110 likes | 273 Views
Internet/Marks. - Visual Marks for Cyber World -. Hitachi, Ltd. 1999.4.15,16. Basic Concept of Cyber-World Marks. Marks (e.g., traffic signals) are extremely useful in real world. Convey information briefly and clearly Familiar to non-professionals
E N D
Internet/Marks - Visual Marks for Cyber World - Hitachi, Ltd. 1999.4.15,16
Basic Concept of Cyber-World Marks • Marks (e.g., traffic signals) are extremely useful in real world. • Convey information briefly and clearly • Familiar to non-professionals • Marks (e.g., blue-ribbon marks) are useful BUT insecure in cyber world. • Easy to forge and tamper • Easy to copy-paste on unauthorized data • Useful and Secure marks are desired for cyber world.
Digital Signature for - Material image data - WWW page contents - URL of WWW site - Certificate of IMs issuer Embedded digital signature SCIENCE SCIENCE Water-marking Recommend for School Education Recommend for School Education Material Image Data (JPEG, bitmap, etc) Internet/Marks (JPEG, bitmap, etc) Internet/Marks (IMs)
Structure of Internet/Marks Secret key Digital signature detects - Forge and tamper of IMs - IMs copied on unauthorized data - Forge and tamper of data Data on which IMs is pasted Digital signature Hash Hash Paste IMs Embed by Digital Watermarking
IMs Application to WWW Authentication Secret key URL Hash Digital signature detects - Forge and tamper of IMs - IMs copied on unauthorized data - Forge and tamper of data and - IMs and WWW page copied on unauthorized site WWW page on which IMs is pasted Digital signature Hash Hash Paste IMs Embed by Digital Watermarking
Structure of IMs-Based WWW Authentication 1. Application for IMs with URL and WWW page contents WWW Page Owner IMs Issuer 2. Make sign, issue IMs 3. Paste IMs on WWW page IMs WWW page with IMs Register public key 5. Verify current validation when needed WWW Page User CA Public Key for signature verification* 4. Read IMs, Verify signature when needed *This process can be eliminated by embedding public key and its certificate in IMs.
Alternative Methods 2. Digital signature 1. Simple mark Digital Signature 3. Simple mark + Digital signature 4. Internet/Marks Digital Signature Digital Signature
Requirements for Internet/Marks Requirements Secret key URL Hash Function - Hash - Sign/Verify using public-key cryptography - Embed/Detect data by watermarking technique Inclusion of signature (basic) - Visual Marks (IMs) - WWW page - URL of legitimate WWW site/page Inclusion of signature (option) - URL of IMs issuer etc. WWW page on which IMs is pasted Digital signature Hash Hash Paste IMs Embed by Digital Watermarking
Signed XML IMs <Document xmlns:dsig=“Signature-DTD-URI”> <MyElement id =“anthenticated-infos”…> … <Img src=“sample.jpg” /> … < / MyElement> <dsig:Signature> <Manifest> <Resource> <Locator href=“ #anthenticated-infos” /> … < / Resource> … < / Manifest> <Value> … < / Value> < / dsig:Signature> < / Document> <Document xmlns:dsig=“Signature-DTD-URI”> <MyElement id =“anthenticated-infos”…> … <Img src=“sample.jpg” id=“sample.jpg” /> … < / MyElement> <IMs> <WMAlgorithm> … < / WMAlgorithm > <IMsLocator href=“#sample.jpg” /> < / IMs> < / Document> <dsig:Signature> … < / dsig:Signature > sample.jpg Relation between Signed XML and IMs