簡易檢索 / 詳目顯示

研究生: 顏鏞年
論文名稱: 應用影像辨識技術於NFC手機之研究
指導教授: 葉耀明
學位類別: 碩士
Master
系所名稱: 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2012
畢業學年度: 100
語文別: 中文
論文頁數: 57
中文關鍵詞: AndroidNFC行動付款身份驗證Zernike moments
英文關鍵詞: Android, NFC, Mobile payment, Signature authentication, Zernike moments
論文種類: 學術論文
相關次數: 點閱:87下載:17
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著科技日益進步,智慧型手機功能越來越多樣化且應用範圍也越來越廣泛,而行動商務也隨之興起。把手機當作電子錢包、信用卡甚至透過智慧型手機來購物,已經是時代的趨勢。而如何有效且有鑑別性的進行身份驗證,是本研究致力解決的問題。
    本研究以Android平台為基礎,利用NFC技術開發一套行動付款機制,並提出一個新穎的方法:以簽名的方式做身份的辨認,並利用影像處理技術辨識簽名來驗證使用者之身份,用改進以往手機做身份認證時,只能利用輸入PIN碼來做身份確認的不足。本研究使用Zernike moments技術來辨識簽名,此技術擁有抗旋轉不變性、抗位移不變性、抗大小不變性及能夠擷取出高鑑別度的特徵等特性,所以經實驗證明,Zernike moments技術確能運用在手寫簽章上的認證。

    With the advance of information technology, the functions of smart phone are more diversified and its applications also are increased. The trend of using mobile phone as an electronic wallet, credit card, and even the shopping tools has arrived owing to the development of NFC (Near Field Communication). One of the most important modules of above applications is to verify the user’s authentication effectively and discriminatively.
    Current mobile payment mechanism only uses the PIN number to identify the user’s authentication. It is not friendly for that user need to remember lots of codes to keep the security of private profile. To solve this defect, we propose a novel approach to identify the user’s signature authentication. In this article, we develop a NFC mobile payment system which is based on Android operating system, and recognize the user’s signature with the Zernike moments technique. Owing to the merits of the Zernike moments technique, it can recognize the user’s signature with rotation invariance, transition invariance, and scaling invariance. Furthermore, it also can extract the high- discriminative features. From the result of our experiment, we find that the Zernike moments technical works well in the handwriting signature identification procedure.

    第一章 緒論................................................1 1.1 研究背景...............................................1 1.2 研究目的...............................................4 第二章 文獻探討............................................5 2.1 ANDROID作業系統 ...................................5 2.1.1 Android系統架構......................................5 2.1.2 應用程式層...........................................6 2.1.3 中介軟體層...........................................7 2.1.4 硬體抽像層...........................................9 2.2 無線通訊網路...........................................9 2.3 影像辨識..............................................11 第三章 系統規畫...........................................14 3.1 系統架構..............................................14 3.2 NFC技術介紹與應用.....................................17 3.2.1 NFC介紹.............................................17 3.2.2 NFC用戶端設計.......................................20 3.3 主機端簽名辨識........................................27 3.3.1 簽名辨識流程圖......................................27 3.3.2 簽名辨識前處理......................................28 3.3.3 Zernike moments公式和演算法.........................30 3.3.3.1 Zernike moments特徵的抽取.........................33 3.3.3.2 Zernike moments性質討論...........................33 3.3.3.3 Zernike moments相似度比對.........................36 3.4 TSM平台介紹...........................................37 第四章 實驗結果與分析.....................................40 4.1 NFC系統與其它行動付款系統的相關分析...................40 4.2 開發環境..............................................42 4.3 網路傳輸..............................................43 4.4 身份驗證..............................................44 第五章 結論與未來展望.....................................53 5.1 結論..................................................53 5.2 未來展望..............................................54 第六章 參考文獻...........................................55

    [1] L.Francis,Gerhard.Hancke,Keith.Mayes and K.Markantonakis, "Practical NFC Peer-to-Peer Relay Attack using Mobile Phones",Royal Holloway University of London, 2010.

    [2] 蕭節中(2006), 近場通訊在行動商務應用之安全評量,國立台灣科技大學碩士論文.

    [3] 林城(2011), "Google Android 應用程式開發實戰" ,碁峰資訊出版社.

    [4] 楊名鈺(2011), "Context-awareness application on Android phone",國立台灣師範大學碩士論文.

    [5] 近場通訊與其它無線通訊技術的比較, http://www.designspark.com/node/60671

    [6] ISO/IEC 18092 (ECMA-340), Information technology Telecommunications and information exchange between systems Near Field Communication Interface and Protocol (NFCIP-1) , 2004.

    [7] R. Steffen, J. Preißinger, T. Schöllermann, A. Müller and I. Schnabel, "Near Field Communication (NFC) in an Automotive Environment", IEEE Second International Workshop on Near Field Communication, page(s): 15-20, 2010.

