1 / 11

Internet/Marks

Internet/Marks. - Visual Marks for Cyber World -. Hitachi, Ltd. 1999.4.15,16. Basic Concept of Cyber-World Marks. Marks (e.g., traffic signals) are extremely useful in real world. Convey information briefly and clearly Familiar to non-professionals

adolfo
Télécharger la présentation

Internet/Marks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet/Marks - Visual Marks for Cyber World - Hitachi, Ltd. 1999.4.15,16

  2. Basic Concept of Cyber-World Marks • Marks (e.g., traffic signals) are extremely useful in real world. • Convey information briefly and clearly • Familiar to non-professionals • Marks (e.g., blue-ribbon marks) are useful BUT insecure in cyber world. • Easy to forge and tamper • Easy to copy-paste on unauthorized data • Useful and Secure marks are desired for cyber world.

  3. Digital Signature for - Material image data - WWW page contents - URL of WWW site - Certificate of IMs issuer Embedded digital signature SCIENCE SCIENCE Water-marking Recommend for School Education Recommend for School Education Material Image Data (JPEG, bitmap, etc) Internet/Marks (JPEG, bitmap, etc) Internet/Marks (IMs)

  4. Structure of Internet/Marks Secret key Digital signature detects - Forge and tamper of IMs - IMs copied on unauthorized data - Forge and tamper of data Data on which IMs is pasted Digital signature Hash Hash Paste IMs Embed by Digital Watermarking

  5. IMs Application to WWW Authentication Secret key URL Hash Digital signature detects - Forge and tamper of IMs - IMs copied on unauthorized data - Forge and tamper of data and - IMs and WWW page copied on unauthorized site WWW page on which IMs is pasted Digital signature Hash Hash Paste IMs Embed by Digital Watermarking

  6. Structure of IMs-Based WWW Authentication 1. Application for IMs with URL and WWW page contents WWW Page Owner IMs Issuer 2. Make sign, issue IMs 3. Paste IMs on WWW page IMs WWW page with IMs Register public key 5. Verify current validation when needed WWW Page User CA Public Key for signature verification* 4. Read IMs, Verify signature when needed *This process can be eliminated by embedding public key and its certificate in IMs.

  7. Alternative Methods 2. Digital signature 1. Simple mark Digital Signature 3. Simple mark + Digital signature 4. Internet/Marks Digital Signature Digital Signature

  8. Comparison with Alternative Methods- Performance Summary -

  9. Comparison with Alternative Methods- Operations -

  10. Requirements for Internet/Marks Requirements Secret key URL Hash Function - Hash - Sign/Verify using public-key cryptography - Embed/Detect data by watermarking technique Inclusion of signature (basic) - Visual Marks (IMs) - WWW page - URL of legitimate WWW site/page Inclusion of signature (option) - URL of IMs issuer etc. WWW page on which IMs is pasted Digital signature Hash Hash Paste IMs Embed by Digital Watermarking

  11. Signed XML IMs <Document xmlns:dsig=“Signature-DTD-URI”> <MyElement id =“anthenticated-infos”…> … <Img src=“sample.jpg” /> … < / MyElement> <dsig:Signature> <Manifest> <Resource> <Locator href=“ #anthenticated-infos” /> … < / Resource> … < / Manifest> <Value> … < / Value> < / dsig:Signature> < / Document> <Document xmlns:dsig=“Signature-DTD-URI”> <MyElement id =“anthenticated-infos”…> … <Img src=“sample.jpg” id=“sample.jpg” /> … < / MyElement> <IMs> <WMAlgorithm> … < / WMAlgorithm > <IMsLocator href=“#sample.jpg” /> < / IMs> < / Document> <dsig:Signature> … < / dsig:Signature > sample.jpg Relation between Signed XML and IMs

More Related