跳到主要內容

臺灣博碩士論文加值系統

(34.204.169.230) 您好!臺灣時間:2024/02/28 08:52
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:黃立品
研究生(外文):Lipin Benson Huang
論文名稱:安全且具語音功能的網站系統之研究與實現
論文名稱(外文):A Research and Implementation of Secure and Voice-enabled Web System
指導教授:張樹之張樹之引用關係
指導教授(外文):Dr.Shuchih Ernest Chang
學位類別:碩士
校院名稱:國立中興大學
系所名稱:電子商務研究所
學門:商業及管理學門
學類:一般商業學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:英文
論文頁數:56
中文關鍵詞:語音加密互動式語音回覆系統
外文關鍵詞:Speech EncryptionVoiceXMLIVRXSLTSecurity of Information
相關次數:
  • 被引用被引用:0
  • 點閱點閱:143
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來由於網際網路的發展,改變了人們生活上許多的型態。各種網路的服務應運而生,且隨著無線網路的日益成熟,網路使用者可以在不受網路線的拘束下上網。然而大部分的人使用行動電話的機會比網際網路多,許多企業開始用各種方式(如:CT Link)將電腦的運算能力整合到電話系統中,但是由於不同的伺服器(Server)間溝通不易,整合困難。隨著語音辨識技術與相關語言科技的進步成熟,VoiceXML在此有利的環境下由AT&T, IBM, Lucent, and Motorola所訂立,如此網際網路所提供的資訊服務,不再只能透過視覺及手指動作與其互動,透過電話用聽覺與口述的方式也能完成各項交易與服務,這對於無法使用電腦的用戶將是一項創舉。
本論文目的在利用XSL(XML style sheet)將XML(Extensible Markup Language)格式轉為HTML格式或VoiceXML以適合不同使用者(使用一般瀏覽器或電話)的需求,並利用java與XML跨平台、可擴充、可再用的共通特性,以建立一個整合企業應用服務的環境。此外並對聲音的加密傳輸做進一步的探討以改善安全的問題。

In recent years, Internet has dramatically changed life styles of the public, and by using the power of the Web, various kinds of services can widely be provided. And currently, users receive Web services from an access device that offers visual presentation capabilities. As wireless LAN becomes popular today, 'anytime anywhere' connectivity is becoming a reality. However, most people still prefer telephone compared to Internet. From the business viewpoint, the current trend is dominating by providing common services available in both web-base application and telephony service interface. In order to reduce the cost of construction and delivery of new capabilities to telephone customers, voice access provided for voice-enabled web applications is an attractive option. VoiceXML makes it possible for companies to make shared business logic at one time and focus their resources on developing only the specific user interface for each device they support.
The purpose of this paper is to design a secure Interactive Voice system based on Apache web server and implemented with the Java servlets engine as the application server. Multimodal user-interface page can be generated by using XSLT stylesheet which transforms the XML documents to appropriate target documents such as HTML pages, WML decks, and VoiceXML documents.

摘要 I
Abstract II
Index III
List of Figures V
List of Tables…………………………………………………………VII
CHAPTER 1INTRODUCTION…………………………………………………1
1.1 Background …………………………………………………………1
1.2 Description of the Voice Enable Web System ………………2
1.2.1 Evolution of VoiceXML…………………………………………3
1.2.2 The advantages of VoiceXML …………………………………4
1.2.3 How it works? …………………………………………………4
1.3 Motivations ………………………………………………………5
1.3.1 Security Concern ………………………………………………5
1.4 Overview of voice-enabled system… …………………………6
CHAPTER 2 LITERATURE REVIEW…………………………………………9
2.1 Multimodal Integration of Voice and Visual Interface for Pervasive Computing……………………………………………………9
2.2 Internet Telephony ………………………………………………9
2.3 Survey of Secure Voice Systems………………………………12
2.4 Security Issues on Internet telephony application system……………………………………………………………………15
2.4.1 Data Encryption Standard Algorithm (DES)………………15
2.4.2 Advanced Encryption Standard (AES)………………………16
2.4.3 IDEA ……………………………………………………………17
2.4.4 Blowfish…………………………………………………………18
2.4.5 Hash Functions…………………………………………………18
CHAPTER 3 THE PROPOSED SECURE VOICE COMMUNICATION SYSTEM20
3.1 Description of the Proposed Research and Its Content…20
3.1.1 IBM WebSphere Voice Server 2.0……………………………20
3.1.2 Intel Dialogic environment…………………………………21
3.1.3 Cisco Environment ……………………………………………21
3.2 Detail Design Procedure ………………………………………22
3.3 The Role of XSL …………………………………………………24
CHAPTER 4 IMPLEMENTATION……………………………………………26
4.1 The Voice Application Design…………………………………26
4.2 The Hardware Architecture ……………………………………29
4.3 Analysis of quality and security……………………………29
4.3.1 Quality of voice packets……………………………………29
4.3.2 Compression options …………………………………………33
4.3.3 The Encryption modes…………………………………………35
4.3.4 Hash Algorithms/functions …………………………………35
CHAPTER 5 RESULT AND CONCLUSION …………………………………38

[1] B. S. J, "Natural Spoken Dialogue Systems for Telephony," Communication of the ACM, vol. 43(9), September 2000.
