首页 | 本学科首页   官方微博 | 高级检索  
     

基于图像变形的卡用户认知性(英文)
引用本文:赵强福,谢政勋.基于图像变形的卡用户认知性(英文)[J].计算机工程与科学,2012,34(1):11-20.
作者姓名:赵强福  谢政勋
作者单位:1. 日本会津大学计算机科学系,福岛会津965-8580,日本
2. 台湾朝阳科技大学计算机科学与信息工程系,台湾台中41349
摘    要:尽管许多人可能并没有意识到,各类卡已经被广泛应用到我们的日常生活当中。其中,信用卡,现金卡,驾驶执照,等等,其实与钱包同等重要。为了防止这些卡被非法使用,用户认证是必不可少的。最常用的用户认证方法就是要求用户提供某些个人信息。如果用户提供的信息与卡中记录的信息一致,我们就认为用户是合法的。然而如果个人信息被泄露,卡就有可能被非法使用。本论文的目的就是要提供一种新的基于图像变形的卡用户认证方法。其基本思路是把真正持卡人的脸部图像通过图像变形隐藏到某个覆盖数据下,并把恢复原图像所需要的钥匙信息分散保存到卡,终端,服务器等不同地方。在用户使用卡的时候,认证系统可以利用反变形技术恢复原图像,让受权人察知到用户的真伪,从而有效地保护持卡人的权益。

关 键 词:图像变形  图像反变形  用户认证  用户察知  信息隐藏
收稿时间:2011-05-20
修稿时间:2011-10-26

Card User Awareness Based on Image Morphing
ZHAO Qiang-fu , HSIEH Cheng-hsiung.Card User Awareness Based on Image Morphing[J].Computer Engineering & Science,2012,34(1):11-20.
Authors:ZHAO Qiang-fu  HSIEH Cheng-hsiung
Affiliation:ZHAO Qiang-fu1,HSIEH Cheng-hsiung2 (1.Department of Computer and Information Systems,the University of Aizu Aizuwakamatsu,Fukushima 965-8580,Japan; 2.Department of Computer Science and Information Engineering, Chaoyang University of Technology,Taichung 41349,China)
Abstract:Consciously or unconsciously, we are using many kinds of "cards" in our daily lives. Among them, credit card, cash card, driving license, etc., are as important as our wallets. To prevent the cards from being illegally used, card user authentication is indispensable. A common practice for user authentication is to ask the user to provide some personal information. The user is usually considered legal if the personal information matches the one pre-stored in the card. However, if the personal information is leaked, some third party may use the card illegally. The purpose of this paper is to propose an image morphing based method for card user authentication. The fundamental idea is to hide the face image of the true card holder into some cover data through morphing, distribute the key information for restoring the face image into several different places, and restore the face image through de-morphing when the card is used. This method can provide good user awareness for authorized persons, and can protect the true card holder more effectively.
Keywords:image morphing  user authentication  user awareness  de-morphing  stegonography
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号