基于时空混沌的视频保密通信研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近几十年来,非线性动力学中的混沌学理论研究蓬勃发展,特别是自从1990年Pecora和Carroll对混沌同步的研究取得突破性进展之后,混沌保密通信已成为当今世界的研究热点。目前,网络信息安全问题日益突出,多媒体数字信号的保密通信是现代网络安全的亟待研究的课题,它不仅是混沌学应用研究的新领域,而且是现有混沌保密通信技术所面临的新挑战。保密通信系统的加解密速度,安全性能,抗噪声能力等问题都有待于我们进一步分析研究。
     本文致力于视频图像的加密和时空混沌保密通信研究,取得的主要研究成果及创新之处体现在:
     第一,基于时空混沌理论设计了一种视频加密算法,此算法的创新之处不仅是将时空混沌系统应用在实际的视频加密上,而且算法具有普适性,即对视频文件的压缩格式没有具体的要求。
     第二,将时空混沌同步理论应用于视频流网络保密传输,实现通信双方在线地、实时地加密和解密视频流,且密钥敏感性强,密钥空间极大,因此有很强的保密性和抵抗攻击的能力。
     第三,改进了使用单纯的一维耦合格子模型,而采用一维链加二维网格再加上一维链的组合模型来构造驱动和响应系统,增强密钥序列复杂度的同时也提高了系统的加密效率。
     文中介绍的第一个应用研究系统是“时空混沌加密系统”,对视频AVI文件进行加密和解密。时空混沌系统作为密钥流产生器应用在加密系统中,这是涉及到安全性的关键部分,因此加密系统设置了分析时空系统特征量的测试单元,保证密钥流的随机无序性。第二个实例是“视频保密通信服务器与客户端系统”,针对视频流传输的特点及实时性要求,系统采用了改进后的耦合格子模型,实现数据并行加密和解密。结果证明,视频流的加密和解密速度及其在线同步要求都得以很好的实现。
In recent several decades, the researches on chaos theory in non-linear dynamics have achieved a great development. Nowadays, chaos secure communication has been one of the focuses, especially since the breakthrough in chaos synchronization made by Pecora and Carroll in 1990. At present, the security in Network is an increasingly serious problem. As to the security of modern Network, Secure communication on the multimedia is the issue to be resolved urgently. It is not only a new field in the application of chaos, but also a challenge in chaos secure communication. These problems, such as the efficiency of encoding and decoding, the security of communication systems, and the performance against noise, are waiting for us to analyze and study further.
     In this thesis, we gave attentions to the researches on video encryption and video communication based on spatiotemporal chaos. The major contributions and innovations include:
     Firstly, we designed an encryption algorithm for video based on the spatiotemporal chaotic systems. The creation is not only the application of spatiotemporal chaotic systems to the actual video encryption, but also the universality. It is means no format requirement of the compressed video files.
     Secondly, we have applied spatiotemporal chaotic theories to the practice of video stream’s secure communication in Network. Both sides realized the on-line and real-time correspondence of encoding and decoding video data. What’s more, the secret key streams are highly sensitive to any changes and have a large space. Thus, the secure communication system can work safely and has a good performance against the attacks.
     Thirdly, Instead of using one-dimensional coupled map lattices model, we have constructed a combinable model, which is consisted of an one-dimensional chain, a two-dimensional netting grid and another one-dimensional chain as the drive-response system. So both the system’s complexity for secret key streams and the efficiency for encryption have been increased.
     The first practical application system introduced in this thesis is“encryption system based on spatiotemporal chaos”, which accomplished the function to encrypt and decrypt video files in AVI famat. The spatiotemporal chaotic system peforms a function as secret key streams’generator which is the critical constitution related to security. So there is a test unit to analyze the characteristic quantity of spatiotemporal chaotic system, and to ensure stream’s randomness further. The second instance is“video secure communication system between Server and Client”. Considering the characteristic and real-time requirement of the video stream transmission, the system utilized an improved coupled map lattices model to realize encoding and decoding with parallel method. The experiment result is that, both the speed of video stream’s encoding and the on-line synchronism show good performance.