[2] L. Jennifer, "Conversational Interfaces-Introduction Communication of the ACM," vol. 43(9), September 2000.
[3] J. D. Hartman and J. A. Vila, "VoiceXML builder: a workbench for investigating voiced-based applications," presented at Frontiers in Education Conference, 2001. 31st Annual, 2001.
[4] R. Dettmer, "It's good to talk [speech technology for on-line services access]," IEE Review, vol. 49, pp. 30-33, 2003.
[5] J. A. Larson, "VoiceXML 2.0 and the W3C speech interface framework," presented at Automatic Speech Recognition and Understanding, 2001. ASRU '01. IEEE Workshop on, 2001.
[6] J. A. Larson, "VoiceXML and the W3C speech interface framework," Multimedia, IEEE, vol. 10, pp. 91-93, 2003.
[7] J. Chugh and V. Jagannathan, "Voice-enabling enterprise applications," presented at Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on, 2002.
[8] T. B. o. V. i. t. Enterprise, www.heyanita.com.
[9] J. T. David M. Hilbert and B. Schilit, "Supporting ubiquitous information on very small devices is harder than you think."
[10] M. D. Collier, "Current threats to and technical solutions for voice security," presented at Aerospace Conference Proceedings, 2002. IEEE, 2002.
[11] A. Rodriguez, W.-K. Ho, G. Kempny, M. Pedreschi, and N. Richards, IBM WebSphere Voice Server 2.0 Implementation Guide, 2002 05.
[12] Z. Trabelsi, S.-H. Cha, D. Desai, and C. Tappert, "Multimodal integration of voice and ink for pervasive computing," presented at Multimedia Software Engineering, 2002. Proceedings. Fourth International Symposium on, 2002.
[13] "Understanding Voice over IP Protocols," Cisco Systems Service Provider Solutions Engineering, 2002.
[14] J.-I. Guo, J.-C. Yen, and H.-F. Pai, "New voice over Internet protocol technique with hierarchical data security protection," Vision, Image and Signal Processing, IEE Proceedings-, vol. 149, pp. 237-243, 2002.
[15] S.-Y. Tang, Y.-P. Lu, and D. H. C. Du, "Performance study of software-based iSCSI security," presented at Security in Storage Workshop, 2002. Proceedings. First International IEEE, 2002.
[16] G. Troullinos, "A software based approach to secure voice applications," presented at Electronics, Circuits, and Systems, 1996. ICECS '96., Proceedings of the Third IEEE International Conference on, 1996.
[17] M. Orceyre and R. Heller, "An approach to secure voice communication based on the data encryption standard," Communications Magazine, IEEE, vol. 16, pp. 41-50, 1978.
[18] R. Barbieri, D. Bruschi, and E. Rosti, "Voice over IPsec: analysis and solutions," presented at Computer Security Applications Conference, 2002. Proceedings. 18th Annual, 2002.
[19] M. S. McBeth, R. Cole, Jr., and R. B. Adamson, "Architecture for secure network voice," presented at Military Communications Conference Proceedings, 1999. MILCOM 1999. IEEE, 1999.
[20] R. Ramaswamv, "Design of a secure packet voice communication system in wide area networks," presented at Security Technology, 1990. Crime Countermeasures, Proceedings. IEEE 1990 International Carnahan Conference on, 1990.
[21] J. R. M. J. Calpe, J. F. Guerrero and J. V. Frances, "Toll-Quality Digital Secraphone," MELECON'96, vol. 3, pp. 1714-1717, 1996.
