| 研究生: |
洪順成 Hong, Shun-Cheng |
|---|---|
| 論文名稱: |
混沌式準隨機位元產生器及其在影像/視訊加密應用之研究 A Study on Chaotic PRBG and Its Application to Image/Video Encryption |
| 指導教授: |
陳進興
Chen, Chin-Hsing |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 電機工程學系 Department of Electrical Engineering |
| 論文出版年: | 2011 |
| 畢業學年度: | 99 |
| 語文別: | 英文 |
| 論文頁數: | 97 |
| 中文關鍵詞: | 加密 、金鑰流迴授 、混沌式串流碼 |
| 外文關鍵詞: | encryption, cipher feedback, chaos-based stream cipher |
| 相關次數: | 點閱:60 下載:3 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文提出兩種加密架構,分別應用於JPEG2000影像和MPEG視訊。針對JPEG2000,我們採用J. Fang加密模式並增加金鑰流迴授的功能,此一修改的理由是在同樣的明文和相同金鑰流時能產生不同的密文,除此之外,我們採用藕合混沌準隨機位元產生器(CCS-PRBG)取代在F&S系統的計數器模式AES。經由實驗結果顯示,我們提出的加密架構能提供高安全性,並可大幅提高運算速度。
在MPEG視訊部份,本論文將D. Xie和C. C. J. Kuo提出的REC/RPB加密架構修改成混沌加密架構,其中使用Zhu的混沌式串流碼取代128位元MD5雜湊函數以產生金鑰流。使用Zhu混沌式串流碼的原因是可產生任意長度的金鑰流。我們擷取已壓縮的影像資料流,做不同的組合加密以符合使用者的需求,設計一多重安全性的混沌加密架構。經由安全性實驗分析顯示,我們的架構具有高安全性,可抵禦已知密文攻擊,已知明文攻擊和選擇性明文攻擊。我們並以實驗比較部份加密,全部加密和原始未加密三者的壓縮效能和計算時間。
In this thesis, we proposed an encryption scheme for JPEG2000 and an encryption scheme for MPEG video. For JPEG2000, we adopt the encryption scheme proposed by J. Fang and modify its encryption operations by adding the action of cipher feedback. The reason why we do this modification is that it can make the same plaintext with the same key stream have different ciphertext. Beside that, we adopt a pseudo-random bit generator based on couple chaotic systems called CCS-PRBG to replace the counter mode AES employed in the F&S system. Experiments show that our proposed encryption scheme not only still can provide high security but also speed performance greatly improved.
For MPEG video, this thesis presents a modified chaos-based encryption scheme on the basis of the REC/RPB encryption scheme proposed by D. Xie and C. C. J. Kuo, where the Zhu’s chaos-based stream cipher is used to replace the 128-bit MD5 hash function as the secret key. The reason is that the Zhu’s chaos-based stream cipher could output keystream of arbitrary length. We encrypted the extracted video compressed stream with various combination according to the demands. Therefore a multiple security encryption scheme could be obtained. Experimental security analysis showed that it is of high security and able to withstand the attacks of ciphertext only, known plaintext, and chosen plaintext. Besides, the compression performance and the compution time comparison among the selective encryption, all entropy encoder output encryption, and the original compressed bitstream without encryption were also examined.
[1] T. Addabbo, M. Alioto, A. Fort, S. Rocchi and V. Vignoli, “A feedback strategy to improve the entropy of a chaos-based random bit generator,” IEEE Transactions on Circuits and Systems, Vol. 53, No. 2, pp. 326-337, Feb. 2006.
[2] W. Alexi, B. Chor, O. Goldreich and C. P. Schnorr, “RSA and Rabin functions: certain parts are as hard as the whole,” SIAM Journal on Computing, Vol. 17, No.2, pp. 194-209, Apr. 1988.
[3] G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, Vol.16, No.8, Pages: 2129-2151, 2006.
[4] J. M. Amigo, L. Kocarve and J. Szczepanski, “Theory and practice of chaotic cryptography,” Physics Letters A, Vol. 366, No. 3, pp. 211-216, Jun. 2007.
[5] S. Behnia, A. Akhshani, A. Akhavan and H. Mahmodi, “Applications of tripled chaotic maps in cryptography,” arXiv.org, The Cornell University, May 2007.
[6] S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solutions and Fractals, Vol. 35, No. 2, pp. 408-419, Jan. 2008.
[7] H. J. Beker and F. C. Piper, “Secure speech communications,” London, Academic Press, 1985.
[8] F. Beldhouche and U. Qidwai, "Binary image encoding using 1D chaotic maps," in IEEE Annual Technical Conf., 11 April 2003, pp. 39-43.
