删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

一个安全包机制-加密多媒体通讯基础研究

北京航空航天大学 辅仁网/2017-07-06

文献详情


一个安全包机制-加密多媒体通讯基础研究
文献类型学位
作者Emad S.Osman[1]
机构
授予学位博士
年度2004
学位授予单位北京航空航天大学
语言中文
关键词Cryptography;Steganography;hash function;secret key;image;audio;compression;cryptosystem;multimedia;security;aerial images;copyright;watermark
摘要Because of the need to ensure that only those eyes intended to view sensitive information can ever see this information, and to ensure that the information arrives unaltered, security systems have often been employed in computer systems for governments, militaries, corporations, and even individuals. Encryption schemes can be broken, but making them as hard as possible to break is the job of a good cipher designer. All what one can really do is make it very difficult for the codebreakers to decipher his cipher.The thesis in hand presents the implemented KBSA schemes which, provide privacy and confidentiality of multimedia data whether they are stored or communicated over insecure channels.To study secured communication over insecure channels, two main objectives are achieved which are: (i) Secrecy (or privacy),to prevent the unauthorized disclosure of data, and (ii) Authenticity (or integrity), to prevent the unauthorized modification of data through:· Generating the secret keys which will be used in the encryption and decryptionprocedures using the Blum-Blum-Shub generator and run them through a goodhash function before actually using them.· Implementing some cryptosystem schemes (KBSA) under the hash functionstechniques umbrella, that work as Message Authentication Codes (MAC), whichare easy to use, and be efficient for all keys then gathering them into a library(package) so, can be easily be applicable in real applications.·Stretching the limits of Cryptography by adding another layer of protection"Steganography" for hiding the information to reduce the chance of a messagebeing detected which works as a multilevel of security.·Compressing this information before transmitting to the other party.·Finally, encapsulating and activating these systems to be appropriate andfunctional in some real-world applications like: securing aerial imagestransmission, copyrights reserving and Internet security like (E-Commerce,E-Votingetc).Cryptography scrambles a message so it cannot be understood. Steganography hides the message so it cannot be seen. A message in ciphertext, for instance, might arouse suspicion on the part of the recipient while an "invisible" message created with steganographic methods will not. Unlike practical Cryptography, Steganography cannot be detected. The most prominent way of embedding information in multimedia data is the use of digital watermarking. Hiding information into image files by a way that can be indistinguishable by the naked eyes is presented. Also, Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of software and audio files.Due to the mass storage of aerial and remote sensing images and their sensitive information used by decision makers, the need for a secured compression technique has become an important demand. So, Hybrid Fractal-RBC compression algorithm, which uses the benefits of both Fractal and the RBC image compression techniques, is presented. Thus, the merits of the two different approaches can be combined -Fractal at high compression ratios and the RBC at low compression ratios- and the overall coding efficiency can be improved.Three Main Results have been achieved:1. Combining Cryptography and Steganography to provide multilayer securitymechanism.2. Combining Fractal and Resampling Block Coding (RBC) image compressiontechniques to achieve the benefits of both.3. Real applications like: commercial & military.The KBSA techniques have been studied from the point of view of robustness,speed and several important properties, it was proved that extracting any information about the plaintext from the ciphertext is hard for any eavesdropper with computational resources due to multilevel securities that provides a computationally way to dramatically improve on the resistance exhaustive search attacks. It was found that the integrated KBSA algorithms are relatively accepted and robust, when they are compared with the standard encryption techniques. No one can guarantee 100% security. But one can work toward 100% risk acceptance.



影响因子:


暂无成果共有人
dc:title:一个安全包机制-加密多媒体通讯基础研究
dc:creator:Emad S.Osman
dc:date: publishDate:1753-01-01
dc:type:学位
dc:format: Media:北京航空航天大学
dc:identifier: LnterrelatedLiterature:北京航空航天大学.2004.
dc:identifier:DOI:
dc: identifier:ISBN:
闂傚倸鍊风粈浣虹礊婵犲倴缂氱憸鏃堛€侀弽顓炲耿婵$偟绮弫鐘绘⒑闁偛鑻晶鎾煟閹垮啫浜扮€规洖澧庨幑鍕姜閺夋寧鐎抽梻鍌欑窔閳ь剛鍋涢懟顖涙櫠娴煎瓨鐓曢柣妯荤叀閸欏嫮鈧娲忛崹鑺ヤ繆閸洖鐐婇柕濞垮労娴兼洟姊洪懡銈呮瀾闁荤喆鍎抽埀顒佸嚬閸欏啫顕i幎钘夐唶闁靛濡囬崢閬嶆⒑瑜版帒浜伴柛鎾寸懇閵嗗啫鈻庨幋鐘碉紲闂佸憡鐟﹂敋鐎规挸妫涢埀顒冾潐濞插繘宕濋幋锕€鏋侀柟鍓х帛閺呮悂鏌ㄩ悤鍌涘闂傚倸鍊烽悞锔锯偓绗涘懐鐭欓柟杈鹃檮閸庢柨鈹戦崒姘暈闁稿鍠愮换娑㈠箣濞嗗繒浠肩紒缁㈠幐閸嬫捇姊虹拠鏌ヮ€楁繝鈧潏銊﹀弿閻庨潧鎽滄稉宥嗐亜閺嶎偄浠﹂柣鎾存礃缁绘盯宕卞Ο鍝勵潕婵犫拃灞藉缂佺粯绻堥崺鈧い鎺戝缁犮儲銇勯弮鈧崕鍐茬暦閵夈儮鏀介柣鎰级椤ョ偤鎮介婊冧槐濠碘€崇埣椤㈡洟鏁傞悾灞藉箰闂備胶枪閺堫剛绮欓幘璇茬疇闁糕剝鐟﹂崑鏍ㄧ箾閸℃ɑ灏伴柣鎾存礃娣囧﹪顢涘▎鎺濆妳闂佺ǹ瀛╅崹鍦閹捐纾兼慨妯哄悑妤旈梻渚€鈧偛鑻晶瀛樼箾娴e啿鍚樺☉妯锋闁靛繆鈧厖鍑芥繝鐢靛Т閿曘倝鎮ф繝鍥х柧妞ゆ帒瀚悡銉╂煟閺囩偛鈧湱鈧熬鎷�
相关话题/北京航空航天大学 学位 文献 基础 博士

