跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.172) 您好!臺灣時間:2025/09/11 21:08
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:邱數恩
研究生(外文):Shu-en Ciou
論文名稱:在電子商務中可以保護價格隱私的新價格忘卻式協定
論文名稱(外文):A Revised Priced Oblivious Transfer Protocol for Privacy Preserving in E-commerce
指導教授:施東河施東河引用關係
指導教授(外文):Dong-Her Shih
學位類別:碩士
校院名稱:國立雲林科技大學
系所名稱:資訊管理系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:英文
論文頁數:41
中文關鍵詞:價格忘卻式傳輸協定視覺密碼數位浮水印
外文關鍵詞:Digital WatermarkingVisual Cryptography TechniquePriced Oblivious Transfer
相關次數:
  • 被引用被引用:0
  • 點閱點閱:193
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
由於通訊網路的普及,電子商務也隨之蓬勃發展。現存已有一種稱為「價格忘卻式傳輸」的傳輸協定,適用於當買家向賣家進行商品交易時,他不願意透漏他購買的商品是什麼,藉以保護自己的隱私。但是,假使有惡意買家在購買後,非法釋出此數位商品,賣家則無法得到保障,因此,此協定已經發展至擁有保護賣家的版權機制,名叫PBSW 協定。我們發現「價格忘卻式傳輸」協定在商品交取的過程中有漏洞,無法確實保護買家的隱私,使買家不能放心進行交易。本篇論文修正「價格忘卻式傳輸」協定的模組,加入取得買賣雙方信任的公正第三方角色來實現能夠保護買家隱私的商品交易。因為原本「價格忘卻式傳輸」協定使用的浮水印機制是嵌入至數位商品中,會降低產品本身品質,我們也修正了浮水印機制,使用視覺密碼加密技術提出一個有效率的新價格忘卻式協定。我們實現了「價格忘卻式傳輸」的定義,重新規劃現有的協定模組,提出「新價格忘卻式傳輸」協定,在實驗過程中,以圖片為交易產品的例子,並使用可視性浮水印機制來測試浮水印的強度,經實驗結果,本研究的浮水印機制強度能夠抵擋大部分的對產品的攻擊。本篇研究有以下兩個貢獻,改善「價格忘卻式傳輸」協定,使買家可以在保護自己隱私的環境中進行交易和 建構秘密分享的產生流程,使之更具實用性。
Because the rapid development of network, the e-commerce also flourishing. There is an existing transaction protocol called Priced Oblivious Transfer (POT). It is applied that when a buyer wants to perform transactions with a seller, he would not disclose what he purchased. But, if there is a malicious buyer release the digital product illegally after buying it, the seller cannot be protected. Therefore, the protocol has been developed to protect the copyright for sellers, it called PBSW protocol. We discovered there are some defects in the POT protocol, when seller send the digital product to buyer, the privacy of buyer might be disclosed. The mechanism is not secure enough for buyer to perform purchase. In this paper, we revised these defects of POT protocol. In order to achieve protecting buyers’ privacy, we add a trust distributor in whole trade model. Because the watermarking technique in PBSW protocol is embedded the watermark into the digital product, the quality of product will be reduced. So, we also change the watermarking mechanism, we utilize the visual cryptography technique and proposed a Revised Priced Oblivious Transfer Protocol (RPOT). Our study achieves the definition in POT protocol by re-planning its model. In our experiment, we take the picture as an example, and utilize Visual Cryptography Technique to test robustness. The result of experiment, our watermarking mechanism is robust enough to resist attacks. The main contributions include the following. First, we improved the POT protocol and let buyers can buy in an environment which is privacy. Second, we conduct the process of generating secret share to make it more practical.
Abstract (In Chinese)........................i
Abstract (In English)........................ii
acknowledgement..............................iii
Content......................................iv
List of Tables...............................v
List of Figures..............................vi
1. Introduction..............................1
2. Preliminaries.............................3
2.1 Digital Watermark........................3
2.2 Visual Cryptography......................5
2.3 k-out-of-N Oblivious Transfer............6
2.4 Priced Oblivious Transfer Protocol.......7
2.5 Weakness of PBSW Protocol................9
3. Proposed RPOT Protocol....................12
3.1 Secret Share Generation Stage............15
3.2 Watermark Extraction Stage...............17
3.3 RPOT Protocol............................17
3.3.1 Initial Phase........................18
3.3.2 Purchase Phase.......................19
3.3.3 Watermark Generation Phase...........20
3.3.4 Arbitration Phase....................21
4. Experiment................................22
4.1 Experimental Design......................23
4.2 Experimental Result......................23
5. Analyze..............................27
5.1 Security Analyze.........................27
5.2 Discussion...............................29
6. Conclusion and Future Work................30
References...................................31
[1]Tae, H. R., Cheol, K. A., and Ingoo, H., 2005, "The priority factor model for customer relationship management system success," Expert Systems with Applications, Volume 28, Issue 4, pp.641–654.
[2]George, S. D., 1994, "The capabilities of market-driven organizations," Journal of Marketing, Volume 58, Issue 4, pp.37-52.
