Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/48189
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor謝清佳
dc.contributor.authorHsing-Shao Liuen
dc.contributor.author劉星劭zh_TW
dc.date.accessioned2021-06-15T06:48:26Z-
dc.date.available2012-07-06
dc.date.copyright2011-07-06
dc.date.issued2011
dc.date.submitted2011-05-01
dc.identifier.citation[1]http://tw.people.com.cn/BIG5/14812/14874/9260912.html,2010/05/21
[2]http://www.ctv.com.tw,2010/05/20。
[3]胡志男,IPTV發展前景(下)-從電信固網業者觀點看IPTV 市場發展前景,資策會產業研究報告,2008。
[4]無線寬頻新聞採訪作業平台暨 互動式手持電視播放系統示範性建置計畫,中國電視事業股份有限公司,2006。
[5]http://www.eettaiwan.com/ART_8800551861_622964_NT_acd62456.HTM,2010/05/20。
[6]http://www.mtaiwan.org.tw/cht/our_projects_content.php?id=14,2010/05/20
[7]WiMAX Forum, Available online: http: //www.wimaxforum. org,2010/05/22
[8]http://pdt.acesuppliers.com/news/new_1_15409.html,2010/05/24
[9]http://udn.com/NEWS/STOCK/STO3/4372188.shtml,2010/05/24
[10]http://wimaxshowcase.tca.org.tw/2007/press_center.php,2010/05/25
[11]http://wimaxtaipei.tw/events.php?n=2008,2010/05/25
[12]http://www.alvarion.com,2010/05/25
[13]http://www.alcatel-lucent.com,2010/05/25
[14]http://www.wi-fi.org,2010/05/26
[15]http://www.fact-uk.org.uk/site/media_centre/documents/2006_05_03leksumm.pdf,2010/05/26
[16]http://www.wimaxforum.org,2010/05/27
[17]http://www.beephone.com.tw/shownews.php?id=8048,2010/05/30
[18]http://tw.advertorial.news.yahoo.com/issues/article/tw-features.yahoonews.com.tw/twfeaturesyahoonewscomtw_200911051119,2010/05/30
[19]http://www.teema.org.tw/upload/ciaupload/1_53435.pdf,2010/05/30
[20]Chou, Yun-tasi,”A Seamless City: the Case of Taipei’sWi-Fi Project, ” 16th European Regional Conference, Sep. 2005.
[21]H. Holma and A. Toskala, HSDPA/HSUPA for UMTS: High Speed Radio Access for Mobile Communications, 2006, ISBN 0470018844.
[22]IEEE Computer Society, “IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems”, 24 June, 2004.
[23]IEEE Computer Society, “IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems,” 27 September, 2007.
[24]Senza Fili Consulting (WiMAX Forum), “Fixed, nomadic, portable and mobile applications for 802.16-2004 and 802.16e WiMAX networks,” Nov. 2005.
[25]Westech Communications Inc. (WiMAX Forum), “Can WiMAX Address Your Applications?,” Oct. 24, 2005
[26]WiMAX Forum, “Mobile WiMAX – Part II: A Comparative Analysis,” May, 2006.
[27]WiMAX Forum, “Mobile WiMAX – Part I: A Technical Overview and Performance Evaluation,” Aug., 2006.
[28]H. Liu, C. Wang, R. Chang, and C. Hsieh, 'A cost-effective wimax deployment for high-quality video streaming of live news reporting,' IEEE Mobile WiMAX Symposium 2009, Napa Valley, California, U.S.A. 9-10 July, 2009.
[29]P. Pfeffer, ”IPTV: Technology and Development Predictions,” Fiber & Integrated Optics, Vol. 25, No. 5, pp. 325-346, Sep/Oct2006.
[30]Y. Xiao, X. Du, J. Zhang, F. Hu, & S. Guizani, ”Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet,” Communications Magazine, IEEE, Vol. 45, No. 11, pp. 126-134, November 2007.
[31]P. M. Kimball, “Has technology introduced new ethical problems,” Journal of Business Ethics, Vol.19, pp. 81-90, 1999.
[32]A. S. Tosun & W. C. Feng, 'Lightweight Security Mechanisms for Wireless Video Transmission,' IEEE Int. Conf. on Info. Technol.: Coding and Computing, pp. 157-161, April 2001.
[33]C. S. Ong, K. Nahrstedt, & Wanghong, “Quality of protection for mobile multimedia applications,” IEEE International Conference on Multimedia and Expo (ICME 2003), pp. II137-II140, 2003.
[34]D. K. Mulligan, “Digital rights management and fair use by design,” Communications of the ACM, Vol. 46, No. 4, pp. 31-33, 2003.
[35]B. B. Zhu, “Multimedia Encryption,” in Multimedia Security Technologies for Digital Rights Management, W. Zeng, H. Yu, & C. Y. Lin (eds.), Amsterdam Boston : Academic Press, c2006.
[36]Data Encryption Algorithm (DEA), ANSI X3.92-1981, American National Standards Institute, New York.
[37]J. Daemen and V. Rijmen, 'The Design of Rijndael: AES - The Advanced Encryption Standard,' Springer-Verlag, 2002.
[38]M. J. Wiener, 'Cryptanalysis of short RSA secret exponents,' Information Theory, IEEE Transactions on, Vol. 36, No. 3, pp. 553–558, May 1990.
[39]S. Jindal, A. Jindal and N. Gupta, “Grouping WI-MAX, 3G and WI-FI for Wireless Broadband”, The First IEEE and IFIP International Conference in Central Asia on Internet, Sept. 2005, pp. 26-29.
[40]L. Ma and D. Jia, “The Competition and Cooperation of WiMAX, WLAN and 3G”, Mobile Technology, Applications and Systems, 2005 2nd International Conference, Nov. 2005. pp. 15-17.
