666, Pages: 149 - 160, Jan. 2002.
[17]S. Li, X. Zheng, X. Mou and Y. Cai, “Pseudo-Random Bit Generator Based on Couple Chaotic Systems and Its Application in Stream-Ciphers cryptography,” In Progress in Cryptology - INDOCRYPT 2001, Lecture Notes in Computer Science, Vol. 2247, Pages: 316 - 329, 2001.
[18]S. Li, Q. Li, W. Li, X. Mou and Y. Cai, “Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding,” In Cryptography and Coding - 8th IMA Int. Conf. Proc. (to be published), Lecture Notes in Computer Science, Springer-Verlag, Berlin, Pages: 205 - 221, 2001.
[19]S. Lian, G. Chen, A.Cheung and Z. Wang, “A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images,” IEEE Symposium on Neural Networks, Pages: 627 - 632, 2004.
[20]S. Lian, J. Sun and Z. Wang, “A Selective Image Encryption Scheme Based on JPEG2000 codec,” Springer LNCS 3332, 2004.
[21]S. Lian, J. Sun and Z. Wang, “Perceptual Cryptography on JPEG2000 Compressed Images or Videos,” Proceedings of IEEE the Fourth International Conference on Computer and Information Technology, Pages: 78 - 83, Sep. 2004.
[22]C. Lin, W. Chang and C. Li, “A Chaos-based Visual Encryption Mechanism in JPEG2000 Medical Images,” Journal of Medical and Biological Engineering, Vol. 27, No. 3, Pages: 381 - 394, Jun. 2007.
[23]Y. Mao and G. Chen, “Chaos-Based Image Encryption,” Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neural Computing and Robotics, Springer-Verlag, Berlin, Apr. 2004.
[24]H. H. Nien, C. K. Huang, S. K. Changchien, H. W. Shieh, C. T. Chen and Y. Y. Tuan, “Digital Color Image Encoding and Decoding Using a Novel Chaotic Random Generator,” Journal of Chaos, Solitons and Fractals, Vol. 32, No. 3, Pages: 2070 - 2080, May 2007.
[25]R. Norcen and A. Uhl, “Selective Encryption of the JPEG2000 Bitstream,” International Federation for Information Processing, Pages: 194 - 204, 2003.
[26]A. Pommer and A. Uhl, “Selective Encryption of Wavelet-Packet Encoded Image Data: Efficiency and Security,” Communications and Multimedia Security, Pages: 194 - 204, 2003.
[27]A. Pommer, “Selective Encryption of Wavelet-Compressed Visual Data,” Ph. D. Dissertation, Department of Scientific Computing, University of Salzburg, Austria, Jun. 2003.
[28]A. Sranoyevitch, “Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB,” Wiley-Interscience, N. J., 2005.
[29]S. Tao, W. Ruili and Y. Yixun, “Clock-Controlled Chaotic Keystream Generators,” Electronics Letters, Vol. 34, No. 20, Pages: 1932 - 1934, 1998.
[30]S. Tao, W. Ruili and Y. Yixun, “Perturbance-Based Algorithm to Expand Cycle Length of Chaotic Key Stream,” Electronics Letters, Vol. 34, No. 9, Pages: 873 - 874, 1998.
[31]T. Uehara, “Contributions to Image Encryption and Authentication,” Ph.D. dissertation, Department of Computer Science, University of Wollongong, 2003.
[32]A. Uhl and A. Pommer, “Image and Video Encryption: From Digital Rights Management to Secured Personal Communication,” Springer-Verlag, New York Inc., 2005.
[33]D. D. Wheeler and R. Matthews, “Supercomputer Investigations of a Chaotic Encryption Algorithm,” Cryptologia, Vol.15, No.2, Pages: 140 - 152, Apr. 1991.
[34]Y. Wu and R. H. Deng, “Compliant Encryption of JPEG2000 Codestreams,” International Conference Image Processing, Vol. 5, Pages: 3439 - 3442, Oct. 2004.
[35]H. Wu and D. Ma, “Efficient and Secure Encryption Schemes for JPEG2000,” International Conference Acoustics, Speech, and Signal Processing, Vol. 5, Pages: V - 869 - 872, May 2004.