(34.236.244.39) 您好!臺灣時間:2021/03/09 18:52
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:陳育廷
論文名稱:基於秘密分享之網站鑑識研究
論文名稱(外文):Web-site Forensics upon Secret Sharing
指導教授:王旭正王旭正引用關係
學位類別:碩士
校院名稱:中央警察大學
系所名稱:資訊管理研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
畢業學年度:99
語文別:中文
中文關鍵詞:偽造網站秘密分享機制電腦鑑識ADAPT訊息嵌入
外文關鍵詞:secret sharingcomputer forensicscounterfeit website
相關次數:
  • 被引用被引用:0
  • 點閱點閱:119
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:1
  • 收藏至我的研究室書目清單書目收藏:0
偽造網站複製原始網站進行相同商業行為,造成原始網站權益的損失,原始網站擁有者必須提出證據說明原始網站版權所有,打擊偽造網站侵權行為。本文提出ADAPT訊息嵌入方法,採用英文縮寫(Abbreviation)、製作日期(Date)、演算法則(Algorithm)、執行人員(Person)、運用工具(Tool)等5項訊息,組成原始擁有者唯一知悉有意義的24字元特殊訊息,透過One-Way Hash Function的運算,將藏有DIGEST秘密影像,利用視覺安全技術-秘密分享機制,以密鑰分散管理、降低風險的概念,分散至網頁圖片偽裝體。當出現偽造網站侵權爭議時,依循電腦鑑識採證程序確保證據力及證明力,並結合秘密分享機制還原秘密影像取出DIGEST值,藉由比對DIGEST值證明原始網站所有,亦可達成資安技術的機密性(Confidentiality)、完整性(Integrity)及可用性(Availability)要求。
第一章 簡介.............................5
1.1 前言...............................5
1.2 研究動機與目的......................5
第二章 文獻探討.........................8
2.1 視覺安全與秘密分享機制...............8
2.2 電腦鑑識...........................13
2.3 數位證據的證據能力與證明力...........16
2.4 偽裝體的鑑識分析....................18
第三章 原始網站的視覺安全................20
3.1 ADAPT訊息嵌入......................21
3.2 秘密分享機制應用....................26
第四章 討論分析........................34
4.1 萃取DIGEST比對訊息.................36
4.2 偽造網站鑑識原則分析................37
4.3 實驗結果的安全性分析[4].............38
第五章 結論............................40
參考文獻...............................41
[1]徐宏昇,網路智慧財產權完整解析,寶鼎出版社,2005。
[2]蔡雅惠,蔡文祥,“用於網頁版權保護的資訊隱藏方法,”NCS全國計算機會議,2003。
[3]購物網站有分身?疑是詐騙新手法,http://www.epochtimes.com/b5/8/6/19/n2160773.htm,2008。
[4]林祝興,張明信,資訊安全導論,旗標出版社,2009。
[5]J. Ashcroft, “Electronic Crime Scene Investigation: A Guide for First Responders,” U.S Department of Justice, Office of Justice Programs, National Institute of Justice, 2001.
[6]J. Ashcroft, D.J. Daniels, and S.V. Hart, “Forensic Examination of Digital Evidence: A Guide for Law Enforcement,” U.S Department of Justice, Office of Justice Programs, National Institute of Justice, 2004.
[7]E. Casey, “Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet,” Academic Press, 2000.
[8]A. Castiglione, A. D. Santis, and C. Soriente, “Taking Advantages of a Disadvantage: Digital Forensics and Steganography Using Document Metadata,” Journal of Systems and Software, Vol. 80, No. 5, pp.750–764, 2007.
[9]Y. T. Chen, C. H. Yang, and S. J. Wang, “Secret Embedding and Reconstruction for Authentications in Steganography upon Secret Sharing Systems,” The 5th International Conference on Future Information Technology, Korea, pp. 1–6, 2010.
[10]C. C. Chang and I. C. Lin, “A new (t, n) threshold image hiding scheme for sharing a secret color image,” Proceedings of International Conference on Communication Technology, pp. 196–202, 2003.