闂備浇顕х€涒晠顢欓弽顓炵獥闁圭儤顨呯壕濠氭煙閸撗呭笡闁抽攱鍨堕妵鍕箛閸撲焦鍋ч梺纭呮閻☆櫀闂傚倸鍊烽悞锔锯偓绗涘懐鐭欓柟鐑橆殕閸庢銇勯弬鍨挃闁告宀搁弻娑㈠箻濡も偓閹虫劙鎮$€n喗鍊垫鐐茬仢閸旀岸鏌eΔ鈧崯鏉戠暦閹达箑绠婚悹鍥皺椤︺劌顪冮妶鍛婵☆偅顨婇幃鈥斥槈閵忊檧鎷洪梺绋跨箰閸氬娆㈤弻銉︾厱闁绘梻枪閳绘洟鏌熼娆戝妽鐎垫澘瀚禒锕傚箚瑜庨悗顓㈡⒒娴h櫣銆婇柛鎾寸箖缁楃喎螖閸涱厽杈堥梺闈涱槴閺呮粓鍩涢幒妤佺厱婵炴垵宕獮妯肩磼閻欏懐鎮肩紒杈ㄥ笧娴狅箓鎮剧仦鐣屽幗闂備浇顕栭崹鏉棵洪妸鈺佺劦妞ゆ帒锕﹂崚鏉款熆瑜嶅ù椋庡垝閸喎绶為悗锝庡亜瀵潡姊洪幐搴g畵闁硅櫕鍔楃划濠氬矗婢跺瞼鐦堥梺閫炲苯澧撮柟顔ㄥ洤閱囬柍鍨涙櫆閻忓啴鏌f惔锛勭暛闁稿酣浜堕獮濠冩償閵婏箑浜楅梺绋挎湰閸╁啫危閸儲鐓欑紓浣靛灩閻忕姴霉濠婂牏鐣烘慨濠冩そ瀹曘劍绻濋崒婊呮噯婵犵妲呴崑鍛崲閸儳宓侀柟鎵閺呮悂鏌ㄩ悤鍌涘
547闂傚倸鍊风粈浣革耿闁秲鈧倹绂掔€n亞锛涢梺鐟板⒔缁垶鍩涢幒妤佺厱闁哄洦顨嗗▍鍛存煟韫囷絼閭柡宀嬬到铻栭柍褜鍓熼弻濠囨晲婢跺﹦鐤囬梺瑙勫礃椤曆呯矆閸愨斂浜滈煫鍥ㄦ尰椤ユ粓鏌i幘瀵告创婵﹥妞藉畷妤呭礂閼测晛鍤掗梻浣告憸閸c儵宕戦崟顖涘仼闁绘垼濮ら弲鎼佹煥閻曞倹瀚�1130缂傚倸鍊搁崐椋庣矆娓氣偓钘濇い鏍ㄧ矌閻捇鏌i姀銏╂毌闁稿鎹囧畷褰掝敃閿濆洦顓婚梻渚€鈧偛鑻晶鍙夈亜椤愩埄妲洪柛鐘诧工椤撳吋寰勬繝鍐发闂備線鈧偛鑻晶鎾煛鐏炵ǹ澧茬€垫澘瀚埀顒婄秵娴滄粓锝炴惔鈾€鏀介柣鎰皺婢ф盯鏌涢妸銉т虎闁伙絿鍏橀弫鎾绘偐閼碱剦妲伴柣鐔哥矊缁绘帞鍒掑▎鎾崇倞闁冲搫鍟伴敍婊勭節閵忥絾纭鹃柨鏇檮閺呫儵姊绘担鍛婂暈閼垦囨煕婵犲啰澧辩紓鍌涙崌閹稿﹥绔熼埡鍌涱棃鐎规洦浜濋幏鍛喆閸曨厽袙闂傚倷绀佸﹢閬嶅储瑜旈幃娲Ω閳轰胶顔囬梺鍓插亝濞叉牠鎮為崹顐犱簻闁瑰鍋涢婊呯磼娴e搫顣奸柕鍥у椤㈡洟濮€閳轰礁澹夐梻浣瑰缁嬫帡宕濆▎鎾跺祦閻庯綆鍣弫宥嗙節婵犲倹濯兼俊鏌ユ敱缁绘繈鎮介棃娑楁勃闂佹悶鍔岀紞濠傤嚕椤愩倗鐭欐俊顐ゆ暩閸庛倗鎹㈠┑瀣倞闁靛ǹ鍎查娲⒑閸濆嫷妲搁柣妤佺矒瀹曟垿骞掑Δ鈧崥褰掓煛閸愩劎澧涢柣鎾崇箻閺屾盯鍩勯崘鈺冾槷闂佺ǹ绻愰惉鑲╂閹烘鏁婇柛蹇擃槸娴滈箖鎮洪幒宥嗙グ妞ゎ偄顦甸獮鍡涘棘鎼存挻顫嶉梺鍦劋閸ㄨ櫕绔熼弴鐔虹閺夊牆澧介幃濂告煛閸滀礁浜滈崡閬嶆煕椤愮姴鍔滈柣鎾存礋閺岀喖鎮滃Ο璇查瀺闂佺ǹ顑囨繛鈧柡灞界Х椤т線鏌涜箛鏃傘€掓繛鍡愬灩椤繄鎹勫ú顏咃紬濠德板€х徊浠嬪疮椤栫偛绠犳慨妯诲閸嬫捇鐛崹顔煎闂佸摜鍠撴繛鈧€规洘鍨块獮妯尖偓娑櫭鎾绘⒑缂佹ê鐏﹂柨姘舵煃瑜滈崜娑㈠磻閻旂厧鐒垫い鎺戝枤濞兼劙鏌熼鑲╁煟鐎规洘娲熼、娑㈡倷閼碱剙濮︽俊鐐€