Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電子工程學研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/90664
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor簡韶逸zh_TW
dc.contributor.advisorShao-Yi Chienen
dc.contributor.author李可瀚zh_TW
dc.contributor.authorKe-Han Lien
dc.date.accessioned2023-10-03T17:05:01Z-
dc.date.available2023-11-09-
dc.date.copyright2023-10-03-
dc.date.issued2023-
dc.date.submitted2023-03-14-
dc.identifier.citationS. Bakhshi, D. Shamma, and E. Gilbert. Faces engage us: Photos with faces attract more likes and comments on Instagram. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’14, page 965–974, 2014.
L. Wu, F. Morstatter, K. Carley, and H. Liu. Misinformation in social media: Definition, manipulation, and detection. SIGKDD Explor. Newsl., 21(2):80–90, 2019.
S. Battiato, O. Giudice, and A. Paratore. Multimedia forensics: discovering the history of multimedia contents. In Proceedings of the 17th International Conference on Computer Systems and Technologies 2016, pages 5–16, 2016.
K. Bhagtani, A. Yadav, E. Bartusiak, Z. Xiang, R. Shao, S. Baireddy, and E. Delp. An overview of recent work in media forensics: Methods and threats. arXiv preprint arXiv:2204.12067, 2022.
R. Kaur and A. Kaur. Digital signature. In 2012 International Conference on Computing Sciences, pages 295–301. IEEE, 2012.
C.-Y. Lin and S.-F. Chang. Semifragile watermarking for authenticating jpeg visual content. In Security and watermarking of multimedia contents II, volume 3971, pages 140–151, 2000.
R. Sun, H. Sun, and T. Yao. A SVD-and quantization based semi-fragile wa termarking technique for image authentication. In International Conference on Signal Processing, volume 2, pages 1592–1595, 2002.
R. Davarzani, S. Mozaffari, and K. Yaghmaie. Perceptual image hashing using center-symmetric local binary patterns. Multimedia Tools and Applications, 75(8):4639–4667, 2016.
Z. Tang, X. Zhang, X. Li, and S. Zhang. Robust image hashing with ring partition and invariant vector distance. IEEE TIFS, 11(1):200–214, 2015.
H. Chen, X. Huang, W. Wu, and Y. Mu. Efficient and secure image authenti cation with robustness and versatility. Science China Information Sciences, 63(12):1–18, 2020.
H. Chen, X. Huang, J. Ning, F. Zhang, and C. Lin. VILS: A verifiable image licensing system. IEEE TIFS, 17:1420–1434, 2022.
A. Naveh and E. Tromer. PhotoProof: Cryptographic image authentication for any set of permissible transformations. In Symposium on Security and Privacy (SP), pages 255–271. IEEE, 2016.
U. Feige, A. Fiat, and A. Shamir. Zero-knowledge proofs of identity. Journal of cryptology, 1(2):77–94, 1988.
T. Orekondy, M. Fritz, and B. Schiele. Connecting pixels to privacy and utility: Automatic redaction of private information in images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 8466–8475, 2018.
Iden3. SNARKJS: Javascript implementation of zk-SNARKs. https: //github.com/iden3/snarkjs, 2022.
L. Grassi, D. Khovratovich, C. Rechberger, A. Roy, and M. Schofnegger. POSEIDON: A new hash function for zero-knowledge proof systems. In USENIX Security, pages 519–535, 2021.
G. Becker. Merkle signature schemes, Merkle trees and their cryptanalysis. Ruhr-University Bochum, TR, 12:19, 2008.
D. Cozzolino and L. Verdoliva. Noiseprint: a CNN-based camera model fingerprint. IEEE TIFS, 15:144–159, 2019.
E. Bartusiak, S. Yarlagadda, D. Guera, P. Bestagini, S. Tubaro, F. Zhu, ¨ and E. Delp. Splicing detection and localization in satellite imagery using conditional gans. In MIPR, pages 91–96, 2019.
Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive, 2018.
Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer. From ex tractable collision resistance to succinct non-interactive arguments of knowl edge, and back again. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pages 326–349, 2012.
Yinjie Gong, Yifei Jin, Yuchan Li, Ziyi Liu, and Zhiyi Zhu. Analysis and comparison of the main zero-knowledge proof scheme. In 2022 International Conference on Big Data, Information and Computer Network (BDICN), pages 366–372. IEEE, 2022.
SCIPR Lab. libsnark: a c++ library for zksnark proofs. https://github. com/scipr-lab/libsnark, 2020.
TU Berlin. Zokrates: A toolbox for zksnarks on ethereum. https:// github.com/Zokrates/ZoKrates, 2022.
Zcash. bellman: zk-snark library. https://github.com/zkcrypto/ bellman, 2022.
J. Munoz-Tapia, M. Belles, M. Isabel, A. Rubio, and J. Baylina. CIRCOM: A robust and scalable language for building complex zero-knowledge circuits. 2022.
Simon Josefsson and Ilari Liusvaara. Edwards-curve digital signature algo rithm (eddsa). RFC, 8032:1–60, 2017
Iden3. circomlib: Library of basic circuits for circom. https://github. com/iden3/circomlib, 2022.
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/90664-
dc.description.abstract隨著多媒體技術與社群軟體的快速發展,數位影像在我們的生活中變得無所不在。然而,影像編輯軟體也越來越強大,甚至連AI都可以直接生成出影像。這些發展使得有心人士可以輕易的竄改或製造出影像內容,進而散播錯誤或惡意的假資訊,最終導致社會成本增加。
影像認證是一項可以保護影像完整性與真實性的技術。傳統的主動影像認證方法可以有效地保護原始影像的完整性,但它們無法使編輯後的影像被認證,然而,對原始影像進行合理的影像編輯往往是影像發布前重要過程。零知識證明的出現為主動影像認證開闢了新的可能性,它使影像可以在不洩露其原始影像的情況下證明編輯後影像的完整性與真實性。然而,目前基於零知識證明的方法在滿足實際用途方面存在不可接受的性能。
在本論文中,我們提出了一個基於零知識證明之區域感知影像保證系統,以克服現有方法在效能上所面臨的挑戰。進一步來說,本系統利用馬賽克、拼貼等局部編輯功能保護影像的敏感區域,針對編輯區域進行零知識證明,非編輯區域進行數位簽章來,進而使得本系統仍然保證了整個影像的認證保證。我們全面分析了系統性能,並透過一個真實世界隱私影像資料集(Redactions Dataset)證明了本系統的實用性。實驗結果顯示,本系統相較目前最先進零知識證明影像認證系統,分別在 KeyGen 與 Proof 運算上快 15 倍與 60 倍的運算效率,在 Proof 的大小上降低了 25 倍的記憶體用量;此外,在所選的 Redactions Dataset 中影像中,有 180 倍到 2700 倍的效能提升,顯著地減少了編輯影像所需的證明時間。
綜合上述,我們透過廣泛的實驗證明了系統的實用性,期望我們的努力能使進階影像認證技術朝著現實世界應用的實際解決方案向前邁進一步,從而為構建可信賴的互聯網這難題做出小小的貢獻。
zh_TW
dc.description.abstractWith the rapid advancement of multimedia technology and social software, digital images have become ubiquitous in our lives. However, image editing software is growing increasingly sophisticated, and even artificial intelligence can directly generate images. Such development has made it effortless for those with nefarious intentions to manipulate or fabricate image content, thereby spreading misinformation and disinformation, ultimately leading to an escalation in social costs.
Image authentication is a technology designed to safeguard the integrity and authenticity of digital images. Traditional active image authentication methods effectively protect the integrity of a source image, but they cannot make edited images authenticated. Nevertheless, reasonable editing of images is often essential before their release. The advent of Zero-knowledge Proof (ZKP) opens up new possibilities for active image authentication that can prove the integrity of an image after editing without revealing its source. However, ZKP-based methods suffer from unacceptable performance in fulfilling real-world usages.
In this paper, we propose a Zero-Knowledge Proof Based Region-aware Photo Assurance System to overcome the performance challenges of existing works. The system utilizes local editing functions such as mosaic and collage to protect sensitive areas of an image, performs ZKP for the edited region, and digital signature for the non-edited region to ensure complete image authentication. We comprehensively analyze the system's performance and demonstrate its practicality with a real-world privacy image dataset (Redactions Dataset). Experimental results show that, compared to the most advanced ZKP-based image authentication system, our system is 15 times faster in KeyGen and 60 times faster in Proof operations, respectively, and reduces memory usage by 25 times in the size of Proof. Moreover, the system's performance is optimized by 180 times to 2700 times on selected images in the Redactions Dataset, leading to a significant reduction in the proof time required for image editing.
en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-10-03T17:05:01Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2023-10-03T17:05:01Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontentsAbstract i
List of Figures v
List of Tables vi
1 Introduction 1
1.1 Image Authentication 1
1.2 Our Key Insight 3
1.3 Contributions 4
1.4 Thesis Organization 5
2 Related Work 6
2.1 Image Authentication 6
2.1.1 Machine Learning Based Methods 6
2.1.2 Computer-Vision Based Methods 7
2.1.3 Cryptography Based Methods 8
2.2 Cryptography Tools 11
2.2.1 Digital Signature 11
2.2.2 Zero Knowledge Proof 12
2.2.3 Merkle Tree 14
3 Proposed Method 15
3.1 Syntax 15
3.2 Definition of Photo Assurance 17
3.3 Security Model 19
3.4 Security Analysis 20
3.5 Region-Aware Photo Assurance System 22
3.6 Multi-Editor Continuous Image Editing Scenario 26
3.7 System Architecture 30
4 Experimental Results 34
4.1 Experimental Settings 34
4.2 Performance Analysis 36
4.2.1 Editing Function in Circom 36
4.2.2 Region-aware Photo Assurance System 37
4.2.3 Detailed System Performance 44
4.2.4 Circom Compiler Optimization 45
4.3 Discussion on the Performance of Hash Function 48
5 Conclusion 51
Reference 52
-
dc.language.isoen-
dc.subject多媒體鑑識zh_TW
dc.subject零知識證明zh_TW
dc.subject區域感知zh_TW
dc.subject影像認證zh_TW
dc.subjectRegion-awareen
dc.subjectMedia Forensicsen
dc.subjectZero-Knowledge Proofen
dc.subjectImage Authenticationen
dc.title基於零知識證明之區域感知影像保證系統zh_TW
dc.titleZero-Knowledge Proof Based Region-aware Photo Assurance Systemen
dc.typeThesis-
dc.date.schoolyear111-2-
dc.description.degree碩士-
dc.contributor.coadvisor陳維超zh_TW
dc.contributor.coadvisorWei-Chao Chenen
dc.contributor.oralexamcommittee雷欽隆;鮑興國;王紹睿zh_TW
dc.contributor.oralexamcommitteeChin-Laung Lei;Hsing-Kuo Pao;Peter Shaojui Wangen
dc.subject.keyword影像認證,區域感知,零知識證明,多媒體鑑識,zh_TW
dc.subject.keywordImage Authentication,Region-aware,Zero-Knowledge Proof,Media Forensics,en
dc.relation.page55-
dc.identifier.doi10.6342/NTU202300664-
dc.rights.note未授權-
dc.date.accepted2023-03-14-
dc.contributor.author-college電機資訊學院-
dc.contributor.author-dept電子工程學研究所-
顯示於系所單位:電子工程學研究所

文件中的檔案:
檔案 大小格式 
ntu-111-2.pdf
  未授權公開取用
3.43 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved