广西师范大学学报(自然科学版) ›› 2024, Vol. 42 ›› Issue (2): 1-15.doi: 10.16088/j.issn.1001-6600.2023062701

• •    下一篇

密文域可逆信息隐藏研究进展及技术难点分析

涂广升1, 孔咏骏1*, 宋哲超2, 叶康3   

  1. 1.网络与信息安全武警部队重点实验室(中国人民武装警察部队工程大学), 陕西 西安 710086;
    2.中国人民武装警察部队福建总队, 福建 福州 350000;
    3.中国人民武装警察部队重庆总队, 重庆 400000
  • 收稿日期:2023-06-27 修回日期:2023-10-10 发布日期:2024-04-22
  • 通讯作者: 孔咏骏(1990—), 男, 上海人, 中国人民武装警察部队工程大学讲师, 博士。E-mail: fighting_kyj@163.com
  • 基金资助:
    国家自然科学基金(62102452, 62172436); 国家重点研发计划项目(2021YFB3100100); 武警工程大学科研创新团队项目(KYTD201805); 陕西省自然科学基础研究计划项目(2023-JC-YB-584)

Research Progress and Technical Difficulties of Reversible Data Hiding in Encrypted Domain

TU Guangsheng1, KONG Yongjun1*, SONG Zhechao2, YE Kang3   

  1. 1. Key Laboratory of Network and Information Security of Chinese People Armed Police Force (Engineering University of CAPF), Xi’an Shaanxi 710086, China;
    2. Fujian Corps of CAPF, Fuzhou Fujian 350000, China;
    3. Chongqing Corps of CAPF, Chongqing 400000, China
  • Received:2023-06-27 Revised:2023-10-10 Published:2024-04-22

摘要: 密文域可逆信息隐藏技术融合了加密技术和信息隐藏技术的双重优势,旨在实现公开信道上数据内容的隐私保护和信息的可逆嵌入功能,以应对云环境下日益复杂的用户应用需求。本文从密态数据管理、情报隐蔽通信、军事协同作战、技术融合创新4个应用场景分析密文域可逆信息隐藏的研究价值,根据信息嵌入与数据加密的操作关系对密文域可逆信息隐藏分类,对不同嵌入框架下的技术发展进行阐述和总结。同时,从嵌入性能提升、可分离性实现、图像的加密安全性、满足云环境下的应用需求4个方面对密文域可逆信息隐藏的技术难点进行剖析,并对后续研究方向进行分析和展望。

关键词: 信息安全, 可逆信息隐藏, 云环境, 图像处理, 密文域

Abstract: Reversible data hiding in encrypted domain combines the dual advantages of encryption technology and data hiding technology, aiming to achieve privacy protection of data content on public channels,and reversible data embedding, so as to cope with the increasingly complex application requirements in the cloud environment. The research significance of reversible data hiding in encrypted domain is discussed from four application scenarios: encrypted data management, covert communication of intelligence, military collaborative operations, and technological integration innovation. Then, the reversible data hiding in encrypted domain is classified according to the operation relationship between data embedding and data encryption, and the technological development under different embed-ding frameworks is also reviewed. Furthermore, technical difficulties of reversible data hiding in encrypted domain are analyzed from four aspects, including embedding performance improvement, separability implementation, image encryption security, and application requirements for cloud environment. Finally, subsequent research directions are analyzed and prospected.

Key words: information security, reversible data hiding, cloud environment, image processing, encrypted domain

