3G网络的身份认证与内容安全关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
身份认证与内容安全是通信安全的两个关键问题,也是3G网络安全研究的两个重要课题。3G网络的主要特点是除了传统话音业务外,还提供丰富的多媒体数据业务,因此又称为移动互联网。业务的多样化对3G的网络接入安全性以及业务数据内容的安全性提出了新的需求。
     3G网络中,网络接入安全的核心技术之一就是身份认证和密钥协商,因为身份认证与密钥协商是实现安全通信、保护用户与运营商利益的首要保证。作为呼叫建立的一部分,身份认证与密钥协商协议在其中扮演着举足轻重的角色。因此,对3G身份认证和密钥协商协议的安全性分析和改进一直是3G安全研究领域的一个重要课题。
     3G网络的多媒体数据业务内容安全是近年来出现的研究领域,已有不少研究成果。3G网络的开放特性与多媒体数据的易于无损拷贝、分发等特性,使得多媒体内容的保护与管理技术的研究更有现实意义和应用价值。数字水印技术是近几年发展起来的多媒体信息安全领域的一项重要技术,目前主要的应用领域是数字内容的版权标示与版权保护;内容认证和完整性检验等。本论文以3G网络的认证与密钥协商机制以及以数字版权管理为基础的多媒体内容版权保护技术为研究内容,设计一种可抵抗中间人攻击的认证与密钥协商协议模型和两种用于版权保护的多媒体数字水印算法,并且对3G网络的数字版权管理标准的互联互通问题进行了探讨。本论文的研究工作主要包括以下几个方面:
     1.对3G网络的身份认证与密钥协商协议进行了安全性分析。在对3G网络的安全框架体系研究的基础上,深入分析了3G网络的身份认证与密钥协商协议的安全性,得出了目前3G网络身份认证与密钥协商的安全隐患。
     2.设计了一种可抵抗MITM攻击的改进AKA协议。基于对3G网络的身份认证与密钥协商(AKA)协议的安全性分析,提出了一种基于Diffie-Hellman密钥交换算法的AKA协议模型(简称为DH-AKA协议)。该协议模型继承了Diffie-Hellman密钥交换算法的优点,避免了Diffie-Hellman算法的无法进行身份认证的缺点。经过安全性能评估,证明该协议可抵抗MITM攻击,可以实现ME与VLR以及VLR与HLR之间基于共享密钥的双向身份认证机制;此外,“一次一密”的密钥生成机制保证了协议的前向保密性、数据完整性保护等安全性能,提高了3G系统的抗破坏能力。
     3.提出了一种基于边缘检测的数字图像水印算法。通过对数字图像数据冗余及边缘检测特性的研究,提出一种基于图像边缘检测的图像数字水印算法,该算法将水印信息嵌入到图像的边缘信息中,实现了水印信息与图像中的关键元素的绑定,该算法对无损压缩格式变换具有鲁棒性,可以实施对数字图像有关属性的有效保护。
     4.提出一种基于多位回声核和时域扩频技术的数字音频水印算法。该算法在深入分析回声隐藏水印技术的基础上,将多位回声核与时域扩频技术相结合,在利用扩频技术对水印信息进行扩展后,利用多位回声核将水印信息嵌入在数字音频中。实验表明,时域扩频技术保证该算法可以抵抗DA和AD转换攻击,多位回声核的优势弥补了扩频技术带来的水印容量损失。
     5.针对目前的DRM标准没有统一的标准的问题,设计了一种DRM桥机制。针对3G网络与其他网络的DRM标准之间缺乏互操作性的问题,对目前的DRM互联互通研究进行了分析,仿照硬件桥的概念,设计了一种DRM桥机制,各个网络域中由DRM桥负责实现网络间的DRM互操作,其特点是离线工作
Authentication and content security are two key issues of the security of 3rd Generation network. The main characteristics of 3rd Generation network, which are called Mobile Internet, are not only the traditional voice services, but also the rich multimedia data services. Business diversification puts forward new demands to the access security and content security of 3rd Generation network.
