跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.223) 您好!臺灣時間:2025/10/08 08:40
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳啟銘
研究生(外文):Chi-Ming Chen
論文名稱:雲端網路視訊電話之門禁管制認證設計與實作
論文名稱(外文):Design and Implementation of Access Control Authentication for in-Cloud Video/Voice over IP
指導教授:張保榮
指導教授(外文):Bao Rong Chang
學位類別:碩士
校院名稱:國立高雄大學
系所名稱:資訊工程學系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:英文
論文頁數:50
中文關鍵詞:門禁安全認證系統
外文關鍵詞:Access Control Authentication
相關次數:
  • 被引用被引用:0
  • 點閱點閱:206
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本研究的目的是實現在雲端系統上設計一個具有門禁安全認證系統的網路視訊電話(Video/Voice over IP),簡稱VVoIP,可讓各種不同作業系統的PC或Notebook以web介面方式且使用以Authentication、Authorization、Accounting (AAA)管理機制登入雲端計算系統,透過雲端計算系統作人臉辨識和指紋辨識的認證與帳號和密碼的驗證來登入視訊電話系統,便能使用雲端VVoIP應用程式與另一位線上使用者做即時網路視訊通話。對於Android行動裝置的使用者則經由Android Market下載及安裝我們發佈雲端的門禁安全認證系統和VVoIP 的應用程式來使用。門禁安全認證系統應用程式的影像傳輸服務是採用TCP/IP通訊協定,而生物辨識是採用人臉和指紋的影像來辨識使用者身分,經由身分驗證通過後,使用者才能順利登入VVoIP系統。最後根據實驗結果,我們所提出的雲端網路視訊電話的效能是優於其他市面上相類似的產品。
The purpose of this study is to implement an access control authentication system for Video/Voice over IP, commonly called VVoIP, on the cloud system, where different operation systems on the PC or Notebook can proceed to the scheme of Authentication, Authorization, and Accounting (AAA) management through web interfaces to log into the cloud computing system. The cloud computing system will authenticate using face recognition and fingerprint identification, as well as verify user account and password in order to log into the video/voice over IP system, so that one can use the cloud VVoIP application to have an instant Internet video phone chat with another online user. For Android users, they will need to download and install the cloud access control authentication system and the VVoIP application released by us on the Android Market. The video transmission service used in the access control authentication is adopted from TCP/IP protocol, and the biometrics used to identify user identity is adopted from face and fingerprint images. After the identity verification is complete, users can successfully sign in online VVoIP system. Finally, regarding performance evaluation, as a result the experiments show that the proposed approach outperforms the other biometric devices in the current market.
1 摘要 ii
2 ABSTRACT iii
3 誌謝 iv
4 Directory v
5 List of Figures vi
6 List of Tables vii
Chapter 1. Introduction 1
Chapter 2. Background and Related Work 5
2.1 Biometric access control product - FaceKey 7
2.2 Biometric access control product - FACE ID2 8
2.3 Biometric access control product - eSSL 9
Chapter 3. Research Method 12
3.1 Deployment of the cloud host-Proxmox Virtual Environment 12
3.2 Establishment of access control authentication system 13
3.2.1 Create virtual machine and install Ubuntu 10.04 OS 13
3.2.2 Build application servers in the virtual machine 15
3.3 Communication architecture in both server and client 17
3.4 Operation procedure of access control authentication system 19
3.5 Setup of developing environment 21
3.6 Execution of access control authentication system 22
3.7 Performance indicators of biometrics 25
Chapter 4. Experimental Results and Discussion 29
4.1 Experimental environment 29
4.2 Experimental results 30
4.2.1 Using access control authentication system on the PC 30
4.2.2 Using access control authentication system on the browser 32
4.2.3 Using access control authentication system on the smart phone 34
4.2.4 Performance evaluation of access control authentication system 35
4.2.5 Performance assessment of access control authentication system on the smart phone 36
4.2.6 Stress test 37
Chapter 5. Conclusion 38
References 40
[1] A. Beloglazov and R. Buyya, “Energy Efficient Allocation of Virtual Machines in Cloud Data Centers,” in Proceeding of 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 577-578, 2010.
[2] R. Laurikainen, J. Laitinen, P. Lehtovuori, and J. K. Nurminen, “Improving the Efficiency of Deploying Virtual Machines in a Cloud Environment,” in Proceeding of 2012 International Conference on Cloud and Service Computing, pp. 232-239, 2012.