引文
[1] 张琪昌 , 王洪礼等 . 分岔与混沌理论及应用 [M]. 天津 : 天津大学出版社 , 2005
    [2] Lorenz E N. Deterministic nonperiodic flow[J]. Atmos J Sci, 1963, 20:130-141
    [3] Li T Y, Yorke J A. Period three implies chaos[J]. Am. Math. Monthly, 1975, 82(10):985-992
    [4] Feigenbaum M J. Quantitative universality for a class of nonlinear transformation. Stat J Phys, 1978, 19:25-52
    [5] Devaney R L. An Introduction to Chaotic Dynamical Systems. Menlo Par, CA Benjamin/Cummings, 1986
    [6] Takens F. Detecting Strange Attractors in Turbulence. Lecture Notes in Mathematics, 1981
    [7] Pincus S M. Approximate entropy as a measure of system complexity. Proc Natl. Acad Sci USA, 1991, 88:2297-2301
    [8] Lempel A, Ziv J. On the complexity of finite sequences[J]. IEEE Trans Inf Theory, 1976, IT-22:75
    [9] 侯威, 封国林, 董文杰. 基于复杂度分析Logistic映射和Lorenz模型的研究[J]. 物理学报, 2005, 54(8):3940-3946
    [10] K Kaneko. Propagation of disturbance co-moving Lyapunov exponent and path summation[J]. Phys. Lett., 1992, I70A:210-215
    [11] 杨维明. 时空混沌和耦合映象格子模型[M]. 上海: 上海科技教育出版社, 1994
    [12] Pecora L M, Carroll T L. Synchronization in chaotic systems[J]. PhysRev Lett, 1990, 64:21-824
    [13] S Codreanu. Synchronization of spatiotemporal nonlinear dynamical systems by an active control[J]. Chaos, Solitons and Fractals. 2003, 15(3):507-510.
    [14] D W Peterman, M Ye, P E Wigen. Controlling chaos in ferromagnetic resonance[J]. Journal of Magnetism and Magnetic Materials, 1995, 140(5):2074-2076
    [15] T C Newell, P M Alsing, A Gavrielids and V Kovanis. Synchronization of chaotic resonators based on control theory[J]. Physical Review E, 1995,51(4A):2963-2973
    [16] U Parlitz, L Junge, L Kocarve. Synchronization-based parameter estimation from time series[J]. Physical Review E., 1996, 54(6):6253-6259
    [17] 翁贻方, 鞠磊. 变参数混沌同步保密通信方案设计[J]. 信息与控制, 2003, 32(2): 128-131
    [18] 陈宇环, 张小红, 易称福. 基于 Lyapunov 稳定性定理的混沌同步研究与应用[J]. 江西理工大学学报, 2006, 27(3):34-37
    [19] 杨波. 网络安全理论与应用[M]. 北京: 电子工业出版社, 2000
    [20] F. L. Bauer. 密码编码和密码分析原理与方法[M]. 北京: 机械工业出版社, 2001
    [21] Shannon C E. A mathematical theory of communication[J]. Bell Syst. Tech. J., 1948, 27(3):379-423
    [22] 朱秀昌, 刘峰, 胡栋. 数字图像处理与图像通信[M]. 北京: 北京邮电大学出版社, 2005
    [23] 魏恒义, 程竹林, 刘伟娜, 曹雪. 多媒体会议系统中的视音频传输模块[J]. 计算机工程, 2003, 29(3):150-156
    [24] L Tang. Methods for encrypting an decrypting MPEG video data efficiently[A]. In: Boston USA, Proceedings of ACM Multimedia'96, 1996
    [25] Changgui Shi, Bharat Bhargava. An efficient MPEG video encryption algorithm[J]. In: Bristol, United Kingdom, Proceedings of the 6th ACM International Multimedia Conference, 1998, (9):381-386
    [26] 张良胜等. MPEC 视频加密算法浅析[J]. 中国有线电视, 2005, (2):138-142
    [27] Qiao L, Nahrstedt K. A new algorithm for MPEG video encryption[A]. In: CISSt’97(International Conference on Imaging Science, Systems, and Technology), Las Vegas, June, 1997:242-249
    [28] Tosun A S, Feng W. Lightweight security mechanisms for wireless video transmission[A]. In: Proc. Intl. conf. on Information Technology: Coding and Computing. Apr. 2001:157-161
