WO2019095172A1 - Procédé et appareil de génération et de décodage de code qr dans un processus de copie de code qr - Google Patents

Procédé et appareil de génération et de décodage de code qr dans un processus de copie de code qr Download PDF

Info

Publication number
WO2019095172A1
WO2019095172A1 PCT/CN2017/111213 CN2017111213W WO2019095172A1 WO 2019095172 A1 WO2019095172 A1 WO 2019095172A1 CN 2017111213 W CN2017111213 W CN 2017111213W WO 2019095172 A1 WO2019095172 A1 WO 2019095172A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
dimensional code
authentication information
gradation value
information
Prior art date
Application number
PCT/CN2017/111213
Other languages
English (en)
Chinese (zh)
Inventor
陈昌盛
谢宁
罗钢
Original Assignee
深圳大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳大学 filed Critical 深圳大学
Priority to PCT/CN2017/111213 priority Critical patent/WO2019095172A1/fr
Publication of WO2019095172A1 publication Critical patent/WO2019095172A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code

Definitions

  • the invention relates to a method and a device for generating and decoding in a two-dimensional code copying process.
  • QR code has become a universal information carrier, which has the characteristics of large amount of stored information, wide application range, strong anti-noise and anti-interference ability, and is popularized with the promotion of smart phones, especially in identity verification.
  • Network transmission, e-Cert and bills have been widely used.
  • QR codes which are easy to be cracked, counterfeited, and abused. Therefore, how to improve the security of QR codes, especially in the process of copying Sex has become the focus of current attention.
  • the generation and replication of QR codes mainly have the following methods to improve security.
  • the special printed material in the printing process can be used to print the two-dimensional code to prevent it from being copied.
  • Special printing inks can also be applied to the printing of two-dimensional codes. For example, ultraviolet fluorescent inks make the printed two-dimensional code invisible under visible light to prevent it from being copied.
  • Special production processes can also be used to enhance the security of QR codes. For example, special halftone printing technology can generate two-dimensional codes hidden under visible light.
  • the encryption algorithm and the security protocol are used to control the generation and reading of the two-dimensional code.
  • An asymmetric key encryption algorithm for example, RSA algorithm
  • a PKI public key encryption system can be used to control the generation of a two-dimensional code and verify the authenticity of its information, such as Chinese patent CN201110054417.2 and CN201410520353.4 in two-dimensional code transmission or
  • An asymmetric key encryption algorithm is used in the production process, and Wang et al. applied such encryption-protected system to the construction of the anti-counterfeiting platform in Using Modified Digital Halftoning Technique to Design Invisible 2D Barcode by Infrared Detection.
  • the Chaotic Equation can be used to generate the QR code identity number to ensure its uniqueness and the random string cannot be copied in batches, thus effectively controlling the generation of the QR code.
  • AuthPaper The ECDSA digital signature algorithm is applied within the system to prevent document counterfeiters from tampering with the content.
  • the researchers also proposed some security protocols based on the communication architecture to enhance the security of the displayed two-dimensional code. For example, the researcher proposed a communication protocol called "all or nothing" based on the duplex communication system of the mobile device front camera device and the display screen. Only when the receiver can acquire the transmitted and received signals at the same time can the information of the two-dimensional code in the channel be decoded, thereby enhancing the confidentiality of the information.
  • the digital watermarking technique can embed information related to the two-dimensional code in the two-dimensional code image. For example, directly using DCT and DFT to decompose the image frequency information of the two-dimensional code, it is possible to embed watermark information that is not easily perceptible to the naked eye. After the two-dimensional code image is taken, it can be decoded and the authenticity of the digital watermark information can be evaluated at the same time. Similarly, digital watermarks can also be stored in the DWT domain. For example, Chinese patent CN201710187615.3 embeds watermark information in the logo image of the two-dimensional code, Two-Level QR Code for Private Message Sharing and Document Authenticatio by Tkachenko et al.
  • the generation and copying of the two-dimensional code is controlled using a pattern pattern having a copy detection feature or a physical non-cloning feature.
  • the conventional two-dimensional code is composed of a large black and white block unit.
  • this design is easy to copy.
  • Some pattern patterns with more detail features can be used in the design of two-dimensional codes to resist the most direct scan-print form reproduction. Dirik et al.'s Copy Detection Pattern-based Document Protection for Variable Media and Gaubatz et al's Distortion Metrics for Predicting Authentication Functionality of Printed Security Deterrents use high-density black-and-white cells to form graphics in copy detection, and apply the same in the detection process.
  • grayscale images can also be used in copy detection patterns.
  • the decision of copy detection may be based on a variation feature of the grayscale image in the print-scan channel, mainly including high frequency features of the image, such as Gaubatz et al. extract a feature set based on the sharpness of the image in the Towards a Feature Set for Robust Printing-Imaging Cycle Device Identification using Structured Printed Markings.
  • the color pattern contains information on four channels of CMYK. After copying, the characteristics of the colors (color mean, variance, entropy, etc. within the module) will make a significant difference.
