{"title":"基于广义图像变形的卡片用户认证","authors":"Qiangfu Zhao, C. Hsieh","doi":"10.1109/ICAWST.2011.6163124","DOIUrl":null,"url":null,"abstract":"Nowadays, “cards” are becoming part of our lives. The cards enable us to obtain different kinds of services conveniently, but may also bring us economic loss if they are used illegally by some malicious third party. A common practice to solve the problem is to ask the user to provide some personal information possessed by the true card holder only. However, the personal information can be leaked if it is not managed properly. To protect the card users more effectively, this study proposes a generalized image morphing technique and a new method for card user authentication. The fundamental idea is to hide the face image of the card holder into some cover data through morphing, distribute the key information for restoring the face image into several different places, and restore the face image through de-morphing when the card is used. Brief analysis show that the proposed method is simple but secure, and can be very useful in different card-based services.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Card user authentication based on generalized image morphing\",\"authors\":\"Qiangfu Zhao, C. Hsieh\",\"doi\":\"10.1109/ICAWST.2011.6163124\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, “cards” are becoming part of our lives. The cards enable us to obtain different kinds of services conveniently, but may also bring us economic loss if they are used illegally by some malicious third party. A common practice to solve the problem is to ask the user to provide some personal information possessed by the true card holder only. However, the personal information can be leaked if it is not managed properly. To protect the card users more effectively, this study proposes a generalized image morphing technique and a new method for card user authentication. The fundamental idea is to hide the face image of the card holder into some cover data through morphing, distribute the key information for restoring the face image into several different places, and restore the face image through de-morphing when the card is used. Brief analysis show that the proposed method is simple but secure, and can be very useful in different card-based services.\",\"PeriodicalId\":126169,\"journal\":{\"name\":\"2011 3rd International Conference on Awareness Science and Technology (iCAST)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 3rd International Conference on Awareness Science and Technology (iCAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAWST.2011.6163124\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAWST.2011.6163124","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Card user authentication based on generalized image morphing
Nowadays, “cards” are becoming part of our lives. The cards enable us to obtain different kinds of services conveniently, but may also bring us economic loss if they are used illegally by some malicious third party. A common practice to solve the problem is to ask the user to provide some personal information possessed by the true card holder only. However, the personal information can be leaked if it is not managed properly. To protect the card users more effectively, this study proposes a generalized image morphing technique and a new method for card user authentication. The fundamental idea is to hide the face image of the card holder into some cover data through morphing, distribute the key information for restoring the face image into several different places, and restore the face image through de-morphing when the card is used. Brief analysis show that the proposed method is simple but secure, and can be very useful in different card-based services.