[41]F. Behmann, “Impact of Wireless (Wi-Fi, WiMAX) on 3G and Next Generation-An Initial Assessment”, The IEEE International Conference on Electro Information Technology, May 2005.
[42]N. Abramson, 'THE ALOHA SYSTEM: another alternative for computer communications,' AFIPS '70 (Fall), Proceedings of the November 17-19, 1970, fall joint computer conference (ACM), pp. 281–285, 1970.
[43]C. Huang, “An analysis of CDMA 3G wireless communications standards,” The 49th IEEE Vehicular Technology Conference, Vol. 1, pp. 342-345, 16-20 May 1999.
[44]D. Dujovne, T. Turletti, 'Multicast in 802.11 WLANs: An Experimental Study,' ACM MSWIM 2006, Oct. 2006.
[45]Y. Xiao, “IEEE 802.11n: enhancements for higher throughput in wireless LANs,” IEEE Wireless Communications, Vol. 12, No. 6, pp. 82-91, 2005.
[46]D. Gray (WiMAX Forum), “Mobile WiMAX: A Performance and Comparative Summary,” Sep. 2006.
[47]S. Abhijit and C. Sicker Douglas, “Multi Layer Rules Based Framework for Vertical Handoff,” in Proc. IEEE ICBN 2005, Vol. 1, pp. 571–580, Oct. 2005.
[48]M. A. Ahmed, N. M. Ibrahim, and H. H. El-Tamally, “Performance Evaluation of Handoff Queuing Schemes,” Second International Conference on Communication Software and Networks (ICCSN '10), pp. 83-87, 26-28 Feb. 2010.
[49]T. Taleb and K. Letaief, “A Cooperative Diversity Based Handoff Management Scheme,” IEEE Transactions on Wireless Communications, Vol. 9, No. 4, pp. 1462-1471, 2010.
[50]H. Zhu and K. -S. Kwak, “Performance analysis of an adaptive handoff algorithm based on distance information,” Computer Communications, Vol. 30, No. 6, pp. 1278–1288, Mar. 2007.
[51]M. Oliphant, ' The Mobile Phone Meets the Internet,' IEEE Spectrum, pp. 20-28, August 1999.
[52]E. Dahlman, B. Gudmundson, M. Nilsson, and J. Skold, 'UMTS/IMT-2000 Based on Wideband CDMA,' IEEE Communications Magazine, Vol. 36, pp. 70-80, September 1998.
[53]E. Dahlman, P. Beming, J. Knutsson, F. Ovesj¨o, M. Persson, and C. Roobol, “WCDMA—The Radio Interface for Future Mobile Multimedia Communications,” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, Vol. 47, No. 4, Nov. 1998.
[54]H. Holma and J. Reunanen, “3GPP Release 5 HSDPA Measurements,” in Proceedings PIMRC’06, Helsinki, Finland, 11-14 Sep., 2006.
[55]R. Love, A. Ghosh, X. Weimin, and R. Ratasuk, “Performance of 3GPP High Speed Downlink Packet Access (HSDPA),” The 60th IEEE Vehicular Technology Conference (VTC2004-Fall), pp. 3359-3363, Sep. 2004.
[56]M. Khairy and M. El-Saidny, 'Uplink Quality Measurement Reporting Mechanism for HSUPA,' IEEE Communications Magazine, Vol. 46, No. 6, pp. 68-75, June 2008.
[57]M. Steer, “Beyond 3G,” IEEE Microwave Magazine, Vol. 8, No. 1, pp. 76-82, Feb. 2007.
[58]S. Murawwat and K. Ahmed, “Performance Analysis of 3G And WiMAX As Cellular Mobile Technologies,” Second International Conference on Electrical Engineering (ICEE 2008), pp. 1-5, 25-26 March 2008.
[59]A. Yarali, B. Mbula, and A. Tumula, “WiMAX: A Key To Bridging The Digital Divide,” in Proceedings of IEEE SoutheastCon 2007, pp. 159-164, 22-25 March 2007.
[60]E. Dahlman, H. Ekstrom, A. Furuskar, Y. Jading, J. Karlsson, M. Lundevall, and S. Parkvall, “The 3G Long-Term Evolution - Radio Interface Concepts and Performance Evaluation,” The 63rd IEEE Vehicular Technology Conference (VTC 2006-Spring), Vol. 1, pp. 137-141, 7-10 May 2006.
[61]S. Nagaraj, S. Garg, F. Liang, W. Yang, N. Mangalvedhe, J. Haug, and K. Pradap, “Lab Performance Analysis of a 4G LTE Prototype,” IEEE Wireless Communications and Networking Conference (WCNC 2009), pp. 1-6, 5-8 April 2009.
[62]G. Boudreau, J. Panicker, N. Guo, R. Chang, N. Wang, and S. Vrzic, “Interference Coordination And Cancellation For 4G Networks,” IEEE Communications Magazine, Vol. 47, No. 4, pp. 74-81, 2009.
[63]K. Sklower, et al., “The PPP Multilink Protocol (MP) “, RFC 1990, August 1996.
[64]G. Malkin, “Multi-link Multi-node PPP Bundle Discovery Protocol,” RFC 2701, Sept. 1999.
[65]K. Sklower, B. Lloyd, G. McGrego, and D. Carr, “The PPP Multilink Protocol (MP),” RFC 1717, Nov. 1994.
[66]W. Simpson, 'The Point-to-Point Protocol (PPP)', STD 51, RFC 1661, Daydreamer, July 1994.
[67]W. Simpson, “PPP in HDLC-like Framing,” RFC 1662, July 1994.
[68]D. Rand, “PPP Reliable Transmission,” RFC 1663, July 1994.
