期刊文献+

二维码的安全技术研究 被引量:5

Research on Security Technology of Two-Dimensional Code
下载PDF
导出
摘要 随着信息安全获得国家层面的关注,二维码安全已成为社会普遍关注的焦点问题。本文以矩阵式二维码中应用最广泛的QR码为基础,通过论述QR码的图形结构、编码方式和编码过程,总结了常见的攻击二维码的方法,并提出从编码环节和解析环节协同引入安全机制的防护策略。目的在于从技术层面和二维码产业的顶层架构层面规范二维码市场的运行秩序,促进二维码行业形成统一的编码体系、解析体系、应用标准以及行业规范。 With the great concern of information security from state level, the security of two-dimensional code becomes the focus of society. Based on QR code, the most widely-used one in matrix two-dimensional codes, the graphics structure, encoding mode and encoding process of QR code are expounded, several common methods attacking two-dimensional code summarized, and protection strategies in coordinate introduction of security mechanism from both encoding and parsing links also presented. The purpose is to regu- late the operation order of two-dimensional code from technical level and the top-level architecture of two-dimensional code industry, thus promoting the two-dimensional code industry and forming the unified encoding system, analytical system, application standard and industry standard.
作者 张彬 王岳
出处 《信息安全与通信保密》 2015年第10期110-113,共4页 Information Security and Communications Privacy
基金 山东省质量技术监督局科研项目(No.2013KYZ23)
关键词 二维码安全 QR码 RC4加密算法 第三方认证 security of two-dimensional codes QR code RC4 encryption algorithm third-party certification
  • 相关文献

参考文献9

二级参考文献20

  • 1张玲,胡东红,孔华锋,刘干.二维条码码图结构特性分析[J].湖北大学学报(自然科学版),2004,26(3):226-231. 被引量:10
  • 2中国物品编码中心 QR code二维条码技术与应用[S],2002.
  • 3GB/T18284-2000快速响应矩阵码[S].2001.
  • 4Peter Kieseberg, Sebastian Schrittwieser, Manuel Leithner, et al., Malicious Pixels Using QR Codes as Attack Vector [B]. Trustworthy Ubiquitous Computing, Atlantis Ambient and Pervasive Intelligence, Volume 6, 2012, pp pp.21-38.
  • 5Vishrut Sharma,A Study of Malicious QR Codes [J]. International Journal of Computational Intelligence and Information Security, May 2012, Vol.3, No.5, pp10-15.
  • 6FLOTY L W. Bar codes[J]. Metal Finishing, 2002, 100(8) : 42 - 47.
  • 7KAO Y W, LUO G H, LIN H T, et al. Physical access control based on QR code[ C]/! Proceedings of the 2011 International Con- ference on Cyber - Enabled Distributed Computing and Knowledge Discovery. Washington, DC: IEEE Computer Society, 2011: 285- 288.
  • 8OH D S, KIM B H, LEE J K. A study on authentication system u- sing QR code for mobile cloud computing environment[ C]// Pro- ceedings of the 6th International Conference on Future Technology. Berlin: Springer, 2011:500-507.
  • 9CHUNAG J C, HU Y C, KO H J. A novel secret sharing technique using QR code[ J]. International Journal of Image Processing, 2010, 4(5) : 468 -475.
  • 10BARRERA J F, MIRA A, TORROBA R. Optical encryption and QR codes: Secure and noise-free information retrieval [ J]. Optics Express, 2013, 21(5): 5373-5287.

共引文献40

同被引文献37

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部