     In 3rd Generation network, one of the core technologies of network access security is authentication and key agreement, called AKA, which is the basic guarantee for secure communication and the protection of the interests of users and the network operators. As part of call setup, authentication and key agreement protocol plays a pivotal role. Therefore, the security analysis and improvement for authentication and key agreement protocol of 3rd Generation network has been an important topic in the field.
     Content security research on multimedia data services of 3rd Generation network is developed in recent years. The open feature of 3rd Generation network and the characteristics of multimedia data, which are easy to copy and distribute, make the researches on multimedia content protection and management are well worth looking into. Digital watermarking technology is an important technology of multimedia information security which is developed in recent years. The key application areas of digital watermarking technology are the copyright of digital content copyright protection; content authentication and integrity inspection.
     This thesis focuses on the techniques of authentication and key agreement and the multimedia copyright protection of 3rd Generation network. One improved authentication and key agreement protocol which resists against MITM attack are presented, and two digital watermarking algorithms which could be used to the copyright protection are present. Besides, the interlink and intercommunication mechanism between different digital rights managements of 3rd Generation network is discussed. The main content of this thesis is summarized as follows:
     1. An in-depth analysis of the 3G network authentication and key agreement protocol security are proposed based on the security framework of 3rd Generation network, and the security risks of 3rd Generation network authentication and key agreement are resulted.
     2. An improved AKA protocol is proposed. Based on the security risks, an improved AKA protocol is proposed, called DH-AKA protocol. DH-AKA protocol could resist against the MITM attack, and implement mutual authentication between VLR and HLR and between ME and VLR.
     3. A digital watermarking based on edge detecting is proposed. Based on the research of data redundancy and edge detecting, a new watermarking algorithm is proposed, which embed the watermark into the edges of a picture. This new algorithm can resist against the lossless format transformation.
     4. An improved audio watermarking algorithm which based on time-domain frequency spread technology and echo hiding technology is proposed. This algorithm combines the two technologies together; frequency spread technology makes this new algorithm resisting DA/ADconverting attack, while echo hiding technology compensates the loss of watermark capacity which is reduced by frequency spread technology.
     5. A DRM bridge mechanism is designed. There is no uniform standard for DRM standards, so based on the research on the interlink and intercommunication mechanism between different digital rights managements, a DRM bridge mechanism is designed, which is responsible for the interlink and intercommunication mechanism between different digital rights managements of 3rd Generation network.
引文
[1]王丽娜.信息安全导论[M].武汉大学出版社,2008.
    [2]张茹,杨榆,张啸.数字版权管理[M].北京邮电大学出版社,2008.
    [3]王明华,钮心忻,杨义先.移动网络数字内容分发的版权管理研究[J].电信科学,2005,11:P39-42
    [4]刘新伟.数字版权管理及相关水印技术研究[D].华中科技大学,2005.
    [5]OpenMobileAlliance.DigitalRightManagementVersionl.0.2002.[2002-12-1].htt p://www.openmobilealliance.org.
    [6]EmbeddedRealPlayerExtendedFunctionalityGuide.RealNetwork.Inc.USA.300c tober2001.
    [7]钮心忻等.信息隐藏与数字水印[M].北京邮电大学出版社,2004.
    [8]JamkhedkarPA, HeilemanGL. Digital rights management architectures. Computers&ElectricalEngineering, Volume35, Mar,2009.
    [9]GonzalezRG, GilR. Semantic copyright management for internet-wide knowledge sharing and reuse.Online Information Review, Volume32,2008.
    [10]杨木伟,王劲林,陈君等.IPTV中DRM许可证服务系统研究与实现[J].微计算机信息,2009,25(1-3):P6-8.
    [11]HwangSO, YoonKS.Interoperable DRM framework for multiple devices environment, Online Information Review, Volume30, Aug2008.
    [12]EunSeokJeong, ChulSur, KyungHyuneRhee. A New DRM System Based on Graded Contents Sharing andTime-Block Distribution for HomeNetworks.ComputerandInformationScience,2007.ICIS2007.6thIEEE/ACI SInternationalConferenceon11-13 July2007Page(s):P830-833
    [13]Eun-GyeomJang,Byung-OkJeong,Byoung-SooKoh,Young-RakChoi.A Study on the Permutation and Recombination Method Digital Contents for DRM in Smart Home Environment.Future Generation Communication and Networking Symposia,2008,FGCNS'08.Second International Conferenceon, Volume3,13-15 Dec.2008:P175-180.