[3]Sheehan, K. B., Hoy, M. G., 1999, "Flaming, complaining, abstaining: how online users respond to privacy concerns," Journal of Advertising, Volume 28, Issue 3, pp.37-51.
[4]Wang, P., Petrison, L. A., 1993, "Direct marketing activities and personal privacy," Journal of Direct Marketing, Volume 7, Issue 1, pp.7-19.
[5]Chaum. D., 1985, "Security without identification: Transaction systems to make big brother obsolete," Communications of the ACM, Volume 28, Issue 10, pp.1030-1044.
[6]Aiello, W., Ishai, Y., and Reingold, O., 2001, "Priced oblivious transfer: How to sell digital goods," In Birgit Pfitzmann, editor, Advances in Cryptology-EUROCRYPT, Volume 2045, pp.119-135.
[7]Rial, A., Kohlweiss, M., and Preneel, B., 2009, "Universally composable adaptive priced oblivious transfer," In Pairing, ser. Lecture Notes in Computer Science, Volume 5671, pp.231-247.
[8]Rial, A., Balasch, J., and Preneel,B., 2011, "A Privacy-Preserving Buyer–Seller Watermarking Protocol Based on Priced Oblivious Transfer," Information Forensics and Security, IEEE Transactions on, Volume 6, Issue 1, pp.202-212.
[9]Celik, M. U. et al., 2005, "Lossless generalized-LSB data embedding," IEEE Transactions on Image Processing, Volume 14, Issue 2, pp.253-266.
[10]Wang, C. C., Tai, S. C., and Yu, C. S., 2000, "Repeating image watermarking technique by the visual cryptography," IEICE Transactions on Fundamentals, Volume E83-A, Issue 8, pp.1589-1598.
[11]Hsieh, S. L., and Huang, B. Y., 2004, "A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation," Proceedings of International Computer Symposium, pp.661-666.
[12]Chang, C. C., and Chung, J. C., "An image intellectual property protection scheme for gray-level images using visual secret sharing strategy," Pattern Recognition Letters, Volume 23, Issue 8, 2002, pp.931-941.
[13]Lou, D. C., Tso, H. K., and Liu, J. L. "A copyright protection scheme for digital images using visual cryptography technique," Computer Standards & Interfaces, Volume 29, Issue 1, 2007, pp.125-131.
[14]Rabin, M. O. "How to exchange secrets by oblivious transfer, " ACM Transactions of Computer Systems, Volume 1, issue 20, 1983, pp. 175-193.
[15]Wakaha, O. and Ryota, S. "k out of n oblivious transfer without random oracle," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume E87-A, issue 1, 2004, pp. 147-151.
[16]Hartung, F., and Kutter, M. "Multimedia watermarking techniques," Proceedings of the IEEE, Volume 87, Issue 7, 1999, pp.1079-1107.
[17]Naor, M., and Shamir, A. "Visual cryptography,” Advances in cryptology-EUROCRYPT ''94, 1998, pp.1-12.
[18]Wang, C. C., Tai, S. C., and Yu, C. S. "Repeating image watermarking technique by the visual cryptography," IEICE Transactions on Fundamentals, Volume E83-A, Issue 2000, pp.1589-1598.
[19]Wang, Y., Doherty, J. F., and Van Dyck, R. E. "A wavelet-based watermarking algorithm for ownership verification of digital images," IEEE Transactions on Image Processing, Volume 11, Issue 2, 2002, pp.77–88.
[20]Chen, T. H. and Tsai, D. S. "Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol," Pattern Recognition, Volume 39, Issue 8, 2006, pp.1530-1541.
[21]Rial, A., and Preneel, B. "Optimistic fair priced oblivious transfer," In Proceedings of AFRICACRYPT., Volume 6055, 2010, pp.131–147.
[22]Hu, M. C., Lou, D. C., and Chang, M. C. "Dual-wrapped digital watermarking scheme for image copyright protection," Computers & Security, Volume 26, Issue 4, 2007, pp.319-330.
[23]Lou, D. C., Tso, H. K., and Liu, J. L. "A copyright protection scheme for digital images using visual cryptography technique," Computer Standards & Interfaces, volume 29, issue 1, 2007, pp.125-131.
[24]Desmedt, Y., Hou, S., and Quisquater, J. J. "Audio and Optical Cryptography," Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology, 1998, pp.392-404.
[25]Lin, C. C., Laih, C. S., and Yang, C. N. "New Audio Secret Sharing Schemes With Time Division Technique," Journal of Information Science and Engineering, 2003, pp.605-614.
[26]Socek, D., and Magliveras, S. S. "General access structures in audio cryptography," Electro Information Technology, 2005 IEEE International Conference on, 2005, pp.-6.
[27]Thomas, T. et al., "Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture," Information Forensics and Security, IEEE Transactions on, volume 4, issue 4, 2009, pp.758-767.
[28]Hsieh S.L., Huang B.Y., "A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation," Proceedings of International Computer Symposium, 2004, pp. 661-666.
[29]Rachel R. "7 Reasons Distributors Should Get Into Ecommerce in 2011" http://www.info.insitesoft.com/Insite-Software-Blog/bid/58357/7-Reasons-Distributors-Should-Get-Into-Ecommerce-in-2011, 2011.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