Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code
Abstract
Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes.
References
Li C. Studies on book anti-counterfeiting technology based on two-dimensional code [Master’s thesis]. Nanjing: Nanjing Normal University; 2014.
Yuan W. The design principles of AES algorithm and the improvement of its key expanding algorithm [Master’s thesis]. Changchun: Jilin University; 2010.
Wu M, Xu X, E C. Research on the encryption speed of DESRSA and their hybrid algorithm. Network Security Technology and Application 2014; (7): 117–119.
Feng Y. Research on attack and defense of smart card based on AES [Master’s thesis]. Beijing: Beijing Jiaotong University; 2013.
Wei X. Research and implementation of QR code encryption based on improved AES Algorithm [Master’s thesis]. Xi’an: Xi’an University of Technology; 2019.
Yu X, Chen Q, Yan Y. Research and Realization of the RSA Encryption Algorithm Improvement. Journal of the University of South China (Natural Science edition) 2016; 32(2): 75–78.
Zhu J. Research and implementation of QR code anti-counterfeiting algorithm based on improved DES algorithm [Master’s thesis]. Xi’an: Shaanxi University of Science & Technology; 2018.
Chen Q. A hybrid encryption algorithm based on DES and RSA algorithm [Master’s thesis]. Kunming: Yunnan University; 2015.
Tian W, Li Z. Study of RSA encryption algorithm and its improved algorithm. Shanxi Electronics Technology 2013; (6): 90–92.
Lv L, Zhao J. Analysis and research of DES encryption algorithm. Journal of Nanchang Institute of Technology 2006; (5): 28–31.
Copyright (c) 2020 Liuyi Lu
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright on any open access article in a journal published by PiscoMed Publishing is retained by the author(s).
Authors grant PiscoMed Publishing a license to publish, copy, distribute, and convey the article.
The current adopted license, the Creative Commons Attribution 4.0 International License (CC BY 4.0), formalizes these and other terms and conditions of publishing articles. The license (CC BY 4.0) means:
Share: Everyone can copy and redistribute the open-access content in the journal.
Adapt: Materials in the articles can be remixed, reused, and reanalyzed for any purpose.
Attribution: You must cite the source with the correct license if some changes to the materials are made, but that does not mean that the licensor endorses you or your use.
Authors should ensure that the content of the article is not involved in a copyright dispute before submitting it. For previously published articles, authors should obtain permission from the copyright holder if the material is under a more restrictive license.