重生之宠妃攻略微盘:远距离获取钥匙模板
来源:百度文库 编辑:九乡新闻网 时间:2024/05/04 22:44:34
加州圣迭戈分校的计算机科学家开发出一种软件Sneakey,能通过数字图像复制数十米外的钥匙。
其中一个演示,他们使用了手机摄像头拍摄照片复制钥匙;另一个演示,他们从60米外借助望远镜复制咖啡桌上的钥匙。程序利用常见的2D对应匹配算法映射目标的2D平面,计算出剖切位置和切削深度。这项技术并不新也不复杂,只要有手机摄像头和软件人人都能当钥匙窃贼。科学家并未公布用Matlab开发的代码。
SneakeyUCSD Jacobs School of Engineering (Original Press Release)
Click to enlarge
',1)">
It looks like the writers of CBS's Numb3rs were inspired by SneaKey...check it out above.
Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding
Benjamin LaxtonKai WangStefan Savage
University of California, San DiegoUniversity of California, San DiegoUniversity of California, San Diego
ACM Conference on Computer and Communications Security (CCS) 2008
Our SNEAKEY system correctly decoded the keys shown in the above image that was taken from the rooftop of a four floor building. The inlay shows the image that was used for decoding while the background provides a context for the extreme distances that our system can operate from. In this case the image was taken from 195 feet. This demonstration shows that a motivated attacker can covertly steal a victim's keys without fear of detection. The SNEAKEY system provides a compelling example of how digital computing techniques can breach the security of even physical analog systems in the real-world.
Abstract
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private --- that duplication should require either possession of the key or a priori knowledge of how it was cut. However, the ever-increasing capabilities and prevalence of digital imaging technologies present a fundamental challenge to this privacy assumption. Using modest imaging equipment and standard computer vision algorithms, we demonstrate the effectiveness of physical key teleduplication --- extracting a key's complete and precise bitting code at a distance viaoptical decoding and then cutting precise duplicates. We describe our prototype system, Sneakey, and evaluate its effectiveness, in both laboratory and real-world settings, using the most popular residential key types in the U.S.
Citation
Benjamin Laxton, Kai Wang, and Stefan Savage
Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding.
ACM CCS 2008, Alexandria, VA, October 2008.
Paper
Paper pdf.
Code
The code for this project was developed in Matlab. If there is sufficient interest I may release it in the future.
其中一个演示,他们使用了手机摄像头拍摄照片复制钥匙;另一个演示,他们从60米外借助望远镜复制咖啡桌上的钥匙。程序利用常见的2D对应匹配算法映射目标的2D平面,计算出剖切位置和切削深度。这项技术并不新也不复杂,只要有手机摄像头和软件人人都能当钥匙窃贼。科学家并未公布用Matlab开发的代码。
SneakeyUCSD Jacobs School of Engineering (Original Press Release)
Click to enlarge
',1)">
It looks like the writers of CBS's Numb3rs were inspired by SneaKey...check it out above.
Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding
Benjamin LaxtonKai WangStefan Savage
University of California, San DiegoUniversity of California, San DiegoUniversity of California, San Diego
ACM Conference on Computer and Communications Security (CCS) 2008
Our SNEAKEY system correctly decoded the keys shown in the above image that was taken from the rooftop of a four floor building. The inlay shows the image that was used for decoding while the background provides a context for the extreme distances that our system can operate from. In this case the image was taken from 195 feet. This demonstration shows that a motivated attacker can covertly steal a victim's keys without fear of detection. The SNEAKEY system provides a compelling example of how digital computing techniques can breach the security of even physical analog systems in the real-world.
Abstract
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private --- that duplication should require either possession of the key or a priori knowledge of how it was cut. However, the ever-increasing capabilities and prevalence of digital imaging technologies present a fundamental challenge to this privacy assumption. Using modest imaging equipment and standard computer vision algorithms, we demonstrate the effectiveness of physical key teleduplication --- extracting a key's complete and precise bitting code at a distance viaoptical decoding and then cutting precise duplicates. We describe our prototype system, Sneakey, and evaluate its effectiveness, in both laboratory and real-world settings, using the most popular residential key types in the U.S.
Citation
Benjamin Laxton, Kai Wang, and Stefan Savage
Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding.
ACM CCS 2008, Alexandria, VA, October 2008.
Paper
Paper pdf.
Code
The code for this project was developed in Matlab. If there is sufficient interest I may release it in the future.
远距离获取钥匙模板
远距离指纹识别
.如何把你喜欢的模块样式搬来为自己所用?【如何获取模板代码】
如何远距离辨别处女
如何远距离辨别处女
如何远距离辨别处女n
如何远距离辨别处女CN
如何远距离辨别处女CNJL
【知识钥匙】
快乐钥匙
如何远距离辨别处女===
个各方的 如何远距离辨别处女
LNG给力远距离绿色交通1
生活中并不缺乏快乐,只要用心体味,你总能从中悟出快乐的真谛,找到获取快乐的办法,捡到打开快乐之门的钥匙……
获取知识
获取地址
12星座的远距离爱情持久指数各是多少?
贝克汉姆远距离把球射入桶内!!弧度超美!!
12星座远距离爱情持久指数各是多少?
如果你有一个远距离真正爱你的女人
快乐的钥匙
带走的钥匙
摆脱疾病的钥匙
快乐的钥匙