    [29] Shujun Li, Xuan Zheng, Xuanqin Mou, Yuanlong Cai. Chaotic encryption scheme for real-time digital video[J]. In Real-Time Imaging VI, Proc. 2002, (4666):149-160
    [30] Shujun Li. Analyses and New Designs of Digital Chaotic Ciphers[D]. In: Xi'anJiaotong University, PhD thesis, School of Electronics & Information Engineering, 2003
    [31] 俞经善, 王晶, 杨川龙. 基于 ECC 和 AES 相结合的加密系统的实现[J]. 信息技术, 2006, (2):44-46
    [32] 刘长明, 杨工明. Visual C++ 实践与提高—多媒体篇[M]. 北京: 中国铁道出版社, 2001
    [33] 求是科技. Visual C++ 音视频编解码技术及实践[M]. 北京: 人民邮电出版社, 2006
    [34] 杨高波. 精通 MATLAB 7.0 混合编程[M]. 北京: 电子工业出版社, 2006
    [35] 刘秉正, 彭建华. 非线性动力学[M]. 北京: 高等教育出版社, 2004
    [36] Pincus S M. Approximate entropy(ApEn) as a complexity measure. Chaos, 1995, 5(1):110-117
    [37] http: //csrc. Nist. gov/ encryption/ aes
    [38] Papadimitrious, Bezerianos A, Bountis T. Secure communication with chaotic systems of diference equations[J]. IEEE Trans. Comput, 1997, 46:27-38
    [39] Ott E, Grebogi C, Yorke J A. Controling chaos. Phys. Rev. Lett., 1990, 64(11):1196-1199
    [40] 胡国杰. 混沌保密通信系统保密性能分析及新型混沌数字加密系统理论设计. 博士毕业论文, 上海交通大学, 2003
    [41] P G Vaidya, Rong He. Transfer of information between synchronized chaotic systems[C]. Chaos in Communications, 1993, 2038:205-216
    [42] 邓华. MATLAB 通信仿真及应用实例详解[M]. 北京: 人民邮电出版社, 2003
    [43] 王世红. 时空混沌保密通信系统的设计与研究. 博士毕业论文, 北京师范大学, 2003
    [44] Robert Matthews. On the derivation of a “chaotic” encryption algorithm[J]. Cryptolologia. 1989, 8(1):29-41
    [45] Hu Gang, Wang Shihong, Kuang Jinyu. Chaos secure communications in a large community[J]. Phys Rev, 2002, E66 (6):65202
    [46] 温孝东, 黄荣怀, 胡岗等. 一种时空混沌保密语音会议系统的实现[J]. 北京师范大学, 2005, 41(2):142-145
    [47] 郎锐, 孙方. Visual C++ 网络通信程序开发基础及实例解析[M]. 北京: 机械工业出版社, 2006
    [48] 钟玉琢 , 向哲 , 沈洪 . 流媒体和视频服务器 [M]. 北京 : 清华大学出版社 , 2003
    [49] John R.Terry, Gregory D.Van Wiggeren.Chaotic communication using generalized synchronization. Chaos, Solition and Fractals, 2001, 12(1):145-152
    [50] A. Maritan, J. R. Banavar. Chaos, noise and synchronization[J]. Phys. Rev. Lett., 1994, 72(11):1451-1454
    [51] 张 旭 , 沈 柯 . 时 空 混 沌 的 单 向 耦 合 同 步 [J]. 物 理 学 报 , 2002, 51(12):2702-2706
    [52] Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps[J]. Int. J. Bifur & Chaos, 1998, 8(6):1259-1284
    [53] 金伟萍, 王新龙. 外部随机信号驱动下时空混沌同步及其应用[J]. 通信学报, 2005, 26(7):82-88
    [54] S. Wolfram. Theory and applications of cellular automata[M]. World Sci . Pub., 1986
    [55] 方锦清 . 非线性系统中混沌的控制与同步及其应用前景 [J]. 物理学进展 , 1996, 16(2):137-199
    [56] K. A. Mirus, J. C. Sprott. Controlling chaos in a high dimensional system with periodic parametric perturbations[J]. Phys. Lett. A., 1999, 254(5):275-278
    [57] 方锦清. 驾驭混沌与发展高新技术[M]. 北京: 原子能出版社, 2002
    [58] 姜恩华, 钱建生. 基于 C/S 模型的视频信息传输系统的研究[J]. 信息技术, 2004, 28(1):35-38
    [59] 熊平华, 杨建刚. IP 可视电话会议系统设计与实现[J]. 计算机工程与设计, 2004, 25(4):619-621
    [60] WANG Jun-hua, LU Heng-Li, ZHANG Wei-Xin. Implementation of IP Multicast in LAN Video Transmission Based On Winsock2.0[J]. Journal of Shanghai University(English Edition), 2003, 7(1):64-67
    [61] 吴志军, 马兰, 沈笑云. Visual C++ 视频会议开发技术与实例[M]. 北京: 人民邮电出版社, 2006

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700