面向分布式制造的机械工程文件安全传输技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
参与分布式制造的企业间存在大量的机械工程文件交换,这些文件不仅包括图纸,还包括规范、数控程序、合同,甚至包括软件。目前,企业通常采用廉价、快速的计算机网络进行文件传递,这些机械工程文件普遍涉及专利、商业机密,甚至影响企业的生存安全,需要有效的措施保证其安全传输。目前,面向分布式制造的机械工程文件安全传输技术已经成为分布式制造领域中的一个重要研究课题。
     本文在黑龙江省科技攻关项目(名称:基于数控设备的数字化,网络化设计与制造系统编号:CC06A129)的支持下,系统地收集并分析了国内外相关的技术文献资料,发现现有面向分布式制造的机械工程文件传输方案,由于没有更多的选择,普遍采用加密的方式进行信息交换。杂乱无章的密文容易引起非法攻击者的注意,暴露通信的机密性,存在严重的安全隐患。
     为了最大限度地淡化非法攻击者的攻击意识,降低信息被猜测和破译的可能性,本文采取加密技术,结合数字密写技术构建新的传输方案。在加密保护的基础上,由密写技术提供多一层的安全防护,将机械工程文件“伪装”在载体图片中,起到迷惑、欺骗非法攻击者的目的。本文的主要研究内容如下:
     研究并提出了密写技术结合密码技术的总体方案。确定本系统的实际传输文件为机械工程文件(如:CAD的“.dwg”文件),辅助文件(载体文件)为索引图像和BMP图像。本文研究并提出了最佳效果分配(ORA)密写算法。对比实验表明,该算法在获得比OPA算法更高安全性的同时,获得比OPA改进算法更好的隐藏效果;本文还研究并提出了一种高嵌入量安全BMP图像密写算法。该算法的信息容量大,嵌入过程对图像的直方图影响较小。
     利用数字图像置乱技术,弥补密写技术无密钥的不足。设计了基于混沌和哈希函数的数字图像置乱算法。算法的时间复杂性较低,满足实际的应用需要。
     设计面向分布式制造的机械工程文件安全传输系统的构成和操作流程。其中,重点应用本文设计的算法开发了适合分布式制造企业使用的密写软件,成功将机械工程文件隐藏在载体文件中。在黑龙江省机械科学研究院及其合作伙伴间的信息传输实验表明,本系统可以为分布式制造企业提供机械工程文件的传输服务。
     分布式企业间传递的其它信息(如:对话),如果能够保存成文件,也可以利用本系统进行安全地传输。随着相关技术的深入发展,本方案很有可能成为分布式制造中信息安全传输的必要技术,并扩展新的应用领域。
A large number of mechanical engineering files exchange exits between distributed manufacturing enterprises. These files include not only drawings, but also standard, NC program, contracts, and even includes software. At present, the enterprises generally use the inexpensive and fast computer network to carry on the information transmission. Because these manufacture information generally involves patent, commercial secrets, and sometimes is also deciding enterprise's destiny, an effective measures is needed to guarantee the safety of information transmission. At present, secure transmission of mechanical engineering files facing distributional manufacture has become one of the important research directions in information security transmission domain.
     This subject is funded by Science-Tech Key Project of Heilongjiang Province(Title: Digital & network design and manufacturing system based on numerical control equipment, ID: CC06A129), and is the result of overall and systematically collected and deeply studied the searched data at home and abroad about information security transfer technology of distributed manufacturing system and digital steganography technology. Found that existing Methods of file transfer program, as the absence of more choices, widely used encryption method to exchange information. Chaotic ciphertext easily lead to attention of unlawful attackers, exposed the confidentiality of communications, has serious security risks.
     In order to maximize water down the illegal attackers'consciousness, reduce the possibility of speculation and deciphering, this paper has studied and proposed a new method of information security transfer combination the advantages of cryptographic technology and digital steganography technology. On the basis of encryption protection, steganography provides a more layer of security protection, mechanical engineering files can be "disguised" in the carrier image, played a purpose of confused, deceiving illegal attacker. The main results achieved of this paper are as follows:
     This article identifies the overall program combination of Steganography and Cryptography technology, analysis the selection principles of carries files for Steganography, and take this as the basis, identifies this article's main research carriers are the index images and the BMP images. As index image, this article designed a new algorithm named optimal result assignment (ORA) algorithm to write secret information into index images. Comparison experiments show that the algorithm can guarantee the security, meanwhile gain a higher image quality than optimal parity assignment (OPA).As BMP images, studied and proposed a high-volume embedded security BMP Image Steganography Algorithm, the algorithm has higher embedding rate, has less affect of the image histogram in the course of embedding, and has higher security.
