An RSA-RFID-based Image Authentication System

碩士 === 立德大學 === 資訊傳播研究所 === 97 === The image certification technology developed in this study has applications for commercial digital data transactions such as electronic file transfers and video-on-demand。 The use of image verification technology allows for the identification of copyright violation...

Full description

Bibliographic Details
Main Authors: Shu-Ping Liu, 劉蜀平
Other Authors: Yih-Fuh Wang
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/60550202112874537736
id ndltd-TW-097LU005676040
record_format oai_dc
spelling ndltd-TW-097LU0056760402016-04-25T04:29:21Z http://ndltd.ncl.edu.tw/handle/60550202112874537736 An RSA-RFID-based Image Authentication System 一個基於RSA&RFID之影像確認系統 Shu-Ping Liu 劉蜀平 碩士 立德大學 資訊傳播研究所 97 The image certification technology developed in this study has applications for commercial digital data transactions such as electronic file transfers and video-on-demand。 The use of image verification technology allows for the identification of copyright violations or verification of image integrity。 Since Simmons first proposed the hidden data problem with his "how can prisoners in two different jails plan their escape" in 1984, other experts and researchers have begun studying the issue。 Recently, Wu and Liu (2004) proposed identifying optimum hiding points and odd-even correspondence before hiding the data。 Existing image verification research can generally be divided into two main groups。 The first uses watermarking technology while the other uses digital certification technology。 Image verification technology looks at not only whether an image has been tampered with but also how tampered areas can be restored to reduce the need for re-transmission。 The focus of this paper was on the application of RSA digital certificates and the use of RFID for images or documents。 In practice this emphasized the RSA cipher system。 The actual implementation consisted of four parts: 1。 a key generation system, 2。 a RSA encryption/decryption system, 3。 an image digital certificate, and 4。 an image characteristic comparison。 For the digital certificate, the weighted average method was applied to the pixel values to derive ten sets of eigenvalues in place of miscellaneous functions。 The RSA public key was then used to encrypt the ten sets of eigenvalues to generate the digital certificate。 The encryption result was presented as ten sets of encryption text for use in image or document recognition。 In the interest of recognition speed, the user simply uses the actual image or document to generate the 10 sets of eigenvalues and then acquires the document/image's private key acquired through the ID-Base。 The RSA private key is used to decrypt and compare the 10 sets of encryption text to find the difference。 The results offer the operator with an indicator of image or document similarity。 Yih-Fuh Wang 王億富 2009 學位論文 ; thesis 110 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 立德大學 === 資訊傳播研究所 === 97 === The image certification technology developed in this study has applications for commercial digital data transactions such as electronic file transfers and video-on-demand。 The use of image verification technology allows for the identification of copyright violations or verification of image integrity。 Since Simmons first proposed the hidden data problem with his "how can prisoners in two different jails plan their escape" in 1984, other experts and researchers have begun studying the issue。 Recently, Wu and Liu (2004) proposed identifying optimum hiding points and odd-even correspondence before hiding the data。 Existing image verification research can generally be divided into two main groups。 The first uses watermarking technology while the other uses digital certification technology。 Image verification technology looks at not only whether an image has been tampered with but also how tampered areas can be restored to reduce the need for re-transmission。 The focus of this paper was on the application of RSA digital certificates and the use of RFID for images or documents。 In practice this emphasized the RSA cipher system。 The actual implementation consisted of four parts: 1。 a key generation system, 2。 a RSA encryption/decryption system, 3。 an image digital certificate, and 4。 an image characteristic comparison。 For the digital certificate, the weighted average method was applied to the pixel values to derive ten sets of eigenvalues in place of miscellaneous functions。 The RSA public key was then used to encrypt the ten sets of eigenvalues to generate the digital certificate。 The encryption result was presented as ten sets of encryption text for use in image or document recognition。 In the interest of recognition speed, the user simply uses the actual image or document to generate the 10 sets of eigenvalues and then acquires the document/image's private key acquired through the ID-Base。 The RSA private key is used to decrypt and compare the 10 sets of encryption text to find the difference。 The results offer the operator with an indicator of image or document similarity。
author2 Yih-Fuh Wang
author_facet Yih-Fuh Wang
Shu-Ping Liu
劉蜀平
author Shu-Ping Liu
劉蜀平
spellingShingle Shu-Ping Liu
劉蜀平
An RSA-RFID-based Image Authentication System
author_sort Shu-Ping Liu
title An RSA-RFID-based Image Authentication System
title_short An RSA-RFID-based Image Authentication System
title_full An RSA-RFID-based Image Authentication System
title_fullStr An RSA-RFID-based Image Authentication System
title_full_unstemmed An RSA-RFID-based Image Authentication System
title_sort rsa-rfid-based image authentication system
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/60550202112874537736
work_keys_str_mv AT shupingliu anrsarfidbasedimageauthenticationsystem
AT liúshǔpíng anrsarfidbasedimageauthenticationsystem
AT shupingliu yīgèjīyúrsarfidzhīyǐngxiàngquèrènxìtǒng
AT liúshǔpíng yīgèjīyúrsarfidzhīyǐngxiàngquèrènxìtǒng
AT shupingliu rsarfidbasedimageauthenticationsystem
AT liúshǔpíng rsarfidbasedimageauthenticationsystem
_version_ 1718233908102823936