    [14]ConradoC, KampermanF, SchrijenG.J, JonkerW. Privacy in an identity-based DRMsystem. Proceedings of the 14th International Workshop on Database and Expert Systems Applications.2003:P389-395.
    [15]Bok-NyongPark, Jae-WonKim, WonjunLee. Aprivacy-enhancing license management protocol for digital rights management.18th International Conference on the Advanced Information Networking and Applications.2004,1: P 574-579.
    [16]Messerges, Thomas S., Dabbish, EzzatA. Digital rights management in a 3G mobile phone and beyond. Proceedings of the 2003 ACM workshop on Digital rights management (DRM'05), Washington, DC, USA, ACMPress,2005:P 27-38.
    [17]杨培,张宝贤.支持互操作的移动DRM系统研究[J].电信科学,2009,03:P49-53.
    [18]魏建兰,阙秀震,文博.IPTV中DRM相关技术探讨[J].通信与广播电视,2008,03:P25-31.
    [19]李忠源,郭全成,任亚萍.图像中的信息隐含及水印技术[J].电子学报,2000,Vol.28(4):P60-62.
    [20]牛夏牧,陆哲明,孙圣和.彩色数字水印嵌入技术[J].电子学报,2000,Vol.28(9):P10-12.
    [21]祁明.Han L.基于离散对数的若干新型代理签名方案[J].电子学报,2000,28(11):P114-115.
    [22]桑茂栋,赵耀.基于几何矩的抵抗RST攻击的数字图像水印[J].电子与信息学报,2007,29(1):P76-80.
    [23]刘旻昊,孙堡垒,郭云彪等.文本数字水印技术研究综述[J].东南大学学报,2007,s1:P158-164.
    [24]张立和,米晓莉,杨成,孔祥维.基于水印的移动数字内容权限管理方案[J].计算机应用研究,2007,24(3):P125-127.
    [25]Zhang, Yong.Niu, Xia-Mu. Reversible watermark technique for relational databases. ActaElectronicaSinica.2006,34:P2425-2428.
    [26]Sun Xingming. Huang, Huajun. Wang Baowei. Sun Guang. Huang Junwei. Algorithm of web page information hiding based on equaltag. Computer Research and Development, v44, n5, May2007. P756-760.
    [27]李敏,刘胜利,陈克非.家庭网络DRM与典型DRM整合问题的研究[J].计算机工程,2007,33(02):P249-254.
    [28]张茹,周琳娜,杨义先.移动通信数字版权管理系统模型研究[J].哈尔滨工业大学学报,2006年(增刊),38(205):P691-693.
    [29]魏景芝杨义先钮心忻OMA DRM技术体系研究综述[J].电子与信息学报,2008,30(3):P746-751.
    [30]徐泽兰,刘清堂,王淑娟.数字权利描述语言互操作研究[J].计算机工程与设计,2009,30(24):P5570-5572.
    [31]张茹,杨榆,张啸.数字版权管理[M].北京邮电大学出版社,2008.
    [32]袁琦,闵栋.移动DRM技术的发展和应用分析[J].电信网技术,2009,12:P28-31.
    [33]杨成,王永滨,杨义先.家庭网络与数字版权管理技术[J].中兴通讯技术,2006,12(4):P15-20.
    [34]ChenTianzhou, HuangYu, ChenFeng, HuWei. A New Security Architecture for Mobile Communication. Proceeding of the 17th IASTED International Conference Modeling and Simulation, May24-26,2006, Canada. P424-429.
    [35]冯登国.国内外密码学研究现状及发展趋势.通信学报.2002,23(5):P18-26.
    [36]郭迎九,林闯,尹浩.IPTV数字内容版权保护安全协议的设计[J].系统仿真学报.2007,19(A01):P84-89.
    [37]李海燕.数字水印的攻击方法及策略研究[J].科技信息(科学教研),2008,21:P89.
