期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
1
作者 Saranya Vaithilingam Santhosh Aradhya Mohan Shankar 《International Journal of Intelligence Science》 2024年第2期49-57,共9页
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia... The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication. 展开更多
关键词 Artificial Intelligence Cyber Security qr codes Quishing AI Framework Machine Learning AI-Enhanced Security
下载PDF
一种基于QR码混沌图像加密算法研究
2
作者 吴源源 张亚军 +1 位作者 康凌 蔡江云 《中国新技术新产品》 2023年第3期29-32,共4页
随着资讯传播互联网化的程度越来越深,线上图像资源的版权保护受到越来越多的重视。该文提出了一种基于QR码(Quick response code)的利用Shearlet变换和线性螺旋变换的混沌图像数字水印算法。首先,对预加密图像资源生成版权QR码。其次,... 随着资讯传播互联网化的程度越来越深,线上图像资源的版权保护受到越来越多的重视。该文提出了一种基于QR码(Quick response code)的利用Shearlet变换和线性螺旋变换的混沌图像数字水印算法。首先,对预加密图像资源生成版权QR码。其次,用Arnold变换对QR码进行加扰。最后,用Shearlet变换、线性螺旋变换和离散余弦变换将版权水印信息嵌入图像的中频部分,以嵌入水印。提取则是嵌入过程的逆过程。经试验证明,该文提出的方法不仅具有较好的版权信息隐蔽性,而且还有较强的鲁棒性。嵌入的QR码对一定比例的图像遮挡和噪声具有抗攻击能力。 展开更多
关键词 qr码(Quick response code) ARNOLD变换 SHEARLET变换 线性螺旋变换 离散余弦变换 图像加密
下载PDF
二维条码QR Code编码原理及实现 被引量:20
3
作者 黄吉兰 《电脑知识与技术》 2013年第4X期2904-2908,共5页
在二维码编码的实现过程中,分析了QR Code二维条码的结构、编码步骤、编码原理和Reed-Solomon算法,并以数字模式为实例按照QR Code编码原理直观的描述了实现二维码QR Code的编码、纠错等功能。采用VC++的编程环境,通过对二维码编码程序... 在二维码编码的实现过程中,分析了QR Code二维条码的结构、编码步骤、编码原理和Reed-Solomon算法,并以数字模式为实例按照QR Code编码原理直观的描述了实现二维码QR Code的编码、纠错等功能。采用VC++的编程环境,通过对二维码编码程序反复测试,实现了二维码QR Code的编码程序设计。 展开更多
关键词 qr Code 二维码 编码 VC++ 纠错
下载PDF
On the Computing of the Minimum Distance of Linear Block Codes by Heuristic Methods
4
作者 Mohamed Askali Ahmed Azouaoui +1 位作者 Said Nouh Mostafa Belkasmi 《International Journal of Communications, Network and System Sciences》 2012年第11期774-784,共11页
The evaluation of the minimum distance of linear block codes remains an open problem in coding theory, and it is not easy to determine its true value by classical methods, for this reason the problem has been solved i... The evaluation of the minimum distance of linear block codes remains an open problem in coding theory, and it is not easy to determine its true value by classical methods, for this reason the problem has been solved in the literature with heuristic techniques such as genetic algorithms and local search algorithms. In this paper we propose two approaches to attack the hardness of this problem. The first approach is based on genetic algorithms and it yield to good results comparing to another work based also on genetic algorithms. The second approach is based on a new randomized algorithm which we call 'Multiple Impulse Method (MIM)', where the principle is to search codewords locally around the all-zero codeword perturbed by a minimum level of noise, anticipating that the resultant nearest nonzero codewords will most likely contain the minimum Hamming-weight codeword whose Hamming weight is equal to the minimum distance of the linear code. 展开更多
关键词 Minimum Distance Error Impulse Method Heuristic Methods Genetic Algorithms NP-HARDNESS Linear Error Correcting codes BCH codes qr codes Double Circulant codes
下载PDF
QR二维条形码攻击事件分析
5
作者 邢晓鹏 《价值工程》 2012年第27期210-211,共2页
对QR code attack安全事件分析。
关键词 qr—code CVE-2010-1807 The Jester
下载PDF
基于QR Code的校园ID身份生成识别系统的设计 被引量:1
6
作者 柴世杰 马佳琳 《电子技术与软件工程》 2021年第5期52-53,共2页
本文以“沈阳师范大学”为基础设计并开发了一款基于QR Code的校园ID身份生成识别系统。系统采用Visual Studio进行开发,借用jquery-qrcode开源第三方库,实现校园师生人员的相关信息录入编码纠错、生成载入解码显示QR-Code图形功能。防... 本文以“沈阳师范大学”为基础设计并开发了一款基于QR Code的校园ID身份生成识别系统。系统采用Visual Studio进行开发,借用jquery-qrcode开源第三方库,实现校园师生人员的相关信息录入编码纠错、生成载入解码显示QR-Code图形功能。防止个人信息的泄露,避免以往校园卡丢失的情况,做到信息资源整合,还可以便于应急防疫措施的展开,方便师生的使用。 展开更多
关键词 qr Code C# 数字校园ID
下载PDF
Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem 被引量:1
7
作者 Ramadhan J.Mstafa 《Computers, Materials & Continua》 SCIE EI 2022年第8期3349-3368,共20页
