A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques
碩士 === 國立高雄第一科技大學 === 電腦與通訊工程所 === 95 === The techniques for identity recognition by using human face have become more popular in the applications of e-commerce. When a customer shops online, buyer’s face image taken by a camera in real time. However, when the face image is transmitted on the networ...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/21243864327531825951 |
id |
ndltd-TW-095NKIT5650022 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095NKIT56500222016-05-20T04:18:04Z http://ndltd.ncl.edu.tw/handle/21243864327531825951 A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques 以資訊隱藏技術作網站購物的臉部影像傳輸安全保護之研究 Jiun-Sheng Li 李俊昇 碩士 國立高雄第一科技大學 電腦與通訊工程所 95 The techniques for identity recognition by using human face have become more popular in the applications of e-commerce. When a customer shops online, buyer’s face image taken by a camera in real time. However, when the face image is transmitted on the network, it might be intercepted by a hacker, and modified or reserved for later use in fake transactions. In this thesis, three distinct methods for security protection of online transmitted face images is proposed, which may be selected for different applications. The first method adopts information hiding techniques to embed information of the e-commerce transaction, compressed facial region, and authentication signals into the face image excluding its facial region. When the server receives a transmitted face image, it can then extract not only the information of the transaction but also judge the truthfulness of the image. If facial region of face image was modified, the original facial region can be reconstructed. In this thesis, we adopt an adaptive JPEG quantization table which decided by the embedded data size and the DCT coefficients of the face image in order to decrease the influence of image quality caused by the embedding steps. The second method compresses the DCT coefficients of the JPEG face image. After compressing, we can obtain space for embedding information of the e-commerce transaction, and authentication signals. This method produces a noise like image which is then transmitted to the server. Because the face is not exposed during the transmission process, this method can achieve additional degree of security. At the receiver end, the original face can be reconstructed by a reversible process. The third method uses a bit-shift operator for DCT coefficients of the JPEG face image. After bit-shift, we can obtain space for embedding information of the e-commerce transaction, and authentication signals. And we modify quantization table to keep image quality. At the receiver end, the original face can be reconstructed by a reversible process. Experiment results show the proposed methods are feasible. Da-Chun Wu 吳大鈞 2007 學位論文 ; thesis 91 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立高雄第一科技大學 === 電腦與通訊工程所 === 95 === The techniques for identity recognition by using human face have become more popular in the applications of e-commerce. When a customer shops online, buyer’s face image taken by a camera in real time. However, when the face image is transmitted on the network, it might be intercepted by a hacker, and modified or reserved for later use in fake transactions. In this thesis, three distinct methods for security protection of online transmitted face images is proposed, which may be selected for different applications.
The first method adopts information hiding techniques to embed information of the e-commerce transaction, compressed facial region, and authentication signals into the face image excluding its facial region. When the server receives a transmitted face image, it can then extract not only the information of the transaction but also judge the truthfulness of the image. If facial region of face image was modified, the original facial region can be reconstructed. In this thesis, we adopt an adaptive JPEG quantization table which decided by the embedded data size and the DCT coefficients of the face image in order to decrease the influence of image quality caused by the embedding steps. The second method compresses the DCT coefficients of the JPEG face image. After compressing, we can obtain space for embedding information of the e-commerce transaction, and authentication signals. This method produces a noise like image which is then transmitted to the server. Because the face is not exposed during the transmission process, this method can achieve additional degree of security. At the receiver end, the original face can be reconstructed by a reversible process. The third method uses a bit-shift operator for DCT coefficients of the JPEG face image. After bit-shift, we can obtain space for embedding information of the e-commerce transaction, and authentication signals. And we modify quantization table to keep image quality. At the receiver end, the original face can be reconstructed by a reversible process. Experiment results show the proposed methods are feasible.
|
author2 |
Da-Chun Wu |
author_facet |
Da-Chun Wu Jiun-Sheng Li 李俊昇 |
author |
Jiun-Sheng Li 李俊昇 |
spellingShingle |
Jiun-Sheng Li 李俊昇 A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques |
author_sort |
Jiun-Sheng Li |
title |
A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques |
title_short |
A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques |
title_full |
A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques |
title_fullStr |
A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques |
title_full_unstemmed |
A Study on Security Protection of Facial Images Transmitted on Networks in E-Business Platform by Information Hiding Techniques |
title_sort |
study on security protection of facial images transmitted on networks in e-business platform by information hiding techniques |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/21243864327531825951 |
work_keys_str_mv |
AT jiunshengli astudyonsecurityprotectionoffacialimagestransmittedonnetworksinebusinessplatformbyinformationhidingtechniques AT lǐjùnshēng astudyonsecurityprotectionoffacialimagestransmittedonnetworksinebusinessplatformbyinformationhidingtechniques AT jiunshengli yǐzīxùnyǐncángjìshùzuòwǎngzhàngòuwùdeliǎnbùyǐngxiàngchuánshūānquánbǎohùzhīyánjiū AT lǐjùnshēng yǐzīxùnyǐncángjìshùzuòwǎngzhàngòuwùdeliǎnbùyǐngxiàngchuánshūānquánbǎohùzhīyánjiū AT jiunshengli studyonsecurityprotectionoffacialimagestransmittedonnetworksinebusinessplatformbyinformationhidingtechniques AT lǐjùnshēng studyonsecurityprotectionoffacialimagestransmittedonnetworksinebusinessplatformbyinformationhidingtechniques |
_version_ |
1718273446201262080 |