CN105117757A - Quick response code encryption and decryption method based on random textures - Google Patents
Quick response code encryption and decryption method based on random textures Download PDFInfo
- Publication number
- CN105117757A CN105117757A CN201510532183.6A CN201510532183A CN105117757A CN 105117757 A CN105117757 A CN 105117757A CN 201510532183 A CN201510532183 A CN 201510532183A CN 105117757 A CN105117757 A CN 105117757A
- Authority
- CN
- China
- Prior art keywords
- quick response
- response code
- random
- pseudo
- decryption method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention discloses a quick response code encryption and decryption method based on random textures. The encryption process is realized with the combination of randomness or pseudo-randomness of identifiers by employing quick response codes or other recognition technologies based on OCR. In the practical operation process, random texture images or pseudo-random patterns may be stained in a conveying process, and the match has errors. Therefore, segmented processing of the random texture images or pseudo-random patterns is performed, each part can still have much feature point information after segmentation, and the reliability of the matching algorism is guaranteed.
Description
Technical field
The present invention relates to a kind of method for anti-counterfeit, particularly a kind of Quick Response Code encryption and decryption method based on random grain.
Background technology
Random grain image around Quick Response Code or pseudo-random patterns contain specific coding information, for deciphering.Coded message utilizes the extract minutiae of special algorithm to obtain.
The scrambled information of Quick Response Code is by the key coding with random grain image or pseudo-random patterns after a series of specific decrypt operation, and Quick Response Code is decrypted, and user can obtain effective information.
Because decrypt operation needs the coded message of Quick Response Code and random grain image or pseudo-random patterns simultaneously, and its computing is usually comparatively complicated.By these means, greatly can strengthen the security of 2 D code information, prevent its information from being revealed to other irrelevant users.
At the research initial stage, in order to simplified operation, whether the mode that the master pattern adopting the textured pattern taken by mobile phone camera to prestore with client or download carries out mating has permission acquisition key to check this user.Images match utilizes SIFT algorithm, and when matching rate reaches certain threshold value, be considered as that the match is successful, user can obtain key, and deciphering obtains real 2 D code information.
In the process of practical operation, random grain image or pseudo-random patterns may be tarnished in the process of transport, lead political affairs coupling and occur the consequences such as mistake.
Summary of the invention
For solving the problems of the technologies described above, the invention provides a kind of Quick Response Code encryption and decryption method based on random grain, it is characterized in that, comprising:
(1) encryption method
1. using Quick Response Code as id number, dominant existence; Using Quick Response Code peripheral region as key, stealthy in Quick Response Code peripheral region;
2. the random grain image of Quick Response Code peripheral region or pseudo-random patterns are scanned;
3. make at Quick Response Code and in integrated process, random grain image or pseudo-random patterns be recorded in background data base;
(2) decryption method
1. recognizer shooting image;
2. take image to carry out mating with the random grain image in background data base or pseudo-random patterns and verify;
3. the match is successful, can obtain key, and deciphering obtains real 2 D code information.
Further, described random grain or pseudo-random patterns carry out piecemeal and extract minutiae by piecemeal line, as long as part segmented areas coupling reaches requirement during described Feature Points Matching, are namely considered as that the match is successful.
Further, described matching process adopts SIFT algorithm, and described random grain or pseudo-random patterns carry out multiple area dividing and extract minutiae, if having segmented areas matching rate to reach threshold value be namely considered as that the match is successful.
Further, described segmented areas is 12.
A kind of described Quick Response Code encryption and decryption method based on random grain of the present invention has the following advantages compared to existing technology:
Solve random grain image or pseudo-random patterns to tarnish in the process of transport, cause coupling to occur the consequences such as mistake.Meanwhile, the characteristic point information that random grain image or pseudo-random patterns comprise is very abundant, still can ensure that each block has more characteristic point information, ensure that the reliability of algorithm after piecemeal.
Accompanying drawing explanation
In order to make content of the present invention be more likely to be clearly understood, below in conjunction with accompanying drawing, the present invention is further detailed explanation, wherein,
Fig. 1 is the structural representation of a kind of Quick Response Code based on random grain of the present invention;
In figure, Reference numeral is expressed as: 1-Quick Response Code; 2-Quick Response Code peripheral region; 3-piecemeal line.
Embodiment
In order to make the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, embodiments of the present invention are described in further detail.
A kind of Quick Response Code encryption and decryption method based on random grain comprises:
(1) encryption method
1. using Quick Response Code 1 as id number, dominant existence; Using Quick Response Code peripheral region 2 as key, stealthy in Quick Response Code peripheral region 2;
2. Quick Response Code peripheral region 2 is divided by piecemeal line 3, and the random grain image of 12 segmented areas or pseudo-random patterns are scanned, extract minutiae;
3. make at Quick Response Code 1 and in integrated process, the unique point of random grain image or pseudo-random patterns be recorded in background data base;
(2) decryption method
1. recognizer shooting image;
2. take image to carry out mating with the random grain image in background data base or pseudo-random patterns and verify;
3. the match is successful, can obtain key, and deciphering obtains real Quick Response Code 1 information.
