• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2012, Vol. 34 ›› Issue (1): 11-20.

• 论文 • 上一篇    下一篇

基于图像变形的卡用户认知性

赵强福1,谢政勋2   

  1. (1.日本会津大学计算机科学系,福岛 会津 9658580,日本;
    2.台湾朝阳科技大学计算机科学与信息工程系,台湾 台中 41349)
  • 收稿日期:2011-05-20 修回日期:2011-10-26 出版日期:2012-01-25 发布日期:2012-01-25

Card User Awareness Based on Image Morphing

ZHAO Qiangfu1,HSIEH Chenghsiung2   

  1. (1.Department of Computer and Information Systems,
    the University of Aizu Aizuwakamatsu,Fukushima 9658580,Japan;
    2.Department of Computer Science and Information Engineering,
    Chaoyang University of Technology,Taichung 41349,China)
  • Received:2011-05-20 Revised:2011-10-26 Online:2012-01-25 Published:2012-01-25

摘要:

尽管许多人可能并没有意识到,各类卡已经被广泛应用到我们的日常生活当中。其中,信用卡,现金卡,驾驶执照,等等,其实与钱包同等重要。为了防止这些卡被非法使用,用户认证是必不可少的。最常用的用户认证方法就是要求用户提供某些个人信息。如果用户提供的信息与卡中记录的信息一致,我们就认为用户是合法的。然而如果个人信息被泄露,卡就有可能被非法使用。本论文的目的就是要提供一种新的基于图像变形的卡用户认证方法。其基本思路是把真正持卡人的脸部图像通过图像变形隐藏到某个覆盖数据下,并把恢复原图像所需要的钥匙信息分散保存到卡,终端,服务器等不同地方。在用户使用卡的时候,认证系统可以利用反变形技术恢复原图像,让受权人察知到用户的真伪,从而有效地保护持卡人的权益。

关键词: 图像变形;图像反变形;用户认证;用户察知;信息隐藏

Abstract:

Consciously or unconsciously, we are using many kinds of “cards” in our daily lives. Among them, credit card, cash card, driving license, etc., are as important as our wallets. To prevent the cards from being illegally used, card user authentication is indispensable. A common practice for user authentication is to ask the user to provide some personal information. The user is usually considered legal if the personal information matches the one prestored in the card. However, if the personal information is leaked, some third party may use the card illegally. The purpose of this paper is to propose an image morphing based method for card user authentication. The fundamental idea is to hide the face image of the true card holder into some cover data through morphing, distribute the key information for restoring the face image into several different places, and restore the face image through demorphing when the card is used. This method can provide good user awareness for authorized persons, and can protect the true card holder more effectively.

Key words: image morphing;user authentication;user awareness;demorphing;stegonography