An RSA-RFID-based Image Authentication System
碩士 === 立德大學 === 資訊傳播研究所 === 97 === The image certification technology developed in this study has applications for commercial digital data transactions such as electronic file transfers and video-on-demand。 The use of image verification technology allows for the identification of copyright violation...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/60550202112874537736 |
id |
ndltd-TW-097LU005676040 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097LU0056760402016-04-25T04:29:21Z http://ndltd.ncl.edu.tw/handle/60550202112874537736 An RSA-RFID-based Image Authentication System 一個基於RSA&RFID之影像確認系統 Shu-Ping Liu 劉蜀平 碩士 立德大學 資訊傳播研究所 97 The image certification technology developed in this study has applications for commercial digital data transactions such as electronic file transfers and video-on-demand。 The use of image verification technology allows for the identification of copyright violations or verification of image integrity。 Since Simmons first proposed the hidden data problem with his "how can prisoners in two different jails plan their escape" in 1984, other experts and researchers have begun studying the issue。 Recently, Wu and Liu (2004) proposed identifying optimum hiding points and odd-even correspondence before hiding the data。 Existing image verification research can generally be divided into two main groups。 The first uses watermarking technology while the other uses digital certification technology。 Image verification technology looks at not only whether an image has been tampered with but also how tampered areas can be restored to reduce the need for re-transmission。 The focus of this paper was on the application of RSA digital certificates and the use of RFID for images or documents。 In practice this emphasized the RSA cipher system。 The actual implementation consisted of four parts: 1。 a key generation system, 2。 a RSA encryption/decryption system, 3。 an image digital certificate, and 4。 an image characteristic comparison。 For the digital certificate, the weighted average method was applied to the pixel values to derive ten sets of eigenvalues in place of miscellaneous functions。 The RSA public key was then used to encrypt the ten sets of eigenvalues to generate the digital certificate。 The encryption result was presented as ten sets of encryption text for use in image or document recognition。 In the interest of recognition speed, the user simply uses the actual image or document to generate the 10 sets of eigenvalues and then acquires the document/image's private key acquired through the ID-Base。 The RSA private key is used to decrypt and compare the 10 sets of encryption text to find the difference。 The results offer the operator with an indicator of image or document similarity。 Yih-Fuh Wang 王億富 2009 學位論文 ; thesis 110 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 立德大學 === 資訊傳播研究所 === 97 === The image certification technology developed in this study has applications for commercial digital data transactions such as electronic file transfers and video-on-demand。 The use of image verification technology allows for the identification of copyright violations or verification of image integrity。 Since Simmons first proposed the hidden data problem with his "how can prisoners in two different jails plan their escape" in 1984, other experts and researchers have begun studying the issue。 Recently, Wu and Liu (2004) proposed identifying optimum hiding points and odd-even correspondence before hiding the data。
Existing image verification research can generally be divided into two main groups。 The first uses watermarking technology while the other uses digital certification technology。 Image verification technology looks at not only whether an image has been tampered with but also how tampered areas can be restored to reduce the need for re-transmission。
The focus of this paper was on the application of RSA digital certificates and the use of RFID for images or documents。 In practice this emphasized the RSA cipher system。 The actual implementation consisted of four parts: 1。 a key generation system, 2。 a RSA encryption/decryption system, 3。 an image digital certificate, and 4。 an image characteristic comparison。 For the digital certificate, the weighted average method was applied to the pixel values to derive ten sets of eigenvalues in place of miscellaneous functions。 The RSA public key was then used to encrypt the ten sets of eigenvalues to generate the digital certificate。 The encryption result was presented as ten sets of encryption text for use in image or document recognition。 In the interest of recognition speed, the user simply uses the actual image or document to generate the 10 sets of eigenvalues and then acquires the document/image's private key acquired through the ID-Base。 The RSA private key is used to decrypt and compare the 10 sets of encryption text to find the difference。 The results offer the operator with an indicator of image or document similarity。
|
author2 |
Yih-Fuh Wang |
author_facet |
Yih-Fuh Wang Shu-Ping Liu 劉蜀平 |
author |
Shu-Ping Liu 劉蜀平 |
spellingShingle |
Shu-Ping Liu 劉蜀平 An RSA-RFID-based Image Authentication System |
author_sort |
Shu-Ping Liu |
title |
An RSA-RFID-based Image Authentication System |
title_short |
An RSA-RFID-based Image Authentication System |
title_full |
An RSA-RFID-based Image Authentication System |
title_fullStr |
An RSA-RFID-based Image Authentication System |
title_full_unstemmed |
An RSA-RFID-based Image Authentication System |
title_sort |
rsa-rfid-based image authentication system |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/60550202112874537736 |
work_keys_str_mv |
AT shupingliu anrsarfidbasedimageauthenticationsystem AT liúshǔpíng anrsarfidbasedimageauthenticationsystem AT shupingliu yīgèjīyúrsarfidzhīyǐngxiàngquèrènxìtǒng AT liúshǔpíng yīgèjīyúrsarfidzhīyǐngxiàngquèrènxìtǒng AT shupingliu rsarfidbasedimageauthenticationsystem AT liúshǔpíng rsarfidbasedimageauthenticationsystem |
_version_ |
1718233908102823936 |