[22] L. Diez-Del-Rio, S. Moreno-Perez, R. Sarmiento, J. Parera, M. Veiga-Perez, and R. Garcia-Gomez, "Secure speech and data communication over the public switching telephone network," presented at Acoustics, Speech, and Signal Processing, 1994. ICASSP-94., 1994 IEEE International Conference on, 1994.
[23] A. Servetti and J. C. De Martin, "Perception-based partial encryption of compressed speech," Speech and Audio Processing, IEEE Transactions on, vol. 10, pp. 637-643, 2002.
[24] A. Filippini, P. Bergamo, and G. Mazzini, "Security issues based on chaotic systems," presented at Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE, 2002.
[25] J. L. M. X. Lai, S. Murphy, "Markov ciphers and differential cryptanalysis, Advances in Cryptology," Eurocrypt '91, Springer-Verlag, pp. 17-38, 1992.
[26] R. M. Davis, "The Data Encryption Standard in perspective," Computer Security and the Data encryption Standard, Nationsal Bureau of Standards Special Publication Feb, 1978.
[27] A. S. E. Biham, "Differential Cryptanalysis of the Data Encryption Standard," vol. 4, pp. 3-72, 1991.
[28] F. P. 46-2, "DATA ENCRYPTION STANDARD (DES)," Federal Information Processing Standards Publication, vol. 46-2, 1988 January 22.
[29] S.-J. Han, H.-S. Oh, and J. Park, "The improved data encryption standard (DES) algorithm," presented at Spread Spectrum Techniques and Applications Proceedings, 1996., IEEE 4th International Symposium on, 1996.
[30] M. E. H. Ralph C. Merkle, "On the Security of Multiple Encryption.," Commun. ACM 24, vol. 7, pp. 465-467, 1981.
[31] K. W. C. a. M. J. Wiener, "DES is not a Group, Advances in Cryptology," Crypto ?2 (LNCS 740),, vol. Springer-Verlag, pp. 512-520., 1993.
[32] N. I. o. S. a. T. (NIST), "Announcing the ADVANCED ENCRYPTION STANDARD (AES)," Federal Information Processing Standards Publication 197, 2001.
[33] F. P. 197, "Advanced Encryption Standard (AES)," National Institute of Standards and Technology, U.S. Department of Commerce, November 2001.
[34] J. L. M. Xuejia Lai, "A Proposal for a New Block Encryption Standard," Institute for Signal and Information Processing Swiss Federal Institute of Technology, pp. 389-404, 1990.
[35] B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)," Fast Software Encryption, Cambridge Security Workshop Proceedings, pp. 191-204, 1994.
[36] J. Nechvatal, "Public key cryptography," the science of information integrity,G. J. Simmons, Contemporary Cryptology - The Science of Information Integrity, pp. 177-288, 1992.
[37] R. Rivest, "The MD5 Message Digest Algorithm, RFC1321," Network Working MIT Laboratory for Computer Science and RSA Data Security, 1992.
[38] R. Rivest, "The MD4 Message Digest Algorithm, RFC1320," Network Working MIT Laboratory for Computer Science and RSA Data Security, April, 1992.
[39] Sun, "Java API for XML Processing (JAXP)," presented at 2004 JavaOne Conference.
[40] S. Adler, A. Berglund, and J. Caruso, "Extensible Stylesheet Language (XSL) Version 1.0," W3C Recommendation, 2001.
[41] E. M. Burke, JAVA & XSLT.PDF: O'Reilly, 2001.
[42] E. Armstrong, S. Bodoff, D. Carson, M. Fisher, S. Fordin, D. Green, K. Haase, and E. Jendrock, The Java. Web Services Tutorial: Sun Microsystems, Inc., 2003.
[43] X. Chen, C. Wang, D. Xuan, Z. Li, Y. Min, and W. Zhao, "Survey on QoS management of VoIP," presented at Computer Networks and Mobile Computing, 2003. ICCNMC 2003. 2003 International Conference on, 2003.
[44] S. C. H. Schulzrinne, R. Frederick, and V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications," RFC 1889, Internet Engineering Task Force, Jan., Jan. 1996.
[1] B. S. J, "Natural Spoken Dialogue Systems for Telephony," Communication of the ACM, vol. 43(9), September 2000.
[2] L. Jennifer, "Conversational Interfaces-Introduction Communication of the ACM," vol. 43(9), September 2000.
[3] J. D. Hartman and J. A. Vila, "VoiceXML builder: a workbench for investigating voiced-based applications," presented at Frontiers in Education Conference, 2001. 31st Annual, 2001.
[4] R. Dettmer, "It's good to talk [speech technology for on-line services access]," IEE Review, vol. 49, pp. 30-33, 2003.
[5] J. A. Larson, "VoiceXML 2.0 and the W3C speech interface framework," presented at Automatic Speech Recognition and Understanding, 2001. ASRU '01. IEEE Workshop on, 2001.
[6] J. A. Larson, "VoiceXML and the W3C speech interface framework," Multimedia, IEEE, vol. 10, pp. 91-93, 2003.
[7] J. Chugh and V. Jagannathan, "Voice-enabling enterprise applications," presented at Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on, 2002.
[8] T. B. o. V. i. t. Enterprise, www.heyanita.com.
[9] J. T. David M. Hilbert and B. Schilit, "Supporting ubiquitous information on very small devices is harder than you think."
[10] M. D. Collier, "Current threats to and technical solutions for voice security," presented at Aerospace Conference Proceedings, 2002. IEEE, 2002.
[11] A. Rodriguez, W.-K. Ho, G. Kempny, M. Pedreschi, and N. Richards, IBM WebSphere Voice Server 2.0 Implementation Guide, 2002 05.
[12] Z. Trabelsi, S.-H. Cha, D. Desai, and C. Tappert, "Multimodal integration of voice and ink for pervasive computing," presented at Multimedia Software Engineering, 2002. Proceedings. Fourth International Symposium on, 2002.
[13] "Understanding Voice over IP Protocols," Cisco Systems Service Provider Solutions Engineering, 2002.
[14] J.-I. Guo, J.-C. Yen, and H.-F. Pai, "New voice over Internet protocol technique with hierarchical data security protection," Vision, Image and Signal Processing, IEE Proceedings-, vol. 149, pp. 237-243, 2002.
[15] S.-Y. Tang, Y.-P. Lu, and D. H. C. Du, "Performance study of software-based iSCSI security," presented at Security in Storage Workshop, 2002. Proceedings. First International IEEE, 2002.
[16] G. Troullinos, "A software based approach to secure voice applications," presented at Electronics, Circuits, and Systems, 1996. ICECS '96., Proceedings of the Third IEEE International Conference on, 1996.
[17] M. Orceyre and R. Heller, "An approach to secure voice communication based on the data encryption standard," Communications Magazine, IEEE, vol. 16, pp. 41-50, 1978.
[18] R. Barbieri, D. Bruschi, and E. Rosti, "Voice over IPsec: analysis and solutions," presented at Computer Security Applications Conference, 2002. Proceedings. 18th Annual, 2002.
[19] M. S. McBeth, R. Cole, Jr., and R. B. Adamson, "Architecture for secure network voice," presented at Military Communications Conference Proceedings, 1999. MILCOM 1999. IEEE, 1999.
[20] R. Ramaswamv, "Design of a secure packet voice communication system in wide area networks," presented at Security Technology, 1990. Crime Countermeasures, Proceedings. IEEE 1990 International Carnahan Conference on, 1990.
[21] J. R. M. J. Calpe, J. F. Guerrero and J. V. Frances, "Toll-Quality Digital Secraphone," MELECON'96, vol. 3, pp. 1714-1717, 1996.
[22] L. Diez-Del-Rio, S. Moreno-Perez, R. Sarmiento, J. Parera, M. Veiga-Perez, and R. Garcia-Gomez, "Secure speech and data communication over the public switching telephone network," presented at Acoustics, Speech, and Signal Processing, 1994. ICASSP-94., 1994 IEEE International Conference on, 1994.
[23] A. Servetti and J. C. De Martin, "Perception-based partial encryption of compressed speech," Speech and Audio Processing, IEEE Transactions on, vol. 10, pp. 637-643, 2002.
[24] A. Filippini, P. Bergamo, and G. Mazzini, "Security issues based on chaotic systems," presented at Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE, 2002.
[25] J. L. M. X. Lai, S. Murphy, "Markov ciphers and differential cryptanalysis, Advances in Cryptology," Eurocrypt '91, Springer-Verlag, pp. 17-38, 1992.
[26] R. M. Davis, "The Data Encryption Standard in perspective," Computer Security and the Data encryption Standard, Nationsal Bureau of Standards Special Publication Feb, 1978.
[27] A. S. E. Biham, "Differential Cryptanalysis of the Data Encryption Standard," vol. 4, pp. 3-72, 1991.
[28] F. P. 46-2, "DATA ENCRYPTION STANDARD (DES)," Federal Information Processing Standards Publication, vol. 46-2, 1988 January 22.
[29] S.-J. Han, H.-S. Oh, and J. Park, "The improved data encryption standard (DES) algorithm," presented at Spread Spectrum Techniques and Applications Proceedings, 1996., IEEE 4th International Symposium on, 1996.
[30] M. E. H. Ralph C. Merkle, "On the Security of Multiple Encryption.," Commun. ACM 24, vol. 7, pp. 465-467, 1981.
[31] K. W. C. a. M. J. Wiener, "DES is not a Group, Advances in Cryptology," Crypto ?2 (LNCS 740),, vol. Springer-Verlag, pp. 512-520., 1993.
[32] N. I. o. S. a. T. (NIST), "Announcing the ADVANCED ENCRYPTION STANDARD (AES)," Federal Information Processing Standards Publication 197, 2001.
[33] F. P. 197, "Advanced Encryption Standard (AES)," National Institute of Standards and Technology, U.S. Department of Commerce, November 2001.
[34] J. L. M. Xuejia Lai, "A Proposal for a New Block Encryption Standard," Institute for Signal and Information Processing Swiss Federal Institute of Technology, pp. 389-404, 1990.
[35] B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)," Fast Software Encryption, Cambridge Security Workshop Proceedings, pp. 191-204, 1994.
[36] J. Nechvatal, "Public key cryptography," the science of information integrity,G. J. Simmons, Contemporary Cryptology - The Science of Information Integrity, pp. 177-288, 1992.
[37] R. Rivest, "The MD5 Message Digest Algorithm, RFC1321," Network Working MIT Laboratory for Computer Science and RSA Data Security, 1992.
[38] R. Rivest, "The MD4 Message Digest Algorithm, RFC1320," Network Working MIT Laboratory for Computer Science and RSA Data Security, April, 1992.
[39] Sun, "Java API for XML Processing (JAXP)," presented at 2004 JavaOne Conference.
[40] S. Adler, A. Berglund, and J. Caruso, "Extensible Stylesheet Language (XSL) Version 1.0," W3C Recommendation, 2001.
[41] E. M. Burke, JAVA & XSLT.PDF: O'Reilly, 2001.
[42] E. Armstrong, S. Bodoff, D. Carson, M. Fisher, S. Fordin, D. Green, K. Haase, and E. Jendrock, The Java. Web Services Tutorial: Sun Microsystems, Inc., 2003.
[43] X. Chen, C. Wang, D. Xuan, Z. Li, Y. Min, and W. Zhao, "Survey on QoS management of VoIP," presented at Computer Networks and Mobile Computing, 2003. ICCNMC 2003. 2003 International Conference on, 2003.
[44] S. C. H. Schulzrinne, R. Frederick, and V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications," RFC 1889, Internet Engineering Task Force, Jan., Jan. 1996.
[45] C. Xydeas, "An overview of speech coding techniques," presented at Speech Coding - Techniques and Applications, IEE Colloquium on, 1992.
[46] E. Shichor and H. Silverman, "An improved LPC algorithm for voiced-speech synthesis," Acoustics, Speech, and Signal Processing [see also IEEE Transactions on Signal Processing], IEEE Transactions on, vol. 32, pp. 180-183, 1984.
[47] K. Tokuda, H. Matsumura, T. Kobayashi, and S. Imai, "Speech coding based on adaptive mel-cepstral analysis," presented at Acoustics, Speech, and Signal Processing, 1994. ICASSP-94., 1994 IEEE International Conference on, 1994.
[48] A. Kaltenmeier, "Implementation of various LPC algorithms using commercial digital signal processors," presented at Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP '83., 1983.
[49] E. Macii, "The effect of clustering on the performance of hashing algorithms," presented at Communications, Computers, and Signal Processing, 1995. Proceedings. IEEE Pacific Rim Conference on, 1995.
[50] P. C. C. C. K. Wong, "Digital speech transmission for highly encrypted and paramiltary operated land mobile radio communications over a narrowband uhf channel."
[51] "The Blowfish Encryption Algorithm," Counterpane Internet Security, Inc., 2003.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top