  • the physical unclonable function in the printed document is also used to identify illegal copying of the printed document.
  • the Physical Unclonable Function is a random change produced by printing equipment and paper. Its features are easy to extract and analyze but are not easily copied and forged. For example, Wong et al.'s Counterfeit Detection using Paper PUF and Mobile Cameras and Khanna et al.'s A Survey of Forensic Characterization Methods for Physical Devices, mentioned random variations in print toner and paper, and Chiang et al., Printer and Scanner Forensics The microscopic roughness of the paper.
  • the ciphertext is stored by using specific information, for example, the Chinese patent CN201110113881.X stores the ciphertext separately as the error correction code information, avoids the data area of the two-dimensional code, and has an independent ciphertext transmission function; the Chinese patent CN201610945368.4 encrypts the information.
  • the storage is the mask information with the identification function, and the binary operation related to the information of the two-dimensional code, thereby covering the data of the original two-dimensional code, thereby improving the security of transmission; US Patent US201514662377A converts the encrypted information into picture information. And embedded in the two-dimensional code, combined with the two-dimensional code graphic to become a pair of pictures for transmission.
  • the complexity of use Compared with the traditional two-dimensional code, the introduction of algorithms based on encryption and digital watermarking or security protocols can control the unauthorized generation of the two-dimensional code and The illegal tampering of the data, but increased the complexity of the system.
  • the encryption and watermarking algorithms as an example, the complexity is mainly reflected in the following two aspects: First, in the process of generating and controlling the two-dimensional code by using the asymmetric encryption algorithm and the digital signature technology, the public key infrastructure needs to be arranged (Public) Key Infrastructure, PKI). The security of each user's private key must be guaranteed and the corresponding public key distributed through a secure communication channel. Secondly, in the process of using the information, the steps of decrypting or extracting the two-dimensional code are additionally added.
  • Public Public
  • the above security algorithm only guarantees the reliability of the information in the two-dimensional code in terms of information encryption, and cannot change the visibility of the information in the two-dimensional code, it is also difficult to effectively resist illegal copying.
  • the copy detection pattern usually determines the authenticity of the image based on the attenuation of the high frequency information
  • the copying device high-precision scanner, copying machine, etc.
  • the reservation is more complete. Therefore, it is difficult to prevent the counterfeiter from copying it while ensuring the general type of the verification device.
  • the encrypted information or the encrypted data occupying the storage space of the two-dimensional code means that the number of codes of the two-dimensional code is reduced, and the number of codes is reduced.
  • the application range of the dimension code In addition, other information spaces also need sufficient information to effectively complete data processing, such as error correction information areas, etc., occupying these data areas will result in insufficient control of these control information, thereby indirectly reducing the code of the two-dimensional code. Quantity.
  • the present invention proposes the following technical solutions.
  • a first aspect of the present invention relates to a method for generating a two-dimensional code in a two-dimensional code copying process, the steps of which are: converting original information into a bit stream by an encoding method; converting the bit stream into an image of the original information a gray value; loading the authentication information, and generating an image gray value of the authentication information; superimposing the image gray value of the authentication information on the image gray value of the original data to form a superimposed gray image Adding a finder pattern to the superimposed image gradation to generate a two-dimensional code.
  • the loading authentication information includes the authentication information as authentication information having a white noise characteristic.
  • the generated two-dimensional code is mixed with channel noise during transmission.
  • the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The image gray value of the authentication information is superimposed in a center-aligned manner.
  • the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The superimposed position of the image gradation value of the authentication information may be in a dispersed form.
  • the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The superimposed position of the image gradation value of the authentication information is set by the mutual understanding, or by mutual agreement, or by mutual agreement, and is not disclosed.
  • the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes, the original information The image gradation value and the image gradation value of the authentication information are superimposed in a specified pattern.
  • the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The image gradation value of the authentication information is superimposed with a specified gradation value.
  • a second aspect of the present invention relates to a two-dimensional code decoding method in a two-dimensional code copying process, the steps of which are as follows: acquiring a two-dimensional code; and acquiring the acquired two-dimensional code image, and performing an image restoration step to restore the second
  • the shape grayscale image is subjected to shape distortion, color and/or brightness distortion in the communication channel to obtain a first grayscale image of the two-dimensional code; and the first grayscale image is generated according to the signal in the two-dimensional code generation step