    [38]王俊丽,蒋昌俊,候玉兵.一种新的混合数字水印算法[J].复旦学报(自然科学版).2004,43(5):P902-906.
    [39]MBarni, FBartolini, IJCos, JHernandez, FPerez-Gonzalez. Digital watermarking for copyright protection:a.communications perspective. IEEEComm.Magazine, 2001, Vol.39(8):P 90-91.
    [40]Mbarni, Cipodilchuk, Fbartolini, Ejdelp.Watermark embedding:hiding a signal within a cover image. IEEEComm.Magazine,2001, Vol.39 (8):P102-108.
    [41]Jr.Hernandezmartin, Mkutter. Information retrieval in digital watermarking. IEEEComm.Magazine,2001, Vol 39 (8):P110-116.
    [42]Vsoloshynovskiy, Spereira, Tpun, Jjeggers, Jksu.Attacksondigitalwatermarks: classification, estimationbasedattacks, andbenchmarks.IEEEComm.Magazine, 2001, Vol.39 (8):P118-126.
    [43]Ijcox, Mlmiller. A review of watermarking and the importance of perceptual modeling. Porc.SPIEHuman Vision and Elect. ImageingⅡ,1997, vol.SPIE, vol.3016:P92~99.
    [44]Atirkel, Grankin, Rvanschyndel. Electronic watermark. In Proc. DICTA, 1993:P666-672.
    [45]Pierremoulin, Josephao Sullivan. Information-theoretic analysis of information hiding. IEEETrans.InformTheory,2003, Vol 49:P 563-593.
    [46]Cohen, Alapidoth. The Gaussian watermarking game. IEEE TransIform Theory, 2002, Vol48:P1639-1667.
    [47]Aneliasomekh-Baruch, Nerimerhay. On the capacity game of public watermarking System. IEEE Trans. Inform Theory,2004, Vol50:P511-524.
    [48]马秀莹,林家骏.数字水印系统性能评价研究的现状与展望[J].计算机工程与设计.2009,30(22):P5233-5238.
    [49]马帅旗,陈瑞雪,吴建华.基于XML与中间件技术的同步物流系统中异构数据共享研究[J].天津理工大学学报,2009,25(1):P74-77.
    [50]RGSchyndel, AZTirkel, CFOsborne. A digital watermark. Proceedings of IEEE International Conference of Image Processing,1994,2:P86~90.
    [51]薛梅,顾海,顾君忠.DRM系统协作的研究[J].计算机应用,2005,25(5):P1148-1157.
    [52]赵晓群,黄小珊.改进的基于人耳掩蔽效应谱减语音增强算法[J].通信学报,2008,28(9):P73-80.
    [53]谢志文,尹俊勋.音频掩蔽效应的研究及发展方向[J].数字声频.2007,36(210):163-169.
    [54]张明.数字音频水印技术的研究[D].燕山大学.2009.
    [55]Bender W., Gruhl D., Morimoto N., Lu A. Techniques for datahiding. IBM Systems Journal,1996,35(3):P313-336.
    [56]王庆席.数字音频水印算法的研究[D].山东轻工业学院,2007.
    [57]孙锋申.鲁棒数字音频水印算法研究[D].西南交通大学,2009.
    [58]李伟.鲁棒性数字音频水印算法研究[D].复旦大学,2004.
    [59]MansourM, TewfikA. Time-scale in variant audio data embedding [A].Proceedings of IEEE International Conference on Multimedia and Expo, ICME [C].2001.P76-79.
    [60]MansourM, TewfikA. Audio watermarking by time-scale modification [A]. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP[C].SaltLakeCity,2001.P1353-1356.
    [61]CvejiC, KeskinarkausA, SeppanenT. Audio watermarking using m-sequences and temporal masking [A]. Proceedings of the 7th IEEE Workshop on Applications of Signal Processing to Audio and Acoustics [C]. New York, NY, 2001.P227-230.
    [62]PetitcolasF[EB/OL].http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego,1 999.
    [63]QiaoLT, ahrstedtyN. On-invertible watermarking methods for MPEG encoded audio [A]. SPIE Proceedings on Security and Watermarking of Multimedia Contents[C].1999.P194-202.
