A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques

碩士 === 國立高雄第一科技大學 === 電腦與通訊工程所 === 95 === The techniques for identity recognition by using human face have become more popular in the applications of e-commerce. When a customer shops online, buyer’s face image taken by a camera in real time. However, when the face image is transmitted on the networ...

Full description

Bibliographic Details
Main Authors: Jiun-Sheng Li, 李俊昇
Other Authors: Da-Chun Wu
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/21243864327531825951
id ndltd-TW-095NKIT5650022
record_format oai_dc
spelling ndltd-TW-095NKIT56500222016-05-20T04:18:04Z http://ndltd.ncl.edu.tw/handle/21243864327531825951 A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques 以資訊隱藏技術作網站購物的臉部影像傳輸安全保護之研究 Jiun-Sheng Li 李俊昇 碩士 國立高雄第一科技大學 電腦與通訊工程所 95 The techniques for identity recognition by using human face have become more popular in the applications of e-commerce. When a customer shops online, buyer’s face image taken by a camera in real time. However, when the face image is transmitted on the network, it might be intercepted by a hacker, and modified or reserved for later use in fake transactions. In this thesis, three distinct methods for security protection of online transmitted face images is proposed, which may be selected for different applications. The first method adopts information hiding techniques to embed information of the e-commerce transaction, compressed facial region, and authentication signals into the face image excluding its facial region. When the server receives a transmitted face image, it can then extract not only the information of the transaction but also judge the truthfulness of the image. If facial region of face image was modified, the original facial region can be reconstructed. In this thesis, we adopt an adaptive JPEG quantization table which decided by the embedded data size and the DCT coefficients of the face image in order to decrease the influence of image quality caused by the embedding steps. The second method compresses the DCT coefficients of the JPEG face image. After compressing, we can obtain space for embedding information of the e-commerce transaction, and authentication signals. This method produces a noise like image which is then transmitted to the server. Because the face is not exposed during the transmission process, this method can achieve additional degree of security. At the receiver end, the original face can be reconstructed by a reversible process. The third method uses a bit-shift operator for DCT coefficients of the JPEG face image. After bit-shift, we can obtain space for embedding information of the e-commerce transaction, and authentication signals. And we modify quantization table to keep image quality. At the receiver end, the original face can be reconstructed by a reversible process. Experiment results show the proposed methods are feasible. Da-Chun Wu 吳大鈞 2007 學位論文 ; thesis 91 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立高雄第一科技大學 === 電腦與通訊工程所 === 95 === The techniques for identity recognition by using human face have become more popular in the applications of e-commerce. When a customer shops online, buyer’s face image taken by a camera in real time. However, when the face image is transmitted on the network, it might be intercepted by a hacker, and modified or reserved for later use in fake transactions. In this thesis, three distinct methods for security protection of online transmitted face images is proposed, which may be selected for different applications. The first method adopts information hiding techniques to embed information of the e-commerce transaction, compressed facial region, and authentication signals into the face image excluding its facial region. When the server receives a transmitted face image, it can then extract not only the information of the transaction but also judge the truthfulness of the image. If facial region of face image was modified, the original facial region can be reconstructed. In this thesis, we adopt an adaptive JPEG quantization table which decided by the embedded data size and the DCT coefficients of the face image in order to decrease the influence of image quality caused by the embedding steps. The second method compresses the DCT coefficients of the JPEG face image. After compressing, we can obtain space for embedding information of the e-commerce transaction, and authentication signals. This method produces a noise like image which is then transmitted to the server. Because the face is not exposed during the transmission process, this method can achieve additional degree of security. At the receiver end, the original face can be reconstructed by a reversible process. The third method uses a bit-shift operator for DCT coefficients of the JPEG face image. After bit-shift, we can obtain space for embedding information of the e-commerce transaction, and authentication signals. And we modify quantization table to keep image quality. At the receiver end, the original face can be reconstructed by a reversible process. Experiment results show the proposed methods are feasible.
author2 Da-Chun Wu
author_facet Da-Chun Wu
Jiun-Sheng Li
李俊昇
author Jiun-Sheng Li
李俊昇
spellingShingle Jiun-Sheng Li
李俊昇
A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques
author_sort Jiun-Sheng Li
title A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques
title_short A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques
title_full A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques
title_fullStr A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques
title_full_unstemmed A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques
title_sort study on security protection of facial images transmitted on networks in e-business platform by information hiding techniques
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/21243864327531825951
work_keys_str_mv AT jiunshengli astudyonsecurityprotectionoffacialimagestransmittedonnetworksinebusinessplatformbyinformationhidingtechniques
AT lǐjùnshēng astudyonsecurityprotectionoffacialimagestransmittedonnetworksinebusinessplatformbyinformationhidingtechniques
AT jiunshengli yǐzīxùnyǐncángjìshùzuòwǎngzhàngòuwùdeliǎnbùyǐngxiàngchuánshūānquánbǎohùzhīyánjiū
AT lǐjùnshēng yǐzīxùnyǐncángjìshùzuòwǎngzhàngòuwùdeliǎnbùyǐngxiàngchuánshūānquánbǎohùzhīyánjiū
AT jiunshengli studyonsecurityprotectionoffacialimagestransmittedonnetworksinebusinessplatformbyinformationhidingtechniques
AT lǐjùnshēng studyonsecurityprotectionoffacialimagestransmittedonnetworksinebusinessplatformbyinformationhidingtechniques
_version_ 1718273446201262080