[69]H. Adiseshu, G. M. Parulkar, and G. Varghese, “A Reliable And Scalable Striping Protocol,” in Proceedings of ACM SIGCOMM, 1996.
[70]J. Duncanson. “Inverse Multiplexing,” IEEE Communications Magazine, Vol. 32, pp. 34-41, 1994.
[71]A. Snoeren, “Adaptive Inverse Multiplexing For Widearea Wireless Networks,” in Proceedings of IEEE Conference on Global Communications, 1999.
[72]J. R. Iyengar, P. D. Amer, and R. Stewart, “Concurrent Multipath Transfer Using SCTP Multihoming Over Independent End-to-End Paths,” IEEE/ACM Transactions on Networking, Vol. 14, No. 5, Oct. 2006.
[73]J. R. Iyengar, “End-To-End Concurrent Multipath Transfer Using Transport Layer Multihoming,” Phd dissertation, CS Dept., University of Delaware, Newark, DE, USA, 2006.
[74]A. Caro, “End-to-End Fault Tolerance Using Transport Layer Multihoming,” Phd dissertation, CIS Dept., University of Delaware, Newark, DE, USA, August 2005.
[75]P. Natarajan, N. Ekiz, E. Yilmaz, P. D. Amer, J. Iyengar, and R. Stewart, “Non-Renegable Selective Acknowledgments for SCTP,” The 16th IEEE International Conference on Network Protocols Program, Orlando, Florida, USA, October 19-22, 2008.
[76]D. S. Phatak and T. Goff, “A Novel Mechanism for Data Streaming Across Multiple IP Links for Improving Throughput and Reliability in Mobile Environments,” in Proceedings of IEEE INFOCOM, New York, NY, June 2002.
[77]M. Zhang, J. Lai, A. Krishnamurthy, L. Peterson, and R. Wang, “A Transport Layer Approach for Improving End-to-End Performance and Robustness Using Redundant Paths,” in Proceedings of the USENIX Annual Technical Conference, pp. 99–112, June 2004.
[78]M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow. TCP selective acknowledgement options. RFC 2018, Oct. 1996.
[79]D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris, “Resilient Overlay Networks,” in Proceedings of ACM SOSP, Oct. 2001.
[80]H.Y. Hsieh and R. Sivakumar, “A Transport Layer Approach for Achieving Aggregate Bandwidths on Multihomed Mobile Hosts,” ACM/Kluwer Mobile Networks and Applications Journal (MONET), Vol. 11, No. 1, Jan. 2005.
[81]H.Y. Hsieh and R. Sivakumar, “A Transport Layer Approach for Achieving Aggregate Bandwidths on Multihomed Mobile Hosts,” in ACM International Conference on Mobile Computing and Networking (MOBICOM), Atlanta, Georgia, Sept. 2002.
[82]H. Y. Hsieh, K. H. Kim, and R. Sivakumar, 'An End-to-End Approach for Transparent Mobility across Heterogeneous Wireless Networks,' ACM/Kluwer Mobile Networks and Applications Journal, Vol. 9, No. 4, pp. 363-378, August 2004.
[83]H. Y. Hsieh, K. H. Kim, Y. Zhu, and R. Sivakumar, “A Receiver-Centric Transport Protocol for Mobile Hosts with Heterogeneous Wireless Interfaces,” ACM/Springer Wireless Networks, Vol. 11, No. 4, pp. 363-382, Jul. 2005.
[84]R. Gupta, M. Chen, S. McCanne, and J. Walrand, “A Receiver-Driven Transport Protocol For The Web,” in Proceedings of INFORMS Telecommunications Conference, Boca Raton, FL, USA, Mar. 2000.
[85]I. Akyildiz, Y. Altunbasak, F. Fekri, and R. Sivakumar, “AdaptNet: An Adaptive Protocol Suite For The Next-Generation Wireless Internet,” IEEE Communications Magazine, Vol. 42, No. 3, pp. 128-136, Mar. 2004.
[86]N. Spring, M. Chesire, M. Berryman,V. Sahasranaman, T. Anderson, and B. Bershad, “Receiver Based Management of Low Bandwidth Access Links,” in Proceedings of IEEE INFOCOM, Tel-Aviv, Israel, Mar. 2000.
[87]P. Mehra, C. De Vleeschouwer, and A. Zakhor, “Receiver-Driven Bandwidth Sharing For TCP,” in Proceedings of IEEE INFOCOM, San Francisco, CA, USA Apr. 2003.
[88]K. Park, Y. Choi, D. Kim, and D. Park, “MTCP: A Transmission Control Protocol for Multi-Provider Environment,” in Proceedings of IEEE Consumer Communications and Networking Conference (CCNC 2006), Vol. 2, pp. 735-739, 8-10 Jan. 2006.
[89]T. Dreibholz, M. Becke, J. Pulinthanath, and E. P. Rathgeb, “Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer,” The 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), 20-23 April 2010.
[90]X. Cui, X. Feng, and C. Wang, “A Simulation-Based Study on Performance Profit of Concurrent Multi-Path Transmission Schemes,” The 1st IEEE International Conference on Information Science and Engineering (ICISE 2009), 26-28 Dec. 2009.
[91]Ł. Budzisz, R. Ferr´us, F. Casadevall, and P. Amer, “On Concurrent Multipath Transfer in SCTP-Based Handover Scenarios,” IEEE International Conference on Communications (ICC '09), 14-18 June 2009.
[92]Ł. Budzisz, R. Ferr´us, and F. Casadevall, “Design Principles and Performance Evaluation of mSCTP-CMT for Transport-Layer Based Handover,” The 69th IEEE Vehicular Technology Conference (VTC-Spring 2009), 26-29 April 2009.