[9] B. Bhargava, C. Shi, and Y. Wang, “MPEG video encryption algorithms,” Multimedia Tools and Applications, 2003.
[10] L. Blum, M. Blum and M. Shub, “A simple unpredictable pseudo-random number generator,” SIAM Journal on Computing, Vol. 15, No. 2, pp. 364-383, May 1986.
[11] R. Bose and S. Pathak, “A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system,” IEEE Transaction on Circuits and Systems, Vol. 53, No. 4, pp. 848-857, Apr. 2006.
[12] J. Cernak, “Digital generators of chaos,” Physics Letters A, Vol. 214, pp. 151-160, Feb. 1996.
[13] G. Chen, Y. Mao and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solutions & Fractals, Vol. 21, No. 3, pp. 749-761, Jul. 2004.
[14] P. L’Ecuyer, “Uniform random number generation,” Annals of Operations Research, Vol. 53, No. 1, pp. 77-120, Dec. 1994.
[15] J. Fang and J. Sun, "Compliant encryption scheme for JPEG 2000 image code streams," Journal of Electronic Imaging, Vol. 15, No. 4, pp. 043013-1 - 043013-4, Oct. - Dec. 2006.
[16] C. Fu and Z. Zhu, “An improved chaos-based stream cipher algorithm,” Third International Conference on Natural Computation, IEEE, Vol. 3, pp. 179-183, Aug. 2007.
[17] H. Gao, Y. Zhang, S. Liang and D. Li, “A new chaotic algorithm for image encryption,” Chaos, Solutions and Fractals, Vol. 29, No. 2, pp. 393-399, Jul. 2006.
[18] T. G.. Gao and Z. Q. Chen, "A new image encryption algorithm based on hyper-chaos," Phys. Lett. A, Vol. 372, No. 4, pp. 394-400, 2008.
[19] J. A. Gonzalez and R. Pino, “Chaotic and stochastic functions,” Physics Letters A, Vol. 276, No. 3-4, pp. 425-440, Feb. 2000.
[20] D. Gillman, M, Mohtashemi and R. Rivest, “On breaking a huffman code,” IEEE Trans. Inform. Theory, Vol. 42, No. 3, Pages: 972, May, 1996.
[21] M. Grangetto, A. Grosso and E. Magli, "Selective encryption of JPEG 2000 images by means of randomized arithmetic coding," 2004 IEEE 6th Workshop on Multimedia Signal Processing, pp. 347 - 350, Oct. 2004.
[22] Z. H. Guan, F. J. Huang and W. J. Guan, "Chaos-based image encryption algorithm" Phys. Lett. A 346, pp. 153-157, 2005.
[23] Z. H. Guan, F. Huang and W. Guan, “A general chaos-based key stream generator,” Circuits, Systems, and Signal Processing, Vol. 24, No. 5, pp. 549-555, 2005.
[24] G. Heidari-Bateni and C. D. McGillem, “A chaotic direct-sequence spread-spectrum communication system,” IEEE Transaction on Communications, Vol. 42, No. 4, Apr. 1994.
[25] L. Kocarev, “Chaos-based cryptography: a brief overview,” IEEE Circuits and Systems Magazine, Vol. 1, No. 3, pp. 6-21, 2001.
[26] L. Kocarev and G. Jakimoski, “Logistic map as a block encryption algorithm,”Physics Letters A, Vol. 289, No. 4-5, pp. 199-206, Oct. 2001.
[27] L. Kocarev and G. Jakimoski, “Pseudorandom bits generated by chaotic maps,” IEEE Transaction on Circuits and Systems, Vol. 50, No. 1, pp. 123-126, Jan. 2003.
[28] L. Kocarev, G. Jakimoski and Z. Tasev, “Chaos and pseudo-randomness,” Lecture Notes in Control and Information Sciences, Vol. 292, pp. 247-263, 2004.
[29] P. H. Lee, S. C. Pei and Y. Y. Chen, “Generating chaotic stream ciphers using chaotic systems,” Chinese Journal of Physics, Vol. 41, No. 6, pp. 559-581, Dec. 2003.
[30] C. T. Li, “Compliant encryption of JPEG2000 code streams based on chaotic systems,” Master Thesis, Department of Electrical Engineering, NCKU, June 2008.
[31] K. Li, Y. C. Soh and Z. G. Li, “Chaotic cryptosystem with high sensitivity to parameter mismatch,” IEEE Transaction on Circuits and Systems, Vol. 50, No. 4, pp. 579-583, Apr. 2003.