  • Demodulating the modulation method removing the channel noise and the authentication information, obtaining a second grayscale image of the two-dimensional code, obtaining the authentication information by using the first grayscale image and the second grayscale image;
  • the second grayscale image is subjected to a source decoding operation to obtain a noiseless original bitstream; the noiseless original bit data is converted into a noiseless two-dimensional code grayscale value by secondary encoding and secondary modulation.
  • the first grayscale image of the two-dimensional code is demodulated according to a signal modulation method in the two-dimensional code generating step to remove channel noise and authentication information, and further includes the following steps:
  • the error introduced by the channel is corrected by decoding.
  • the method further includes the following steps: performing a difference operation between the first grayscale image before decoding and the second grayscale image after decoding to obtain the channel noise. And the authentication information.
  • the method further includes the step of separating the authentication information from the channel noise by using a BCH decoding method.
  • a third aspect of the present invention relates to a two-dimensional code generating apparatus in a two-dimensional code copying process, including: a bit stream generating module: converting original information into a bit stream by an encoding method; and an image converting module: the bit stream Converting to the image gray value of the original information; the authentication information loading module: loading the authentication information, and generating the image gray value of the authentication information; and the image superimposing module: superimposing the image gray value of the authentication information to the The superimposed grayscale image is formed on the image gray value of the original data; the two-dimensional code generating module adds a finder pattern to the superimposed image grayscale to generate a two-dimensional code.
  • a fourth aspect of the present invention relates to a two-dimensional code decoding apparatus in a two-dimensional code copying process, comprising: an acquiring module: acquiring a two-dimensional code; and recovering an image module: the acquired two-dimensional code image is passed through an image a recovery step of restoring the grayscale image of the two-dimensional code in a communication letter Distortion of shape, color and/or brightness received in the track to obtain a first grayscale image of the two-dimensional code; demodulating the first grayscale image according to a signal modulation method in the two-dimensional code generating step to remove channel noise And the authentication information, obtaining a second grayscale image of the two-dimensional code, obtaining the authentication information by using the first grayscale image and the second grayscale image; and decoding the demodulation module: the demodulated second gray The degree image is subjected to a source decoding operation to obtain a noiseless original bit stream; the secondary code modulation module converts the noiseless original bit data into a noiseless two-dimensional code gray value by secondary encoding
  • the two-dimensional code decoding apparatus further includes a noise separation module that separates the authentication information from the channel noise by using a BCH decoding method.
  • the invention combines the communication channel model of the two-dimensional code and the characteristics of the physical device (scanning and printing device) in the scanning-printing process, and after the original two-dimensional code information is encoded and modulated, before the communication channel is transmitted, the authentication information is artificially The form of the noise is superimposed on the original information and transmitted into the communication channel together.
  • the authentication information can be extracted from the receiving end, and the agreed secret is used.
  • the key and decoding technology completes the decoding of the authentication information, thereby completing the authentication of the two-dimensional code and improving its security in the communication process.
  • FIG. 1 is a schematic block diagram showing generation and decoding of a two-dimensional code in a two-dimensional code copying process of the present invention
  • FIG. 2 is a flow chart showing a method of generating a two-dimensional code in the process of copying a two-dimensional code of the present invention
  • FIG. 3 is a flow chart showing a two-dimensional code decoding method in the two-dimensional code copying process of the present invention
  • FIG. 4 is a structural diagram showing a two-dimensional code generating apparatus in a two-dimensional code copying process of the present invention
  • Figure 5 is a block diagram showing a two-dimensional code decoding apparatus in the two-dimensional code copying process of the present invention.
  • FIG. 1 is a schematic block diagram showing two-dimensional code generation and decoding in a two-dimensional code copying process of the present invention
  • FIG. 2 is a flow chart showing a two-dimensional code generating method in a two-dimensional code copying process of the present invention
  • the two-dimensional code generation method and the decoding principle in the two-dimensional code copying process include encoding, modulation, authentication, de-authentication, demodulation, decoding, and the like, and the figure also shows Generate and acquire channels in the process.
  • the two-dimensional code generating method and the decoding method in the two-dimensional code copying process may include the following steps: a bit stream generating step 201: converting the original information into a bit stream by using an encoding method.
  • the original information input by the user may have many types, including characters, a web address, a picture, a business card, and the like, and the above information may be converted into a bit stream by encoding.
