留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

流媒体系统多数据流安全的动态选择控制模型

肖 晨 马世龙 吕卫峰 王丽丰

肖 晨, 马世龙, 吕卫峰, 等 . 流媒体系统多数据流安全的动态选择控制模型[J]. 北京航空航天大学学报, 2008, 34(11): 1292-1297.
引用本文: 肖 晨, 马世龙, 吕卫峰, 等 . 流媒体系统多数据流安全的动态选择控制模型[J]. 北京航空航天大学学报, 2008, 34(11): 1292-1297.
Xiao Chen, Ma Shilong, Lü Weifeng, et al. Selective control mechanism for multi-datastream security in streaming media system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(11): 1292-1297. (in Chinese)
Citation: Xiao Chen, Ma Shilong, Lü Weifeng, et al. Selective control mechanism for multi-datastream security in streaming media system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(11): 1292-1297. (in Chinese)

流媒体系统多数据流安全的动态选择控制模型

基金项目: 国家973资助项目(G1999032711,2005CB32190);中央办公厅信息安全保密重点实验室基金资助项目(KYKF200702)
详细信息
    作者简介:

    肖 晨(1981-),男,北京人,博士生,xiaochen@nlsde.buaa.edu.cn.

  • 中图分类号: TP 309.2

Selective control mechanism for multi-datastream security in streaming media system

  • 摘要: 部分加密等媒体数据加密算法是保护媒体数据安全的有效方法,但用其加密流媒体系统中的多路媒体数据将使系统面临效率、规模扩展与安全性问题.为此提出基于数据安全权重的多数据流加密的动态最优选择控制模型,根据各数据流的带宽、权重等参数,为不同数据动态选择不同强度的加密方法.由于化简后的数学模型是NP难的0-1背包问题,结合实际系统特点提出基于贪婪启发思想的增量式近似算法.理论分析和实验表明该算法时间复杂度低且具有良好的近似性.最终在一个实用流媒体系统——Admire系统中设计实现了选择控制模型的原型子系统.

     

  • [1] Jin T, Sheng X Z, Lu J. Admire, a prototype of large scale e-collaboration platform //Li M L. Grid and Cooperative Computing, Lecture Notes in Computer Science (LNCS) 3033. Berlin:Springer-Verlag,2003:335-343 [2] Huang T, Yu X N.An adaptive mixing audio gateway in heterogeneous networks for admire system //Li M L. Grid and Cooperative Computing, Lecture Notes in Computer Science (LNCS) 3033. Berlin:Springer-Verlag,2003:294-302 [3] Yin H, Lin C, Qiu F,et al. CASM: A content-aware protocol for secure video multicast[J]. IEEE Trans on Multimedia,2006,8(2):270-277 [4] Liu F W, Koenig H. A novel encryption algorithm for high sesolution video //Proc of NOSSDAV05.New York:ACM Press,2005:69-74 [5] ITU-T H.235(v3). Security and encryption for h-Series (H.323 and other H.245-based) multimedia terminals[S] [6] Maples T, Spanos G. Performance study of a selective encryption scheme for the security of networked, real-time video //4th Int Conf on Computer Comm and Networks. Wash. D C: IEEE Computer Society Press,1995:2-10 [7] Tang L. Methods for encrypting and decrypting MPEG video data efficiently //Proceedings of the 4th ACM International Conference on Multimedia. Boston, MA: ACM Press, 1996:219-230 [8] Servetti A,Martin J C. Perception-based partial encryption of compressed speech [J]. IEEE Trans on Speech and Audio Processing,2002,10:637-643 [9] Cheng H, Li X B.Partial encryption of compressed images and videos[J]. IEEE Trans on Signal Processing,2000,3: 2439 2451 [10] Tosun A S, Feng W C. On error preserving encryption algorithms for wireless video transmission //Proc of the 9th ACM International Conference on Multimedia.New York:ACM Press,2001: 302-308 [11] Lookabaugh T, Sicker D C, Keaton D M, et al. Security analysis of selectively encrypted MPEG-2 streams //Proc of the Multimedia Systems and Applications VI. Bellingham: SPIE Press, 2003:10-21 [12] Qiao T L, Narhstedt K. Comparison of MPEG encryption algorithms[J]. Computer and Graphics,1998,22 (4): 437-448 [13] Robertazzi T G. Computer networks and system: queuing theory and performance evaluation[M]. Berlin: Springer, 2000 [14] Martello S, Toth P. Knapsack problems: algorithms and computer implementations[M]. Chichester: John Wiley & Sons, 1990 [15] Sahni S. Approximate algorithms for the 0-1 knapsack problem [J]. Journal of the Assoc for Computing Machinery, 1975,22(1):115-124
  • 加载中
计量
  • 文章访问数:  3898
  • HTML全文浏览量:  101
  • PDF下载量:  964
  • 被引次数: 0
出版历程
  • 收稿日期:  2007-09-26
  • 网络出版日期:  2008-11-30

目录

    /

    返回文章
    返回
    常见问答