The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia...The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication.展开更多
With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response...With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response(QR)code has been widely researched in IoT.However,the security of privacy data in IoT is also a very important issue.At the same time,because IoT is developing towards low-power devices in order to be applied to more fields,the technology protecting the security of private needs to have the characteristics of low computational complexity.Visual Secret Sharing(VSS),with its features of safety and low computational cost,can fully meet the requirements of communication security in IoT.Therefore,a VSS scheme with QR code(VSS-QR)was proposed and has been applied to some extent.In VSS-QR,the secret is shared into a series of shares.These shares are usually common QR codes,which cannot cause the attention of the attacker.However,if there is dishonesty among participants,the secret cannot be recovered,which will lead to VSS-QR cannot be widely used due to its inadequate security.In this paper,we propose a visual secret sharing scheme with authentication based on QR code(VSSA-QR).Both the reconstructed secret QR code and shares can be verified whether they are forged by attackers.The above-mentioned operations conveniently are performed on low-power QR scanning devices.Not only does the proposed scheme prevent some dishonest participants or attackers from cheating,but also prevent all participants from conspiring.In addition,the payload is the QR code itself,which is higher than other schemes.Theoretical analysis and experiments prove that the proposed scheme is effective.展开更多
It is the development trend of library information management,which applies the mature and cutting-edge information technology to library information retrieval.In order to realize the rapid retrieval of massive book i...It is the development trend of library information management,which applies the mature and cutting-edge information technology to library information retrieval.In order to realize the rapid retrieval of massive book information,this paper proposes a book retrieval method combining QR code with image retrieval technology.This method analyzes the visual features of book images,design a book image retrieval method based on boundary contour and regional pixel distribution features,and realizes the association retrieval of book information combined with the QR code,so as to improve the efficiency of book retrieval.The experimental results show that,the books can be retrieved effectively through the boundary contour and regional pixel distribution features,the book information can be displayed through QR code,readers can be provided with fast and intelligent massive book retrieval services.展开更多
QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not ...QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not have the ability of hiding information,which leads to everyone can get access to read the content in any QR code,including those hiding some secret content in the bytes of QR code.Therefore,in recent years,information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently,especially in the financial field and multi-party verification scenarios.QR codes are almost impossible to use in these scenarios.Therefore,this paper proposes a distributed information sharing method based on information hiding QR code.This method can make secret code in QR code safer and robust,and the secret shared between receivers can be used for decryption and attacking detection.Therefore,on the one hand,the information hiding method can maximize the capacity of embedded secret information,on the other hand,it can prevent attacks by disguised attackers and recover hidden secret information through reconstruction.This paper illustrates the feasibility of this scheme through the form of theoretical proof.展开更多
In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code do...In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code does not have the ability of information hiding,any device can access the content in QR code.Thus,hiding the secret data in QR code becomes a hot topic.Previously,the information hiding methods based on QR code all use the way of information hiding based on image,mostly using digital watermarking technology,and not using the coding rules of QR code to hide information.Therefore,we propose a distributed information sharing method based on QR code information hiding.On the one hand,we can start from the coding rules of QR code and use the information hiding method to maximize the capacity of secret information embedded in QR code.On the other hand,the distributed information sharing method is used to decentralize.At the same time,experimental results and analysis show that the proposed scheme can prevent the attack of camouflage attacker,and finally recover hidden information by secret reconstruction.展开更多
The People’s Bank of China(PBOC)recently issued the regulations on QR code payment service(Trial)and two other relevant technical specifications to regulate payments by scanning two-dimensional barcode,which are to t...The People’s Bank of China(PBOC)recently issued the regulations on QR code payment service(Trial)and two other relevant technical specifications to regulate payments by scanning two-dimensional barcode,which are to take effect on April 1,2018.Payment institutions must obtain proper permits to offer barcode-based payment services by then.Payments with QR codes are increasingly common in China for purchases in large or small shops,subway展开更多
Narrative design was originated in the 20th century.As a kind of design thinking,it runs through various fields such as architecture,environment,and new media.The QR code design has gradually become a bridge for media...Narrative design was originated in the 20th century.As a kind of design thinking,it runs through various fields such as architecture,environment,and new media.The QR code design has gradually become a bridge for media integration design,and its importance is becoming increasingly obvious.An optimized QR code design may gradually replace the original LOGO of certain goods or brand.In this study,narration is embedded into the QR code design,and a new QR code design image is gradually constructed through three ways of planarization,spatialization,and narration.展开更多