  • the bit stream can be processed by using source coding, and channel coding is also needed to improve the reliability of data transmission.
  • an image conversion step 202 is further included: converting the bit stream into an image gray value of the original information.
  • the authentication information loading step 203 loading the authentication information and generating an image gray value of the authentication information.
  • the authentication information may adopt various types of methods, such as a common ciphertext form, watermark information, and the like, and may also generate noise with white noise characteristics, especially white noise with statistically independent characteristics, thereby In this way, not only can the hidden authentication information be added to the original data with minimal interference, but also the acquisition party can separate the authentication information.
  • the image superimposing step 204 is further included: superimposing the image gradation value of the authentication information on the image gradation value of the original data to form the superimposed gradation image.
  • the process of loading the authentication information is generally performed by superposition, or other types of operations, such as XOR, same OR, phase, and splicing operations.
  • the image gradation value of the authentication information is superimposed on the image gradation value of the original data to form a superimposed gradation image.
  • a two-dimensional code generating step 205 is further included: a finder pattern is added next to the superimposed image gradation to generate a two-dimensional code.
  • the channel is schematic, and as a two-dimensional code, the data channel that passes through is generated from acquisition to acquisition.
  • channels are transport type, but can also represent the process between generation and acquisition.
  • the user presents the two-dimensional code on the paper medium by printing, for example, on the billboard, and other authorized users can obtain the two-dimensional code by shooting or scanning.
  • ⁇ Printing ⁇ Scanning process can be considered as passing the channel.
  • the two-dimensional code passing through the channel inevitably incorporates channel noise, which may include light, shading, shading, refraction, distortion, blurring, sharpening, missing, and the like.
  • channel noise may include light, shading, shading, refraction, distortion, blurring, sharpening, missing, and the like.
  • the two-dimensional code itself has strong error correction capability, but after acquiring the two-dimensional code, the noise on the image can be removed by filtering, or modulation, or demodulation, and the noise is often channel noise.
  • the loading in the process of loading the authentication information, the loading may be performed by superimposing.
  • the present invention considers selecting a superimposed position, selecting a superimposed angle, or selecting another superimposing manner as a way to avoid illegal copying.
  • the following methods can be used for superposition.
  • the image gradation value of the original information and the image gradation value of the authentication information may be superimposed in a center-aligned manner; the authentication information may be dispersed while being in the image The corners are superimposed; the authentication information can also be lengthened and superimposed along the edges of the QR code.
  • the location of the overlay may not be disclosed to the public, and the location of the overlay may be set up and obtained by mutual agreement or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
  • the authentication information may be formed into a designated pattern and then superimposed; or the superimposition may be performed according to the specified pattern.
  • the authentication information may be performed using a pattern of "rings".
  • Superimposed In particular, the superimposed pattern may not be disclosed to the public, and may be set up and acquired by using mutual understanding, or by mutual agreement, or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
  • the angle of superposition may not be disclosed to the public, either by the parties, or by mutual agreement or by mutual agreement. The way to set up and obtain the angle of the overlay, thereby further avoiding the malicious third party to copy and improve the security of the authentication information.
  • the superimposition may be performed according to the specified gradation value, for example, superimposed on all modules having a gradation value of 100.
  • the superimposed gradation may not be disclosed to the public, and the gradation of the superimposed gradation may be set by using the mutual understanding or the agreement between the two parties or the two parties to negotiate, thereby further preventing the malicious third party from copying and improving the authentication information. safety.
  • processing may be simultaneously considered from the superimposed position and the superimposed pattern.
  • the superimposed position may select, for example, a corner
  • the superimposed pattern may select, for example, a square, Round, or a specific pattern.
  • FIG. 3 is a flow chart showing a two-dimensional code decoding method in the two-dimensional code copying process of the present invention.
  • Step 208 is obtained to obtain a two-dimensional code.
  • the two-dimensional code can be acquired in various possible ways. For example, by acquiring or scanning a two-dimensional code, a two-dimensional code picture can also be obtained by pre-storing, downloading, instant transmission, mail receiving, etc., and then extracting the two-dimensional code therein by using a picture processing program.
  • a recovery step 209 is further included, and the acquired two-dimensional code image is subjected to an image restoration step to restore distortion, color, and/or brightness distortion of the two-dimensional code gray image received in the communication channel.
  • the first grayscale image of the two-dimensional code is further included, and the acquired two-dimensional code image is subjected to an image restoration step to restore distortion, color, and/or brightness distortion of the two-dimensional code gray image received in the communication channel.
