重生之宠妃攻略微盘:远距离获取钥匙模板

来源:百度文库 编辑:九乡新闻网 时间:2024/05/04 22:44:34
加州圣迭戈分校的计算机科学家开发出一种软件Sneakey,能通过数字图像复制数十米外的钥匙。
其中一个演示,他们使用了手机摄像头拍摄照片复制钥匙;另一个演示,他们从60米外借助望远镜复制咖啡桌上的钥匙。程序利用常见的2D对应匹配算法映射目标的2D平面,计算出剖切位置和切削深度。这项技术并不新也不复杂,只要有手机摄像头和软件人人都能当钥匙窃贼。科学家并未公布用Matlab开发的代码。
SneakeyUCSD Jacobs School of Engineering (Original Press Release)
Click to enlarge
',1)">
It looks like the writers of CBS's Numb3rs were inspired by SneaKey...check it out above.
Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding
Benjamin LaxtonKai WangStefan Savage
University of California, San DiegoUniversity of California, San DiegoUniversity of California, San Diego
ACM Conference on Computer and Communications Security (CCS) 2008

Our SNEAKEY system correctly decoded the keys shown in the above image that was taken from the rooftop of a four floor building. The inlay shows the image that was used for decoding while the background provides a context for the extreme distances that our system can operate from. In this case the image was taken from 195 feet. This demonstration shows that a motivated attacker can covertly steal a victim's keys without fear of detection. The SNEAKEY system provides a compelling example of how digital computing techniques can breach the security of even physical analog systems in the real-world.
Abstract
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private --- that duplication should require either possession of the key or a priori knowledge of how it was cut. However, the ever-increasing capabilities and prevalence of digital imaging technologies present a fundamental challenge to this privacy assumption. Using modest imaging equipment and standard computer vision algorithms, we demonstrate the effectiveness of physical key teleduplication --- extracting a key's complete and precise bitting code at a distance viaoptical decoding and then cutting precise duplicates. We describe our prototype system, Sneakey, and evaluate its effectiveness, in both laboratory and real-world settings, using the most popular residential key types in the U.S.
Citation
Benjamin Laxton, Kai Wang, and Stefan Savage
Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding.
ACM CCS 2008, Alexandria, VA, October 2008.
Paper
Paper pdf.
Code
The code for this project was developed in Matlab. If there is sufficient interest I may release it in the future.