簡易檢索 / 詳目顯示

研究生: 韋秉均
Ping-Chun Wei
論文名稱: 基於KNN演算法之數位身分證射頻指紋認證研究
Research on RF Fingerprint Authentication of eID Card Based on KNN Algorithm
指導教授: 劉馨勤
Hsin-Chin Liu
口試委員: 查士朝
Shi-Cho Cha
鮑興國
Hsing-Kuo Pao
學位類別: 碩士
Master
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2022
畢業學年度: 110
語文別: 中文
論文頁數: 41
中文關鍵詞: 射頻指紋辨識卡片辨識分類降維
外文關鍵詞: RF fingerprint, card recognition, classification, dimension reduction
相關次數: 點閱:172下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 射頻指紋特徵被運用在許多領域上面,其中包含真偽卡的辨識,近年來許多有心人士偽造卡片,為了能分辨出真偽卡,可以提取每張卡片獨有的指紋特徵從中分辨,由於每張卡片被製造時都有所不同,這使得指紋特徵難以被仿冒,大幅減少被偽造的可能性
    本論文透過結合K近鄰模型(K Nearest Neighbours Model, KNNM)以及支援向量機(Support Vector Machine, SVM)兩種演算法以辨識出真偽卡,進行K近鄰模型前先經由線性判別分析(Linear Discriminant Analysis, LDA)做降維,將資料做好事先的分類,使相同類別的資料盡可能靠近,不同類別資料盡可能遠離,以提升K近鄰模型的準確率,K近鄰模型會將相鄰的同類別的資料視為一個群集,從群集中找出一個代表點並畫出該群集的範圍,只要新資料落在某群集範圍內,該資料便視為某群集的類別,如果沒落在任何一個群集的類別將視為偽卡,過程中可以透過放大群集的範圍以提升真卡落在群集範圍的機率,降低真卡誤辨識成偽卡的機率,但也可能造就真卡被誤辨識成其他真卡的情況,此時可以透過支援向量機提升真卡的準確率,以解決此問題。


    Radio frequency fingerprint is used in many fields, including the identification of cards. In recent years, people with bad intentions have forged cards. In order to distinguish the identification of cards, the unique radio frequency fingerprint of each card can be extracted. Due to the difference of manufacturers, it is hard to counterfeit the radio frequency fingerprint. It reduces the chance of being counterfeited.
    In this paper, we combine the KNNM with SVM to identify the cards. We use LDA to implement the dimensionality reduction before KNNM. It can make the data of the same class as close as possible to improve the accuracy of KNNM, which will regard adjacent data of the same class as a cluster. Finding a representative point in the cluster and circle the range of the cluster. If the testing data falls in the range of a cluster, the testing data is classified as the cluster. If it does not fall into any cluster, it will be regarded as a fake card. In the process, we can increase the probability of the real card falling into the cluster by enlarging the range of clusters. It can reduce the mistake of the real card being misidentified as a fake card. However, it may also cause the real card to be misidentified as another real card. In this case, the accuracy of the real card can be improved through SVM.

    摘要 I Abstract II 致謝 III 目錄 IV 圖目錄 VI 表目錄 VII 縮寫索引 VIII 符號索引 IX 第1章 緒論 1 1.1 研究動機 1 1.2 論文貢獻 1 1.3 章節概要 2 第2章 文獻探討與背景介紹 3 2.1 ISO 14443 TypeA 3 2.2 射頻指紋特徵提取 4 2.3 機器學習預處理 4 2.3.1 三西格馬法則(three-sigma rule of thumb) 4 2.3.2 標準化(Normalization) 4 2.3.3 降維(Dimension Reduction) 5 2.4 常用於指紋特徵之機器學習 8 2.4.1 K近鄰 9 2.4.2 支援向量機 10 第3章 射頻指紋辨識之機器學習辨識方法 12 3.1 提取訊號特徵之模型 12 3.1.1 moment特徵 12 3.2 訓練集實驗架構 15 3.2.1 線性判別分析 18 3.2.2 K近鄰模型 19 3.3 測試集實驗架構 22 第4章 實驗結果分析 25 4.1 不同廠牌之卡片辨識 25 4.2 同廠牌之卡片辨識 32 第5章 結論與未來研究方向 37 附錄A 38 參考文獻 39

    [1] Q. Xu, R. Zheng, W. Saad, and Z. Han, "Device Fingerprinting in Wireless Networks: Challenges and Opportunities," IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 94-104, 2016.
    [2] 陳信豪, "ISO 14443 Type A 標籤模擬器研製," 碩士, 電機工程系, 國立臺灣科技大學, 台北市, 2017.
    [3] G. Zhang, L. Xia, S. Jia, and Y. Ji, "Physical-layer identification of HF RFID cards based on RF fingerprinting," in International Conference on Information Security Practice and Experience, 2016, pp. 284-299: Springer.
    [4] G. Zhang, L. Xia, S. Jia, and Y. Ji, "Identification of cloned HF RFID proximity cards based on RF fingerprinting," in 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, pp. 292-300: IEEE.
    [5] J. Shi, G. He, and X. Liu, "Anomaly detection for key performance indicators through machine learning," in 2018 International Conference on Network Infrastructure and Digital Content (IC-NIDC), 2018, pp. 1-5: IEEE.
    [6] H. Henderi, T. Wahyuningsih, and E. Rahwanto, "Comparison of Min-Max normalization and Z-Score Normalization in the K-nearest neighbor (kNN) Algorithm to Test the Accuracy of Types of Breast Cancer," International Journal of Informatics and Information Systems, vol. 4, no. 1, pp. 13-20, 2021.
    [7] D. B. Williams and V. Madisetti, "Detection: Determining the number of sources," in Wireless, Networking, Radar, Sensor Array Processing and Nonlinear Signal Processing: CRC Press, 2009, pp. 8-1-8-10.
    [8] J. Hogenboom, "Principal component analysis and side-channel attacks-master thesis," Principal component analysis and side-channel attacks-master thesis, pp. 536-539, 2010.
    [9] C. Li, "Preprocessing methods and pipelines of data mining: An overview," seminar data mining,, 2019.
    [10] T. Hastie, R. Tibshirani, and J. H. Friedman, The elements of statistical learning: data mining, inference, and prediction. Springer, pp. 106-119, 2009.
    [11] T. Cover and P. Hart, "Nearest neighbor pattern classification," IEEE transactions on information theory, vol. 13, no. 1, pp. 21-27, 1967.
    [12] U. Lall and A. Sharma, "A nearest neighbor bootstrap for resampling hydrologic time series," Water resources research, vol. 32, no. 3, pp. 679-693, 1996.
    [13] D. Cheng, S. Zhang, Z. Deng, Y. Zhu, and M. Zong, "kNN algorithm with data-driven k value," in International Conference on Advanced Data Mining and Applications, 2014, pp. 499-512: Springer.
    [14] S. Zhang, M. Zong, K. Sun, Y. Liu, and D. Cheng, "Efficient kNN algorithm based on graph sparse reconstruction," in International Conference on Advanced Data Mining and Applications," IEEE Trans. Image Process, 2014, pp. 356-369: Springer.
    [15] X. Zhu, L. Zhang, and Z. Huang, "A sparse embedding and least variance encoding approach to hashing," IEEE transactions on image processing, vol. 23, no. 9, pp. 3737-3750, 2014.
    [16] G. Guo, H. Wang, D. Bell, Y. Bi, and K. Greer, "KNN model-based approach in classification," in OTM Confederated International Conferences" On the Move to Meaningful Internet Systems", 2003, pp. 986-996: Springer.
    [17] S. Zhang, D. Cheng, Z. Deng, M. Zong, and X. Deng, "A novel kNN algorithm with data-driven k parameter computation," Pattern Recognition Letters, vol. 109, pp. 44-54, 2018.
    [18] V. Vapnik, "The nature of statistical learning theory, " Springer science & business media, 1999.
    [19] P. Tao, Z. Sun, and Z. Sun, "An improved intrusion detection algorithm based on GA and SVM," Ieee Access, 6, vol. 6, pp. 13624-13631, 2018.
    [20] V. K. Chauhan, K. Dahiya, and A. Sharma, "Problem formulations and solvers in linear SVM: a review," Artificial Intelligence Review, vol. 52, no. 2, pp. 803-855, 2019.
    [21] Q.-Q. Tao, S. Zhan, X.-H. Li, and T. Kurihara, "Robust face detection using local CNN and SVM based on kernel combination," Neurocomputing 211, vol. 211, pp. 98-105, 2016.
    [22] S. Kumar, S. Singh, and J. Kumar, "Multiple face detection using hybrid features with SVM classifier," in Data and Communication Networks: Springer, 2019, pp. 253-265.
    [23] M. Aljanabi, M. H. Qutqut, and M. Hijjawi , "Machine learning classification techniques for heart disease prediction: a review," International Journal of Engineering & Technology, vol. 7, no. 4, pp. 5373-5379, 2018.
    [24] N. Caballé-Cervigón, J. L. Castillo-Sequera, J. A. Gómez-Pulido, J. M. Gómez-Pulido, and M. L. Polo-Luque, "Machine learning applied to diagnosis of human diseases: A systematic review," Applied Sciences, vol. 10, no. 15, p. 5135, 2020.
    [25] H. Li and F. Systems, "Text recognition and classification of english teaching content based on SVM," Journal of Intelligent & Fuzzy Systems, vol. 39, no. 2, pp. 1757-1767, 2020.
    [26] L. M. Francis, N. Sreenath, and I. Sciences, "TEDLESS–Text detection using least-square SVM from natural scene," Journal of King Saud University-Computer and Information Sciences, vol. 32, no. 3, pp. 287-299, 2020.
    [27] S. Huang et al., "Applications of support vector machine (SVM) learning in cancer genomics," Cancer genomics & proteomics, vol. 15, no. 1, pp. 41-51, 2018
    [28] G. Shen, J. Zhang, A. Marshall, and J. R. Cavallaro, "Towards scalable and channel-robust radio frequency fingerprint identification for LoRa," IEEE Transactions on Information Forensics and Security, vol. 17, pp. 774-787, 202

    無法下載圖示 全文公開日期 2024/09/26 (校內網路)
    全文公開日期 2024/09/26 (校外網路)
    全文公開日期 2024/09/26 (國家圖書館:臺灣博碩士論文系統)
    QR CODE