栭崹濂稿磿婵犳艾绀傞悘鐐板嫎娴滄粓鏌熼幆褏鎽犻柛濠冨姍閺岀喖顢欓懖鈺佺厽閻庤娲熸禍鍫曠嵁閸ヮ剙惟闁靛鍊曢ˉ姘攽閻愯埖褰х紒鑼亾缁傚秹鎳為妷褜娴勯梺鎸庢磵閸嬫捇妫佹径鎰厱闊洦娲栫敮鍫曟煙閸忓吋鍊愰柡灞界Х椤т線鏌涜箛鏃傗槈闂囧鏌涢妷顔煎缁炬儳銈搁弻鏇熺節韫囨洜鏆犲銈嗘礉妞存悂骞堥妸銉庣喓绮欓崹顔碱潕闂備胶枪椤戝棝骞愭繝姘闁告侗鍨遍崰鍡涙煕閺囥劌澧伴柡鍡樺哺濮婄粯鎷呴崫鍕粯閻庢鍠楅崕濂稿Φ閹版澘绀冩い蹇撴婢跺嫭淇婇妶蹇曞埌闁哥噥鍨跺畷鎴︽偐缂佹ḿ鍘遍梺鏂ユ櫅閸燁偅鎱ㄩ埀顒勬⒑缁嬫鍎愰柟绋款煼楠炲繘宕ㄧ€涙ê浠惧銈嗙墬閼瑰墽绮婚幋锔解拻濞达絽鎲¢幆鍫ユ煕婵犲媱鍦弲闂侀潧绻堥崐鏇㈡倿閸偁浜滈柟瀵稿仜椤曟粎绱掓担瑙勭凡妞ゎ叀娉曢幉鎾礋椤掆偓绾炬娊鎮楀▓鍨灓闁轰礁顭烽妴浣糕槈濡粎鍠庨悾鈩冿紣娴e壊妫滄繝鐢靛仩閹活亞绱為埀顒併亜椤愩埄妯€闁诡噯绻濋崺鈧い鎺戝閳锋帡鏌涚仦鎹愬闁逞屽厸缁瑩銆佸▎鎰瘈闁告洦鍓﹀ḿ鐔兼⒑閸撴彃浜濇繛鍙夌墱缁崵绱掑Ο闀愮盎闂佸湱鍋撳ḿ娆撍夊鑸电厱閻庯綆鍋呯亸浼存煙瀹勭増鍤囩€规洜鍏橀、妯衡攦閹傚婵犵數濮村ú锕傚磹閸偆绠鹃柟瀛樼箘閺嬪啰绱掗埀顒傗偓锝庡枟閻撳啰鎲稿⿰鍫濈婵炴垶姘ㄩ惌鍡椕归敐鍫熴€冮柣鎺戯躬閺岀喎鈻撻崹顔界亐闂佺ǹ顑嗛幐鎼佸煡婢跺备鍋撻崷顓炐ユい锔垮嵆濮婃椽鏌呴悙鑼跺闁告ê鎲$换娑㈠级閹寸偛鏋犲銈冨灪閿曘垹鐣烽锕€唯鐟滃瞼绮径濞炬斀閹烘娊宕愰幘缁樺€块柨鏃€宕樻慨铏叏濡灝鐓愰柣鎾崇箻閺屾盯鍩勯崘鈺冾槶濡炪倧璁f俊鍥焵椤掆偓濠€杈ㄧ仚濡炪値鍘奸崲鏌ユ偩閻戣姤鏅查柛銉檮閸曞啴姊虹粙鎸庢拱妞ゃ劌鎳忕粋宥夊箚椤€崇秺閺佹劙宕ㄩ鍏兼畼闂備礁鎲″ú鐔虹不閺嶎厼钃熼柨婵嗩槹閸婄兘鏌涘▎蹇f▓婵☆偅鍨垮娲焻閻愯尪瀚伴柛妯绘倐閺岋綁骞掗悙鐢垫殼閻庢鍣崜鐔风暦閹烘埈娼╅柨婵嗘閸欏啯绻濆▓鍨灓闁硅櫕鎸哥叅闁绘ǹ顕х壕濠氭煙閹呮憼濠殿垱鎸抽弻娑樷槈濮楀牊鏁鹃梺闈╃稻閹倿寮婚敐鍡樺劅闁靛繒濮撮弸娆撴煟閻樺啿濮夐柛鐘崇墵瀹曟椽鍩€椤掍降浜滈柟瀵稿仜椤曟粍銇勯敃鍌ゆ缂佽鲸鎸搁濂稿椽娴gǹ澹庨梻浣侯攰濞呮洟鎮ч悩璇茬疇闁绘ɑ妞块弫鍡涙煕閹邦喖浜鹃柦鎴濐槺缁辨捇宕掑▎鎴濆闂佸憡鍔曢…鐑界嵁韫囨稒鏅搁柨鐕傛嫹28缂傚倸鍊搁崐椋庢閿熺姴纾诲鑸靛姦閺佸鎲搁弮鍫涒偓浣肝旈崨顔间簻闂佹儳绻愬﹢閬嶆偂鐎n喗鈷戦悷娆忓閸庢鏌涢妸銉э紞缂侇喖鐗婄换鍛枎缁碍绻濋悽闈涗沪婵炲吋鐟╁畷銉р偓锝庡枟閸ゅ苯螖閿濆懎鏆欑紒鐘靛枛閺屟嗙疀閿濆懍绨兼繝娈垮灡閹告娊鐛弽顬ュ酣顢楅埀顒勫焵椤掍焦绀€闁崇粯鎹囬弫鎾绘晸閿燂拷128.00闂傚倸鍊烽懗鑸电仚缂備胶绮崝娆忕暦閺夊簱妲堟慨姗嗗弾濞肩喖姊虹捄銊ユ珢闁瑰嚖鎷