     Digital image scrambling technology was used to compensate the lack of non-key steganography technology. A digital image scrambling algorithm is designed based on hash function and chaotic. The algorithm has lower time complexity, high security, to meet the needs of practical application.
     Developed a steganography software for distributed manufacturing enterprises, achieved ORA, high-density BMP images steganography, scrambling algorithm of Chaos and hash function. After scrambling the carrier of the input file, called ORA or high-volume embedded BMP Image Steganography Algorithm according to the type of input image. Hidden the ciphertext into the scrambled carrier image, and then applied the inverse Scrambling algorithm, gained the carrier images hidden Mechanical engineering files, experiment between Mechanical Sciences in Heilongjiang Province and its partners shows that the system could provide mechanical engineering file transfer service for distributed manufacturing enterprises.
     Other information (such as:dialogue) passing between distributed enterprises can also be transmitted securely use this system if we can save these information into a file. With the deepening development of relevant technologies, the program is likely to become necessary technology to secure transmission of information for distributed manufacturing, and expand new fields of application.
引文
[1]James P W. The Machine that Changed the World.Johns Hopkins University Press, 1990:45-46
    [2]Chisholm, A. W. J,1992.Nomenclature and Definitions for Manufacturing System[J]. Annals of the CIRP,1990:735-744
    [3]Chryssolouris G.Manufacturing System:Theory and Practice. New York, Springer-Verlag: 1992
    [4](日)人见滕人.制造系统工程—制造工艺和生产管理的综合研究.陈榕林,吕柱译.北京:中国农业机械出版社,1983
    [5]Herk R. The rediscovery of postponement a literature review and directions for research[J].Operations Management,2001,19(2):161-184
    [6]William M. Fitzpatrick, Donald R. Burke Form, Function, and Financial Performance Realities for the Virtual Organization [J]. SAM Advanced Manufacturing Journal,2000:13-20
    [7]Martijn R. Hoogeweegen, Wim J.M. Modular Network Design:Using Information and Communication Technology to Allocate Production Tasks in a Virtual Organization[J].Design Science,1999,30(4):1073-1091
    [8]N.Zarour, M.Boufaida, L.Seinturier, P.Estraillier. Supporting virtual enterprise systems using agent coordination [J]. Knowledge and Information Systems,2000
    [9]Olivier Perrin, Claude Godart. A model to collaborative work in virtual enterprises [J]. Data&Knowledge Engineering,2004,50:63-86
    [10]NIIIP inc. NIIIP Reference Architecture.www.mp.org,1998
    [11]Zarli,et al. Integrating emerging IT paradigms for the Virtual Enterprise:the VEGA platform.In:Proceedings of the 4th International Conference on Concurrent Enterprise(ICE1997).Nottingham UK, October 8-10,1997.347-359
    [12]L.M.Camarinha-Matos,H.Afsarmanesh.The PRODNET Goals and Approach.In:IFIP TCS WG5.3/PRODNET Working Conference on Infrastructure for Virtual Enteiprise(PRO-VE99).Porto,Portugal,October27-28,1999.97-108
    [13]张莉,殷国富,王伟,邓志滔.网络环境下面向ASP的协同分析服务技术研究[J].中北大学学报(自然科学版),2008,(02):136-141
    [14]Frayret, J. [Dissertation] A conceptual framework to operate collaborative manufacturing network.Canada:2002
    [15]Camarinha-Matos, L.M., Afsamanesh, H., Garita, C., and Lima, C.Towards an architecture for Virtual Enterprise. In:Proc. Of 2nd world congress on Intelligent Manufacturing Process and Systems, Budapest,Hungary:1997
    [16]Fujii, S., Kaihara, T. and Morita, H..A distributed virtual factory in agile manufacturing environment. INT. J. PROD. RES.,2000, VOL.38, NO.17,4113-4128.
    [17]陈玮,郑时雄,孙延明,等.分布式制造动态调度资源集成系统建模.组合机床与自动化加工技术,2002,6:12-14.
    [18]杨正琦,刘治红.分散网络制造浅谈.兵工自动化,2002,21(2):5-7.
