跳到主要內容

臺灣博碩士論文加值系統

(44.212.94.18) 您好!臺灣時間:2023/12/10 15:04
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:賴晉賢
研究生(外文):Jing-Sian Lay
論文名稱:結合視覺密碼與 QR Code 之防偽認證機制
論文名稱(外文):Anti-counterfeiting authentication mechanism combined with visual secret sharing and QR code
指導教授:吳憲珠黃慧鳳黃慧鳳引用關係
指導教授(外文):Hsien-Chu WuHui-Feng Huan
學位類別:碩士
校院名稱:國立臺中科技大學
系所名稱:資訊工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2019
畢業學年度:107
語文別:中文
論文頁數:52
中文關鍵詞:二維條碼視覺密碼防偽認證第二因子認證
外文關鍵詞:QR CodeVisual Secret Sharing2FA
相關次數:
  • 被引用被引用:0
  • 點閱點閱:145
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本文提出具有意義視覺密碼的QR Code防偽認證機制,針對傳統視覺密碼中分享影像不具識別性的雜訊影像及行動裝置以公眾網路進行服務存取時易受有心人以中間人攻擊取得分享影像的問題,本文提出的方法是將做為防偽驗證機密影像,以QR Code 做為分享影像的掩蓋影像使分享影像具有視覺辨識意義且不影響機密影像的安全,而驗證時將分享影像疊合即可得到機密影像資訊。當以QR Code進行驗證時,需使用行動裝置存取儲存於資料庫中的分享影像進行驗證,本文也提出以第二因素認證的方法,在行動裝置存取分享影像時,使用第二因素認證中的DES區塊加密模組,對使用者和資料庫間傳輸的分享影像加密使分享影像在公眾網路通訊更為安全及增加使用者的身分驗證保護。本文方法增加視覺密碼分享影像的友善分享特性,具有安全與不易攻擊的特點。
In this thesis, an innovative QR code authentication mechanism with meaningful visual secret sharing is proposed. In traditional verification processes, the images would be easily copied and stole during the public network transmission via mobile devices. This proposed scheme is a hybrid transformation of QR Code and the secret/target image to generate the share images with identification but also security during as it is transmitted, and it can be decoded with image superposition computation. Moreover, the share image can be stored locally in the mobile to facilitate the user decoding processes. The second factor authentication methodology is also applied in this work. DES sub-area encryption is utilized to enhance the transmission security within public network service. The features of the proposed scheme are friendliness, safety and robustness.
中文摘要 i
Abstract ii
誌謝 iii
目錄 iv
表目錄 v
圖目錄 vi
第一章 緒論 1
1.1研究背景 1
1.2研究動機與目的 3
1.3研究方法 4
第二章 文獻探討 7
2.1真品證明書 7
2.2條碼的發展 12
2.2.1 一維條碼 13
2.2.2 二維條碼 QR Code 16
2.2.3 QR Code 藝術化 21
2.3第二因素認證 23
2.4視覺密碼 23
2.4.1隨機網格 25
2.4.2有意義影像分享 27
第三章 研究方法 29
3.1 研究架構 29
3.2 研究工具 30
3.2.1 視覺密碼開發工具 Microsoft Visual C# 30
3.2.2 QR Code 產生工具Microsoft Visual Code 30
3.2.3 第二因素認證驗證 DS28C36 展示套件 31
3.3防偽QR Code發行驗證方法 32
3.4第二素因認證 34
3.5影像加密區塊加密 37
第四章 實驗結果 39
4.1環境及架構設定 39
4.2研究結果 39
實驗一 40
實驗二 42
實驗三 44
實驗四 47
第五章 結論與未來研究方向 48
5.1研究結論 48
5.2未來研究方向 48
參考文獻 50
[1] 經濟部智慧財產局, “EUIPO-OECD發布最新仿冒與盜版品貿易趨勢報告,” 23 4 108. [線上]. Available: https://www.tipo.gov.tw/ct.asp?xItem=703908&ctNode=7124&mp=1.
[2] R. a. Markets, "Global Brand Counterfeiting Report 2018," 2018.
[3] "Certificate of authenticity," [Online]. Available: https://en.wikipedia.org/wiki/Certificate_of_authenticity. [Accessed 5 8 2019].
[4] "License Sticker (COA)," [Online]. Available: https://www.msembedded.biz/en/licensing/license-sticker/. [Accessed 1 7 2019].
[5] "Case Studies," [Online]. Available: https://www.delarue.com/global-insights/case-studies. [Accessed 1 7 2019].
[6] "ISO 14298," [Online]. Available: https://www.securityprinters.org/index.php/intergraf-certification/iso-14298-and-cwa-15374. [Accessed 1 7 2019].
[7] . A. Espejel-Trujillo, . I. Castillo-Camacho, M. Nakano-Miyatake and H. Perez-Meana, "Identity document authentication based on VSS and QR codes," Procedia Technology, vol. 3, pp. 241-250, 2012.
[8] "How to Tell - Software - Microsoft," [Online]. Available: https://www.microsoft.com/en-us/howtotell/Software.aspx.
[9] "How to Tell – Hardware," [Online]. Available: https://www.microsoft.com/en-gb/howtotell/Hardware.aspx.
[10] “英特爾中國盒裝處理器正版驗證,” [線上]. Available: https://cbaa.intel.com/hint.aspx.
[11] "Barcode," [Online]. Available: https://en.wikipedia.org/wiki/Barcode.
[12] "Mechanism of barcode scanning," DENSO WAVE, [Online]. Available: https://www.denso-wave.com/en/adcd/fundamental/barcode/scan/index.html.
[13] "code 39," [Online]. Available: https://en.wikipedia.org/wiki/Code_39. [Accessed 1 7 2019].
[14] “QR開発、きっかけはバーコードの限界 生みの親が語る,” [線上]. Available: https://www.asahi.com/articles/ASL2H6RTGL2HUZVL004.html. [存取日期: 5 8 2019].
[15] "ISO IEC 18004 2015 Standard," [Online]. Available: https://www.iso.org/standard/62021.html.
[16] H. K. C. C. S. L. R. R. &. M. N. J. Chu, "Halftone QR Codes.".ACM Transactions on Graphics (TOG), 32(6), 217..
[17] "FIDO2," [Online]. Available: https://fidoalliance.org/specifications/.
[18] M. Naor and A. Shamir, "Visual cryptography," in Workshop on the Theory and Application of of Cryptographic Techniques, Perugia, 1994.
[19] O. Kafri and E. Keren, "Encryption of pictures and shapes by random grids," Optics letters, vol. 12, no. 6, pp. 377-379, 1987.
[20] G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, "Extended capabilities for visual cryptography," Theoretical Computer Science, vol. 250, no. 1-2, pp. 143-161, 2001.
[21] "DS28C36," [Online]. Available: https://www.maximintegrated.com/cn/products/embedded-security/secure-authenticators/DS28C36.html. [Accessed 1 7 2019].
[22] "DENSO WAVE QR Code," [Online]. Available: https://www.qrcode.com/zh/. [Accessed 5 8 2019].
[23] "Fail-safe," [Online]. Available: https://en.wikipedia.org/wiki/Fail-safe.
[24] "A Simple Solution Simplifies Authentication to Ensure Device Security," [Online]. Available: https://www.digikey.com/en/articles/techzone/2018/jun/a-simple-solution-simplifies-authentication-to-ensure-device-security. [Accessed 1 7 2019].
[25] "Implementing Secure Authentication Without Being a Cryptography Expert," [Online]. Available: https://www.maximintegrated.com/cn/app-notes/index.mvp/id/6391. [Accessed 1 7 2019].
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top