Browse > Article
http://dx.doi.org/10.5762/KAIS.2012.13.2.849

A study of e-passport against forgeries using scrambling encryption method  

Lee, Kwang-Hyoung (Internet Information, Seoil College)
Jung, Young-Hoon (Internet Information, Seoil College)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.13, no.2, 2012 , pp. 849-855 More about this Journal
Abstract
In this paper, a proposed system can be ensured safety using scrambling technique in order to protect personal information which identifies visually from the existing e-passport. This system inserts ID card number and photograph into e-passport using scrambling technique. In this system, we need user private key and CA private key to encrypt and decrypt which make it secure. And It show better performance in throughput by not encrypting or decrypting the whole e-passport.
Keywords
Scrambling technique; Electronic ID card; E-passport; Digital protection technology;
Citations & Related Records
연도 인용수 순위
  • Reference
1 jung Y.H, "A New Partial Encryption of e-cash using Scrambling Technical in Mobile Environmemt", Soongsil Unv. a doctoral dissertation, 2009.
2 Kim. M .H, "Development of Scrambling Algorithm Using Reordering Macroblocks and Public-key Encryption", Seoil National University of Technology, master's thesis, 2008.
3 Bloch, M., "Channel scrambling for secrecy", Information Theory, 2009. ISIT 2009. IEEE International Symposium on June. 28. 2009-July. 3. 2009. Page(s):2452 - 2456.
4 Hong Peng, YanBin Lin, Yuanzhi Wang, "An Information Hiding Algorithm Based on Blocks and Scrambling", Artificial Intelligence, 2009. JCAI '09. International Joint Conference on 25-26 April 2009 Page(s):327 - 329.
5 I. J. Cox, "Digital Watermarking" Morgan Kauffmann Publishers, 2002.
6 Ito, I,; Kiya, H., "Phase scrambling for blind image matching", Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on 19-24 April. 2009. Page(s):1521 - 1524.
7 John Linn, "Trust Models and Management in Public Key Infrastructures", Technical Notes and Reports of RSA Laboratories, November. 2000.
8 Moni Naor and Kobbi Nissim, "Certificate Revocation and Certificate Update", Proceedings of the 7th USENIX Security Symposium, pp.217-228, 1998.
9 Antonio F.Gomez. Gregorio Marinez. Oscar Canovas., "New Security services based on PKI", Future Generation Computer Systems, 2003.
10 Corron, N.J. Reed, B.R. Blakely, J.N. Myneni, K. Pethel, S.D., "Chaotic scrambling for wireless analog video", Southeastcon, 2009. SOUTHEASTCON '09. IEEE 5-8 March. 2009. Page(s):38 - 43.