    [64]KoukopoulosDK. A compressed-domain watermarking algorithm for MPEG audio layer3[EB/OL].http://woodworm.cs.ume.edu/iprice/cp/koukopoulos/.
    [65]WangCT, ChenTS, ChaoWH. A new audio watermarking based on modified discrete cosine transform of MPEG/Audio Layer III [A]. Proceedings of the 2004 IEEE International Conference on Networking, Sensing&Control[C].Taipei,2004.P984-989.
    [66]Ⅰ.J.Cox, J. Killian,F. T.Leighton,T.Shamoon.Secure spread spectrum watermarking for multimedia. ImageProcessing.1997,6(12):P1673-1687.
    [67]王育民,张彤,黄继武.信息隐藏——理论与技术[M].清华大学出版社.2006:P1-69.
    [68]J.F. Tilki, A.A. Beex. Encoding a hidden auxiliary channel onto a digital audio signal using psychoacoustic masking. Southeastcon'97.'Engineering new NewCentury'. Proceedings. IEEE.1997:P331-333.
    [69]MingquanFan, HongxiaWang. Chao-based diserete fractional Sine transform domain audio watermarking seheme. Computers and Electrical Engineering 2009.35:P506-511.
    [70]王秋生,孙圣和.基于量化数字音频信号频域参数的水印嵌入算法[J].声学学报,2002.7(27):P379-385.
    [71]吴绍权,黄继武,黄达人.基于小波变换的自同步音频水印算法[J].计算机学报.2004,27(3):P365-370.
    [72]CoxIJ, KilianJ, LeightonT. Secure spread spectrum watermarking for images, audio and video [A]. Proceedings of International Conference on Image Processing (ICIP'96)[C].1996.P243-246.
    [73]BoneyL, Tew AH, HamdyKN. Digital watermarks for audio signals [A]. IEEE International Conference on Multimedia Computing and Systems [C].1996.P473-480.
    [74]NeubauerC, HerreJ, BrandenburgK. Continuous steganographic data transmission using uncompressed audio [A]. Proceedings of Information Hiding[C].1998.P208-217.
    [75]LiuYW, SmithJO. Audio watermarking based on sinusoidal analysis and synthesis[EB/OL].http://wwwccrma.stanford.edu/~jacobliu/DWM/ISMA04-A4. pdf.
    [76]LiX, YuH. Transparent and robust audio data hiding in cepstrum domain [A]. IEEE International Conference on Multimedia and Expo(ICME2000)[C].2000. P397-399.
    [77]钮心忻,杨义先.基于小波变换的数字水印隐藏与检测算法[J].计算机学报,2000,23(1):P2.
    [78]张立和,周继军,陈伟等.透视信息隐藏[M].国防工业出版社.2007:P14-95.
    [79]王育民,刘建伟.通信网的安全—理论与技术[M].西安电子科技大学出版社,1999.
    [80]查光明,熊贤祚.扩频通信[M].西安电子科技大学出版社,2004.
    [81]孙平.基于扩频序列的数字音频水印算法的研究[D].大庆石油学院,2009.
    [82]曾兴雯,刘乃安.通信中的扩展频谱技术[M].西安电子科技大学出版社,1995,P3-5.
    [83]王会华,李宝平.m序列发生器的设计与实现[J].北京电子科技学院学报,2007,15(2):P58-61.
    [84]马翼平,韩纪庆.DCT域音频水印:嵌入对策和算法[J].电子学报,2006,34(7):P1260-1264.
    [85]李忠源,郭全成,任亚萍.图像中的信息隐含及水印技术[J].电子学报,2000,Vol.28(4):P60-62
    [86]项世军.稳健音频水印研究:基于时域统计特征的抗同步攻击水印[D].中山大学,2006.
    [87]LieWen-nung, ChangLi-chun. Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification [J]. IEEE Transactions on Multimedia,2006,8(1):P46-59.
    [88]项世军,黄继武,王永雄.一种抗D/A和A/D变换的音频水印算法[J].计算机学报,2006,Vo1.29(2):P308-316.
    [89]胡云,伍宏涛,张涵钰等.大容量索引图像水印方案的设计与实现[J].北京邮电大学学报,2005,28(1):P26-29.
    [90]何佳鸣.基于密码和数字水印技术的DRM系统的研究[D].北京工业大学,2008.
    [91]胡兰兰.安全协议与方案的研究与设计[D].北京邮电大学,2007.
    [92]思科系统中国网络技术有限公司.下一代网络安全[M].北京邮电大学出版社,2006.
    [93]贾惠影.传统固网向下一代网络(NGN)的演进[J].石家庄铁道学院学报. 2006,z1:P204-206.
    [94]陈自力,林德敬,林柏钢.第二、三代移动通信系统安全体系的分析与比较[J].通信技术.2003,06:P97-100.
    [95]门汝静.3G背景下网络信息安全形势综述[J].现代电信科技.2010,1:P20-24.
    [96]卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):P 1740-1752.
    [97]JansonR., TsudikG. Secure and minimal protocols for authenticated key distribution. Computer Communications, Volumel8, Number9, September1995, P645-653.
    [98]TsutomuMatsumoto,YouichiTakashima, HidekiImai. On Seeking Smart Public-Key-Distribution Systems. IEICE Transactions (1976-1990),1986, Vol.E69-ENo.2, P.99-106.
    [99]RossAnderson, RogerNeedham. Robustness rinciples for Public Key Protocols. Advances in Cryptology-C,RYPTO' 95,LNCS963,P236-247,1995.
    [100]求实科技VisualC++数字图像处理典型算法及实现.人民邮电出版社,2006.
    [101]陈兵旗,孙明.VisualC++实用图像处理专业教程.清华大学出版社,2004.
    [102]郑莹,孙燮华.图像边缘检测Laplace算子的改进.沈阳建筑大学学报(自然科学版).2005,21(3):P268-271.
    [103]Colin Blanchard. Security for the Third Generation (3G) Mobile System.
    [104]3G Securiyt Architecture (Releases 5),2002-12,Http://WWw.3gPP.org
    [105]王秋生.变换域数字水印嵌入算法研究[D].哈尔滨工业大学,2001.
    [106]庞晓红.图像数字水印理论与技术研究[D].哈尔滨工程大学,2006.
    [107]R.G.vanSchyndel, A.Z.Tirkel, N.R.A.Mee, C.F.Osbome. A digital watermarking. Proeedings of the International Conferenceon Image Porcessing, November, 1994, Austin, Texas, vol.2, P.86-90.
    [108]Mihir Bellare, Phillip Rogaway. Entity Authentication And Key Distribution. Proceedings of The 13th Annual International Cryptology Conference On Advances In Cryptology SantaBarbara, California, UnitedStatesPages:P232-249. 1994.
    [109]杨义先,钮心忻,任金强.信息安全新技术[M].北京邮电大学出版社,2002.
    [110]刘海涛,张茹.一种改进的数字音频双水印算法的分析与设计[J].2006北京地区高校研究生学术交流会——通信与信息技术会议论文集(下),2006.
    [111]郭云彪,尤新刚,张春田,周琳娜.面向信息隐藏的图像复杂度研究[J].电 子学报,2006,34(6):p1048-1052.
    [112]刘旻昊,孙堡垒,郭云彪,周琳娜.文本数字水印技术研究综述文本数字水印技术研究综述[J].东南大学学报(自然科学版),2007,37(Ⅰ):P226-230.
    [113]俞龙江,牛夏牧,孙圣和.一种旋转、尺度变换和平移鲁棒水印算法[J].电子学报,2004,31(B2):P2071-2073.
    [114]梁华庆,王磊,双凯,杨义先.一种在原始视频帧中嵌入的鲁棒的数字水印[J].电子与信息学报,2003,25(9):P1281-1284.
    [115]张静,张春田.用于PDF文档认证的数字水印算法[J].天津大学学报(自然科学与工程技术版),2003,36(2):P215-219.
    [116]王道顺,戴一奇.一种双帧数字图像的双盲水印技术[J].电子学报,2002,30(12A):P1982-1985.