[11]J. B. Feng, H. C. Wu, C. S. Tsai, and Y. P. Chu, “A new multi-secret images sharing scheme using Largrange’s interpolation,” The Journal of Systems and Software Vol. 76, No. 3, pp.327–339, 2005.
[12]S. L. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, “Bringing Science to Digital Forensics with Standardized Forensic Corpora,” Digital Investigation, Vol. 6, No 1. , pp.2–11, 2009.
[13]S. L. Garfinkel, “Digital Forensics Research: The next 10 years,” Digital Investigation, Vol. 7, No. 1, pp.64–73, 2010.
[14]G. Horng, T. H. Chen, and D. S. Tsai, “Cheating in Visual Cryptography,” Designs, Codes and Cryptography, Vol. 38, No. 2, pp. 219–236, 2006.
[15]W. G. Kruse and J. G. Heiser, “Computer Forensics: Incident Response Essentials,” Addison-wesley, 2002.
[16]C. C. Lin and W. H. Tsai, “Secret Image Sharing with Steganography Authentication,” The Journal of Systems and Software, Vol. 73, No. 3, pp. 405–414, 2004.
[17]C. C. Lin and W. H. Tsai, “Visual cryptography for gray-level images by dithering techniques,” Pattern Recognition Letters, Vol. 24, No. 1–3, pp.349–358, 2003.
[18]S. Lee, A. Savoldi, K. S. Lim, J. H. Park, and S. Lee, “A Proposal for Automating Investigations in Live Forensics,” Computer Standards & Interfaces, Vol. 32, No.5-6, pp.246–255, 2010.
[19]M. Naor and A. Shamir, “Visual Cryptography,” in Proceedings of Eruocrypt’94, Lecture Notes in Computer Science, Springer-Verlag, pp. 1–12, 1994.
[20]S. Perumal, “Digital Forensic Model Based on Malaysian Investigation Process,” International Journal of Computer Science and Network Security, Vol. 9, No. 8, pp.38–44, 2009.
[21]P. Sommer, “Forensic Science Standards in Fast-changing Environments,” Science &Justice, Vol. 50, No. 1, pp.12–17, 2010.
[22]A. Shamir, “How to Share a Secret,” Communications of the Association for Computing Machinery, Vol. 22, No. 11, pp. 612–613, 1979.
[23]C. C. Thien and J. C. Lin, “Secret Image Sharing,” Computers and Graphics, Vol. 26, No. 5, pp. 765–770, 2002.
[24]C. C. Thien and J. C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 12, pp.1161–1169, 2003.
[25]J. R. Vacca, “Computer Forensics: Computer Crime Scene Investigation, Charles River Media,” Charles River Media, 2002.
[26]S. J. Wang, I. S. Lin, L. C. Lin, and W. Y. Chiang, “Secret Sharing Systems with Authentication-based Steganography,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing, No. 15-17, pp. 1146–1149, 2008.
[27]H. B. Wolfe, “Computer Forensics,” Computers and Security, Vol. 22, No. 2, pp. 26-28, 2003.
[28]R. Z. Wang, C. F. Lin, and J. C. Lin, “Image Hiding by Optimal LSB Substitution and Genetic Algorithm,” Pattern Recognition, Vol. 34, No. 3, pp. 671–683, 2001.
[29]C. N. Yang, T. S. Chen, K. H. Yu, and C. C. Wang, “Improvements of Image Sharing with Steganography and Authentication,” Journal of Systems and software, Vol. 80, No. 7, pp. 1070–1076, 2007.
[30]C. H. Yang, “Inverted Pattern Approach to Improve Image Quality of Information Hiding by LSB Substitution,” Pattern Recognition, Vol. 41, No. 8, pp.2674–2683, 2008.
[31]C. N. Yang, T. S. Chen, K. H. Yu, and C. C. Wang, “Cheating-Immune Secret Image Sharing Scheme with Steganography,” in Proceedings of the 16th National Conference on Information Security, R.O.C., Taiwan, 2006.
[32]R. Zax and F. Adelstein, “ FAUST: Forensic Artifacts of Uninstalled Steganography Tools,” Digital Investigation, Vol. 6, No. 1–2, pp. 25-38, 2009.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