Hiding method and system for signature of credible two-dimensional code

A two-dimensional code, reliable technology, applied in the field of two-dimensional code, can solve the problems of high requirements for decoding equipment, large amount of calculation, and inability to achieve watermark extraction.

Active Publication Date: 2014-02-26
SHENZHEN FULLY HOMOMORPHIC ENCRYPTION SCI & TECH CO LTD
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1. The digital watermark trusted two-dimensional code scheme has high requirements on decoding equipment, which limits the scope of application of the scheme;
[0009] The calculation of digital watermark generation and extraction is large. In the process of embedding the digital watermark into the two-dimensional code picture and extracting the watermark information from the two-dimensional code, the system has a large demand for computing resources; at the same time, because the watermark information is embedded in the picture In the middle and low frequency coefficients of the DCT domain, if the method of taking pictures and scanning is used, the watermark extraction cannot be realized, which greatly limits the application range of the digital watermarking scheme
[0010] 2. The trusted measures of the public key cryptography scheme and the information hiding scheme are in the process of encoding and decoding, which will affect the information released by the user to a certain extent. Once it is separated from the proprietary scanning equipment, the two-dimensional code will lose its usability.
[0011] Different from the digital watermark trusted two-dimensional code scheme, the public key cryptosystem scheme and the trusted measures of information hiding have an effect or interference with the information released by the user during the generation of the two-dimensional code. For example, the public key cryptosystem, through The user's private key is encrypted, and when the publisher's public key cannot be obtained when scanning, the information in the QR code is not readable; the credible measure of information hiding is to add a new color to the QR code image. block, which makes the user's QR code unusable once the scanning device is unavailable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hiding method and system for signature of credible two-dimensional code
  • Hiding method and system for signature of credible two-dimensional code
  • Hiding method and system for signature of credible two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The invention discloses a method for hiding a signature in a credible two-dimensional code. The two-dimensional code is an effective carrier that can be used to publish information such as a website, a microblog account number, a business card, and the like.

[0060] Among the hidden methods of signing in trusted QR codes are:

[0061] Signature hiding steps: h(m) is the message digest generated by the hash function of the information m released by the user, Ks and Kp are the effective private key and public key generated by the public key algorithm; use your own private key Ks to encrypt the message digest h( m) to obtain the signature D; according to the two-dimensional code coding rules, encode the information m and signature D issued by the user, and obtain the data bit stream Data of the information m respectively m and the data bit stream Data of signature D D , the data bit stream contains data codewords and error correction codewords; according to the two-dimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hiding method and system for a signature of a credible two-dimensional code. The hiding method comprises the signature hiding step that a message m passes through hash to obtain an h(m), Ks and Kp are a secrete key and a public key respectively, the Ks is used for encrypting the h(m) to obtain a signature D, the m and the D are encoded to obtain data bit streams Data m of the m and data bit streams Data D of the D, each data bit stream is composed of a data codeword and an error correction codeword, the Data m are arranged in areas of data codewords and error correction codewords, and the Data D are arranged in a signature hiding area; and the signature recognition step that an m0 is obtained when a stop character is scanned, the D is obtained by scanning data after the stop character, the Kp is used for decrypting the D to obtain the h(m), the hash is carried out on the m0 to obtain an h(m0), the h(m) is compared with the h(m0) to verify the credibility. The hiding method and system for the signature of the credible two-dimensional code have the advantages that the issued message is not interfered by credible measures, the usability of the credible two-dimensional code is ensured, and no special requirement for equipment exists.

Description

technical field [0001] The invention relates to the technical field of two-dimensional codes, in particular to a method and system for hiding signatures in trusted two-dimensional codes. Background technique [0002] With the increasing popularity of mobile phones with camera functions, two-dimensional code technology has been more and more widely used. At the same time, the credibility of QR codes has also been exposed. There are three main types: one is the copyright of QR codes, where attackers publish QR codes in the name of users; Determine whether the information of the two-dimensional code is credible; the third is that the information of the two-dimensional code is complete, and the user cannot determine whether the information obtained by scanning the two-dimensional code is complete or has not been modified. For two-dimensional codes, trusted technology is a safe and reliable guarantee for two-dimensional codes, and its main function is to prevent two-dimensional ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/10G06K19/06
Inventor 黄保华霍林江锋
Owner SHENZHEN FULLY HOMOMORPHIC ENCRYPTION SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products