期刊文献+

物流用户隐私信息保护系统 被引量:1

Privacy Information Protection System for Logistics Users
下载PDF
导出
摘要 为解决物流运转过程中用户隐私信息泄露的问题,提出一种基于图像加密和二维码技术的物流用户隐私信息保护方案。该方案依据高维混沌的图像加密理论,对上传的身份证明图像分别进行Y、C_b和C_r通道的数据映射加密。同时根据分级分域的加密策略,以二维码的形式封装地址隐私信息。在此基础上设计和开发出面向用户和配送人员的物流用户隐私信息保护系统,并应用于具体物流运转场景。测试结果显示,该方案设计的系统具有较高的信息保密性和抵抗攻击能力,能够有效保护客户的身份和地址隐私信息不被非法获取和利用。 To solve the problem of information disclosure,a logistics users privacy information protection scheme based on the image encryption and the two-dimensional code is proposed.In the scheme,the uploaded identity images are encrypted by data mapping of Y、C_b and C_r channels based on the high-dimensional chaotic image encryption theory.Meanwhile,the address privacy information is encapsulated in the form of two-dimensional codes according to the encryption strategy of hierarchical domain.On this basis,a privacy information protection system for the users and the couriers is developed and then applied to the scenarios of logistics transportation.Test results show that the system designed by this scheme has high information confidentiality and strong resistance to attacks,and it could effectively protect the identity and address privacy information of customers from being illegally obtained and exploited.
作者 娄豪 李晓东 刘晶 金鑫 LOU Hao;LI Xiaodong;LIU Jing;JIN Xin(Beijing Electronic Science and Technology Institute,Beijing 100070,P.R.China;Beijing University of Posts and Telecommunications,Beijing 100876,P.R.China)
出处 《北京电子科技学院学报》 2019年第4期18-25,共8页 Journal of Beijing Electronic Science And Technology Institute
基金 国家自然科学基金面上项目,无退化的混沌密码标准实现研究,项目编号:61772047 中央高校基本科研业务费项目,基于智能优化方法的密码算法组件设计研究,项目编号:328201906
关键词 物流 隐私保护 公钥密码体制 混沌 图像加密 logistics privacy protection public key cryptosystem chaos image encryption
  • 相关文献

参考文献5

二级参考文献47

  • 1刘承彬,耿也,舒奎,高真,香子.有关中国剩余定理在多个素数的RSA解密运算中的加速公式的论证以及加速效率的估算[J].大连工业大学学报,2012,31(5):372-375. 被引量:3
  • 2Long Min Peng Fei Qiu Shuisheng Chen Yanfeng.Implementation of a new chaotic encryption system and synchronization[J].Journal of Systems Engineering and Electronics,2006,17(1):43-47. 被引量:7
  • 3姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 4GUAN Z H,HUANG F J,GUAN W J.Chaos-based image encryption algorithm[J].Physics Letters A,2005,346(1-3):153-157.
  • 5GAO H J,ZHANG Y S,LIANG S Y,et al.A new chaotic algorithm for image encryption[J].Chaos,Solitons and Fractals,2006,29(2):393-399.
  • 6ZHANG L H,LIAO X F,WANG X B.An image encryption approach based on chaotic maps[J].Chaos,Solitons and Fractals,2005,24(3):759-765.
  • 7WANG S H,KUANG J Y,LI J H,et al.Chaos-based communications in a large community[J].Physical Review E-Statistical,Nonlinear,and Soft Matter Physics,2002,66(6):1-4.
  • 8Lü J H,CHEN G R,ZHANG S C.The compound structure of a new chaotic attractor[J].Chaos,Solitons and Fractals,2002,14(5):669-672.
  • 9CHEN G R,MAO Y B,CHARLES K.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos,Solitons and Fractals,2004,21(3):749-761.
  • 10X. Feng,J. C. Zhao,K. Xu.Link prediction in complex networks: a clustering perspective[J].The European Physical Journal B.2012(1)

共引文献759

同被引文献18

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部