- 无标题文档
查看论文信息

论文中文题名:

 可信的无线数字图像采集与传输系统关键技术研究    

姓名:

 李红涛    

学号:

 201008386    

保密级别:

 公开    

学科代码:

 081203    

学科名称:

 计算机应用技术    

学生类型:

 硕士    

学位年度:

 2013    

院系:

 计算机科学与技术学院    

专业:

 计算机应用技术    

第一导师姓名:

 李爱国    

论文外文题名:

 Research on Key Technology of Trusted Wireless Digital Image Acquisition and Transmission System    

论文中文关键词:

 图像采集 ; 图像压缩 ; 水印嵌入 ; 数据加密 ; 数据完整性认证 ; 差错控制    

论文外文关键词:

 Image acquisition ; Image compression ; Data encryption ; Data integrity authentica    

论文中文摘要:
图像采集与传输系统是指将摄像头采集的图像实时的发送到控制室的过程,方便工作人员对监控场所进行管理和控制。图像采集与传输系统因其实用性强、布置方便、操作简单等优点被广泛应用在各种领域,甚至是银行、军事基地、导弹阵地等重要场所,因此很容易遭到敌对攻击,如数据窃听、篡改、伪造等,所以必须采取各种措施保证图像在传输过程中的安全性、可靠性和完整性。 本文首先介绍了课题的选题背景和意义以及国内外的研究现状,分析了在图像传输过程中需要采取各种安全措施的必要性,以及有线布线的缺点和无线布线的优点。 其次,介绍了各种图像采集方法的优缺点,选择了基于Linux操作系统的V4L2的图像采集方法,并对嵌入式Linux操作系统进行了移植,对图像进行了JPEG压缩,压缩率能够达到90%左右。 再次,介绍了基于数字水印的图像防伪技术,分析了基于DCT变换域水印嵌入的缺点,并结合JPEG压缩特性,提出了一种新的水印嵌入方式,该水印嵌入方式不会影响载体图像的视觉效果,对JPEG压缩有极强的鲁棒性,并且可以通过提取出的水印图像确定载体图像被篡改的位置。 然后,介绍了数据加密和数据完整性认证技术,详细介绍了RC6加密算法的原理和步骤,并在RC6的基础上提出了一种新的分段加密方法,由于不知道分段加密规则,攻击者就算获得密钥也无法解密出正确的数据。数据完整性认证是通过消息认证码的方式实现的,它能够正确的识别出图像数据在传输过程中是否被篡改。 随后,介绍了图像数据在传输过程中的差错控制机制,分析了引进差错控制机制的必要性,防止了数据包出现接收不到、重复接收和不按序到达等情况,使系统更稳定。 最后,介绍了本系统的运行结果,并通过模拟攻击的方式对数字水印、数据加密和数据完整性认证等功能进行了验证。
论文外文摘要:
Image acquisition and transmission system is the real-time obtained images transmission process from the camera to the control room, which facilitates the control and management of the layout occasions. Because of its strong practicability, convenient layout and simple operations, the image acquisition and transmission systems are widely used in many fields, even some important places such as banks, military bases, missile position and so on. The system is very vulnerable to hostile attack, such as data eavesdropping, tampering and forgery. Therefore, in the process of image transmission, many measures should be taken to ensure the safety, reliability and integrity of the images. The background and significance of the subject, and the research status at home and abroad are introduced first. The necessity of a variety of security measures need to be taken in the image transfer process is analyzed, as well as the shortcomings of cable wiring and the advantages of wireless cabling. The advantages and disadvantages of various image acquisition methods are introduced, the V4L2 image acquisition method based on the Linux operating system is chosen and transplanted in the embedded Linux operating system. JEPG compression has been used, and the compression ratio can reach about 90%. The image anti-counterfeiting technology based on digital watermark is introduced, the disadvantages of watermarking embedding based on DCT transform. With the features of JPEG compression, a new watermarking embedding method is proposed, which does not affect the image visual effect. The robustness is strong for JPEG compression. And the watermark can be extracted to determine the position vector image which has been tampered. The technologies of data encryption and data integrity authentication are introduced, and the principles and steps of RC6 encryption algorithm are introduced in detail. A new block encryption method based on RC6 is put forward. Without the block encryption rules, attackers could not decode the right data even though they have the secret key. Data integrity authentication is implemented by means of message authentication codes, which able to correctly identify whether the image data has been tampered during transmission. The image data error control in the process of transmission is introduced, the necessity of introducing error control is analyzed. The error control prevent the occurrences of cannot receive the data packet, repeat receiving and receive in the wrong order, which makes the system more stable.
中图分类号:

 TP319.41    

开放日期:

 2013-06-15    

无标题文档

   建议浏览器: 谷歌 火狐 360请用极速模式,双核浏览器请用极速模式