[1]刘石坚、翁才杰、邹峥.基于QR码模块边界偏移的信息植入与提取方法[J].福建工程学院学报,2019,17(03):259-266.[doi:10.3969/j.issn.1672-4348.2019.03.010]
 LIU ShiJian,WENG CaiJie,ZOU Zheng.Information embedding and extraction method based on module boundary offset of QR codes[J].Journal of FuJian University of Technology,2019,17(03):259-266.[doi:10.3969/j.issn.1672-4348.2019.03.010]
点击复制

基于QR码模块边界偏移的信息植入与提取方法()
分享到:

《福建工程学院学报》[ISSN:2097-3853/CN:35-1351/Z]

卷:
第17卷
期数:
2019年03期
页码:
259-266
栏目:
出版日期:
2019-06-25

文章信息/Info

Title:
Information embedding and extraction method based on module boundary offset of QR codes
作者:
刘石坚、翁才杰、邹峥
福建工程学院信息科学与工程学院
Author(s):
LIU ShiJianWENG CaiJieZOU Zheng
School of Information Science and Engineering
关键词:
QR码信息安全编码信息认证数字签名
Keywords:
quick response code information security encoded message authentication digital signature
分类号:
TP301
DOI:
10.3969/j.issn.1672-4348.2019.03.010
文献标志码:
A
摘要:
提出一种基于QR码(quickresponse,快速响应)模块边界多方向偏移的信息植入及提取方法,应用于QR码编码信息认证中。该方法具有较高的容量、较强的抗干扰能力,适用于通过数字媒体、印刷媒体传播的QR码场景。通过植入数据容量评估实验和裁剪攻击实验验证了方法的有效性。
Abstract:
An information embedding and extraction method based on multi-directional module boundary offset of QR (quick response) codes is proposed , which can be applied in message authentication of encoded QR codes. The method has such advantages as high capacity and anti-disturbance, and it is applicable for transmission scenarios of QR codes through both digital and print mediums. The effectiveness and efficiency were proved by experiments including embedding capacity evaluation and occlusion attack analysis.

参考文献/References:

[1]马慰. 一种基于双因素认证的QR码安全移动支付方案研究[J]. 现代金融, 2016(4): 42-44.[2] 潘璐. 基于二维码的证件认证技术研究与实现[D]. 北京: 北京邮电大学, 2015.[3] 徐剑, 赵英南, 田永纯, 等. 融合二维码与人脸识别的会议身份认证系统研究[J]. 信息网络安全, 2015(4): 13-18.[4] KROMBHOLZ K, PETER F, KIESEBERG P, et al. QR code security: A survey of attacks and challenges for usable security[C]/〖KG-*4〗/ International Conference on Human Aspects of Information Security, Privacy, and Trust. [S.l.]: Springer International Publishing, 2014: 79-90.[5] GOEL N, SHARMA A, GOSWAMI S. A way to secure a QR code: SQR[C]/〖KG-*4〗/ International Conference on Computing, Communication and Automation. Noida: IEEE, 2017:494-497.[6] HUSNY H R M, ABDULLAH N Y, ISMAIL W H W, et al. Encrypted QR code system[J]. Journal of Computing Technologies and Creative Content, 2017, 8: 82-92.[7] 杨丽娟, 孙红艳, 李瑛. RSA算法在QR码防伪技术中的应用[J]. 北华航天工业学院学报, 2014, 24(2): 24-27.[8] 安吉旺, 徐凯宏. 基于RSA和密钥的二维码加密编码的研究[J]. 森林工程, 2014, 30(2): 125-129.[9] 解龙, 杜艳平, 程明智, 等. 基于加密QR二维码的商品包装防伪技术[J]. 北京印刷学院学报, 2013, 21(4): 16-20.[10]YAO H, SHIN D. Towards preventing QR code based attacks on android phone using security warnings [C]/〖KG-*4〗/Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. Hangzhou: ACM, 2013: 341-346.[11] 闫涛. 基于数字签名二维码认证技术的研究与实现[D], 北京: 北京印刷学院, 2017.[12] 肖本海, 郑莹娜, 龙建明, 等. 基于SHA512哈希函数和Rijndael加密算法QR二维码信息安全设计[J]. 计算机系统应用, 2015, 24(7): 149-154.[13] LIU S J, ZHANG J, PAN J S, et al. SVQR: a novel secure visual quick response code and its anticounterfeiting solution [J]. Information Hiding & Multimedia Signal Processing, 2017, 8(5): 1132-1140.[14] BARMAWI A M, YULIANTO F A. Watermarking QR code [C]/〖KG-*4〗/ 2nd International Conference on Information Science and Security (ICISS). Seoul: IEEE Computer Society, 2015: 1-4.[15] XIE R, HONG C, ZHU S, et al. Anticounterfeiting digital watermarking algorithm for printed QR barcode [J]. Neurocomputing, 2015, 167(C): 625-635.[16] LIN P Y, CHEN Y H. High payload secret hiding technology for QR codes [J]. EURASIP Journal on Image & Video Processing, 2017, 2017(1): 14. [17] YESILTEPE M, KURULAY M. Fake and real massaging at the same time with QR code in web services for different users [J]. Security and Communication Networks, 2018(7): 1-10.[18] HUANG P C, LI Y H, CHANG C C, et al. Efficient scheme for secret hiding in QR code by improving exploiting modification direction [J]. TIIS, 2018, 12(5): 2348-2365.[19] CHENG Y, FU Z, YU B. Improved visual secret sharing scheme for QR code applications [J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2393-2403.[20] Information technology. Automatic identification and data capture techniques. QR Code 2005 bar code symbology specification[S]. ISO/IEC 18004, 2006.[21] CHU H K, CHANG C S, LEE R R, et al. Halftone QR codes [J]. ACM Transactions on Graphics, 2013, 32(6): 1-8.

相似文献/References:

[1]许新承.互联网保险消费者权益保护路径探析[J].福建工程学院学报,2019,17(05):494.[doi:10.3969/j.issn.1672-4348.2019.05.015]
 XU Xincheng.A probe into the path of protecting the rights and interests of consumers in Internet insurance[J].Journal of FuJian University of Technology,2019,17(03):494.[doi:10.3969/j.issn.1672-4348.2019.05.015]

更新日期/Last Update: 2019-06-25