[93]J. Liu and Y. Ma, “Sub-Path Congestion Control in CMT,” The 5th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCom '09), 24-26 Sept. 2009.
[94]I. Aydin and C. Shen, “Performance Evaluation of Concurrent Multipath Transfer Using SCTP Multihoming in Multihop Wireless Networks,” The 8th IEEE International Symposium on Network Computing and Applications, 9-11 July 2009.
[95]X. Zhang, T. Nguyen, and G. Pujolle, “A Cross-layer Approach To Optimize The Performance Of Concurrent Multipath Transfer in Wireless Transmission,” The 2nd IFIP Wireless Days (WD), 15-17 Dec. 2009.
[96]R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson, “Stream Control Transmission Protocol,” RFC2960, Oct. 2000.
[97]R. Stewart, “ Stream Control Transmission Protocol”, RFC 4960, September 2007.
[98]A. Jungmaier, E. P. Rathgeb, M. Schopp, and M. Tuxen, 'SCTP-A Multi-link End-to-End Protocol for IP-based Networks,' International Journal of Electronics and Communications, Vol. 55, No. 1, 2001, pp. 46-54.
[99]T. Hacker and B. Athey, “The End-to-End Performance Effects of Parallel TCP Sockets on a Lossy Wide-Area Network,” in Proceedings of International Parallel and Distributed Processing Symposium (IPDPS 2002), Ft. Lauderdale, FL, Apr. 2002.
[100]H. Sivakumar, S. Bailey, and R. Grossman, “PSockets: The Case For Application-Level Network Striping For Data Inttensive Applications Using High Speed Wide Area Networks,” in Proceedings of IEEE Supercomputing (SC 2000), Dallas, TX, Nov. 2000.
[101]J. Lee, D. Gunter, B. Tierney, B. Allcock, J. Bester, J. Bresnahan, and S. Tuecke, “Applied Techniques for High Bandwidth Data Transfers Across Wide Area Networks,” in Proceedings of Computers in High Energy Physics (CHEP 2001), Sept. 2001.
[102]H. Y. Hsieh and R. Sivakumar, 'pTCP: An End-to-End Transport Layer Protocol for Striped Connections,' IEEE International Conference on Network Protocols (ICNP 2002), Paris, France, November 2002.
[103]D. Wu, Y. T. Hou, W. Zhu, H. J. Lee, T. Chiang, Y. Q. Zhang, & H. J. Chao, 'On end-to-end architecture for transporting MPEG-4 video over the Internet,' IEEE Trans. Circuits Syst. Video Technol., Vol. 10, pp. 923-941, Sept. 2000.
[104]D. Wu, Y. T. Hou, Y. Q. Zhang, “Transporting Real-time Video over the Internet: Challenges and Approaches,“ Proceedings of the IEEE, Vol. 88, No. 12, Dec. 2000.
[105]S. Cox, User Datagram Protocol With Congestion Control, Unpublished master’s thesis, University of Brigham Young, Provo, UT, 2006.
[106]E. Kohler, M. Handley, & S. Floyd, “Designing DCCP: Congestion control without reliability,” Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, Pisa, Italy, September 11-15, 2006.
[107]D. Wu, Y. T. Hou, W. Zhu, Y. Q. Zhang, & J. M. Peha, “Streaming video over the Internet: Approaches and directions,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11, No. 3, March 2001.
[108]C. H. Wang, J. M. Ho, R. I. Chang, & S. C. Hsu. “A control-theoretic rate-based control of buffer-occupancy feedback for real-time multimedia communications,” Multimedia, Internet, Video Technologies 2001 (MIV 2001) of WSES/IEEE International Multi-conference, Sept. 2001.
[109]Y. S. Sun, F. M. Tsou, M. C. Chen, 'A Buffer Occupancy-Based Adaptive Flow Control and Recovery Scheme for Real-time Stored MPEG Video Transport over Internet,” IEICE Trans. Commun., Vol. E81-B, No. 11, Nov. 1998.
[110]J. C. Bolot & T. Turletti, “Experience with control mechanisms for packet video in the internet,” ACM SIGCOMM Computer Communication Review, Vol. 28, No. 1, pp. 4-15, Jan. 1998.
[111]C. H. Wang, R. I. Chang, J. M. Ho, & S. C. Hsu, 'Rate-sensitive arq for real-time video streaming', IEEE Global Telecommunications Conference, 2003.
[112]J. C. Bolot, & T. Turletti, ”Experience with control mechanisms for packet video in the Intemet,” ACM Computer Communication Review, Vol. 28, No.1, pp. 4-15, 1998.
[113]D. LeGall, “MPEG: A Video Compression Standard for Multimedia Applications,” Communications of ACM, Vol. 34, No. 4, pp. 46-58, Apr. 1991.
[114]G. A. Spanos & T. B. Maples, 'Security for real-time MPEG compressed video in distributed multimedia applications,' Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications, pp. 72-78, 1996.
[115]S. Aramvith and M. Sun, 'Mpeg-1 and mpeg-2 video standards,' in A. Bovik (ed.), Handbook of Image and Video Processing, Academic Press, pp. 597-610, 2000.
[116]B. Bhargava, C. Shi, S. Y. Wang, “MPEG Video Encryption Algorithms,” Multimedia Tools and Applications, Vol. 24, No. 1, pp.57-79, Sept. 2004.
[117]Y. Wang, J. Ostermann, & Y. Q. Zhang, Video Processing and Communications. Upper Saddle River, NJ: Prentice-Hall, 2002.
[118]G. A. Spanos & T. B. Maples, 'Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video,' Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), pp. 2-10, 1995.
[119]J. Meyer & F. Gadegast, 'Security mechanisms for multimedia-data with the example MPEG-1-video,' Project Description of SECMPEG, Tech. Univ. of Berlin, Germany, May 1995.