  • the method further includes the removing step 210: after the acquired two-dimensional code image is subjected to an image restoration step, the shape distortion, color, and/or brightness distortion received by the two-dimensional code gray image in the communication channel is restored.
  • the first grayscale image of the two-dimensional code In the middle of generating a two-dimensional code to obtain a two-dimensional code, the channel may cause some errors, which need to be corrected by decoding.
  • the second grayscale image corresponds to the image data before the authentication information is loaded during the generation process, and therefore, the difference between the first grayscale image before decoding and the decoded grayscale image is performed. That is, channel noise and authentication information can be obtained.
  • the BCH decoding method is required to separate the authentication information from the channel noise.
  • a decoding and demodulating step 211 is further included: the demodulated second grayscale image is subjected to a source decoding operation to obtain a noiseless original bitstream.
  • a secondary decoding modulation step 212 is further included: converting the noiseless original bit data into a noiseless two-dimensional code gray value by secondary encoding and secondary modulation.
  • the encryption and authentication of the information encoded by the user is completed by decoding the authentication information.
  • Fig. 4 is a block diagram showing a two-dimensional code generating apparatus in the two-dimensional code copying process of the present invention.
  • the method includes a bit stream generating module 301: converting the original information into a bit stream by using an encoding method;
  • the original information can have many types, including characters, URLs, pictures, business cards, etc., and the above information can be converted into a bit stream by encoding.
  • the bit stream can be processed by using source coding, and channel coding is also needed to improve the reliability of data transmission.
  • an image conversion module 302 is further included that converts the bit stream into an image gray value of the original information.
  • an authentication information loading module 303 is further included, which loads the authentication information and generates an image gray value of the authentication information.
  • the authentication information can be in various types, such as common ciphertext forms, watermark information, etc., and can also generate noise with white noise characteristics, especially white noise with statistically independent characteristics, so that this method can not only maximize The local authentication data is added to the original data with less interference, and the acquisition party is separated from the authentication information.
  • an image superimposition module 304 is further included, which superimposes the image gradation value of the authentication information on the image gradation value of the original data to form a superimposed gradation image.
  • the process of loading the authentication information is generally performed by superposition, or other types of operations, such as XOR, same OR, phase, and splicing operations.
  • the image gradation value of the authentication information is superimposed on the image gradation value of the original data to form a superimposed gradation image.
  • a two-dimensional code generation module 305 is further included, which adds a finder pattern to the superimposed image gradation to generate a two-dimensional code.
  • the channel in the two-dimensional code copying process is of a transmission type, but may also represent a process between generation and acquisition.
  • the two-dimensional code is displayed on the paper medium by printing, for example, on the billboard, and other authorized users can obtain the two-dimensional code by shooting or scanning.
  • the process of generating ⁇ printing ⁇ scanning can be considered as passing The channel.
  • the two-dimensional code passing through the channel inevitably incorporates channel noise, which may include light, shading, shading, refraction, distortion, blurring, sharpening, missing, and the like.
  • channel noise may include light, shading, shading, refraction, distortion, blurring, sharpening, missing, and the like.
  • the two-dimensional code itself has strong error correction capability, but after acquiring the two-dimensional code, the noise on the image can be removed by filtering, or modulation, or demodulation, and the noise is often channel noise.
  • the loading in the process of loading the authentication information, the loading may be performed by superimposing.
  • the present invention considers selecting a superimposed position, selecting a superimposed angle, or selecting another superimposing manner as a way to avoid illegal copying.
  • the following methods can be used for superposition.
  • the image gradation value of the original information and the image gradation value of the authentication information may be superimposed in a center-aligned manner; the authentication information may be dispersed while being in the image The corners are superimposed; the authentication information can also be lengthened and superimposed along the edges of the QR code.
  • the location of the overlay may not be disclosed to the public, and the location of the overlay may be set up and obtained by mutual agreement or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
  • the authentication information may be formed into a designated pattern and then superimposed; or the superimposition may be performed according to the specified pattern.
  • the authentication information may be performed using a pattern of "rings".
  • Superimposed In particular, the superimposed pattern may not be disclosed to the public, and may be set up and acquired by using mutual understanding, or by mutual agreement, or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