Matching process adopts SIFT algorithm, and described random grain or pseudo-random patterns carry out piecemeal extract minutiae, if having segmented areas matching rate to reach threshold value be namely considered as that the match is successful.
Obviously, above-described embodiment is only for clearly example being described, and the restriction not to embodiment.For those of ordinary skill in the field, can also make other changes in different forms on the basis of the above description.Here exhaustive without the need to also giving all embodiments.And thus the apparent change of extending out or variation be still among protection scope of the present invention.
Claims (4)
1., based on a Quick Response Code encryption and decryption method for random grain, it is characterized in that, comprising:
(1) encryption method
1. using Quick Response Code as id number, dominant existence; Using Quick Response Code peripheral region as key, stealthy in Quick Response Code peripheral region;
2. the random grain image of Quick Response Code peripheral region or pseudo-random patterns are scanned;
3. make at Quick Response Code and in integrated process, random grain image or pseudo-random patterns be recorded in background data base;
(2) decryption method
1. recognizer shooting image;
2. take image to carry out mating with the random grain image in background data base or pseudo-random patterns and verify;
3. the match is successful, can obtain key, and deciphering obtains real 2 D code information.
2. the Quick Response Code encryption and decryption method based on random grain according to claim 1, it is characterized in that, described random grain or pseudo-random patterns carry out the piecemeal in multiple region and extract minutiae by piecemeal line, as long as part segmented areas coupling reaches requirement during described Feature Points Matching, be namely considered as that the match is successful.
3. the Quick Response Code encryption and decryption method based on random grain according to claim 1-2, it is characterized in that matching process adopts SIFT algorithm, described random grain or pseudo-random patterns carry out piecemeal extract minutiae, if having segmented areas matching rate to reach threshold value be namely considered as that the match is successful.
4. the Quick Response Code encryption and decryption method based on random grain according to claim 1-3, it is characterized in that, described segmented areas is 12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510532183.6A CN105117757B (en) | 2015-08-26 | 2015-08-26 | A kind of Quick Response Code encryption and decryption approaches based on random grain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510532183.6A CN105117757B (en) | 2015-08-26 | 2015-08-26 | A kind of Quick Response Code encryption and decryption approaches based on random grain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105117757A true CN105117757A (en) | 2015-12-02 |
CN105117757B CN105117757B (en) | 2018-07-06 |
Family
ID=54665740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510532183.6A Active CN105117757B (en) | 2015-08-26 | 2015-08-26 | A kind of Quick Response Code encryption and decryption approaches based on random grain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105117757B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106228902A (en) * | 2016-10-10 | 2016-12-14 | 宋育锋 | A kind of bottom label for false proof double-layer label |
CN106485256A (en) * | 2016-10-10 | 2017-03-08 | 宋育锋 | Double label relative position information construction methods based on SIFT feature point |
CN106952568A (en) * | 2016-10-10 | 2017-07-14 | 宋育锋 | Double label type antifalsification labels |
CN107292632A (en) * | 2017-06-19 | 2017-10-24 | 上海美声服饰辅料有限公司 | Method for anti-counterfeit and its system based on background patterns |
CN107679601A (en) * | 2017-10-10 | 2018-02-09 | 甘庆 | A kind of graphic code structure with Three-Dimensional Solution dense body and the method being scanned to it |
CN108009616A (en) * | 2017-12-12 | 2018-05-08 | 陈洪 | One kind is new to have anti-fraud functional bar figure code and application process |
CN108898205A (en) * | 2017-05-09 | 2018-11-27 | 罗伯特·博世有限公司 | The creation of binary graphics coding, authentication method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101299246A (en) * | 2008-06-24 | 2008-11-05 | 深圳矽感科技有限公司 | Two-dimension code with false proof function |
KR20120040773A (en) * | 2010-10-20 | 2012-04-30 | 김장익 | Encryption and decoding method of two dimensional code pattern, distribution management method, and readign equipment by using the same |
CN102842053A (en) * | 2012-08-21 | 2012-12-26 | 吉林省通程科技有限公司 | Anti-fake pattern and core tag and manufacturing method thereof |
CN102916804A (en) * | 2012-08-28 | 2013-02-06 | 华南农业大学 | Two-dimension code coding and decoding method and device based on local color verification |