[120]A. Alattar, G. Al-Regib, & S. Al-Semari, 'Improved selective encryption techniques for secure transmission of MPEG video bit-streams,' Proceedings of the IEEE International Conference on Image Processing, Japan, Nov. 1999.
[121]T. Lookabaugh, D. C. Sicker, D. M. Keaton, W. Y. Guo, & I. Vedula, 'Security analysis of selectively encrypted mpeg-2 streams,' Proceedings of the SPIE, Vol. 5241, pp. 10-21, Nov. 2003.
[122]C. Griwodz, O. Merkel, J. Dittmann, R. Steinmetz, G. Griwodz, & O. Merkel, “Protecting vod the easier way,” Multimedia'98 - Sixth ACM International Multimedia Conference, pp. 21-28, 12-16 September. 1998.
[123]L. Qiao & K. Nahrstedt, “A New Algorithm for MPEG Video Encryption,” Proceedings of the 1st International Conference on Imaging Science, Systems, and Technology, pp. 21-29, 1997.
[124]I. Agi & L. Gong, “An empirical study of secure MPEG video transmissions,” Proceedings of the Internet Society Symposium on Network and Distributed System Security, San Diego, CA, pp. 137–144, Feb 1996.
[125]L. Tang, 'Methods for encrypting and decrypting MPEG video data efficiently,' Proceedings of the 4th ACM international conference on Multimedia, pp. 219-230, Nov. 1996.
[126]W. Zeng & S. Lei, 'Efficient Frequency Domain Video Scrambling for Content Access Control,' Proceedings of ACM Multimedia, Orlando, FL, pp. 285-294, Oct. 1999.
[127]W. Zeng & S. Lei, “Efficient Frequency Domain Selective Scrambling of Digital Video,” IEEE Transactions on Multimedia, Vol. 5, No. 1, pp. 118-129, 2002.
[128]L. Qiao & K. Nahrstedt, 'Comparison of MPEG encryption algorithms,' Computers & Graphics, Vol. 22, No. 4, pp. 437-448, 1998.
[129]C. Shi, & B. Bhargava, 'An efficient MPEG video encryption algorithm,' Proc. Symp. Reliable Distributed Systems, pp. 381–386, Oct. 1998.
[130]C. Shi, & B. Bhargava, “A fast MPEG video encryption algorithm,” Proceedings of ACM Multimedia Conference, pp. 81-88, 1998.
[131]C. Shi, S. Wang, & B. Bhargava, “MPEG Video Encryption in Real-Time Using Secret Key Cryptography,” Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA’99), Las Vegas, Nevada, USA, 1999.
[132]M. Yang, N. Bourbakis, & S. Li, “Data-Image-Video Encryption,” IEEE Potentials, Vol. 23, No. 3, pp. 28-34, August-September 2004.
[133]T. Seidel, D. Socek, & M. Sramka, 'Cryptanalysis of video encryption algorithms,' Proceedings of the 3rd Central European Conference on Cryptology (TATRACRYPT 2003), Bratislava, Slovak Republic, 2003.
[134]C. P. Wu & C. J. Kuo, “Fast encryption methods for audiovisual data confidentiality,” Proceedings of SPIE International Symposia on Information Technologies, Vol. 4209, pp. 284-295, Nov. 2000.
[135]http://www.cse.fau.edu/~hari/courses/2004/VidCom/Daniel_Socek_Project_report.pdf
[136]B. B. Zhu, C. Yuan, Y. Wang, & S. Li, “Scalable Protection for MPEG-4 Fine Granularity Scalability,” IEEE Trans. on Multimedia, Vol. 7, No. 2, pp. 222-233, April 2005.
[137]A. S. Tosun and W. C. Feng, “Efficient multi-layer coding and encryption of MPEG video streams,” IEEE Int. Conf. Multimedia and Expo, Vol. 1, pp. 119 – 122, July 30 – Aug 2, 2000.
[138]J. Wen, M. Severa, W. Zheng, M. Luttrell, & W. Jin, 'A Format-Compliant Configurable Encryption Framework for Access Control of Multimedia,' Proc. IEEE Workshop on Multimedia Signal Proc., pp. 435-440, Oct. 2001.
[139]J. Wen, M. Severa, W. Zeng, M. H. Luttrell, & W. Jin, “A format-compliant configurable encryption framework for access control of video,” IEEE Trans. Circuits Syst. Video Techn., Vol. 12, No. 6, pp. 545-557, 2002.
[140]W. Zeng, “Format-compliant content protection,” in W. Zeng, H. Yu, & C. Y. Lin (eds.), Multimedia Security Technologies for Digital Rights Management, Elsevier, pp. 221-240, 2006.
[141]B. Furht & D. Socek, “A survey of multimedia security,” Comprehensive Report on Information Security, IEC 2004.
[142]Z. Liu, D. Peng, Y. Zheng, & J. Liu, 'Communication Protection in IP-based Video Surveillance Systems,' Seventh IEEE International Symposium on Multimedia (ISM'05), pp. 69-78, 2005.
[143]M. Kankanhalli, & T. Guan, 'Compressed-domain scrambler/descrambler for digital video,' IEEE Transactions on Consumer Electronics, Vol. 48, No. 2, pp. 356-365, May 2002.
[144]E. Biham & A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, New York: Springer-Verlag, 1993.
[145]M. Matsui, “Linear cryptanalysis method for DES cipher,” Proceedings, EUROCRYPT’93, New York: Springer-Verlag, 1993.
[146]I. Wegenerm, The Complexity of Boolean Functions, New York: Wiley, 1987.
