JPEG2000의 보안을 위한 카오스 시스템의 하드웨어 구현

Hardware Implementation of Chaotic System for Security of JPEG2000

  • 서영호 (한성대학교 정보통신공학과)
  • 발행 : 2005.12.01

초록

본 논문에서는 JPEG2000 표준에서 주파수 변환기법으로 채택된 이산 웨이블릿 변환과 선형양자화 방법을 사용하여 영상 전체가 아닌 영상의 부분 데이터만을 암호화하여 계산양을 줄이는 부분 암호화 방법을 제안하고 하드웨어로 구현하였다. 또한 계산양이 많은 암호화 알고리즘 대신 비교적 계산양이 적은 카오스 시스템을 이용함으로써 계산양을 더욱 감소시킨다. 영상 데이터의 변환 방법은 암호화할 부대역을 선택하여 영상데이터를 일정한 블록으로 만든 후 무작위로 좌/우 쉬프트 하는 방법과 두 가지 양자화 할당 방식(하향식-코드 할당방식/반향-코드 할당방식)에 따라 데이터를 교환하는 방식을 사용한다. 제안한 암호화 방법을 소프트웨어로 구현하여 약 500개의 영상을 대상으로 실험한 결과 원 영상 데이터를 부분적으로 암호화함으로써 원 영상을 인식할 수 없을 정도의 암호화효과를 얻을 수 있음을 알 수 있었다. 구현한 하드웨어 암호화 시스템은 삼성 $0.35{\mu}m$ 팬텀-셀 라이브러리를 사용하여 합성함으로써 게이트 수준 회로를 구성하였고 타이밍 시뮬레이션을 수행한 결과 100MHz 이상의 동작 주파수에서 안정적으로 동작함을 확인하였다.

In this paper, we proposed an image hiding method which decreases the amount of calculation encrypting partial data rather than the whole image data using a discrete wavelet transform and a linear scalar quantization which have been adopted as the main technique in JPEG2000 standard and then implemented the proposed algorithm to hardware. A chaotic system was used instead of encryption algorithms to reduce further amount of calculation. It uses a method of random changing method using the chaotic system of the data in a selected subband. For ciphering the quantization index it uses a novel image encryption algorithm of cyclical shifting to the right or left direction and encrypts two quantization assignment method (Top-down coding and Reflection coding), made change of data less. The experiments have been performed with the proposed methods implemented in software for about 500 images. The hardware encryption system was synthesized to find the gate-level circuit with the Samsung $0.35{\mu}m$ Phantom-cell library and timing simulation was performed, which resulted in the stable operation in the frequency above 100MHz.

키워드

참고문헌

  1. Chisalita, I. and Shahmehri, N, 'Issues in image utilization within mobile e-services', IEEE Workshop on Mobile Internet and e-Business Applications, Boston, USA, pp. 62-67, Jun. 2001
  2. J. D. Gibson, et al., 'Digital Compression for Multimedia, Principles and Standards', Morgan Kaufmann publisher, San Francisco CA, 1998
  3. R. M. Rao, and A, S. Bopardikar, 'Wavelet Transforms, Introduction to Theory and Applications', Addison-Wesley, Readings MA, 1998
  4. Martin Boliek, et al., 'JPEG 2000 Part-I Final Draft International Standard', ISO/IEC JTC1/SC29 WG1, 24. Aug. 2000
  5. R. M. Rao and A. S. Bopardikar, 'Wavelet Transforms, Introduction to Theory and Application', Addison-Wesley, Reading, Sep. 1998
  6. G. J. Sullivan and R. L. Baker, 'Efficient Quadtree coding of images and videos', IEEE Transactions on Signal Processing, Vol. 3, pp. 327-331, May 1994
  7. Shapiro, J. M., 'Embedded image coding using zerotrees of wavelet coefficients', Signal Processing, IEEE Transactions on [see also Acoustics, Speech, and Signal Processing, IEEE Transactions on], Vol. 41, Issue 12, pp. 3445-3462, Dec. 1993 https://doi.org/10.1109/78.258085
  8. P. P. Dang and P. M. Chau, 'Image Encryption for Secure Internet Multimedia Applications', IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 395-403, Aug. 2000 https://doi.org/10.1109/30.883383
  9. M. Podesser, H. P. Schmidt, and A. Uhl, 'Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments', 5th Nordic Signal Processing Symposium, Oct. 2002
  10. Said, A., Pearlman, W.A., 'A new, fast, and efficient image codec based on set partitioning in hierarchical trees', Circuits and Systems for Video Technology, IEEE Transactions on, Vol. 6, Issue 3, pp. 243-250, Jun. 1996 https://doi.org/10.1109/76.499834
  11. Fridrich, J., 'Image encryption based on chaotic maps', 1997 IEEE International Conference on, Vol. 2, pp. 1105-1110, 12-15 Oct. 1997
  12. Salleh, M., Ibrahim, S., Isnin, I. F., 'Enhanced chaotic image encryption algorithm based on baker's map', Circuits and Systems, 2003. ISCAS '03. Proceedings of the 2003 International Symposium on, Vol. 2, pp. 508-511, 25-28 May 2003
  13. Belkhouche, F., Qidwai, U., 'Binary image encoding using ID chaotic maps', IEEE Region 5, 2003 Annual Technical Conference, pp. 39-43, 11 Apr. 2003
  14. Ammar, A., Al Kabbany, A., Youssef, M., Amam, A., 'A secure image coding scheme using residue number system', Radio Science Conference, 2001. NRSC 2001. Proceedings of the Eighteenth National, Vol. 2, pp. 399-405, 27-29 Mar. 2001 https://doi.org/10.1109/NRSC.2001.929397
  15. S. S. Maniccam, N. G. Bourbakis., 'SCAN Based Lossless Image Compression and Encryption.', IEEE Transactions, Image Processing, Vol. 3, No. 5, pp. 490-499, Sep. 1999
  16. Bourbakis, N.; Dollas, A., 'SCAN-based compression encryption hiding for video on demand', Multimedia, IEEE , Vol. 10, Issue 3, pp. 79-87, Jul.-Sep. 2003 https://doi.org/10.1109/MMUL.2003.1218259
  17. 서영호, Sujit Det, 김동욱, '웨이블릿 영역에서의 선택적 부분 영상 암호화', 한국통신학회 논문지 Vol. 28, No. 6C, pp. 648-658, 2003. 06
  18. Young-Ho Seo, Wang-Hyun Kim, Ji-Sang Yoo, Dai-Gyoung Kim and Dong-Wook Kim, 'A real-time image compressor using 2-dimensional DWT and its FPGA implementation', Trans. of IEICE, VolE87-A, No. 8. Aug. 2004