[3] S. Sotiriadis, N. Bessis, and F. Xhafa, and N. Antonopoulos, “Cloud Virtual Machine Scheduling: Modelling the Cloud Virtual Machine Instantiation,” in Proceeding of 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems, pp. 233-240, 2012.
[4] VMware Virtualization, 2011.
http://www.vmware.com/virtualization/
[5] Windows Server 2012 R2, 2012.
http://www.microsoft.com/zh-tw/server-cloud/products/windows-server-2012-r2/
[6] Proxmox Server Solution GmbH, 2012.
http://www.proxmox.com/
[7] Google App Engine, 2010.
https://developers.google.com/appengine/
[8] Amazon Web Services (AWS), 2010.
http://aws.amazon.com/
[9] Windows Azure- A Microsoft Solution to Cloud, 2010.
http://tech.cipper.com/index.php/archives/332
[10] IBM Cloud Compputing, 2010.
http://www.ibm.com/ibm/cloud/
[11] OpenNebula, 2010.
http://www.opennebula.org/
[12] Eucalyptus, 2010.
http://open.eucalyptus.com/
[13] Welcome to Apache Hadoop, 2010.
http://hadoop.apache.org/
[14] Sector/Sphere, National Center for Data Mining, 2009. http://sector.sourceforge.net/
[15] B. R. Chang, H. F. Tsai, Z.-Y. Lin, and C.-M. Chen, “Intelligent VVoIP Implementation in UEC Cloud Computing,”, in Proceeding of 2012 International Conference on Machine Learning and Cybernetics, Vol. 2, pp. 519-524, 2012.
[16] B. R. Chang, H. F. Tsai, Z.-Y. Lin, and C.-M. Chen, “Access-controlled Video/Voice over IP in Hadoop System With BPNN Intelligent Adaptation,” in Proceeding of 2012 International Conference on Information Security and Intelligence Control, pp. 325-328, 2012.
[17] B. R. Chang, C.-P. Young, H. F. Tsai, and R.-Y. Fang, “Timed PR-SCTP for Fast Voice/Video over IP in Wired/Wireless Environments,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 4, pp. 320-331, 2011.
[18] B. R. Chang, H. F. Tsai, C.-P. Young, and R.-Y. Fang, “Embedded System for Inter-Vehicle Heterogeneous-Wireless-based Real-Time Multimedia Streaming and Video/Voice over IP,” in Proceeding of 4th International Conference on Innovative Computing, Information and Control, Paper ID: B06-01, 2009.
[19] B. R. Chang, H.-F. Tsai, Z.-Y. Lin, C.-M. Chen, and Chien-Feng Huang, “Adaptive Performance for VVoIP Implementation in Cloud Computing Environment,” Lecture Notes in Artificial Intelligence, Vol. 7198, Part III, pp. 356-365, 2012.
[20] C. Metz, “AAA Protocols: Authentication, Authorization, and Accounting for the Internet,” Internet Computing (IEEE), Vol. 3, No. 6, pp. 75-79, 1999.
[21] Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, pp. 4-20, 2004.
[22] Josh Harguess, Changbo Hu and J. K. Aggarwal, “Fusing Face Recognition from Multiple Cameras,” in Proceeding of 2009 Workshop on Applications of Computer Vision, pp. 1-7, 2009.
[23] Xudong Jiang, Manhua Liu and Alex Chichung Kot, “Reference Point Detection for Fingerprint Recognition,” in Proceeding of the 17th International Conference on Pattern Recognition, Vol. 1, pp. 540-543, 2004.
[24] Christoph Böhm and Maximilian Hofer, Physical Unclonable Functions in Theory and Practice, Springer Verlag, USA, 2012.
[25] Aur´elien Mayoue, Biosecure Tool-Performance Evaluation of a Biometric Verification System, 2007, https://www.google.com.tw/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CBwQFjAA&url=http%3A%2F%2Fsvnext.it-sudparis.eu%2Fsvnview2-eph%2Fref_syst%2FTools%2FPerformanceEvaluation%2Fdoc%2FhowTo.pdf&ei=iEEFVMmfD4eC8gXwwIKAAw&usg=AFQjCNFInH2b5cdXfNRLnY-lz3-lqOUhCA&bvm=bv.74115972,d.dGc&cad=rja.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top