[147]N. T. Courtois & G. V. Bard, 'Algebraic cryptanalysis of the data encryption standard,' LNCS, Vol. 4887, pp. 152-169, 2007.
[148]C. H. Yang, 'Performance Evaluation of AES/DES/Camellia On the 6805 and H8/300 CPUs,' Proc. 2001 Symposium on Cryptography and Information Security (SCIS2001), Oiso, Japan, pp. 727-730, January 2001.
[149]S. A. Aly & E. Al-Shaer, “A light-weight encrypting for real time video transmission,” CTI Symposium Conference, DePaul University, Chicago, USA, November 2003.
[150]http://www.cryptopp.com/benchmarks.html,2010/06/10
[151]Y. Zou, T. Huang, W. Gao, & L. Huo,'H.264 video encryption scheme adaptive to DRM,' IEEE Transactions on Consumer Electronics, Vol.52, pp.1289-1297, 2006.
[152]S. Aly, “A light-weight encrypting for real time video transmission,” technical report, http://facweb.cs.depaul.edu/research/TechReports/TR04-002.pdf, August 2004.
[153]S. Mao, D. Bushmitch, S. Narayanan, and S. S. Panwar, “MRTP: A Multi-Flow Realtime Transport Protocol for Ad Hoc Networks,” IEEE Transactions on Multimedia, Vol. 8, No. 2, pp. 356-369, April 2006.
[154]D. Bushmitch, “Thinning, Striping and Shuffling: Traffic Shaping and Transport Techniques for VBR Video,” Ph.D. dissertation, Polytechnic Univ., Brooklyn, NY, Jan. 2004.
[155]http://www.freebsd.org/,2010/06/11
[156]H. Cheng & X. Li, “Partial Encryption of Compressed Images and Videos,” IEEE Transactions on Signal Processing, Vol. 48, No. 8, pp. 2439-2451, 2000.
[157]M. Wiener, “Efficient DES key search,” Advances in Cryptology — Proc. Crypto '93, LNCS, Vol. 773, 1994.
[158]D. A. Hayes, J. But, and G. Armitage, “Issues With Network Address Translation For SCTP,” ACM SIGCOMM Computer Communication Review, Vol. 39, No. 1, Jan 2009, pp.23-33.
[159]Y. Huang, S. Mao, and S. F. Midkiff, “A Control-Theoretic Approach to Rate Control for Streaming Videos,” IEEE Transactions On Multimedia, Vol. 11, No. 6, pp. 1072-1081, Oct. 2009.
[160]Z. Liu, D. Peng, Y. Zheng, & Jeffrey Liu, “Communication Protection in IP-based Video Surveillance Systems,” Proceeding of the Seventh IEEE International Symposium on Multimedia (ISM 2005), pp. 69-78, 2005.
[161]W. Diffie & M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, Nov. 1976.
[162]C. Tsao and R. Sivakumar, “On effectively exploiting multiple wireless interfaces in mobile hosts,” CoNEXT’09, Rome, Italy, December 1–4, 2009.
[163]C. Ke, C. Shieh, W. Hwang, A. Ziviani, “An Evaluation Framework for More Realistic Simulations of MPEG Video Transmission,” Journal of Information Science and Engineering, Vol. 24 No. 2, March 2008, pp. 425-440.
[164]http://www.videolan.org., VideoLAN-VLC media player, 2010/06/23
[165]http://www.linuxfoundation.org/en/Net:Netem, Netem,2010/06/23
[166]http://www.wireshark.org/download.html, Wireshark,2010/0623
[167]MSU Video Quality Measurement Tool. Available from: http://compression.ru/video/quality_measure/vqmt_download_en.html#start
[168]http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/configtuning-virtual-hosts.html
[169]CMT NS2 Module developed by Protocol Engineering Laboratory in Delware University. Available from: http://pel.cis.udel.edu
[170]Diffie-Hellman Key Exchange Program developed by Lee Griffiths. Available from: http://www.codeproject.com/KB/security/DiffieHellmanExample.aspx
[171]Rijndael AES program designed by Joan Daemen and Vincent Rijmen. Available from: http://www.codeproject.com/KB/security/aes.aspx?fid=2630&fr=76#xx0xx
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/48189-
dc.description.abstract面對行動電視、網路電視等新興服務所帶來龐大之競爭壓力,傳統新聞電視媒體被迫重整新聞採訪、編輯、播出(簡稱新聞採編播)等流程,以提供更低成本、更高效率之服務模式。本研究依新聞電視台透過新一代無線傳輸技術WiMAX,來提升新聞採編播效能之努力,提出兩項研究議題來促進此發展。
第一項研究議題,乃奠基於電視媒體「即時回傳新聞採訪影音內容」之需求,傳統以高成本之衛星傳輸技術來完成,現今則可考慮採用低成本之WiMAX傳輸技術。然而,已知單一座WiMAX基地台僅約能提供2∼3Mbps上鏈傳輸頻寬。在影音內容維持至少standard definition (SD)畫質的要求下,現有MPEG4壓縮技術仍需2.5Mbps以上之data rate,此使其難於保證(gurantee)即時新聞採訪影音內容之傳輸服務;另一方面,由於傳輸一路SD畫質之影音內容,已幾乎消耗所有WiMAX上鏈頻寬資源,而限制其它行動應用服務使用該傳輸資源的機會,此亦將難以符合WiMAX營運商(WiMAX operator)之商業考量。據此,本研究提出多重鏈路傳輸的方法,藉由結合多個無線基地台之傳輸資源,分擔傳輸SD影音內容之負荷,並能達到網路備援(backup)的效用,以進一步保障傳輸服務品質。經分析比較後,本研究採用建置於FreeBSD 7.1版之stream control transmission protocol (SCTP)模組(其已內建多重鏈路傳輸功能──Concurrent Multipath Transfer (CMT)),並在此平台上實作多重鏈路傳輸系統,然後驗證其合併鏈路頻寬資源的效能。在經過多項實驗測試後,本研究發現諸多有利於高畫質即時影音傳輸之系統參數,同時辨識出CMT在合併鏈路頻寬資源上的問題。依所發現的問題,本研究提出改良CMT的方法──VC-CMT,以改善合併鏈路後之傳輸效能。經NS2.31 (Network Simulator with Version 2.31)模擬驗證後,證實VC-CMT能有效改善CMT傳輸效能。
第二項研究議題,乃基於電視媒體提供行動影音播出服務(包括Internet視訊服務)之需求,針對影音內容傳輸之安全性,提出解決方案。由於行動影音服務多提供於公眾無線網路傳輸環境,而在無線網路環境下存在資料容易被竊取的風險,造成內容供應業者之營運損失。然而,過去即時影音內容傳輸加密方法,通常為了滿足即時傳輸的需求而降低安全等級,使得影音內容仍存在易被竊取的問題。另一方面,由於行動終端設備之性能愈益提升,而能承載更豐富之行動影音內容。然而,豐富之行動影音內容不但需要消耗較多之傳輸頻寬,同時,也增加即時影音內容保護的困難。此外,由於現今行動終端設備的種類繁多、性能差異大,目前既有之加密機制,是否能適用於各種類型之終端設備,還有待進一步驗證。而針對不同之行動終端設備,採用不同之加密技術來保護影音內容,對於Internet視訊服務業者來說,將會增加營運上的困難。因此,本研究提出具one-time pad特性之即時影音傳輸加密機制──SVOD (Secure Video on Demand),其可適用於不同影音內容類型、不同終端用戶設備、以及適應於網路傳輸狀態的變化,並能在影音內容「即時性」與「安全性」之間取得平衡,以有效確保行動影音服務的品質。此機制藉由定期取得終端用戶播放緩衝區之使用狀況,來動態決定加密複雜度,進而調節影音內容之發送速度(sending rate)。本研究實作系統來驗證SVOD之效能,實驗結果亦顯示所實作的SVOD系統,能確實達到前述特性,而同時兼顧行動影音服務之QoS (quality of service)與QoP (quality of protection)。
