一个安全包机制—加密多媒体通讯基础研究

来源 :贵州大学 | 被引量 : 0次 | 上传用户:fashenqq
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Because of the need to ensure that only those eyes intended to view sensitive information can ever see this information, and to ensure that the information arrives unaltered, security systems have often been employed in computer systems for governments, militaries, corporations, and even individuals. Encryption schemes can be broken, but making them as hard as possible to break is the job of a good cipher designer. All what one can really do is make it very difficult for the codebreakers to decipher his cipher.The thesis in hand presents the implemented KBSA schemes which, provide privacy and confidentiality of multimedia data whether they are stored or communicated over insecure channels.To study secured communication over insecure channels, two main objectives are achieved which are: (i) Secrecy (or privacy),to prevent the unauthorized disclosure of data, and (ii) Authenticity (or integrity), to prevent the unauthorized modification of data through:· Generating the secret keys which will be used in the encryption and decryptionprocedures using the Blum-Blum-Shub generator and run them through a goodhash function before actually using them.· Implementing some cryptosystem schemes (KBSA) under the hash functionstechniques umbrella, that work as Message Authentication Codes (MAC), whichare easy to use, and be efficient for all keys then gathering them into a library(package) so, can be easily be applicable in real applications.·Stretching the limits of Cryptography by adding another layer of protection"Steganography" for hiding the information to reduce the chance of a messagebeing detected which works as a multilevel of security.·Compressing this information before transmitting to the other party.·Finally, encapsulating and activating these systems to be appropriate andfunctional in some real-world applications like: securing aerial imagestransmission, copyrights reserving and Internet security like (E-Commerce,E-Votingetc).Cryptography scrambles a message so it cannot be understood. Steganography hides the message so it cannot be seen. A message in ciphertext, for instance, might arouse suspicion on the part of the recipient while an "invisible" message created with steganographic methods will not. Unlike practical Cryptography, Steganography cannot be detected. The most prominent way of embedding information in multimedia data is the use of digital watermarking. Hiding information into image files by a way that can be indistinguishable by the naked eyes is presented. Also, Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of software and audio files.Due to the mass storage of aerial and remote sensing images and their sensitive information used by decision makers, the need for a secured compression technique has become an important demand. So, Hybrid Fractal-RBC compression algorithm, which uses the benefits of both Fractal and the RBC image compression techniques, is presented. Thus, the merits of the two different approaches can be combined -Fractal at high compression ratios and the RBC at low compression ratios- and the overall coding efficiency can be improved.Three Main Results have been achieved:1. Combining Cryptography and Steganography to provide multilayer securitymechanism.2. Combining Fractal and Resampling Block Coding (RBC) image compressiontechniques to achieve the benefits of both.3. Real applications like: commercial & military.The KBSA techniques have been studied from the point of view of robustness,speed and several important properties, it was proved that extracting any information about the plaintext from the ciphertext is hard for any eavesdropper with computational resources due to multilevel securities that provides a computationally way to dramatically improve on the resistance exhaustive search attacks. It was found that the integrated KBSA algorithms are relatively accepted and robust, when they are compared with the standard encryption techniques. No one can guarantee 100% security. But one can work toward 100% risk acceptance.
其他文献
该文在仔细研究了IP核技术、两种(CISC和RISC)不同设计风格的指令系统等相关技术的基础上,运用硬件描述语言VHDL和SOPC开发工具QUARTUSⅡ,设计了基于SOPC系统的4位CPU、8位CI
该论文主要研究对关系数据库管理系统(RDBMS)进行时态扩展来实现时态数据库管理系统的方法.一个关系数据库管理系统是建立在关系数据模型基础之上.关系数据模型由数据结构(关
伴随着Internet网络的普及以及企业信息化程度的不断加深,web应用程序的开发也得到了成功的发展,为了减少开发时间,缩短维护周期,简化在线应用程序的代码,web应用程序的开发
移动代理是一种可以移动的Agent,它可自主地在异构的网络上,按照一定的规程移动,寻找合适的计算资源、信息资源或软件资源,利用与这些资源处于同一主机或网络的优势,就近处理
本文主要研究和实现了一个面向企业级应用的中间件系统。从整体上看,本文可以划分为两大部份,即系统实现技术的介绍,包括中间件技术、XML技术、组件技术、工作流实现技术,以及系
本文介绍了基于XML的宝钢物资采购网络方案,着重讨论该方案中的三个关键问题:采购决策时,异构数据源数据内容的抽取和其XML表达;不同系统间数据传输共享时,与XML数据模式之间
该文在分析目前中国人民解放军炮兵防空兵气象保障特点的基础上,提出了中国人民解放军炮兵防空兵气象信息系统模式应分为气象信息采集、气象信息处理、气象信息传输三个子系
城市GIS-T系统是一个纵横交错的网格,具有复杂的空间属性、非空间属性,多层次的道路网及其拓扑关系,以及大量交通管理设备的实时动态信息,和需要定期保存、可供恢复的历史数
目前,绝大部分医院都已实施HIS,在各分散的医疗单位积累了一定的信息资源.然而这些有用的电子信息大多局限在本部门使用,共享程度不高.而从信息孤岛状况达到医疗信息社会化,
散射场景深度重建,就是指对浸泡在散射介质中的场景进行深度重建。现有的散射场景深度重建方法分为两类:被动式和主动式;前者基于自然光的传播模型来重建场景的深度;后者则使