期刊文献+

A Photo Certificate-A Framework for Generating Visualized Public Key Certificates

A Photo Certificate—A Framework for Generating Visualized Public Key Certificates
下载PDF
导出
摘要 In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate. In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate.
出处 《Journal of Electronic Science and Technology》 CAS 2011年第4期339-344,共6页 电子科技学刊(英文版)
关键词 AUTHENTICATION CERTIFICATE public key infrastructure two-layer verifications WATERMARKING X.509. Authentication, certificate, public key infrastructure, two-layer verifications, watermarking, X.509.
  • 相关文献

参考文献11

  • 1C.S. Laih,K.Y. Chen.Generating visible RSA public keys for PKI[J].International Journal of Information Security.2004(2)
  • 2International Telecommunication Union (ITU). http://www.itu.int/home/imt.html .
  • 3International Telecommunication Union (ITU). http://www.itu.int/home/imt.html .
  • 4H. Imai."Current trends of cryptology in Japan,"[].Proc of the nd International Workshop for Asian Public Key Infrastructure.2002
  • 5C.-S. Laih,J.-W. Hung."Variants of certificates and their applications in public key infrastructure,"[].Journal of Research Development and Evaluation Commission.2005
  • 6Y.-H. Chen,I.-C. Hsu,C.-C. Lin."Website attributes that increase consumer purchase intention: a conjoint analysis,"[].Journal of Business.
  • 7Y. Hu,B. Jeon."Reversible visible watermarking and lossless recovery of original images,"[].IEEE Transactions on Circuits and Systems for Video Technology.2006
  • 8S.-H. Liu,H.-X. Yao,W. Gao,Y.-L. Liu."An image fragile watermark scheme based on chaotic image pattern and pixel-pairs,"[].Journal of Applied Mathematics.2007
  • 9Lin,Phen-Lan.Digital watermarking models resolving rightful ownership and authenticating legitimate customer[].The Journal of Systems and Software.2001
  • 10Chang Chinchen,Lin Chiachen,Hu Yihshin.An SVD O-riented Watermark Embedding Scheme With High Qualitiesfor The Restored Images[].ComputingInformation andControl.2007

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部