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only t...The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it;this is called the stego image.This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response(QR)code and maze game image generation.This system consists of two components.The first component contains two processes,encryption process,and hiding process.The encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game image.On the other hand,the second component contains two processes,extraction and decryption,which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image,respectively.The results were obtained using the bit error rate(BER)metric.These results confirmed that the system achieved high hiding capacity,good performance,and a high level of robustness against attackers compared with other coverless steganography methods.展开更多
The scheme of robot positioning based on multiple quick response(QR)code landmarks is proposed.Firstly,the pose of the robot relative to the QR code landmarks is obtained by extracting the feature points of the QR cod...The scheme of robot positioning based on multiple quick response(QR)code landmarks is proposed.Firstly,the pose of the robot relative to the QR code landmarks is obtained by extracting the feature points of the QR code,combined with the visual computing technology.Then,the conversion of the absolute pose of the robot is completed based on the absolute position of the QR code landmark,and thus the real-time position of the robot is obtained.The proposed scheme makes full use of the QR code fault tolerance and multiple QR code landmarks to improve the calculation accuracy.It has good robustness and versatility,and it is easy to implement.It can help the robot to complete the positioning in the actual work,making robot navigation more accurate.展开更多
Purpose–With the yearly increase of mileage and passenger volume in China’s high-speed railway,the problems of traditional paper railway tickets have become increasingly prominent,including complexity of business ha...Purpose–With the yearly increase of mileage and passenger volume in China’s high-speed railway,the problems of traditional paper railway tickets have become increasingly prominent,including complexity of business handling process,low efficiency of ticket inspection and high cost of usage and management.This paper aims to make extensive references to successful experiences of electronic ticket applications both domestically and internationally.The research on key technologies and system implementation of railway electronic ticket with Chinese characteristics has been carried out.Design/methodology/approach–Research in key technologies is conducted including synchronization technique in distributed heterogeneous database system,the grid-oriented passenger service record(PSR)data storage model,efficient access to massive PSR data under high concurrency condition,the linkage between face recognition service platforms and various terminals in large scenarios,and two-factor authentication of the e-ticket identification code based on the key and the user identity information.Focusing on the key technologies and architecture the of existing ticketing system,multiple service resources are expanded and developed such as electronic ticket clusters,PSR clusters,face recognition clusters and electronic ticket identification code clusters.Findings–The proportion of paper ticket printed has dropped to 20%,saving more than 2 billion tickets annually since the launch of the application of E-ticketing nationwide.The average time for passengers to pass through the automatic ticket gates has decreased from 3 seconds to 1.3 seconds,significantly improving the efficiency of passenger transport organization.Meanwhile,problems of paper ticket counterfeiting,reselling and loss have been generally eliminated.Originality/value–E-ticketing has laid a technical foundation for the further development of railway passenger transport services in the direction of digitalization and intelligence.展开更多
The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breache...The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breaches of privacy and data security.When it comes to protecting private information in today’s Internet era,digital steganography is vital.Many academics are interested in digital video because it has a great capability for concealing important data.There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data.The visual imperceptibility,robustness,and embedding capacity of these approaches are all challenges that must be addressed.In this paper,a novel solution to reversible video steganography based on Discrete Wavelet Transform(DWT)and Quick Response(QR)codes is proposed to address these concerns.In order to increase the security level of the suggested method,an enhanced ElGamal cryptosystem has also been proposed.Prior to the embedding stage,the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes.Concurrently,it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation(LL),Horizontal(LH),Vertical(HL),and Diagonal(HH)sub-bands.Then,the encrypted Low(L),Medium(M),Quantile(Q),and High(H)QR codes are embedded into the HL sub-band,HHsub-band,U-component,and V-component of video frames,respectively,using the Least Significant Bit(LSB)technique.As a consequence of extensive testing of the approach,it was shown to be very secure and highly invisible,as well as highly resistant to attacks from Salt&Pepper,Gaussian,Poisson,and Speckle noises,which has an average Structural Similarity Index(SSIM)of more than 0.91.Aside from visual imperceptibility,the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio(PSNR)average of 52.143 dB,and embedding capacity 1 bpp.展开更多
In this paper a label-based simultaneous localization and mapping( SLAM) system is proposed to provide localization to indoor autonomous robots. In the system quick response( QR) codes encoded with serial numbers ...In this paper a label-based simultaneous localization and mapping( SLAM) system is proposed to provide localization to indoor autonomous robots. In the system quick response( QR) codes encoded with serial numbers are utilized as labels. These labels are captured by two webcams,then the distances and angles between the labels and webcams are computed. Motion estimated from the two rear wheel encoders is adjusted by observing QR codes. Our system uses the extended Kalman filter( EKF) for the back-end state estimation. The number of deployed labels controls the state estimation dimension. The label-based EKF-SLAM system eliminates complicated processes,such as data association and loop closure detection in traditional feature-based visual SLAM systems. Our experiments include software-simulation and robot-platform test in a real environment. Results demonstrate that the system has the capability of correcting accumulated errors of dead reckoning and therefore has the advantage of superior precision.展开更多
文摘The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication.