    [19]张仙伟,张璟.Web服务的核心技术之——SOAP协议[J].电子科技,2010,(03)
    [20]韦丽娜,何冰.电子商务扩展标准语言研究.计算机技术与发展,2009.01:128-130
    [21]林海.面向企业应用集成的可靠消息传递.甘肃科技.2009.3.86-89
    [22]谢铉洋,谢荣传.XML数字签名.计算机应用研究.2002.1(3).92-94
    [23]熊光彩,莫蓉,毛海鹏,张定华.基于XML的BOM信息共享和存储.机械科学与技术.2002.5(21).848-851
    [24]何永忠,王晓京.用XML实现电子公文的签名和加密.计算机应用.2002.8(22).85-88
    [25]杜航,翟丽丽.虚拟企业信息平台的安全保障体系[J]科技与管理,2007,(05).66-69
    [26]夏维力,王艳照.基于Multi—agent的虚拟企业信息集成模型研究[J].现代管理科学,2007,(5)34-39
    [27]李於洪,曹敏,荣珏.基于制造业虚拟企业的信息代理模型[J].工业技术经济,2008,(2).10-14
    [28]R icardo, J. Rabel o. An ureo Campos Ferreira. M anaging distributed business p rocesses in the virtual enterp rise [J]. Journal of IntelligentM anufacturing,2001,12:185-197.
    [29]E. Balkovich, S.R. Lerman, R.P. Parmelee. Computing in Higher Education:The Athena Experience [J]. Communications of the ACM.1985,28(11):1214-1224
    [30]刘壮,郭荷清,张娟娟.基于公钥的Kerberos分布式认证方法研究[J].计算机工程与应用,2006,42(4):121-124
    [31]刘卫平,蔡皖东.基于SSH的安全iSCSI技术研究[J].小型微型计算机系统,2006,27(5):805-807
    [32]卓先德,赵菲,曾德明.非对称加密技术研究.四川理工学院学报(自然科学版),2010.05:562-569
    [33]李静,肖美华.网络认证协议攻击的非形式化分析[J].计算机工程与应用,2006,42(22):112-115
    [34]Cooper D A. A More Efficient Use of Delta-CRLs [A].In:Proceedings of the 2000 IEEE Symposium on Security and Privacy[C]. May 2000,190-202
    [35]阳文泽,李翠华.数字签名技术在办公自动化系统中的实现[J].计算机工程,2005,31(23):33-35
    [36]肖天威,张世永,钟亦平.基于PKI/CA的中间件系统的设计与实现[J].计算机工程,2006,32(4):189-191
    [37]陈彦学.信息安全理论与实务[M].北京:中国铁道出版社,2001
    [38]张光剑,李军英,李仁发,等.基于VPN的安全VoIP述评[[J].计算机应用研究,2004,21(2):1-3
    [39]王朔中,张新鹏,张开文.数字密写和密写分析.北京:清华大学出版社,2005
    [40]柏森.基于信息隐藏的隐蔽通信技术研究[D].重庆大学:2002
    [41]Lie W, Chang L. Data Hiding In Images with Adaptive Numbers of Least Significant Bits Based on the Human Visual System. In Proc. IEEE Int. Conf. Images Processing. Japan: Kobe. Oct.1999(1):286-290
    [42]Fridrich J, Goljan M. Anew Steganograhpic Method for Palette Images. In IS&T PICS,Savammah, Georgia,1999:285-289
    [43]秦国亮,张治国.一种基于置乱和融合的图像DCT域信息隐藏算法[J].计算机安全,2009,(6):49-50
    [44]Marvel L M, Boncelet C G, Retter C T. Spread Spectrum Image Steganogrphy. IEEE trans. On Image Processing,1999,8:1075-1083
    [45]Wu D C, Tsai W H.Spatial-domain Hiding Using Image Differencing [J].IEEE Proc.-Vis. Image Signal Process.2000:147(1) 29-36
    [46]魏伟一,李战明.新的基于小波对比度的LSB密写[J].计算机工程与应用,2010,46(2):154-220
    [47]Solanki K, Jacobsen N, Chandrasekaran S., Madhow U., Manjunath B. S. High-Volume Data Hiding In Images:Introducing Perceptual Criteria into Quantization Based Embedding [C]. Acoustics, Speech and Signal Processing,2002. Proceedings. (ICASSP' 02). IEEE International Conference on, Volume:4,2002:3485-3488.
    [48]Fridrch J, goljan M. Digital Image Steganograhpy Using Stochastic Modulation. In Proc. El SPIE, CA:Santa Clara.2003
    [49]Chen C C, Chen T S, Chung L T. A Steganographic Method Based upon JPEG and quantization Table Modification. Information Science,2002,141:123-138
    [50]Westfeld A. F5-A Steganographic Algorithm. In 4th International Workshop on Information hiding, Lecture Notes in Computer Science,2137.Springer-verlag,2001:289-302
    [51]Machado R, Noda H,Spaulding J, Shirazi M N, Kawaguchi E. Application of Bit-plane Decomposition Steganography to JPEG2000 Encoded Images. IEEE Signal Processing Letters,2002,9:410-430
    [52]Spaulding J, Noda H, Shirazi M N, Kawaguchi E, BPCS Steganography Using EZW Lossy Compressing Images. Pattern Recognition Letters,2002,23:1579-1587
    [53]Hioki H. A Data Embedding Method Using BPCS Principle with New Complexity Measures. In Pacific rim Workshop on digital Steganography 2002:15-105
    [54]Maniccam S S, Bourbakis N. Lossless comp ression and information hiding in images[J]. Pattern Recognition,2004,37 (3):475-486.
    [55]Chang Chin-chen, Lin Min-hui. A fast and secure image hiding scheme based on LSB substitution [J]. International Journal of Pattern Recognition and Artificial Intelligence, 2002,16 (4):399-416.
    [56]Zou Jian-cheng, Ward Rabab K. Introducing two new image scrambling methods [A]. In: Proceedings of the IEEE PacRim Conference on Communications, Computers and Signal Proceedings [C], Victoria, Canada,2003,2:708-711.
    [57]Zou Jian-cheng, Ward Rabab K, Qi Dong2xu. A new digital image scrambling method based on Fibonacci number [A]. In:Proceeding of the IEEE Inter Symposium on Circuits and Systems[C], Vancouver, Canada,2004,3:965-968.
    [58]柏森,曹长修,曹龙汉等.基于骑士巡游变换的数字图象细节隐藏技术[J].中国图象图形学报,2001,6(11):1096-1100.
    [59]丁玮,闫伟齐,齐东旭.基于生命游戏的数字图像置乱与数字水印技术[J].北方工业大学学报,2000,12(1):1-5.
    [60]丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术[J].计算机学报,1998,21(9):838-843.
    [61]易开祥,孙鑫,石教英.一种基于混沌序列的图像加密算法[J].计算机辅助设计与图形学学报,2000,12(9):672-676.
    [62]叶瑞松,林润海.基于三维整数拟仿射变换的对称图像加密算法[J].汕头大学学报(自然科学版),2009,24(3):60-67.
    [63]Brassil J, Low S, Maxemchuk N, et al. Electronic marking and identification techniques to discourage document copying [A]. In Proc Inforcom'94[C]. [S.l.]:[s. n.],1994.1278-1287.
    [64]Brassil J, Low S, Maxemchuk N, et al. Electronic marking and identification techniques to discourage document copying [J]. IEEE J Select Areas Common,1995,13:1495-1504.
    [65]Brassil J, Low S, Maxemchuk N, et al. Copyright protection for the electronic distribution of text document [J]. Proc IEEE,1999 (7):1181-1196.
    [66]钮心忻,杨义先.文本伪装算法研究[J].电子学报,2003,(3)
    [67]曹卫兵,戴冠中,夏煜,慕德俊.基于文本的信息隐藏技术[J].计算机应用研究,2003,(10).
    [68]李向辉,钟诚.提高Word文本文档信息隐藏容量的方法研究[J].计算机技术与发展,2006,(9)
    [69]J Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[C].In:6th Information Hiding Workshop, Toronto, ON, Canada,2004
    [70]P Sallee.Model-based methods for steganography and steganalysis[J].International Journal of Image and Graphics,2005; 5(1):167-190
    [71]Gang L, Akansu A N, Ramkumar M. Security and Synchronization in Watermark Sequence [J]. ICASSP,2002,6:3736-3739.
