参考文献/References:
[1]马慰. 一种基于双因素认证的QR码安全移动支付方案研究[J]. 现代金融, 2016(4): 42-44.[2] 潘璐. 基于二维码的证件认证技术研究与实现[D]. 北京: 北京邮电大学, 2015.[3] 徐剑, 赵英南, 田永纯, 等. 融合二维码与人脸识别的会议身份认证系统研究[J]. 信息网络安全, 2015(4): 13-18.[4] KROMBHOLZ K, PETER F, KIESEBERG P, et al. QR code security: A survey of attacks and challenges for usable security[C]/〖KG-*4〗/ International Conference on Human Aspects of Information Security, Privacy, and Trust. [S.l.]: Springer International Publishing, 2014: 79-90.[5] GOEL N, SHARMA A, GOSWAMI S. A way to secure a QR code: SQR[C]/〖KG-*4〗/ International Conference on Computing, Communication and Automation. Noida: IEEE, 2017:494-497.[6] HUSNY H R M, ABDULLAH N Y, ISMAIL W H W, et al. Encrypted QR code system[J]. Journal of Computing Technologies and Creative Content, 2017, 8: 82-92.[7] 杨丽娟, 孙红艳, 李瑛. RSA算法在QR码防伪技术中的应用[J]. 北华航天工业学院学报, 2014, 24(2): 24-27.[8] 安吉旺, 徐凯宏. 基于RSA和密钥的二维码加密编码的研究[J]. 森林工程, 2014, 30(2): 125-129.[9] 解龙, 杜艳平, 程明智, 等. 基于加密QR二维码的商品包装防伪技术[J]. 北京印刷学院学报, 2013, 21(4): 16-20.[10]YAO H, SHIN D. Towards preventing QR code based attacks on android phone using security warnings [C]/〖KG-*4〗/Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. Hangzhou: ACM, 2013: 341-346.[11] 闫涛. 基于数字签名二维码认证技术的研究与实现[D], 北京: 北京印刷学院, 2017.[12] 肖本海, 郑莹娜, 龙建明, 等. 基于SHA512哈希函数和Rijndael加密算法QR二维码信息安全设计[J]. 计算机系统应用, 2015, 24(7): 149-154.[13] LIU S J, ZHANG J, PAN J S, et al. SVQR: a novel secure visual quick response code and its anticounterfeiting solution [J]. Information Hiding & Multimedia Signal Processing, 2017, 8(5): 1132-1140.[14] BARMAWI A M, YULIANTO F A. Watermarking QR code [C]/〖KG-*4〗/ 2nd International Conference on Information Science and Security (ICISS). Seoul: IEEE Computer Society, 2015: 1-4.[15] XIE R, HONG C, ZHU S, et al. Anticounterfeiting digital watermarking algorithm for printed QR barcode [J]. Neurocomputing, 2015, 167(C): 625-635.[16] LIN P Y, CHEN Y H. High payload secret hiding technology for QR codes [J]. EURASIP Journal on Image & Video Processing, 2017, 2017(1): 14. [17] YESILTEPE M, KURULAY M. Fake and real massaging at the same time with QR code in web services for different users [J]. Security and Communication Networks, 2018(7): 1-10.[18] HUANG P C, LI Y H, CHANG C C, et al. Efficient scheme for secret hiding in QR code by improving exploiting modification direction [J]. TIIS, 2018, 12(5): 2348-2365.[19] CHENG Y, FU Z, YU B. Improved visual secret sharing scheme for QR code applications [J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2393-2403.[20] Information technology. Automatic identification and data capture techniques. QR Code 2005 bar code symbology specification[S]. ISO/IEC 18004, 2006.[21] CHU H K, CHANG C S, LEE R R, et al. Halftone QR codes [J]. ACM Transactions on Graphics, 2013, 32(6): 1-8.