  • the angle of superposition may not be disclosed to the public, and the use of both parties to know, or the agreement between the two parties, or the two parties to negotiate and obtain the superposition angle, thereby further avoiding the malicious third party to copy and improve the security of the authentication information. .
  • the superimposition may be performed according to the specified gradation value, for example, superimposed on all modules having a gradation value of 100.
  • the superimposed gradation may not be disclosed to the public, and the gradation of the superimposed gradation may be set by using the mutual understanding or the agreement between the two parties or the two parties to negotiate, thereby further preventing the malicious third party from copying and improving the authentication information. safety.
  • processing may be simultaneously considered from the superimposed position and the superimposed pattern.
  • the superimposed position may select, for example, a corner
  • the superimposed pattern may select, for example, a square, Round, or a specific pattern.
  • Figure 5 is a block diagram showing a two-dimensional code decoding apparatus in the two-dimensional code copying process of the present invention.
  • the two-dimensional code needs to be decoded, which corresponds to the steps in the process of generating the two-dimensional code
  • the present embodiment provides a A two-dimensional code decoding device in the process of copying a two-dimensional code. It includes obtaining a two-dimensional code by the acquisition module 401.
  • the two-dimensional code is obtained by shooting or scanning, and the two-dimensional code picture can also be obtained by pre-storing, downloading, instant transmission, mail receiving, etc., and then extracting the two-dimensional code by using the image processing program.
  • the image recovery module 402 is further included: the acquired two-dimensional code image is subjected to an image restoration step to restore shape distortion, color and/or brightness distortion received by the two-dimensional code gray image in the communication channel. A first grayscale image of the two-dimensional code is obtained.
  • the method further includes a noise removal and authentication information module 403: demodulating the first grayscale image according to a signal modulation method in the two-dimensional code generating step, removing channel noise and authentication information, and obtaining a second of the two-dimensional code.
  • the grayscale image, the authentication information is obtained by the first grayscale image and the second grayscale image.
  • the channel may cause some errors, which need to be corrected by decoding.
  • the second grayscale image corresponds to the image data before the authentication information is loaded during the generation process, and therefore, the difference between the first grayscale image before decoding and the second grayscale image after decoding is performed. Operation, that is, channel noise and authentication information can be obtained. In this case, the BCH decoding method is required to separate the authentication information from the channel noise.
  • the authentication information after the authentication information is loaded on the two-dimensional code, it can be separated in various ways. Generally, the following information can be separated from the image. In the manner, for example, edge sharpening method, gradient descent method, pixel difference method, etc., by these methods, the loaded authentication information can be separated from the image, and finally the corresponding authentication information is obtained.
  • the authentication information is noise with white noise characteristics, it is necessary to separate the authentication information and the channel noise from the two-dimensional code by means of filtering, modulation or demodulation, but in this case, the authentication information and the channel noise It is separated as a whole, so it is necessary to further separate the authentication information and channel noise.
  • the authentication information can be separated using BCH decoding techniques to obtain separate authentication information.
  • the decoding and demodulation module 404 is further included: the decoded second grayscale image is subjected to a source decoding operation to obtain a noiseless original bitstream.
  • the secondary decoding modulation module 405 converts the noiseless original bit data into a noiseless two-dimensional code gray value by secondary encoding and secondary modulation. Finally, the encryption and authentication of the information encoded by the user is completed by decoding the authentication information.
  • the following module is further included: the error correction module 406: the error introduced by the channel will be corrected by decoding.
  • the difference operation module 407 performs a difference operation between the first grayscale image before decoding and the second grayscale image after decoding to obtain channel noise and authentication information.
  • the noise separation module 408 separates the authentication information from the channel noise by using the BCH decoding method, and the authentication module 409: completes encryption and authentication of the information encoded by the user by decoding the authentication information.
  • the invention combines the communication channel model of the two-dimensional code and the characteristics of the physical device (scanning and printing device) in the scanning-printing process, and after the original two-dimensional code information is encoded and modulated, before the communication channel is transmitted, the authentication information is artificially The form of the noise is superimposed on the original information and transmitted into the communication channel together.
  • the authentication information can be extracted from the receiving end, and the agreed secret is used.
  • the key and decoding technology completes the decoding of the authentication information, thereby completing the authentication of the two-dimensional code and improving its security in the communication process.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