中图分类号:  TP309.7

[1] MAO Y Y, YOU C S, ZHANG J, et al. A survey on mobile edge computing: the communication perspective[J]. IEEE Communications Surveys & Tutorials, 2017, 19(4): 2322-2358. DOI: 10.1109/COMST.2017.2745201.
[2] YAN K, LUO G C, ZHENG X, et al. A comprehensive location-privacy-awareness task selection mechanism in mobile crowd-sensing[J]. IEEE Access, 2019, 7: 77541-77554. DOI: 10.1109/ACCESS.2019.2921274.
[3] WU D P, SI S S, WU S E, et al. Dynamic trust relationships aware data privacy protection in mobile crowd-sensing[J]. IEEE Internet of Things Journal, 2018, 5(4): 2958-2970. DOI: 10.1109/JIOT.2017.2768073.
[4] ZHOU J, CAO Z F, DONG X L, et al. Security and privacy for cloud-based IoT: challenges[J]. IEEE Communications Magazine, 2017, 55(1): 26-33. DOI: 10.1109/MCOM.2017.1600363CM.
[5] GE X R, YU J, ZHANG H L, et al. Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(1): 490-504. DOI: 10.1109/TDSC.2019.2896258.
[6] LIANG X Q, YAN Z, CHEN X F, et al. Game theoretical analysis on encrypted cloud data deduplication[J]. IEEE Transactions on Industrial Informatics, 2019, 15(10): 5778-5789. DOI: 10.1109/TII.2019.2920402.
[7] SUN J F, XIONG H, ZHANG H, et al. Mobile access and flexible search over encrypted cloud data in heterogeneous systems[J]. Information Sciences, 2020, 507: 1-15. DOI: 10.1016/j.ins.2019.08.026.
[8] 柯彦, 张敏情, 刘佳, 等. 密文域可逆信息隐藏综述[J]. 计算机应用, 2016, 36(11): 3067-3076, 3092. DOI: 10.11772/j.issn.1001-9081.2016.11.3067.
[9] KUMAR S, GUPTA A, WALIA G S. Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges[J]. Applied Intelligence, 2022, 52(7): 7373-7406. DOI: 10.1007/s10489-021-02789-2.
[10] 殷赵霞. 面向隐私保护的数字图像隐写方法研究[D]. 合肥: 安徽大学, 2014.
[11] 俞春强, 邓方舟, 张显全, 等. 一种基于多预测值分类的可逆信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2018, 36(2): 24-32. DOI: 10.16088/j.issn.1001-6600.2018.02.004.
[12] KONG P, FU D, LI X R, et al. Reversible data hiding in encrypted medical DICOM image[J]. Multimedia Systems, 2021, 27(3): 303-315. DOI: 10.1007/s00530-020-00739-5.
[13] KITTAWI N, AL-HAJ A. Reversible data hiding using bit flipping and histogram shifting[J]. Multimedia Tools and Applications, 2022, 81(9): 12441-12458. DOI: 10.1007/s11042-022-12364-7.
[14] PUTEAUX P, ONG S Y, WONG K S, et al. A survey of reversible data hiding in encrypted images: the first 12 years[J]. Journal of Visual Communication and Image Representation, 2021, 77: 103085. DOI: 10.1016/j.jvcir.2021.103085.
[15] LI J, MA R H, GUAN H B. TEES: an efficient search scheme over encrypted data on mobile cloud[J]. IEEE Transactions on Cloud Computing, 2017, 5(1): 126-139. DOI: 10.1109/TCC.2015.2398426.
[16] 武晓帅, 徐明, 乔通, 等. 图像空域可逆信息隐藏研究进展[J]. 中国图象图形学报, 2022, 27(1): 125-149. DOI: 10.11834/jig.210292.
[17] 李名. 信息熵视角下的密文图像信息隐藏研究[D]. 重庆: 重庆大学, 2014.
[18] SUN Y, ZHANG X. A kind of covert channel analysis method based on trusted pipeline[C]// 2011 International Conference on Electrical and Control Engineering. Piscataway, NJ: IEEE, 2011: 5660-5663. DOI: 10.1109/ICECENG.2011.6058071.
[19] 王玮, 王位, 石峰, 等. 美国海军数字化转型战略综述[J]. 舰船科学技术, 2021, 43(23): 170-175. DOI: 10.3404/j.issn.1672-7649.2021.12.031.
[20] 赵国宏. 作战云体系结构研究[J]. 指挥与控制学报, 2015, 1(3): 292-295.
[21] 程学旗, 靳小龙, 王元卓, 等. 大数据系统和分析技术综述[J]. 软件学报, 2014, 25(9): 1889-1908. DOI: 10.13328/j.cnki.jos.004674.
[22] YAN Z, WANG M J, LI Y X, et al. Encrypted data management with deduplication in cloud computing[J]. IEEE Cloud Computing, 2016, 3(2): 28-35. DOI: 10.1109/MCC.2016.29.