[32] S. Li, G. Chen and X. Mou, “On the dynamical degradation of digital piecewise linear chaotic maps,” International Journal of Bifurcation and Chaos, Vol. 15, No. 10, pp. 3119-3151, Oct. 2005.
[33] S. Li, X. Mou and Y. Cai, “Improving security of a chaotic encryption approach,” Physics Letters A, Vol. 290, No. 3-4, pp. 127-133, Nov. 2001.
[34] S. Li, X. Mou and Y. Cai, “Pseudo-random bit generator based on couple chaotic systems and its applications in stream cipher cryptography,” in Progress in Cryptology-INDOCRYPT 2001, Lecture Notes in Computer Science, Vol. 2247, pp. 316-329, 2001.
[35] S. Li, X. Mou, B. L. Yang, Z. Ji and J. Zhang, “Problems with a probabilistic encryption scheme based on chaotic systems,” International Journal of Bifurcation and Chaos, Vol. 13, No. 10, pp. 3063-3077, 2003.
[36] S. Li, X. Mou, Y. Cai, Z. Ji and J. Zhang, “On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision,” Computer Physics Communications, Vol. 153, No. 1, pp. 52-58, Jun. 2003.
[37] S. J. Li, G. R. Chen and X. Q. Mou, "On the dynamical degradation of digital piecewise linear chaotic maps," Int. J. Bifurcation and Chaos, Vol. 15, No. 10, pp. 3119-3151, 2005.
[38] S. Li, X. Zheng, X. Mou and Y. Cai, "Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography," In Progress in Cryptology - INDOCRYPT 2001, Lecture Notes in Computer Science, Vol. 2247, pp. 316 - 329, 2001.
[39] S. G. Lian, J. S. Sun, J. W. Wang and Z. Q. Wang, “A chaotic stream cipher and the usage in video protection,” Chaos, Solutions & Fractals, Vol. 34, No. 3, pp. 851-859, Nov. 2007.
[40] S. Lian, G. Chen, A. Cheung and Z. Wang, "A chaotic-neural-network-based encryption algorithm for JPEG2000 encoded images," IEEE Symposium on Neural Networks, pp. 627 - 632, 2004.
[41] S. Lian, J. Sun and Z. Wang, "A selective image encryption scheme based on JPEG2000 codec," Springer LNCS 3332, 2004.
[42] T. D. Lookabaugh, D. C. Sicker, D. M. Keaton, W. Y. Guo and I. Vedula, “Security analysis of selectively encrypted MPEG-2 streams,” Multimedia Systems and Applications VI, Vol. 5241, Pages: 10-21, September, 2003.
[43] Y. Mao, G. Chen and S. Lian, “A novel fast image encryption scheme based on 3D chaotic baker maps,” International Journal of Bifurcation and Chaos, Vol. 14, No. 10, pp. 3613-3624, 2004.
[44] R. Norcen and A. Uhl, "Selective encryption of the JPEG2000 bitstream," International Federation for Information Processing, pp. 194 - 204, 2003.
[45] N. K. Pareek, V. Patidar and K. K. Sud, "Image encryption using chaotic logistic map," Image and Vision Computing, Vol. 24, No. 9, pp. 926-934, 2006.
[46] S. K. Park and K. W. Miller, “Random number generators: good ones are hard to find,” Communications of the ACM, Vol. 31, No. 10, pp. 1192-1201, Oct. 1988.
[47] Mehdi Rezaei, Imed Bouazizi and Moncef Gabbouj, “Fuzzy Joint Encoding and Statistical Multiplexing of Multiple Video Sources with Independent Quality of Services for Streaming over DVB-H,” International Journal of Innovative Computing, Information and Control, vol.5, no.7, pp.1837-1850, 2009.
[48] J. Peng, S. Jin, Y. Liu, Z. Yang, M. You and Y. Pei, “A novel scheme for image encryption based on piecewise linear chaotic map,” 2008 IEEE Conference on Cybernetics and Intelligent Systems, pp. 1012-1016, Sep. 2008.
[49] A. Rukhin, J. Soto, J. Nechvatal, J. Smid, M. Barker, E. Leigh, S. Levenson, M. Vangel, M. Banks, A. Heckert, J. Dray and S. Vo, “A statistical test suit for random and pseudorandom number generators for cryptographic applications,” NIST Special Publication 800-22, 2001.
[50] T. Sang, R. Wang and Y. Yan, “Perturbance-based algorithm to expand cycle length of chaotic key stream,” Electronics Letters, Vol. 34, No. 9, pp. 873-874, Apr. 1998.