La présente invention concerne un procédé de génération et de décodage dans un processus de copie de code QR. En combinaison avec un modèle de canal de communication de code QR et avec des caractéristiques de dispositif physique dans un processus d'impression par balayage, après que des informations originales de code QR sont codées et modulées et avant que les informations entrent dans un canal de communication aux fins de transmission, des informations d'authentification sont superposées aux informations originales sous la forme de bruit artificiel en vue de leur transmission conjointe dans le canal de communication; les informations d'authentification peuvent être extraites d'un terminal de réception par comparaison et analyse d'un code QR soumis à une restauration d'image et du code QR soumis à une suppression de bruit; les informations d'authentification sont décodées à l'aide d'une clé convenue et d'une technologie de décodage. Par conséquent, le code QR est authentifié et la sécurité du code QR dans un processus de communication est améliorée.
PCT/CN2017/111213 2017-11-15 2017-11-15 Procédé et appareil de génération et de décodage de code qr dans un processus de copie de code qr WO2019095172A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/111213 WO2019095172A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de génération et de décodage de code qr dans un processus de copie de code qr

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/111213 WO2019095172A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de génération et de décodage de code qr dans un processus de copie de code qr

Publications (1)

Publication Number Publication Date
WO2019095172A1 true WO2019095172A1 (fr) 2019-05-23

Family

ID=66538377

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/111213 WO2019095172A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de génération et de décodage de code qr dans un processus de copie de code qr