    [72]刘秀娟,郭立,邱天.改进的大容量多分辨率LSB音频隐写算法[J].计算机工程与应用,2006,(30)
    [73]张达治,马驷良.一种基于线性内插的音频信息隐藏方案[J].吉林大学学报(理学版),2006,(5)
    [74]王俊杰,张晓明,梅东霞.一种DCT域的音频信息隐藏方法[J].计算机应用与软件,2006,(6)
    [75]李跃强,孙星明.一种用音频作载体的信息隐藏算法[J].计算机应用研究,2006,(5)
    [76]同鸣,郝重阳,刘晓军,陈砚圃.一种基于固定附加相位修正的音频信息隐藏方法[J].计算机工程,2006,(1):75-78
    [77]韩佳,康志伟,罗准.基于听觉模型的整数小波包域自适应音频密写[J].计算机工程,2009,35(8):198-200
    [78]李跃强,丁超,孙星明.一种透明健壮大容量的音频密写算法[J].计算机应用与软件,2010,27(2):81-168
    [79]Swanson, M D Bin Zhu, Tewfik, A H. Data hiding for video-in-xideo[A].In the Proceedings of International Conference on Image Processing[C].1997.2:26-29
    [80]Yulin Wang,Alan Pearmain.Robust Data Hiding in MPEG-2 Video against Transcoding[A].4th EURASIP[C].Conference focused on Wideo/image Processing and Multimedia communacations,2003.2:2-5
    [81]Cheng YM, Xie YM, Wang YX, et al. A method for secret transmission of color video. Journal of Image and Graphics,2005,10 (1):93-97
    [82]郭志川,程义民,王以孝,谢于明.一种基于视频的无损信息隐藏方法[J].中国科学院研究生院学报,2006,(2)
    [83]程义民,谢于明,王以孝,郭志川.一种彩色视频信息的隐秘传输方法[J].中国图象图形学报,2005,(1)
    [84]张瀚,王秀峰,李朝晖,等.一种基于混沌系统及Henon映射的快速图像加密算法[J].计算机研究与发展,2005,42(12):2137-2142
    [85]田国胜,杨昆,张民.类似一次一密的复合混沌音频隐藏方案.中国安全科学学报,2009,04:97-101
    [86]赵学峰.基于混沌映射的数字图像置乱方法[J].微电子学与计算机,2003,20(8):136-138
    [87]齐东旭,邹建成,韩效宥.一类新的置乱变换及其在图像信息隐蔽中的应用[J].中国科学E辑,2000,30(5):440-447
    [88]Heing Georg Schuster. Deterministic Chaos-An Introduction (Second Revised Edition) [M]. Federal Republic of Germany:VCH,1998
    [89]Bender W, Gruhl D, Morimto N, et al. Techniques for data hiding [J].IBM System Journal, 1996,35 (3-4):313-335
    [90]丁玮,闫伟齐,齐东旭.基于Aronld变换的数字图象置乱技术[J].计算机辅助设计与图形学学报,2001,4(13):338-341
    [91]Wei Ding, Weiqi Yan, Dongxu Qi.Digital image scrambling technology based on gray code. International Conference on CAD/CG,1999
    [92]邹建成,李国富,齐东旭.广义Gray码及其在数字图像置乱中的应用.高校应用数学学报A辑.2002,17(3)363-370.
    [93]鄂炜,康宝生.基于置乱与融合的数字图像隐藏技术及其应用.计算机应用与软件.2008,28(5):215-218
    [94]柏森,杨晓帆,柏林.对m维空间广义骑士巡游问题的研究[J].渝州大学学报(自然科学版),1998,15(04):21-25
    [95]刘镔,罗向阳,刘粉林.基于一族混沌映射的图像置乱算法[A].2005中国控制与决策学术年会论文集(上)[C],2005:558-566
    [96]马虹博,刘连浩.基于混沌的魔方置乱算法设计[J].计算机工程与应用,2006,12:138-140
    [97]http://www.darkside.com.au/gifshuffle/
    [98]R. Machado, EZ Stego. http//www.stego.com/
    [99]J. Fridrich, and M. Goljan, "A New Steganographic Method for Palette Images," in IS&T PICS, Savannah, Georgia, April 25-28,1999, pp.285-289.
    [100]J. Fridrich, and D. Rui, "Secure Steganographic Methods for Palette Images," Information Hiding, Lecture Notes in Computer Science,1768, Springer-Verlag, New York,2000, pp.47-60.
    [101]张新鹏.信息隐藏安全性研究[博士学位论文].上海大学.2004.1
    [102]Westfeld A, Pfitzmann A. Attacks on steganographic systems:Breaking the steganographic utilities EzStego, Jsteg, Stegnos and S-Tools-and some lessons learned. In the 3rd imformation hiding workshop, lecture notes in computer science,1768.2000:61-76
    [103]罗昌状,麦海娟.基于VB的EXE文件注册加密与防非法复制的思考及实现.宁夏工程技术,2009,04:335-337
    [104]Petiteolas F A P, Anderson R J, Kuhn M G. Information Hiding-A surver. Proc.IEEE,1999,87:1062-1078
    [105]Westfeld A, Pfitzmann A. Attacks on Steganographic Systems [A]. In 3th International Workshop on Information Hiding, Lecture Notes in Computer Science, Springer, 1999:61-76
    [106]Fridrich J, Goljan M, Du R. Detecting LSB Steganography in Color and Gray-Scale Images [J]. Magazine of IEEE Multimedia, Special Issue on Security,2001.Issue:22-28
    [107]Zhang X, Wang S, Zhang K. Steganography with the Least Histogram Abnormality [J]. Lecture Notes in Computer Science,2776.Springer-Verlag,2003:401-412

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700