期刊文献+

基于安全芯片的防伪数码相机

Digital camera to take trusted photo based on TPM chip
下载PDF
导出
摘要 为了改进现有防伪数码相机不能处理通过翻拍伪造数码照片的缺陷,提出了一种新的基于安全芯片的防伪数码相机架构。在拍摄时将所拍摄的区域分成多个小单元,并用对焦测距系统测量各个单元到相机的距离。用安全芯片对图像元数据、图像内容及距离信息进行数字签名,并将签名内容及距离信息都保存在图像文件的元数据里。通过验证数字签名有效且距离信息不完全相等来保证图片的真实可信。该防伪数码相机能同时发现照片在拍摄后被篡改和翻拍问题,所拍摄照片真实可信。 To improve the flaws that trusted digital camera can't discover making a fake digital image by copying photo,a new digital camera architecture for capturing trusted images based on TPM chip is presented.Firstly,the capture scope is divided into many small units,and all distances between small units and camera are measured by focusing and measuring system.Then a digital signature is pro-duced by TPM chip which is given image metadata,image content and all distances,and all data is stored in the image,finally,the image is trusted if the signature is valid and these distances are not entirely equal.A photo is captured by this kind of security camera which can detect a modified or copied photo.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第7期1591-1594,共4页 Computer Engineering and Design
关键词 数码相机 安全芯片 数字签名 透镜成像原理 照片翻拍 RSA公开密钥密码体制 digital camera TPM chip digital signature lens imaging principle copying photos RSA public-key cryptography
  • 相关文献

参考文献7

  • 1David Schlesinger.The use of photoshop[EB/OL].http:// blogs.reuters.com/blog/2007/01/18/the-use-of-photoshop/,2007-01-18.
  • 2Canon.Image verification:Canon data verification system[EB/ OL].http://cpn.canon-europe.com/content/infobank/image_veri-fication/canon_data_verification_system.do,2008-06-08.
  • 3Anomie.Digital signature[EB/OL].http://en.wikipedia.org/wiki/ Digital_signature,2009-08-20.
  • 4Rowe S H,Schuh M L.计算机网络[M].北京:清华大学出版社,2006:410.
  • 5龚声蓉,刘纯平,王强擞字图像处理与分析[M].北京:清华大学出版社,2006:115-116.
  • 6肖政,韩英,叶蓬,侯紫峰.基于可信计算平台的体系结构研究与应用[J].计算机应用,2006,26(8):1807-1809. 被引量:23
  • 7谢希仁.计算机网络[M].4版.大连:大连理工大学出版社,2006:317-318.

二级参考文献9

  • 1TPM Main Part1 Design Principles Specification Version 1.2 52 Draft[Z].2003.
  • 2TPM Main Part2 TPM Structures Specification Version 1.2 57 Draft[Z].2003.
  • 3TPM Main Part3 Commands Specification Version 1.2 Revision 57 Draft[Z].2003.
  • 4TPM Specification Part4 TPM Conformance Specification Version 1.2 Draft[Z].2003.
  • 5TCG Software Stack Specification Version 1.10 RC 10A[Z].2003.
  • 6TCG Infrastructure Committee Reference Architecture for Integrity Information Interoperability,revision 0.07 Draft[Z].2004.
  • 7TCG TNC Architecture for Interoperability Specification Ver 1.0 0.16 Draft[Z].2004.
  • 8IBM Research Report,the role of TPM in enterprise security[Z].2004.
  • 9TCG Infrastructure Working Group.Use Cases Summary.Draft.Version 0.1[EB/OL].https://www.Trusted-computinggroup.org/downloads,2004-03-07.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部