Country Status (1)

Country Link
WO (1) WO2019095172A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197004A (zh) * 2007-12-25 2008-06-11 深圳矽感科技有限公司 一种二维条码及其编解码方法
CN102819724A (zh) * 2012-08-02 2012-12-12 广东正迪科技股份有限公司 基于智能手机的二维码标签防伪识别系统及方法
CN105224974A (zh) * 2014-06-30 2016-01-06 北京大学 一种矩阵式二维码中隐藏信息的方法和防伪方法
CN105718981A (zh) * 2016-01-26 2016-06-29 南京风力舰信息技术有限公司 一种制备新型二维码图像全息防伪标签的处理方法
CN106529637A (zh) * 2016-10-28 2017-03-22 深圳大学 一种二维码的防拷贝实现方法及实现系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197004A (zh) * 2007-12-25 2008-06-11 深圳矽感科技有限公司 一种二维条码及其编解码方法
CN102819724A (zh) * 2012-08-02 2012-12-12 广东正迪科技股份有限公司 基于智能手机的二维码标签防伪识别系统及方法
CN105224974A (zh) * 2014-06-30 2016-01-06 北京大学 一种矩阵式二维码中隐藏信息的方法和防伪方法
CN105718981A (zh) * 2016-01-26 2016-06-29 南京风力舰信息技术有限公司 一种制备新型二维码图像全息防伪标签的处理方法
CN106529637A (zh) * 2016-10-28 2017-03-22 深圳大学 一种二维码的防拷贝实现方法及实现系统

Similar Documents

Publication Publication Date Title
CN107918791B (zh) 二维码复制过程中的二维码生成、解码方法及装置
Tkachenko et al. Two-level QR code for private message sharing and document authentication
CN106529637B (zh) 一种二维码的防拷贝实现方法及实现系统
JP4137084B2 (ja) 不正顕示機能付文書を処理するための方法、及び、不正顕示機能付文書の妥当性検証を行うための方法
Deguillaume et al. Secure hybrid robust watermarking resistant against tampering and copy attack
AU2005241434B2 (en) System and method for decoding digital encoded images
US20050036651A1 (en) Digital anti&minus forging method
KR20030038677A (ko) 인쇄된 오브젝트들 및 관련 애플리케이션들을 위한 인증워터마크들
CN107835332B (zh) 叠加人工噪声信息的二维码生成方法及装置
WO2001015382A1 (fr) Protection de la legitimite d'un document electronique et d'une copie imprimee associee
Alajmi et al. Steganography of encrypted messages inside valid QR codes
JP2004007442A (ja) 情報処理方法及び装置、並びにコンピュータプログラム及びコンピュータ可読記憶媒体
Xie et al. Low-cost anti-copying 2D barcode by exploiting channel noise characteristics
Mayer et al. Fundamentals and applications of hardcopy communication
WO2019095172A1 (fr) Procédé et appareil de génération et de décodage de code qr dans un processus de copie de code qr
Sun et al. An optical watermarking solution for authenticating printed documents
Borges et al. Document image processing for paper side communications
CN110648271A (zh) 一种使用特殊网点在半色调图像中嵌入数字水印的方法
WO2019095173A1 (fr) Procédé et dispositif pour générer un code bidimensionnel auquel sont superposées des informations de bruit artificiel
JP5850370B2 (ja) 印刷物作製方法、印刷物及び真偽判別方法
WO2024137146A1 (fr) Filigranage numérique pour liaison entre nft et contenu numérique associé
Bulan et al. Content authentication for printed images utilizing high capacity data hiding
Srivastava et al. Security of Image Using Watermarking Techniques and Visual Cryptography
Ra'ad et al. Using Visual Cryptography and hash function for Fragile Watermarking to Detect Electronic Document Forgery
JP2003187292A (ja) 印刷物認証方法、印刷物認証システム、識別情報及び可視情報が埋め込まれた印刷物

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17931986

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 28/10/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17931986

Country of ref document: EP

Kind code of ref document: A1