    [117]任娟,王蕴红,谭铁牛.基于感兴趣区域的图像认证与自恢复算法[J].自动化学报,2004,30(6):P833-843.
    [118]桑茂栋,赵耀.抵抗几何攻击的数字图像水印[J].电子与信息学报,2004,26(12):P1875-1881.
    [119]张杰,邹建成.基于一次U系统的音频数字水印新技术[J].北方工业大学学报,2007,19(3):P1-5
    [120]张军,熊枫.网络隐私保护技术综述[J].计算机应用研究,2005,22(7):P9-11,28.
    [121]林代茂,胡岚,郭云彪,周琳娜.广义信息隐藏技术的机理与模型[J].北京邮电大学学报,2005,28(1):P1-5.
    [122]朱仕村,宫泽林.多媒体内容认证技术研究[J].应用能源技术,2009,(6):P44-47.
    [123]Boyd, C. A class of flexible and efficient key management protocols[C].9th IEEE Computer Security Foundations Workshop,1996,P:2-8
    [124]Tuomas Aura, Pekka Nikander. Stateless Connections, In Y. Han et al.,editors, Information and Computer Security, First International Conference,1997, P87-97.
    [125]Diffie, W., Hellman, M.New Directions In Cryptography[J]..Information Theory,1976,22(6):P644-654.
    [126]孙圣和,陆哲明.数字水印处理技术[J].电子学报,2000(08):P85-90.
    [127]杨义先,钮心忻.多媒体信息伪装综论[J].通信学报,2002(23):P32-38.
    [128]钮心忻,杨义先,吴志军.信息隐藏理论与关键技术研究[J].电信科学, 2004,20(12):P28-30.
    [129]牛少彰,钮心忻,杨义先,胡文庆.半色调图像中数据隐藏算法[J].电子学报,2004,32(7):P1180-1183.
    [130]庄超.一种新型INTERNET内容版权保护计算机制[J].计算机学报,2000,23(10):P 1088-1091.
    [131]刘绍辉,韩路,姚鸿勋.抗共谋攻击的视频水印算法[J].通信学报,2010,(1):P14-19.
    [132]陈铭,张茹,刘凡凡,钮心忻,杨义先.基于DCT域QIM的音频信息伪装算法[J].2009(8):P105-111.
    [133]梁长垠,李昂,黄继武.基于MPEG压缩的视频认证算法测试平台[J].电子学报,2008,36(B12):P133-137.
    [134]石美红,申亮,龙世忠,胡西民.从RGB到HSV色彩空间转换公式的修正[J].纺织高校基础科学学报,2008,21(3):P351-356
    [135]由守杰,柏森,曹巍巍,李高峰.一种抗DA/AD转换的音频信息隐藏算法[J].计算机工程与应用,2008,44(7):P:113-116,132
    [136]项世军,黄继武,王永雄.一种抗DA/AD变换的音频水印算法[J].计算机学报,2006,29(2):308-319.
    [137]吴志军,钮心忻,杨义先.语音隐藏的研究及实现[J].通信学报,2002,23(8):P99-104.
    [138]吴绍权.数字音频水印技术研究[D].中山大学,2005.
    [139]Stefan Katzenbeisser, Fabien A.P.Petitcolas编,吴秋新,钮心忻,杨义先,罗守山,杨晓兵译.信息隐藏技术—隐写术与数字水印[M].人民邮电出版社,2001
    [140]I. Ahamed, K. Ravinuthala. Secure Media Player[C]. Consumer Electronics, 2007. ICCE 2007. Digest of Technical Papers.10-14 Jan.2007, P1-2.
    [141]W.Li, X.Y.Xue, P.Z.Lu. Localized Audio Watermarking Technique Robust Against Time-Scale Modification.IEEE Trans.on Multimedia,2006, 8(2):P60-69.
    [142]张一帆,蒋天发.基于时域扩频回声隐藏的数字音频水印研究[J].计算机应用,2008,44(31):P119-120.
    [143]杨榆,白剑,徐迎晖,钮心忻,杨义先.回声隐藏的研究与实现[J].中山大学学报(自然科学版).2004,43(2):P50-52.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700