[23] JUNG K H. A survey of reversible data hiding methods in dual images[J]. IETE Technical Review, 2016, 33(4): 441-452. DOI: 10.1080/02564602.2015.1102099.
[24] PUECH W, CHAUMONT M, STRAUSS O. A reversible data hiding method for encrypted images[C]// Proceedings of SPIE Volume 6819: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Bellingham, WA: SPIE, 2008: 68191E. DOI: 10.1117/12.766754.
[25] ZHANG X P. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. DOI: 10.1109/LSP.2011.2114651.
[26] HONG W, CHEN T S, WU H Y. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4): 199-202. DOI: 10.1109/LSP.2012.2187334.
[27] ZHOU J T, SUN W W, DONG L, et al. Secure reversible image data hiding over encrypted domain via key modulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(3): 441-452. DOI: 10.1109/TCSVT.2015.2416591.
[28] ZHANG X P, QIAN Z X, FENG G R, et al. Efficient reversible data hiding in encrypted images[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 322-328. DOI: 10.1016/j.jvcir.2013.11.001.
[29] ZHANG X P, WANG Z C, YU J, et al. Reversible visible watermark embedded in encrypted domain[C]// 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). Piscataway NJ: IEEE, 2015: 826-830. DOI: 10.1109/ChinaSIP.2015.7230520.
[30] ZHENG S L, LI D D, HU D H, et al. Lossless data hiding algorithm for encrypted images with high capacity[J]. Multimedia Tools and Applications, 2016, 75(21): 13765-13778. DOI: 10.1007/s11042-015-2920-y.
[31] OU B, LI X L, ZHANG W M. PVO-based reversible data hiding for encrypted images[C]// 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). Piscataway NJ: IEEE, 2015: 831-835. DOI: 10.1109/ChinaSIP.2015.7230521.
[32] HUANG F J, HUANG J W, SHI Y Q. New framework for reversible data hiding in encrypted domain[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2777-2789. DOI: 10.1109/TIFS.2016.2598528.
[33] TANG Z J, XU S J, YAO H, et al. Reversible data hiding with differential compression in encrypted image[J]. Multimedia Tools and Applications, 2019, 78(8): 9691-9715. DOI: 10.1007/s11042-018-6567-3.
[34] DI F Q, HUANG F J, ZHANG M Q, et al. Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding[J]. Multimedia Tools and Applications. 2018, 77(16): 20917-20935. DOI: 10.1007/s11042-017-5498-8.
[35] GE H L, CHEN Y, QIAN Z X, et al. A high capacity multi-level approach for reversible data hiding in encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(8): 2285-2295. DOI: 10.1109/TCSVT.2018.2863029.
[36] WANG Y M, HE W G. High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J]. IEEE Transactions on Multimedia, 2022, 24: 1288-1298. DOI: 10.1109/TMM.2021.3062699.
[37] CHEN Y C, SHIU C W, HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164-1170. DOI: 10.1016/j.jvcir.2014.04.003.
[38] CHEN B, LU W, HUANG J W, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 978-991. DOI: 10.1109/TDSC.2020.3011923.
[39] XIANG Y P, XIAO D, ZHANG R, et al. Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer[J]. Information Sciences, 2020, 545: 188-206. DOI: 10.1016/j.ins.2020.08.019.
[40] MA K D, ZHANG W M, ZHAO X F, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 553-562. DOI: 10.1109/TIFS.2013.2248725.
[41] ZHANG W M, MA K D, YU N H. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94: 118-127. DOI: 10.1016/j.sigpro.2013.06.023.
[42] MATHEW T, WILSCY M. Reversible data hiding in encrypted images by active block exchange and room reservation[C]// 2014 International Conference on Contemporary Computing and Informatics (IC3I), Piscataway NJ: IEEE, 2014: 839-844. DOI: 10.1109/IC3I.2014.7019628.
[43] YI S, ZHOU Y C. Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2019, 21(1): 51-64. DOI: 10.1109/TMM.2018.2844679.
[44] WU Y Q, XIANG Y Z, GUO Y T, et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2020, 22(8): 1929-1938. DOI: 10.1109/TMM.2019.2952979.
[45] YU C Q, ZHANG X Q, ZHANG X P, et al. Reversible data hiding with hierarchical embedding for encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(2): 451-466. DOI: 10.1109/TCSVT.2021.3062947.
[46] ZHANG Y, YANG B, NIU X M. Reversible watermarking for relational database authentication[J]. Journal of Computers, 2006, 17(2): 59-65.
[47] NGUYEN T S, CHANG C C, CHANG W C. High capacity reversible data hiding scheme for encrypted images[J]. Signal Processing: Image Communication, 2016, 44: 84-91. DOI: 10.1016/j.image.2016.03.010.
[48] XIANG S J, LUO X R. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2018, 28(11): 3099-3110. DOI: 10.1109/TCSVT.2017.2742023.
[49] CAO X C, DU L, WEI X X, et al. High capacity reversible data hiding in encrypted images by patch-level sparse representation[J]. IEEE Transactions on Cybernetics, 2016, 46(5): 1132-1143. DOI: 10.1109/TCYB.2015.2423678.
[50] QIU Y Q, YING Q C, YANG Y Y, et al. High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(9): 5874-5887. DOI: 10.1109/TCSVT.2022.3163905.
[51] PUTEAX P, PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670-1681. DOI: 10.1109/TIFS.2018.2799381.
[52] PUTEAX P, PUECH W. EPE-based huge-capacity reversible data hiding in encrypted images[C]// 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Piscataway NJ: IEEE, 2018: 1-7. DOI: 10.1109/WIFS.2018.8630788.
[53] PUYANG Y, YIN Z X, QIAN Z X. Reversible data hiding in encrypted images with two-MSB prediction[C]// 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Piscataway NJ: IEEE, 2018: 1-7. DOI: 10.1109/WIFS.2018.8630785.
[54] PUTEAUX P, PUECH W. A recursive reversible data hiding in encrypted images method with a very high payload[J]. IEEE Transactions on Multimedia, 2021, 23: 636-650. DOI: 10.1109/TMM.2020.2985537.
[55] YIN Z X, XIANG Y Z, ZHANG X P. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding[J]. IEEE Transactions on Multimedia, 2020, 22(4): 874-884. DOI: 10.1109/TMM.2019.2936314.
[56] 张敏情, 柯彦, 苏婷婷. 基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016, 38(2): 354-360. DOI: 10.11999/JEIT150702.
[57] 柯彦, 张敏情, 苏婷婷. 基于R-LWE的密文域多比特可逆信息隐藏算法[J]. 计算机研究与发展, 2016, 53(10): 2307-2322. DOI: 10.7544/issn1000-1239.2016.20160444.
[58] 柯彦, 张敏情, 张英男. 可分离的密文域可逆信息隐藏[J]. 计算机应用研究, 2016, 33(11): 3476-3479. DOI: 10.3969/j.issn.1001-3695.2016.11.061.
[59] 柯彦, 张敏情, 项文. 加密域的可分离四进制可逆信息隐藏算法[J]. 科学技术与工程, 2016, 16(27): 58-64. DOI: 10.3969/j.issn.1671-1815.2016.27.010.
[60] 柯彦, 张敏情, 刘佳. 可分离的加密域十六进制可逆信息隐藏[J]. 计算机应用, 2016, 36(11): 3082-3087. DOI: 10.11772/j.issn.1001-9081.2016.11.3082.
[61] KE Y, ZHANG M Q, LIU J. Separable multiple bits reversible data hiding in encrypted domain[C]// Digital Forensics and Watermarking: LNCS Volume 10082. Cham: Springer International Publishing AG, 2017: 470-484. DOI: 10.1007/978-3-319-53465-7_35.
[62] KE Y, ZHANG M Q, LIU J, et al. A multilevel reversible data hiding scheme in encrypted domain based on LWE[J]. Journal of Visual Communication and Image Representation, 2018, 54: 133-144. DOI: 10.1016/j.jvcir.2018.05.002.
[63] HUANG D L, WANG J J. High-capacity reversible data hiding in encrypted image based on specific encryption process[J]. Signal Processing: Image Communication, 2020, 80: 115632. DOI: 10.1016/j.image.2019.115632.
[64] WU H T, CHEUNG Y M, YANG Z Y, et al. A high-capacity reversible data hiding method for homomorphic encrypted images[J]. Journal of Visual Communication and Image Representation, 2019, 62: 87-96. DOI: 10.1016/j.jvcir.2019.04.015.
[65] KE Y, ZHANG M Q, LIU J, et al. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(8): 2353-2365. DOI: 10.1109/TCSVT.2019.2963393.
[66] SHANNON C E. A mathematical theory of communication[J]. Bell Labs Technical Journal, 1948, 27(4): 379-423. DOI: 10.1002/j.1538-7305.1948.tb01338.x.
[67] DRAGOI I C, COLTUC D. On the security of reversible data hiding in encrypted images by MSB prediction[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 187-189. DOI: 10.1109/TIFS.2020.3006382.
[68] PUTEAUX P, PUECH W. Rebuttal: on the security of reversible data hiding in encrypted images by MSB prediction[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 2445-2446. DOI: 10.1109/TIFS.2021.3055630.
[69] 王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述[J]. 软件学报, 2015, 26(5): 1129-1150. DOI: 10.13328/j.cnki.jos.004820.
[70] 施巍松, 孙辉, 曹杰, 等. 边缘计算: 万物互联时代新型计算模型[J]. 计算机研究与发展, 2017, 54(5): 907-924. DOI: 10.7544/issn1000-1239.2017.20160941.
[71] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1): 71-83. DOI: 10.3724/SP.J.1001.2011.03958.
[72] 林文敏. 云环境下大数据服务及其关键技术研究[D]. 南京: 南京大学, 2015.
[1] 肖宇庭, 吕晓琪, 谷宇, 刘传强. 基于拆分残差网络的糖尿病视网膜病变分类[J]. 广西师范大学学报(自然科学版), 2024, 42(1): 91-101.
[2] 梁钰婷, 罗玉玲, 张顺生. 基于压缩感知的混沌图像加密研究综述[J]. 广西师范大学学报(自然科学版), 2022, 40(5): 49-58.
[3] 周戎龙,罗玉玲,闭金杰,岑明灿,丘森辉,廖志贤. 图像并行加密算法在手持设备上的应用研究[J]. 广西师范大学学报(自然科学版), 2019, 37(3): 60-70.
[4] 孙容海, 施林甫, 黄丽艳, 唐振军, 俞春强. 基于图像插值和参考矩阵的可逆信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2019, 37(2): 90-104.
[5] 俞春强, 邓方舟, 张显全, 唐振军, 陈艳, 何南. 一种基于多预测值分类的可逆信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2018, 36(2): 24-32.
[6] 俞春强, 付睿, 陈艳, 雷芸, 张显全, 王晓云. 基于信息隐藏的图像感兴趣区域保护算法[J]. 广西师范大学学报(自然科学版), 2016, 34(2): 67-73.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 袁静静, 郑宇钊, 徐晨枫, 殷婷婕. 非内吞依赖型生物大分子药物胞质递送策略研究进展[J]. 广西师范大学学报(自然科学版), 2024, 42(1): 1 -8 .
[2] 杨杨阳, 朱震霆, 杨翠萍, 李世豪, 张舒, 范秀磊, 万蕾. 基于文献计量学分析的剩余污泥厌氧消化预处理研究进展[J]. 广西师范大学学报(自然科学版), 2024, 42(2): 16 -29 .
[3] 许伦辉, 李金龙, 李若南, 陈俊宇. 基于动态生成对抗网络的路网缺失交通数据修复[J]. 广西师范大学学报(自然科学版), 2024, 42(2): 30 -40 .
[4] 杨海, 谢亚琴. 基于Floyd算法的5G基站区域储能分配策略[J]. 广西师范大学学报(自然科学版), 2024, 42(2): 41 -54 .
[5] 闫文文, 文中, 王爽, 李国祥, 王博宇, 吴艺. 基于AA-CAES电站和综合需求响应的供暖期弃风消纳策略[J]. 广西师范大学学报(自然科学版), 2024, 42(2): 55 -68 .
[6] 甘友春, 王灿, 贺旭辉, 张羽, 张雪菲, 王帆, 喻亚洲. 考虑光热电站和柔性负荷的电氢热综合能源系统联合优化运行[J]. 广西师范大学学报(自然科学版), 2024, 42(2): 69 -83 .
[7] 王旭阳, 王常瑞, 张金峰, 邢梦怡. 基于跨模态交叉注意力网络的多模态情感分析方法[J]. 广西师范大学学报(自然科学版), 2024, 42(2): 84 -93 .
[8] 王卫舵, 王以松, 杨磊. 云资源调度的回答集程序描述性求解[J]. 广西师范大学学报(自然科学版), 2024, 42(2): 94 -104 .
[9] 余谦, 陈庆锋, 何乃旭, 韩宗钊, 卢家辉. 基于矩阵运算加速的改进社区发现遗传算法[J]. 广西师范大学学报(自然科学版), 2024, 42(2): 105 -119 .
[10] 龙芳, 蔡静, 朱艳. 逐步Ⅱ型混合截尾下Lomax分布多部件应力强度模型的可靠性分析[J]. 广西师范大学学报(自然科学版), 2024, 42(2): 120 -130 .
版权所有 © 广西师范大学学报(自然科学版)编辑部
地址:广西桂林市三里店育才路15号 邮编:541004
电话:0773-5857325 E-mail: gxsdzkb@mailbox.gxnu.edu.cn
本系统由北京玛格泰克科技发展有限公司设计开发