CN103870863A (en) * | 2014-03-14 | 2014-06-18 | 华中科技大学 | Method for preparing hidden two-dimensional image holographic anti-counterfeit label and identification device thereof |
-
2015
- 2015-08-26 CN CN201510532183.6A patent/CN105117757B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101299246A (en) * | 2008-06-24 | 2008-11-05 | 深圳矽感科技有限公司 | Two-dimension code with false proof function |
KR20120040773A (en) * | 2010-10-20 | 2012-04-30 | 김장익 | Encryption and decoding method of two dimensional code pattern, distribution management method, and readign equipment by using the same |
CN102842053A (en) * | 2012-08-21 | 2012-12-26 | 吉林省通程科技有限公司 | Anti-fake pattern and core tag and manufacturing method thereof |
CN102916804A (en) * | 2012-08-28 | 2013-02-06 | 华南农业大学 | Two-dimension code coding and decoding method and device based on local color verification |
CN103870863A (en) * | 2014-03-14 | 2014-06-18 | 华中科技大学 | Method for preparing hidden two-dimensional image holographic anti-counterfeit label and identification device thereof |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106228902A (en) * | 2016-10-10 | 2016-12-14 | 宋育锋 | A kind of bottom label for false proof double-layer label |
CN106485256A (en) * | 2016-10-10 | 2017-03-08 | 宋育锋 | Double label relative position information construction methods based on SIFT feature point |
CN106952568A (en) * | 2016-10-10 | 2017-07-14 | 宋育锋 | Double label type antifalsification labels |
CN106952569A (en) * | 2016-10-10 | 2017-07-14 | 宋育锋 | A kind of pair of label type antifalsification label |
CN106981250A (en) * | 2016-10-10 | 2017-07-25 | 宋育锋 | Antifalsification label based on article surface texture |
CN107180586A (en) * | 2016-10-10 | 2017-09-19 | 宋育锋 | A kind of pair of label type antifalsification label |
CN108898205A (en) * | 2017-05-09 | 2018-11-27 | 罗伯特·博世有限公司 | The creation of binary graphics coding, authentication method and system |
CN107292632A (en) * | 2017-06-19 | 2017-10-24 | 上海美声服饰辅料有限公司 | Method for anti-counterfeit and its system based on background patterns |
CN107679601A (en) * | 2017-10-10 | 2018-02-09 | 甘庆 | A kind of graphic code structure with Three-Dimensional Solution dense body and the method being scanned to it |
CN107679601B (en) * | 2017-10-10 | 2021-01-19 | 甘庆 | Graphic code structure with three-dimensional decryption body and method for scanning graphic code structure |
CN108009616A (en) * | 2017-12-12 | 2018-05-08 | 陈洪 | One kind is new to have anti-fraud functional bar figure code and application process |
Also Published As
Publication number | Publication date |
---|---|
CN105117757B (en) | 2018-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105117757A (en) | Quick response code encryption and decryption method based on random textures | |
CN110048832B (en) | Method and system for biometric template security and key generation | |
CN103761702B (en) | Image hiding and authentication method based on secret sharing | |
Challita et al. | Combining steganography and cryptography: new directions | |
Li et al. | Privacy protection of fingerprint database | |
Hämmerle-Uhl et al. | Watermarking as a means to enhance biometric systems: A critical survey | |
CN108038529B (en) | Method for generating and reading circular two-dimensional code with image | |
CN104463016B (en) | Data safety storing method suitable for IC cards and two-dimension codes | |
CN102223233A (en) | Biological code authentication system and biological code authentication method | |
Sadhya et al. | Providing robust security measures to Bloom filter based biometric template protection schemes | |
CN108960387B (en) | Anti-counterfeiting two-dimensional code and generation and identification method thereof | |
Nie et al. | The use of least significant bit (LSB) and knight tour algorithm for image steganography of cover image | |
US11138409B1 (en) | Biometric recognition and security system | |
US9710633B2 (en) | Method and apparatus for authenticating user | |
WO2018206289A1 (en) | A method and a system for creating and authenticating a binary graphic code | |
CN106385320B (en) | RFID anti-counterfeiting device and anti-counterfeiting method based on PUF and digital signature | |
Huber et al. | Two-factor biometric recognition with integrated tamper-protection watermarking | |
CN110516425B (en) | Secret sharing method and system | |
CN104537539A (en) | Method for activating and forbidding anti-counterfeit label based on two-dimension code recognition technology | |
Shin et al. | Content based image authentication using HOG feature descriptor | |
CN103164831A (en) | Image authentication and falsification locating method | |
CN107730263A (en) | A kind of high safety fingerprint method of payment and system | |
Li et al. | Data hiding in fingerprint minutiae template for privacy protection | |
CN103810665A (en) | Information hiding and extracting method and device | |
CN104601333A (en) | Two-dimensional code remote authentication method based on man-machine features |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |