基于激光二维码的物流编码加密算法研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research on encryption algorithm of logistics coding based on laser Two-Dimensional code
  • 作者:乔晓娜
  • 英文作者:QIAO Xiaona;Henan Vocational College of Applied technology;
  • 关键词:物流编码传输 ; 激光二维码 ; 加密 ; 公钥
  • 英文关键词:logistics code transmission;;laser qr code;;encryption;;public key
  • 中文刊名:JGZZ
  • 英文刊名:Laser Journal
  • 机构:河南应用技术职业学院;
  • 出版日期:2019-05-25
  • 出版单位:激光杂志
  • 年:2019
  • 期:v.40;No.260
  • 基金:河南省科技厅科技攻关基金项目(No.152102310118)
  • 语种:中文;
  • 页:JGZZ201905038
  • 页数:5
  • CN:05
  • ISSN:50-1085/TN
  • 分类号:182-186
摘要
物流编码传输中激光二维码传输容易受到明文攻击,导致信息泄漏,通过对物联编码的数据加密,提高物流编码传输的保密性和安全性,提出基于码元频次检测的物流编码传输中激光二维码加密算法,采用数据隐写加密方案构建激光二维码的加密密钥,结合激光二维码的分组密码重构方案进行公钥随机数设计,采用Hash函数构造一个线性密码与分组密码。采用相位随机化处理方法进行物流编码传输中激光二维码的编码和密钥设计,根据授权证书中的激光二维码图像特征进行物流编码设计,构建物流编码的加密解密密钥,采用有限域内明文填充方法进行物流编码的码元频次检测,实现激光二维码加密输出和密钥设计。仿真结果表明,采用该方法进行物流编码传输中激光二维码加密的保密性较好,数据隐写性能较强,提高了物流编码的抗攻击能力。
        In the logistics coding transmission,the laser QR code transmission is vulnerable to the clear text attack,which leads to the information leakage. By encrypting the data of the WH code,the confidentiality and security of the material flow coding transmission can be improved. In this paper,the encryption algorithm of laser QR code in material flow code transmission based on symbol frequency detection is proposed. The encryption key of laser QR code is constructed by data steganography encryption scheme,and the public key random number is designed by combining the block cipher reconstruction scheme of LQC. Using Hash function to construct a linear cipher and block cipher,the phase randomization processing method is used to encode and design the key of the laser two-dimension code in the material flow coding and transmission. According to the characteristics of the laser two-dimensional code image in the authorization certificate,the logistics coding is designed,the encryption and decryption key of the logistics code is constructed,and the code frequency detection of the logistics code is carried out by filling in the clear text in the limited domain. The encryption output and key design of laser QR code are realized. The simulation results show that the proposed method has good security and steganography performance in the transmission of the material flow code,and improves the anti-attack ability of the material flow code.
引文
[1]龙强,刘小华.基于非对称密码体制的二维码加密算法[J].重庆师范大学学报:自然科学版,2017(3):91-95.
    [2]徐光宪,徐山强,郭晓娟,等.DCT变换与DNA运算相结合的图像压缩加密算法[J].激光技术,2015,39(6):806-810.
    [3]闵富红,王珠林,王恩荣,等.新型忆阻器混沌电路及其在图像加密中的应用[J].电子与信息学报,2016,38(10):2681-2688.
    [4]SONG Kai,HOU Kai,WANG Chan,et al.Ferromagnetic Components Stress Characterization Based on ACSM[J].Journal of Mechanical Engineering,2018,54(10):16-22.
    [5]JING W,SHU R,QIN D.Study of synchronization characteristics of a multi-source driving transmission system under an impact load[J].International Journal of Precision Engineering and Manufacturing,2016,17(9):1-18.
    [6]BI S,HO C K,ZHANG R.Wireless powered communication:opportunities and challenges[J].IEEE Communications Magazine,2015,53(4):117-125.
    [7]ULUKUS S,YENER A,ERKIP E,et al.Energy harvesting wireless communications:a review of recent advances[J].IEEE Journal on Selected Areas in Communications,2015,33(3):360-381.
    [8]耿秋实,张文英,戴永恒.基于常权编码的光学相机通信闪烁抑制研究[J].中国电子科学研究院学报,2018,13(2):136-139.
    [9]刘畅,蔡旭,陈强.具有储能功能的链式STATCOM研究[J].电源学报,2018,16(4):21-27.
    [10]陈甬娜,周宇,王晓东,等.基于菱形编码的视频信息隐藏算法[J].计算机应用,2017,37(10):2806-2812.
    [11]AN Q Y,LEUNG H,SONG Y,et al.Multipath ghost suppression for through-the-wall-radar[J].IEEE Transactions on Aerospace and Electronic Systems,2014,50(3):2284-2292.
    [12]GENNARELLI G,SOLDOVIERI F.Multipath ghosts in radar imaging:physical insight and mitigation strategies[J].IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing,2014,8(3):1078-1086.
    [13]吴振华,胡鹏.VANET中路由协议分析[J].通信学报,2015,36(Z1):75-84.
    [14]GUHA D,ROY P,BANERJEE S.Quasi-oppositional symbiotic organism search algorithm applied to load frequency control[J].Swarm and Evolutionary Computation,2016,33:46-67.
    [15]TEJANI G G,SAVSANI V J,PATEL V K.Adaptive Symbiotic Organisms Search(SOS)algorithm for structural design optimization[J].Journal of Computational Design and Engineering,2016,3(3):226-249.
    [16]GAMAL EL DIN HASSAN ALI H,SAROIT I A,KOTB AM.Grouped tasks scheduling algorithm based on Qo S in cloud computing network[J].Egyptian Informatics Journal,2017,18(1):11-19.
    [17]WEN Z,LIU X,BEAULIEU N C,et al.Joint source and relay beamforming design for full-duplex MIMO AF relay SWIPT systems[J].IEEE Communications Letters,2016,20(2):320-323.
    [18]吕康,王晓洁,王九如.基于ECC加密的二维码物流管理系统研究[J].电脑编程技巧与维护,2016(6):72-73.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700