基金This work was supported in part by the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology under Grant 2016r055in part by the Priority Academic Program Development(PAPD)of Jiangsu Higher Education Institutions.
文摘With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response(QR)code has been widely researched in IoT.However,the security of privacy data in IoT is also a very important issue.At the same time,because IoT is developing towards low-power devices in order to be applied to more fields,the technology protecting the security of private needs to have the characteristics of low computational complexity.Visual Secret Sharing(VSS),with its features of safety and low computational cost,can fully meet the requirements of communication security in IoT.Therefore,a VSS scheme with QR code(VSS-QR)was proposed and has been applied to some extent.In VSS-QR,the secret is shared into a series of shares.These shares are usually common QR codes,which cannot cause the attention of the attacker.However,if there is dishonesty among participants,the secret cannot be recovered,which will lead to VSS-QR cannot be widely used due to its inadequate security.In this paper,we propose a visual secret sharing scheme with authentication based on QR code(VSSA-QR).Both the reconstructed secret QR code and shares can be verified whether they are forged by attackers.The above-mentioned operations conveniently are performed on low-power QR scanning devices.Not only does the proposed scheme prevent some dishonest participants or attackers from cheating,but also prevent all participants from conspiring.In addition,the payload is the QR code itself,which is higher than other schemes.Theoretical analysis and experiments prove that the proposed scheme is effective.
文摘It is the development trend of library information management,which applies the mature and cutting-edge information technology to library information retrieval.In order to realize the rapid retrieval of massive book information,this paper proposes a book retrieval method combining QR code with image retrieval technology.This method analyzes the visual features of book images,design a book image retrieval method based on boundary contour and regional pixel distribution features,and realizes the association retrieval of book information combined with the QR code,so as to improve the efficiency of book retrieval.The experimental results show that,the books can be retrieved effectively through the boundary contour and regional pixel distribution features,the book information can be displayed through QR code,readers can be provided with fast and intelligent massive book retrieval services.
基金This work was partially supported by the National Natural Science Foundation of China(61876089,61876185,61902281,61375121)the Opening Project of Jiangsu Key Laboratory of Data Science and Smart Software(No.2019DS301)+1 种基金the Engineering Research Center of Digital Forensics,Ministry of Education,the Science and Technology Program of Jiangsu Province Construction System(2020JH08)the Priority Academic Program Development of Jiangsu Higher Education Institutions。
文摘QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not have the ability of hiding information,which leads to everyone can get access to read the content in any QR code,including those hiding some secret content in the bytes of QR code.Therefore,in recent years,information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently,especially in the financial field and multi-party verification scenarios.QR codes are almost impossible to use in these scenarios.Therefore,this paper proposes a distributed information sharing method based on information hiding QR code.This method can make secret code in QR code safer and robust,and the secret shared between receivers can be used for decryption and attacking detection.Therefore,on the one hand,the information hiding method can maximize the capacity of embedded secret information,on the other hand,it can prevent attacks by disguised attackers and recover hidden secret information through reconstruction.This paper illustrates the feasibility of this scheme through the form of theoretical proof.
文摘In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code does not have the ability of information hiding,any device can access the content in QR code.Thus,hiding the secret data in QR code becomes a hot topic.Previously,the information hiding methods based on QR code all use the way of information hiding based on image,mostly using digital watermarking technology,and not using the coding rules of QR code to hide information.Therefore,we propose a distributed information sharing method based on QR code information hiding.On the one hand,we can start from the coding rules of QR code and use the information hiding method to maximize the capacity of secret information embedded in QR code.On the other hand,the distributed information sharing method is used to decentralize.At the same time,experimental results and analysis show that the proposed scheme can prevent the attack of camouflage attacker,and finally recover hidden information by secret reconstruction.
文摘The People’s Bank of China(PBOC)recently issued the regulations on QR code payment service(Trial)and two other relevant technical specifications to regulate payments by scanning two-dimensional barcode,which are to take effect on April 1,2018.Payment institutions must obtain proper permits to offer barcode-based payment services by then.Payments with QR codes are increasingly common in China for purchases in large or small shops,subway
文摘Narrative design was originated in the 20th century.As a kind of design thinking,it runs through various fields such as architecture,environment,and new media.The QR code design has gradually become a bridge for media integration design,and its importance is becoming increasingly obvious.An optimized QR code design may gradually replace the original LOGO of certain goods or brand.In this study,narration is embedded into the QR code design,and a new QR code design image is gradually constructed through three ways of planarization,spatialization,and narration.
基金This work was supported by the Korea Technology and Information Promotion Agency(TIPA)for SMEs grant funded by the Korea government(Ministry of SMEs and Startups)(No.S3271954)the National Research Foundation of Korea(NRF)grant funded by the korea government(MSIT)(No.2022H1D8A3038040)the Soonchunhyang University Research Fund.
文摘The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it;this is called the stego image.This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response(QR)code and maze game image generation.This system consists of two components.The first component contains two processes,encryption process,and hiding process.The encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game image.On the other hand,the second component contains two processes,extraction and decryption,which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image,respectively.The results were obtained using the bit error rate(BER)metric.These results confirmed that the system achieved high hiding capacity,good performance,and a high level of robustness against attackers compared with other coverless steganography methods.
基金Project of Introducing Urgently Needed Talents in Key Support Areas of Shandong Province,China。
文摘The scheme of robot positioning based on multiple quick response(QR)code landmarks is proposed.Firstly,the pose of the robot relative to the QR code landmarks is obtained by extracting the feature points of the QR code,combined with the visual computing technology.Then,the conversion of the absolute pose of the robot is completed based on the absolute position of the QR code landmark,and thus the real-time position of the robot is obtained.The proposed scheme makes full use of the QR code fault tolerance and multiple QR code landmarks to improve the calculation accuracy.It has good robustness and versatility,and it is easy to implement.It can help the robot to complete the positioning in the actual work,making robot navigation more accurate.
基金supported by the National Key R&D Program of China(No.2020YFF0304101).
文摘Purpose–With the yearly increase of mileage and passenger volume in China’s high-speed railway,the problems of traditional paper railway tickets have become increasingly prominent,including complexity of business handling process,low efficiency of ticket inspection and high cost of usage and management.This paper aims to make extensive references to successful experiences of electronic ticket applications both domestically and internationally.The research on key technologies and system implementation of railway electronic ticket with Chinese characteristics has been carried out.Design/methodology/approach–Research in key technologies is conducted including synchronization technique in distributed heterogeneous database system,the grid-oriented passenger service record(PSR)data storage model,efficient access to massive PSR data under high concurrency condition,the linkage between face recognition service platforms and various terminals in large scenarios,and two-factor authentication of the e-ticket identification code based on the key and the user identity information.Focusing on the key technologies and architecture the of existing ticketing system,multiple service resources are expanded and developed such as electronic ticket clusters,PSR clusters,face recognition clusters and electronic ticket identification code clusters.Findings–The proportion of paper ticket printed has dropped to 20%,saving more than 2 billion tickets annually since the launch of the application of E-ticketing nationwide.The average time for passengers to pass through the automatic ticket gates has decreased from 3 seconds to 1.3 seconds,significantly improving the efficiency of passenger transport organization.Meanwhile,problems of paper ticket counterfeiting,reselling and loss have been generally eliminated.Originality/value–E-ticketing has laid a technical foundation for the further development of railway passenger transport services in the direction of digitalization and intelligence.
文摘The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breaches of privacy and data security.When it comes to protecting private information in today’s Internet era,digital steganography is vital.Many academics are interested in digital video because it has a great capability for concealing important data.There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data.The visual imperceptibility,robustness,and embedding capacity of these approaches are all challenges that must be addressed.In this paper,a novel solution to reversible video steganography based on Discrete Wavelet Transform(DWT)and Quick Response(QR)codes is proposed to address these concerns.In order to increase the security level of the suggested method,an enhanced ElGamal cryptosystem has also been proposed.Prior to the embedding stage,the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes.Concurrently,it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation(LL),Horizontal(LH),Vertical(HL),and Diagonal(HH)sub-bands.Then,the encrypted Low(L),Medium(M),Quantile(Q),and High(H)QR codes are embedded into the HL sub-band,HHsub-band,U-component,and V-component of video frames,respectively,using the Least Significant Bit(LSB)technique.As a consequence of extensive testing of the approach,it was shown to be very secure and highly invisible,as well as highly resistant to attacks from Salt&Pepper,Gaussian,Poisson,and Speckle noises,which has an average Structural Similarity Index(SSIM)of more than 0.91.Aside from visual imperceptibility,the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio(PSNR)average of 52.143 dB,and embedding capacity 1 bpp.
基金Supported by Program for Changjiang Scholars and Innovative Research Team in University,National Science Foundation of China(61105092)the National Natural Science Foundation of China(61473042)
文摘In this paper a label-based simultaneous localization and mapping( SLAM) system is proposed to provide localization to indoor autonomous robots. In the system quick response( QR) codes encoded with serial numbers are utilized as labels. These labels are captured by two webcams,then the distances and angles between the labels and webcams are computed. Motion estimated from the two rear wheel encoders is adjusted by observing QR codes. Our system uses the extended Kalman filter( EKF) for the back-end state estimation. The number of deployed labels controls the state estimation dimension. The label-based EKF-SLAM system eliminates complicated processes,such as data association and loop closure detection in traditional feature-based visual SLAM systems. Our experiments include software-simulation and robot-platform test in a real environment. Results demonstrate that the system has the capability of correcting accumulated errors of dead reckoning and therefore has the advantage of superior precision.