zh_TW
dc.description.abstractFacing the intense competition resulted from the emerging multimedia services such as mobile TV and Internet TV, tranditional news TV stations are forced to rebuild the processes of news coverage, editing, and broadcasting to deliver their TV services more efficiently but in a low-cost manner. According to the context of traditional news TV media and the endeavor which news TV stations have made to use novel wireless communication technology WiMAX to facilitate above processes, we propose two research issues to assist such development.
The first issue is based on the requirement of live news transmission for TV stations. Traditionally, it is done by satellite network which is greatly expensive. Currently, it is possible to be completed by using cost-effective transmission technology WiMAX. However, to maintain the standard-definition (SD) quality, the video of live news content will normally have data rate of 2.5Mbps encoded by modern compression technique MPEG4. Given that one WiMAX base station usually has uplink bandwidth of 2 to 3Mbps, it is difficult for WiMAX to guarantee the service quality for delivering live news video program. Besides, transmiting one SD program almost exhausts the uplink bandwidth of one WiMAX base station and thus prevents other mobile applications from using this base station. It is also difficult for WiMAX operators to dedicate one WiMAX base station only to single service. Therefore, we propose the multi-link transmission approach, which aggregates bandwidth resources from multiple wireless base stations to share the load of transmitting one SD program and have the benefit of link backup for network dynamics. After surveying and literature review, we use concurrent multipath transfer (CMT) which has been embedded into the module of stream control transmission protocol (SCTP) in FreeBSD 7.1. We futher build up and fine-tune CMT system to fulfill the bandwidth aggregation and conduct experiments for evaluating this system’s performance. After several experiments, we have identified several critical parameters which can enable CMT system more suitable for real-time transmission applications. Meanwhile, we also recognize the problem of throughput degradation in CMT. Thus, we further propose a novel approach called VC-CMT (VC stands for virtual connection) to improve the throughput gains obtained from aggregated links in CMT. By using NS-2.31 (Network Simulator with Version 2.31), we can investigate VC-CMT performance. The result shows VC-CMT can more effectively aggregate the link’s bandwidth than CMT.
The second research issue is based on the requirement of delivering mobile video service and Internet video service in TV stations. We propose a solution to protect the video services from eavesdropping. Given that mobile video servces are always rendered in a pulic wireless network environment, the risk of content leakage and eavesdropping is raised and thus the content providers’ interests are easy to be infringed. However, tradidtional encryption approaches often sacrifice the security level to attain the demand of real-time transmission. Thus, the risk of content leakage and eavesdropping still exists. Besides, given that the capability of mobile devices used by clients is enhanced very soon and can play out with richer video content, to transmit richer video content will not only consumes more network bandwidth but also increase the protection difficulty. Furhtermore, due to the diversity of mobile TV devices nowadays, the performance difference between them is large. It requires further examination for current encryption approaches to realize if they can be applied for various kinds of mobile TV devices. To maintain multiple encryption approaches to protect video content due to the diversity of mobile TV devices will be a difficult task for Internet TV service providers. Therefore, we propose an encryption mechanism called SVOD (Secure Video on Demand) with one-time pad feature, which can not only be applied in different types of video content and mobile devices, but also adapt to the network dynamics. It can also leverage the requirements between real-time transmission and content security levels to effectively guarantee the service quality of mobile video applications. SVOD uses the information of playback buffer occupancy (PBO) which is fed back by client periodically to determine the encryption complexity to intervene the video server’s sending rates. We implement SVOD system and investigate its performance. The experiments show that this SVOD system can achieve the advantages mentioned above and can leverage the quality of service (QoS) and quality of protection (QoP) for mobile video services.