    [8] S.L. Ghiron, S. Sposato, C.M. Medaglia and A.Moroni, "NFC Ticketing: A Prototype and Usability Test of an NFC-Based Virtual Ticketing Application ",IEEE First International Workshop on Near Field Communication , page(s): 45-50, 2009.

    [9] M. Pasquet, J. Reynaud and C. Rosenberger, "Secure payment with NFC mobile phone in the SmartTouch project", IEEE International Symposium on Collaborative Technologies and Systems, page(s): 121-126, 2008.

    [10] G. Chavira, S.W. Nava, R. Hervas, J. Bravojose, and C. Sanchez, "Combining RFID and NFC Technologies in an AmI Conference Scenario", IEEE Eighth Mexican International Conference on Current Trends in Computer Science, page(s): 165-172, 2007.
    [11] P.Velayutham, Dr.T.G.Palanivelu, "High Secure Fingerprint Authentication in Ad hoc Network",IEEE Journal of Engineering Science and Technology, page(s): 317-321, 2010.

    [12] Huang Cheng-Ho and Wang Jhing-Fa, "SVM-based one-against-many algorithm for liveness face authentication", IEEE International Conference on Systems, Man and Cybernetics, page(s): 744–748, 2009.

    [13] Qi Miao, Lu Yinghua, Li Jinsong, Li Xiaolu and Kong Jun, "User-Specific Iris Authentication Based on Feature Selection", IEEE International Conference on Computer Science and Software Engineering, page(s): 1040-1043, 2008.

    [14] R. Jayamaha, M. Senadheera, T. Gamage, K. Weerasekara, G.A. Dissanayaka and G.N.Kodagoda, "VoizLock - Human Voice Authentication System using Hidden Markov Model ", IEEE International Conference on Information and Automation for Sustainability, page(s): 330–335, 2009.

    [15] C. Attaianese, V. Nardi and G. Tomasso, "A novel SVM strategy for VSI Dead-time-effect reduction", Industry Applications, vol.4, page(s): 1667-1674,
    2005.

    [16]Y. Freund and E. Robert, "A short introduction to boosting", Journal of Japanese Society for Artificial Intelligence, vol. 14, page(s): 771-780, 1999.

    [17] Wu Bo and R. Nevatia , "Detection of multiple, partially occluded humans in a single image by Bayesian combination of edgelet part detectors", IEEE International Conference on Computer Vision, page(s): 90-97, 2005.

    [18] K. Murphy, A. Torralba, D. Eaton and W. Freeman, "Object Detection and Localization Using Local and Global Features", Lecture Notes in Computer Science, vol. 4170,page(s): 382-400, 2006.

    [19]Carsten Schimanke, "基於Nexperia系統解決方案的NFC功能手機設計", Philippe Maugars, 2005.

    [20]N.Otsu, "A Tlreshold Selection Method from Gray-Level Histograms" , IEEE Transactions on Systems, Man and Cybernetics Society ,page(s): 62-66, 1979.
    [21]Chong, Chee-Way, R.Mukundan, P.Raveendran, "An Efficient Algorithm for fast computation of Pseudo-Zernike moments",in Proc. Int conf on Image and vision computing, page(s): 237-242, 2001.

    [22] K.R. Radhika,M.K.Venkatesha, and G.N. Shekar, "On-line signature authentication using Zernike moments ", IEEE International Conference on Biometrics, page(s): 1–4, 2009.

    [23]財團法人工業技術研究院(2009),經濟部商業交易安全認證前瞻技術研發與應用委外案.

    [24] Luo Ronghua and Min Huaqing, "Multi-scale maximally stable extremal regions for object recognition ", IEEE International Conference on Information and Automation , page(s): 179 -1803, 2010.

    [25] S. Fischmeister, G. Vigna and R.A. Kemmerer," Evaluating the Security of Three Java-Based Mobile Agent Systems" International Conference on Mobile Agents, page(s): 31-41, 2002.

    [26] Kinosita, Shingo, Fumitaka Hoshino, Tomoyuki Komuro, Akiko Fujimura, and Miyako Ohkubo, "Non-identifiable Anonymous-ID Scheme for RFID Privacy Protection" , Proc. Of CSS’ 03, 2003.

    [27] Knospe, Heiko, and Hartmut Pohl, "RFID Security", Information Security Technical Report, 2004.

    [28] Ohkubo, Miyako, Koutarou Suzuki and Shingo Kinoshita, "RFID privacy issues and technical challenges", Magazine Communications of the ACM, page(s): 66-71, 2005.

    [29] J. Ondrus and Y. Pigneur , "A Disruption Analysis in the Mobile Payment Market ", IEE International Conference on System Sciences page(s): 84, 2005.

    [30]Sun-Kyoo Hwang and Whoi-Yul Kim, "A novel approach to the fast computation of Zernike moments", Pattern Recognition, Volume 35, Issue 12, page(s): 2905-2911, 2002.

    下載圖示
    QR CODE