跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.35) 您好!臺灣時間:2025/11/28 21:45
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:黃建禎
研究生(外文):Chien-Chen Huang
論文名稱:照片式憑證:一種產生圖形化公開金鑰憑證的架構
論文名稱(外文):Photo Certificate – A Framework for Generating Visualized Public Key Certificates
指導教授:李維斌李維斌引用關係
指導教授(外文):Wei-Bin Lee
學位類別:碩士
校院名稱:逢甲大學
系所名稱:資訊工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:英文
論文頁數:31
中文關鍵詞:認證PKI憑證X.509浮水印
外文關鍵詞:AuthenticationPKIPKIWatermarkingX.509Certificate
相關次數:
  • 被引用被引用:0
  • 點閱點閱:300
  • 評分評分:
  • 下載下載:29
  • 收藏至我的研究室書目清單書目收藏:1
在公開金鑰加解密系統中,公開金鑰的驗證對於加密資料的安全性而言是不可缺的議題。而X.509公開金鑰基礎建設標準是目前廣泛使用的解決方式。X.509標準定義了在公開金鑰基礎建設中驗證公開金鑰相關的資料格式與運作流程,它是透過一份帶有憑證中心數位簽章的電子憑證來證明公開金鑰的有效性。然而,對於一般使用者來說,很難由憑證內容上所呈現的文字與亂碼數字直接對應想像到公開金鑰擁有者的真實身分。為了解決這個使用上的瑕疵,這篇論文提出了一種產生圖像化憑證的架構。該架構首先將憑證內容的欄位資料依照辨識方式區分為『使用者認證』與『程式驗證』兩大類。不同於傳統憑證,圖像化憑證以圖形化資料如照片、商標、記號等等來表達『使用者認證』欄位資料讓使用者能清楚分辨。此外,考慮到方便性,該架構利用可視與不可視浮水印技術將憑證內容所包含的各個欄位資料整合到一張公開金鑰擁有者的代表照片,使圖像化憑證能以一般電子影像格式呈現憑證內容。這種新型態的圖形化憑證稱為『照片式憑證』。我們以目前常用的影像格式Bitmap來實作這個架構以證明該架構是可行的。
In public-key cryptography, the authentication of public keys is an essential topic for securing electronic data. The X.509 certification authority-based (CA) public key infrastructure (PKI) standard is a widespread solution which explicitly defines data formats and procedures related to the authentication of public key via public key certificates that are digitally sighed by CA. However, the formats of X.509 certificate contents, which consist of randomized integers and string data, are not friendly enough for human to directly associate the identities of real persons. To overcome this drawback, this thesis presents a framework for generating a kind of visualized certificate in image formats. We name this certificate as “photo certificate”. The fields of a certificate are classified into user identification data and program identification data according to their usage. Instead of describing in string data, photo certificate expresses user identification data by a visualized presentation form such as photos, logos, marks, etc. Furthermore, it utilizes watermarking technique for integrating user identification data and program identification data into an image format. We will implement photo certificate in bitmap format to prove that this framework is feasible.
Acknowledgements i
中文摘要 ii
Abstracts iii
Table of Contents iv
List of Figures v
List of Tables vi
Chapter 1 Introduction 1
1.1 Related Knowledge of Public Key Authentication 1
1.1.1 Public-key Infrastructure 2
1.1.2 X.509 Certificate 3
1.2 Motivations 5
Chapter 2 Visualized Certificate 7
Chapter 3 Brief Introduction of Data Hiding 9
3.1 Steganography 10
3.2 Watermarking 10
Chapter 4 Proposed Framework 11
4.1 Preliminary Work 11
4.1.1 Data Classification 11
4.1.2 Format Transformation 12
4.2 Generation Phase 13
4.3 Verification Phase 15
4.4 Implementation 16
4.5 Discussion 19
Chapter 5 Conclusions and Future Works 22
References 23
[1]Data Encryption Standard, Federal Information Processing Standard (FIPS) 46, Nat. Bur. Stand., Jan. 1977
[2]W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transaction on Information and Theory, Vol. IT-22, pp. 644-654, Nov. 1976.
[3]RL Rivest, A Shamir, L Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 1978
[4]M. Van Droogenbroeck, Introduction to PKI- Public Key Infrastructure, European Master in Multimedia Projects, Vol. 1, Feb. 2002
[5]R. Hunt, Technological infrastructure for PKI and digital certification, Computer Communications, Vol. 24, Issue 14, pp. 1460-1471, Sep. 2001
[6]International Telecommunication Union (ITU) URL http://www.itu.int/home/imt.html.
[7]R. Housley, W. Ford, W. Polk, D. Solo, Internet X. 509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459, Jan. 1999
[8]W. Stallings, Cryptography and Network Security (Third Edition), Prentice Hall
[9]C. Ellison, B. Schneier, Ten Risks of PKI: What You’re not Being Told Public Key Infrastructure, Computer Security Journal, Vol. 16, No. 1, pp. 1-7 , 2000
[10]C.-S. Laih and K.-Y. Chen, Generating Visible RSA Public Keys for PKI, International Journal of Information Securit, pp. 103-109, Jan. 2004
[11]C.-S. Laih and J.-W. Hung, “Variants of Certificates and Their Applications in Public Key Infrastructure”, 研考雙月刊, Vol. 29, Issue 1, pp. 53-67, Feb. 2005
[12]C.-C. Thien, J.-C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition, Vol. 36, Issue 12, pp. 2875-2881, Dec. 2003
[13]Y.-H. Yu, C.-C. Chang, I.-C. Lin, A new steganographic method for color and grayscale image hiding, Computer Vision and Image Understanding, Vol. 107, Issue 3, pp. 183-194, Sept. 2007
[14]M. T. Hogan, F. Balado, G.C.M. Silvestre and N.J. Hurley, Secure and robust steganography using side information at the encoder, Information Security, IEE Proceedings, Vol. 153, Issue 3, pp. 87-95, Sept. 2006
[15]Y. Hu and B. Jeon, Reversible Visible Watermarking and Lossless Recovery of Original Images, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, Issue 11, pp. 1423-1429, Nov. 2006
[16]S.-C. Pei and Y.-C. Zeng, A Novel Image Recovery Algorithm for Visible Watermarked Images, IEEE Transactions on Information Forensics and Security, Vol. 1, Issue 4, pp. 543-550, Dec. 2006
[17]Y.-J. Hu; S. Kwong, and J.-W. Huang, An algorithm for removable visible watermarking, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, Issue 1, pp. 129-133, Jan. 2006
[18]P.-L. Lin, Digital watermarking models for resolving rightful ownership and authenticating legitimate customer, Journal of Systems and Software, Vol. 55, Issue 3, pp. 261-271, Jan. 2001
[19]C.-C. Chang, Y.-S. Hu and T.-C. Lu, A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Letters, Vol. 27, Issue 5, pp. 439-446, Apr. 2006
[20]S.-H. Liu, H.-X. Yao, W.-G. and Y.-L. Liu, An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Applied Mathematics and Computation, Vol. 185, Issue 2, pp. 869-882, Feb. 2007
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