en
dc.description.provenanceMade available in DSpace on 2021-06-15T06:48:26Z (GMT). No. of bitstreams: 1
ntu-100-D92725008-1.pdf: 4350518 bytes, checksum: 0540b38760a55a771b235176dbd2a6c0 (MD5)
Previous issue date: 2011
en
dc.description.tableofcontents中文摘要 II
ABSTRACT IV
第一章 緒論 1
第一節 研究背景 1
第二節 研究問題 6
第二章 無線網路技術與多重鏈結傳輸技術相關探討 9
第一節 代表性無線網路技術探討 9
一、 WiFi技術 10
二、 WiMAX技術 11
三、 3G (CDMA) / 3.5G (HSDPA) /3.75G (HSUPA) 13
第二節 多重鏈路傳輸技術相關研究探討 16
一、 資料鏈結層之多重鏈結傳輸研究 17
二、 網路層之多重鏈結傳輸研究 18
三、 傳輸層之多重鏈結傳輸研究 19
四、 應用層之多重鏈結傳輸研究 26
第三節 CMT傳輸層技術架構探討 31
第三章 即時影音傳輸加密技術相關研究探討 36
第一節 公眾網路(INTERNET)傳輸問題與防護機制 38
一、 擁塞控制 38
二、 錯誤控制 39
第二節 流暢的即時影音服務 41
第三節 MPEG影音壓縮格式 44
第四節 INTERNET即時影音傳輸加密機制:選擇性加密法 50
一、 加密「標頭」資訊、I畫面與I大區塊 50
二、 改變DCT係數的排列 53
三、 加密DCT係數與動態向量 55
四、 加密base layer與enhancement layer 56
五、 Syntax-compliant加密機制 59
第五節 INTERNET即時影音傳輸加密機制:傳統資料加密法 69
一、 DES與3DES 69
二、 AES (Rijndael) 71
第六節 研究與討論 74
第四章 高畫質即時影音多重鏈路傳輸系統設計與實驗 77
第一節 基於FREEBSD平台建置I-SNG應用系統:系統實作與重要系統參數 77
第二節 驗證I-SNG系統基本效能:實驗設計與實驗結果 83
一、 i-SNG單一連線效能表現 86
二、 CMT兩條連線效能表現 88
三、 CMT三條連線模擬實務環境效能表現 94
四、 CMT鏈路中斷與恢復實驗 96
第三節 I-SNG系統效能問題分析 100
第四節 I-SNG效能改善方案與實驗測試:VC-CMT 107
第五節 I-SNG研究意涵與討論 115
第五章 INTERNET即時影音傳輸加密機制設計與實驗 118
第一節 SECURE VOD系統設計 118
第二節 SVOD之BFSC加密機制 124
第三節 SVOD系統建置與實驗設計 131
第四節 SVOD系統實驗結果 137
一、 SVOD之PBO控制力、加密等級與PSNR 137
二、 SVOD與VOD效能比較 145
三、 傳送速率與平衡QoS與QoP之效能 153
第五節 SVOD研究意涵與討論 155
第六章 研究貢獻與未來研究方向 159
第一節 研究貢獻 159
一、 i-SNG高畫質即時多重鏈路影音傳輸系統 159
二、 SVOD高畫質即時影音傳輸加密機制 160
第二節 未來研究方向 162
一、 i-SNG高畫質即時多重鏈路影音傳輸系統 162
二、 SVOD高畫質即時影音傳輸加密機制 163
參考文獻 164
dc.language.isozh-TW
dc.subject防護品質 (QoP)zh_TW
dc.subject即時新聞轉播zh_TW
dc.subject合併頻寬zh_TW
dc.subject多重鏈路傳輸(CMT)zh_TW
dc.subjectStream Control Transmission Protocol (SCTP)zh_TW
dc.subject安全之隨選視訊 (SVOD)zh_TW
dc.subject播放緩衝區佔用狀況 (PBO)zh_TW
dc.subject服務品質 (QoS)zh_TW
dc.subjectStream Control Transmission Protocol (SCTP)en
dc.subjectPlayback Buffer Occupancy (PBO)en
dc.subjectSecure Video on Demand (SVOD)en
dc.subjectLive News Broadcastingen
dc.subjectBandwidth Aggregationen
dc.subjectConcurrent Multipath Transfer (CMT)en
dc.subjectQuality of Protection (QoP)en
dc.subjectQuality of Service (QoS)en
dc.title無線網路即時新聞視訊回傳及其加密防護機制之研究zh_TW
dc.titleA Study of Real-time Transmission and Content Protection for TV News Gathering via Wireless Internet Networksen
dc.typeThesis
dc.date.schoolyear99-2
dc.description.degree博士
dc.contributor.coadvisor王家輝,張瑞益
dc.contributor.oralexamcommittee林永松,陳彥良
dc.subject.keyword即時新聞轉播,合併頻寬,多重鏈路傳輸(CMT),Stream Control Transmission Protocol (SCTP),安全之隨選視訊 (SVOD),播放緩衝區佔用狀況 (PBO),服務品質 (QoS),防護品質 (QoP),zh_TW
dc.subject.keywordLive News Broadcasting,Bandwidth Aggregation,Concurrent Multipath Transfer (CMT),Stream Control Transmission Protocol (SCTP),Secure Video on Demand (SVOD),Playback Buffer Occupancy (PBO),Quality of Service (QoS),Quality of Protection (QoP),en
dc.relation.page175
dc.rights.note有償授權
dc.date.accepted2011-05-04
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-100-1.pdf
  未授權公開取用
4.25 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved