期刊文献+

分级安全的二维码识别系统及关键算法设计 被引量:6

Design of system and key algorithms for 2D code recognition with different security levels
下载PDF
导出
摘要 为实现对二维码的分权限读取,提出一种二维码应用框架。通过在二维码中嵌入隐藏信息,使一般用户可采用标准软件读取公开信息,高权限用户通过定制软件读取机密信息;基于该框架,提出针对QR二维码的两种信息嵌入算法,即整体嵌入算法和分散嵌入算法。实验和分析结果表明,这两种算法在安全性、鲁棒性和计算效率方面能够满足一般应用需求,可在政府、商业和社会领域中实际应用。 A systematic framework based on 2 Dcode was proposed,so that different contents could be fetched from the same 2 D code depending on users’ authorities.Specifically,general users could only access public information via standard decoder,while users with higher authorities could access confidential information via customized decoder.Two information hiding algorithms,namely,holistic algorithm and scattered algorithm,were proposed using the proposed application framework.Results of experiments and analyses show that both algorithms can satisfy the requirements of security,reliability and efficiency,which can be applied to deal with affairs of government,commerce and society.
作者 梁荣 汪玉凯 李心池 LIANG Rong WANG Yu-kai LI Xin-chi(Faculty of Management and Economics,Dalian University of Technology, Dalian 116024,China College of Computer Science, Chongqing University, Chongqing 400044,China)
出处 《计算机工程与设计》 北大核心 2017年第11期2903-2908,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(61472464)
关键词 二维码 访问控制 信息隐藏 保密性 完整性 2D code access control information hiding confidentiality integrity
  • 相关文献

参考文献3

二级参考文献27

  • 1PAVLIDIS T,SWARTZ J ,WANG Y P. Information encoding with two- dimensional bar codes [ J ]. IEEE Computer, 1992,27 ( 6 ) : 18 - 27.
  • 2胡向东,魏琴芳.应用密码学[M].北京:电子工业出版社,2005:147-201.
  • 3Wang Xiaoyun, Yu Hongbo. Finding collisions in the Full SHA - 1 [M]. Crvpto 2005 .LNCS 3621.2005:17 -36.
  • 4FLOTY L W. Bar codes[J]. Metal Finishing, 2002, 100(8) : 42 - 47.
  • 5KAO Y W, LUO G H, LIN H T, et al. Physical access control based on QR code[ C]/! Proceedings of the 2011 International Con- ference on Cyber - Enabled Distributed Computing and Knowledge Discovery. Washington, DC: IEEE Computer Society, 2011: 285- 288.
  • 6OH D S, KIM B H, LEE J K. A study on authentication system u- sing QR code for mobile cloud computing environment[ C]// Pro- ceedings of the 6th International Conference on Future Technology. Berlin: Springer, 2011:500-507.
  • 7CHUNAG J C, HU Y C, KO H J. A novel secret sharing technique using QR code[ J]. International Journal of Image Processing, 2010, 4(5) : 468 -475.
  • 8BARRERA J F, MIRA A, TORROBA R. Optical encryption and QR codes: Secure and noise-free information retrieval [ J]. Optics Express, 2013, 21(5): 5373-5287.
  • 9中国物品编码中心.QRCode二维码技术与应用[M].北京:中国标准出版社,2001.
  • 10HOU A L, YUAN F, YING G. QR code image detection using run-length coding[ C]// International Computer Science and Net- work Technology, Washington, DC: IEEE Computer Society, 2011: 2130-2134.

共引文献20

同被引文献63

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部