The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breache... The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breaches of privacy and data security.When it comes to protecting private information in today’s Internet era,digital steganography is vital.Many academics are interested in digital video because it has a great capability for concealing important data.There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data.The visual imperceptibility,robustness,and embedding capacity of these approaches are all challenges that must be addressed.In this paper,a novel solution to reversible video steganography based on Discrete Wavelet Transform(DWT)and Quick Response(QR)codes is proposed to address these concerns.In order to increase the security level of the suggested method,an enhanced ElGamal cryptosystem has also been proposed.Prior to the embedding stage,the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes.Concurrently,it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation(LL),Horizontal(LH),Vertical(HL),and Diagonal(HH)sub-bands.Then,the encrypted Low(L),Medium(M),Quantile(Q),and High(H)QR codes are embedded into the HL sub-band,HHsub-band,U-component,and V-component of video frames,respectively,using the Least Significant Bit(LSB)technique.As a consequence of extensive testing of the approach,it was shown to be very secure and highly invisible,as well as highly resistant to attacks from Salt&Pepper,Gaussian,Poisson,and Speckle noises,which has an average Structural Similarity Index(SSIM)of more than 0.91.Aside from visual imperceptibility,the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio(PSNR)average of 52.143 dB,and embedding capacity 1 bpp. 展开更多
关键词 Reversible video steganography qr code SECURITY ElGamal cryptosystem DWT
下载PDF
基于QR Code二维码的食品溯源系统的开发与设计 被引量:6
8
作者 刘韬 都洪韬 +4 位作者 丁润东 吴芮豪 许鑫 崔煦晨 王亚 《阜阳师范大学学报(自然科学版)》 2021年第4期89-94,共6页
食品安全问题与人们的生活密切关联,为了消费者放心选择食品、企业经营者有效监管食品,构建食品溯源系统尤为重要。在云平台环境下,基于二维码设计开发了一套食品溯源系统,该系统主要由三个部分组成。首先,采用QR(Quick Response)Code... 食品安全问题与人们的生活密切关联,为了消费者放心选择食品、企业经营者有效监管食品,构建食品溯源系统尤为重要。在云平台环境下,基于二维码设计开发了一套食品溯源系统,该系统主要由三个部分组成。首先,采用QR(Quick Response)Code技术设计食品二维码标签,记录食品的生产、运输、销售等信息。其次,在搭载Ubuntu系统的服务器上,结合MySQL数据库和高性能的Nginx服务器,搭建了后端云平台。采用Python+Flask框架构建后端系统,并部署在云平台上。最后,开发设计了前端微信小程序,及时方便地获取二维码中存储的食品信息。该系统利用"互联网+食品"模式为食品溯源提供了一种新途径。 展开更多
关键词 食品溯源 云平台 qr Code 微信小程序
下载PDF
QR Code码在成品油水上供应业务中的应用
9
作者 张俊晓 《中国储运》 2007年第12期103-104,共2页
  1、问题的提出   随着中国成品油销售市场的逐步开放,成品油水上供应领域的竞争日益加剧.为了及时掌握市场、客户需求的变化情况,提高应变能力和市场占有率,降低经营风险,各个企业都相继建立起了各类管理信息系统.以国内船用油...   1、问题的提出   随着中国成品油销售市场的逐步开放,成品油水上供应领域的竞争日益加剧.为了及时掌握市场、客户需求的变化情况,提高应变能力和市场占有率,降低经营风险,各个企业都相继建立起了各类管理信息系统.以国内船用油供应行业中的A公司为例,该公司于2000年建立了基于B/S架构的业务管理系统,由分布于全国沿海沿江的各个供油网点负责及时录入供油凭证、发票及其他相关销售信息,系统自动生成一系列分析报表,指导该公司及时对区域价格、采购倾向、库存数量和库存结构等进行调整;同时,A公司为加强财务管理,亦建立了财务管理系统对发票进行专门的管理.由于在数据的保密性、准确率、录入接口以及入帐时间等方面存在不一致现象或具有不同要求,这两个管理信息系统一直无法实现数据的共享.…… 展开更多
关键词 成品油 qr Code 图像 财务管理系统 发票 石油产品 原始凭证 二维条形码 二维条码 供油船 船用油 油水
下载PDF
Book Retrieval Method Based on QR Code and CBIR Technology
10
作者 Qiuyan Wang Haibing Dong 《Journal on Artificial Intelligence》 2019年第2期101-110,共10页
It is the development trend of library information management,which applies the mature and cutting-edge information technology to library information retrieval.In order to realize the rapid retrieval of massive book i... It is the development trend of library information management,which applies the mature and cutting-edge information technology to library information retrieval.In order to realize the rapid retrieval of massive book information,this paper proposes a book retrieval method combining QR code with image retrieval technology.This method analyzes the visual features of book images,design a book image retrieval method based on boundary contour and regional pixel distribution features,and realizes the association retrieval of book information combined with the QR code,so as to improve the efficiency of book retrieval.The experimental results show that,the books can be retrieved effectively through the boundary contour and regional pixel distribution features,the book information can be displayed through QR code,readers can be provided with fast and intelligent massive book retrieval services. 展开更多
关键词 Book retrieval image retrieval qr code visual features.
下载PDF
A Distributed Secret Sharing Method with QR Code Based on Information Hiding
11
作者 Pengcheng Jiang Yu Xue 《Journal of Cyber Security》 2021年第4期217-225,共9页
QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not ... QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not have the ability of hiding information,which leads to everyone can get access to read the content in any QR code,including those hiding some secret content in the bytes of QR code.Therefore,in recent years,information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently,especially in the financial field and multi-party verification scenarios.QR codes are almost impossible to use in these scenarios.Therefore,this paper proposes a distributed information sharing method based on information hiding QR code.This method can make secret code in QR code safer and robust,and the secret shared between receivers can be used for decryption and attacking detection.Therefore,on the one hand,the information hiding method can maximize the capacity of embedded secret information,on the other hand,it can prevent attacks by disguised attackers and recover hidden secret information through reconstruction.This paper illustrates the feasibility of this scheme through the form of theoretical proof. 展开更多
关键词 qr code image encryption information hiding secret sharing
下载PDF
A QR Data Hiding Method Based on Redundant Region and BCH
12
作者 Ying Zhou Weiwei Luo 《Journal on Big Data》 2021年第3期127-133,共7页
In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code do... In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code does not have the ability of information hiding,any device can access the content in QR code.Thus,hiding the secret data in QR code becomes a hot topic.Previously,the information hiding methods based on QR code all use the way of information hiding based on image,mostly using digital watermarking technology,and not using the coding rules of QR code to hide information.Therefore,we propose a distributed information sharing method based on QR code information hiding.On the one hand,we can start from the coding rules of QR code and use the information hiding method to maximize the capacity of secret information embedded in QR code.On the other hand,the distributed information sharing method is used to decentralize.At the same time,experimental results and analysis show that the proposed scheme can prevent the attack of camouflage attacker,and finally recover hidden information by secret reconstruction. 展开更多
关键词 qr code image encryption information hiding secret sharing
下载PDF
A Secure Visual Secret Sharing Scheme with Authentication Based on QR Code
13
作者 Xinwei Zhong Lizhi Xiong Zhihua Xia 《Journal on Big Data》 2021年第2期85-95,共11页
With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response... With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response(QR)code has been widely researched in IoT.However,the security of privacy data in IoT is also a very important issue.At the same time,because IoT is developing towards low-power devices in order to be applied to more fields,the technology protecting the security of private needs to have the characteristics of low computational complexity.Visual Secret Sharing(VSS),with its features of safety and low computational cost,can fully meet the requirements of communication security in IoT.Therefore,a VSS scheme with QR code(VSS-QR)was proposed and has been applied to some extent.In VSS-QR,the secret is shared into a series of shares.These shares are usually common QR codes,which cannot cause the attention of the attacker.However,if there is dishonesty among participants,the secret cannot be recovered,which will lead to VSS-QR cannot be widely used due to its inadequate security.In this paper,we propose a visual secret sharing scheme with authentication based on QR code(VSSA-QR).Both the reconstructed secret QR code and shares can be verified whether they are forged by attackers.The above-mentioned operations conveniently are performed on low-power QR scanning devices.Not only does the proposed scheme prevent some dishonest participants or attackers from cheating,but also prevent all participants from conspiring.In addition,the payload is the QR code itself,which is higher than other schemes.Theoretical analysis and experiments prove that the proposed scheme is effective. 展开更多
关键词 qr code visual secret sharing low computational complexity AUTHENTICATION
下载PDF
Technical specifcations issued to regulate QR code payment
14
《China Standardization》 2018年第1期7-7,共1页
The People’s Bank of China(PBOC)recently issued the regulations on QR code payment service(Trial)and two other relevant technical specifications to regulate payments by scanning two-dimensional barcode,which are to t... The People’s Bank of China(PBOC)recently issued the regulations on QR code payment service(Trial)and two other relevant technical specifications to regulate payments by scanning two-dimensional barcode,which are to take effect on April 1,2018.Payment institutions must obtain proper permits to offer barcode-based payment services by then.Payments with QR codes are increasingly common in China for purchases in large or small shops,subway 展开更多
关键词 qr Technical specifcations issued to regulate qr code payment
下载PDF
Application of Narration in QR Code Image Design
15
作者 Kaixin Yao 《Journal of Contemporary Educational Research》 2022年第10期62-67,共6页
Narrative design was originated in the 20th century.As a kind of design thinking,it runs through various fields such as architecture,environment,and new media.The QR code design has gradually become a bridge for media... Narrative design was originated in the 20th century.As a kind of design thinking,it runs through various fields such as architecture,environment,and new media.The QR code design has gradually become a bridge for media integration design,and its importance is becoming increasingly obvious.An optimized QR code design may gradually replace the original LOGO of certain goods or brand.In this study,narration is embedded into the QR code design,and a new QR code design image is gradually constructed through three ways of planarization,spatialization,and narration. 展开更多
关键词 NARRATION qr code image Design optimization
下载PDF
A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
16
作者 Al-Hussien Seddik Mohammed Salah +5 位作者 Gamal Behery Ahmed El-harby Ahmed Ismail Ebada Sokea Teng Yunyoung Nam Mohamed Abouhawwash 《Computers, Materials & Continua》 SCIE EI 2023年第3期5087-5103,共17页
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only t... The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it;this is called the stego image.This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response(QR)code and maze game image generation.This system consists of two components.The first component contains two processes,encryption process,and hiding process.The encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game image.On the other hand,the second component contains two processes,extraction and decryption,which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image,respectively.The results were obtained using the bit error rate(BER)metric.These results confirmed that the system achieved high hiding capacity,good performance,and a high level of robustness against attackers compared with other coverless steganography methods. 展开更多
关键词 Coverless steganography data hiding information security qr code maze game
下载PDF
Robot Positioning Based on Multiple Quick Response Code Landmarks
17
作者 李锋 余彦君 盛守祥 《Journal of Donghua University(English Edition)》 CAS 2023年第6期667-675,共9页
The scheme of robot positioning based on multiple quick response(QR)code landmarks is proposed.Firstly,the pose of the robot relative to the QR code landmarks is obtained by extracting the feature points of the QR cod... The scheme of robot positioning based on multiple quick response(QR)code landmarks is proposed.Firstly,the pose of the robot relative to the QR code landmarks is obtained by extracting the feature points of the QR code,combined with the visual computing technology.Then,the conversion of the absolute pose of the robot is completed based on the absolute position of the QR code landmark,and thus the real-time position of the robot is obtained.The proposed scheme makes full use of the QR code fault tolerance and multiple QR code landmarks to improve the calculation accuracy.It has good robustness and versatility,and it is easy to implement.It can help the robot to complete the positioning in the actual work,making robot navigation more accurate. 展开更多
关键词 computer vision quick response(qr)code robot positioning robot orientation
下载PDF
Application and realization of key technologies in China railway e-ticketing system
18
作者 Xinghua Shan Zhiqiang Zhang +2 位作者 Fei Ning Shida Li Linlin Dai 《Railway Sciences》 2023年第1期140-156,共17页
Purpose–With the yearly increase of mileage and passenger volume in China’s high-speed railway,the problems of traditional paper railway tickets have become increasingly prominent,including complexity of business ha... Purpose–With the yearly increase of mileage and passenger volume in China’s high-speed railway,the problems of traditional paper railway tickets have become increasingly prominent,including complexity of business handling process,low efficiency of ticket inspection and high cost of usage and management.This paper aims to make extensive references to successful experiences of electronic ticket applications both domestically and internationally.The research on key technologies and system implementation of railway electronic ticket with Chinese characteristics has been carried out.Design/methodology/approach–Research in key technologies is conducted including synchronization technique in distributed heterogeneous database system,the grid-oriented passenger service record(PSR)data storage model,efficient access to massive PSR data under high concurrency condition,the linkage between face recognition service platforms and various terminals in large scenarios,and two-factor authentication of the e-ticket identification code based on the key and the user identity information.Focusing on the key technologies and architecture the of existing ticketing system,multiple service resources are expanded and developed such as electronic ticket clusters,PSR clusters,face recognition clusters and electronic ticket identification code clusters.Findings–The proportion of paper ticket printed has dropped to 20%,saving more than 2 billion tickets annually since the launch of the application of E-ticketing nationwide.The average time for passengers to pass through the automatic ticket gates has decreased from 3 seconds to 1.3 seconds,significantly improving the efficiency of passenger transport organization.Meanwhile,problems of paper ticket counterfeiting,reselling and loss have been generally eliminated.Originality/value–E-ticketing has laid a technical foundation for the further development of railway passenger transport services in the direction of digitalization and intelligence. 展开更多
关键词 E-ticket Ticketing system Passenger service PSR Dynamic qr code Paper type Research paper
下载PDF
Android平台设备盘点客户端的设计与实现
19
作者 高毅 《电脑知识与技术》 2016年第5X期88-90,共3页
现有的设备盘点大多是手工或者半手工的方式,这使得设备盘点的工作量大大增加。该文基于QR Code技术和Android技术,提出一种通过移动设备扫描设备上的条码标签来实现设备盘点的方法。该客户端的实现,提高了设备盘点的工作效率,对企业的... 现有的设备盘点大多是手工或者半手工的方式,这使得设备盘点的工作量大大增加。该文基于QR Code技术和Android技术,提出一种通过移动设备扫描设备上的条码标签来实现设备盘点的方法。该客户端的实现,提高了设备盘点的工作效率,对企业的设备管理有着重要的意义。 展开更多
关键词 ANDROID 客户端 qr Code 设备盘点
下载PDF
基于VBA的标签式二维码批量生成系统设计与实现 被引量:1
20
作者 张江鹏 杨文 +1 位作者 张利军 卢玉 《计算机时代》 2022年第3期65-69,共5页
二维码技术应用广泛,但是针对大批量、标签式的二维码应用场景,仍缺乏简单易用、方便快捷的设计与生成系统。文章分析了常用二维码标签生成系统的不足,设计并实现了一套QR Code二维码标签批量生成系统。该系统采用VBA实现标签批量生成... 二维码技术应用广泛,但是针对大批量、标签式的二维码应用场景,仍缺乏简单易用、方便快捷的设计与生成系统。文章分析了常用二维码标签生成系统的不足,设计并实现了一套QR Code二维码标签批量生成系统。该系统采用VBA实现标签批量生成功能、采用动态链接库作为二维码生成的编程接口。实验验证结果表明,该系统能够满足生产、经营、管理活动中对大批量、标签式二维码的需求,并具有灵活、便捷、高效等优点。 展开更多
关键词 二维码 动态链接库 qr Code VBA
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部