[51] J. Soto, “Statistical testing of random number generators,” http://www.csrc.nist.gov/groups/ST/toolkit/rng/documents/nissc-paper.pdf, 1999.
[52] D. R. Stinson, “Cryptography: theory and practice,” CRC Press, Boca Raton, Florida, 3rd edition, 2006.
[53] T. Stojanovski and L. Kocarev, “Chaos-based random number generators-Part I: analysis,” IEEE Transaction on Circuits and Systems, Vol. 48, No. 3, pp. 281-288, Mar. 2001.
[54] T. Stojanovski, J. Pihl and L. Kocarev, “Chaos-based random number generators-Part II: practical realization,” IEEE Transaction on Circuits and Systems, Vol. 48, No. 3, pp. 382-385, Mar. 2001.
[55] K.W. Tang, W. K. S. Tang and K. F. Man, “A chaos-based pseudo-random number generator and its application in voice communications,” International Journal of Bifurcation and Chaos, Vol. 17, No. 3, pp. 923-933, Mar. 2007.
[56] S. Tao, W. Ruili and Y. Yixun, "Clock-controlled chaotic keystream generators," Electronics Letters, Vol. 34, No. 20, pp. 1932 - 1934, 1998.
[57] S. Tao, W. Ruili and Y. Yixun, "Perturbance-based algorithm to expand cycle length of Cchaotic key stream," Electronics Letters, Vol. 34, No. 9, pp. 873 - 874, 1998.
[58] T. Uehara, "Contributions to image encryption and authentication," Ph.D. dissertation, Department of Computer Science, University of Wollongong, 2003.
[59] A. Uhl and A. Pommer, "Image and video encryption: From digital rights management to secured personal communication," Springer-Verlag, New York Inc., 2005.
[60] Qiang Wang, Debin Zhao and Wen Gao, “Context-Based Adaptive Variable Length Coding for Video DCT Blocks, Part I -- Theoretical Approach, ” ICIC Express Letters, vol.3, no.2, pp.141-146, 2009.
[61] Qiang Wang, Debin Zhao and Wen Gao, “Context-Based Adaptive Variable Length Coding for Video DCT Blocks, Part II -- Practical Scheme, ” ICIC Express Letters, vol.3, no.2, pp.163-170, 2009
[62] X. Y. Wang and X. J. Wang, “Design of chaotic pseudo-random bit generator and its applications in stream-cipher cryptography,” International Journal of Modern Physics C, Vol. 19, No. 5, pp. 813-820, 2008.
[63] D. D. Wheeler, “Problems with chaotic cryptosystems,” Cryptologia, Vol. 13, No. 3, pp. 243-250, Jul. 1989.
[64] D. D. Wheeler and R. Matthews, "Supercomputer investigations of a chaotic encryption algorithm," Cryptologia, Vol.15, No.2, pp. 140 - 152, Apr. 1991.
[65] C. P. Wu and C. C. J. Kuo, “Efficient multimedia encryption via entropy codec design,” Security and Watermarking of Multimedia Contents, Vol. 4314, pp. 128-138, January, 2001.
[66] H. Wu and D. Ma, "Efficient and secure encryption schemes for JPEG2000," International Conference Acoustics, Speech, and Signal Processing, Vol. 5, pp. V - 869 - 872, May 2004.
[67] Y. Wu and R. H. Deng, "Compliant encryption of JPEG2000 codestreams," International Conference Image Processing, Vol. 5, pp. 3439 - 3442, Oct. 2004.
[68] D. Xie and C. C. J. Kuo, “Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream,” European Journal of Information Systems, 2007.
[69] M. E. Yalcin, J. A. K. Suykens and J. Vandewalle, “True random bit generation from a double-scroll attractor,” IEEE Transaction on Circuits and Systems, Vol. 51, No. 7, pp. 1395-1404, Jul. 2004.
[70] W. Zeng and S. Lei, “Efficient frequency domain selective scrambling of digital video,” IEEE Trans. Multimedia, pp. 118-129, March, 2003.
[71] W. Zeng and S. Lei, “Efficient frequency domain video scrambling for content access control,” Proceedings of the seventh ACM International Multimedia Conference, Pages: 285-293, November, 1999.
[72] J. Zhou, Z. Liang, Y. Chen and O. C. Au, “Security analysis of multimedia encryption schemes based on multiple Huffman table,” IEEE Signal Processing Letters, Vol. 14, No. 3, pp. 201-204, 2007.
[73] “Security requirement for cryptographic modules,” Federal Information Processing Standards Publication (FIPS PUB 140-1), 1994.
[74] “Security requirements for cryptographic modules,”National Institute of Standards and Technology, FIPS PUB 140-2, May 2001.