Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code
Saved in:
| Title: | Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code |
|---|---|
| Authors: | Lu, Liuyi |
| Source: | Insight - Information; Vol. 2 No. 2 (2020) ; 2661-4081 |
| Publisher Information: | PiscoMed Publishing Pte Ltd |
| Publication Year: | 2020 |
| Subject Terms: | AES Algorithm, RSA Algorithm, Two-Dimensional Code, Encryption, Security |
| Description: | Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes. |
| Document Type: | article in journal/newspaper |
| File Description: | application/pdf |
| Language: | English |
| Relation: | https://insight.piscomed.com/index.php/II/article/view/365/273; https://insight.piscomed.com/index.php/II/article/view/365 |
| DOI: | 10.18282/ii.v2i2.365 |
| Availability: | https://insight.piscomed.com/index.php/II/article/view/365 https://doi.org/10.18282/ii.v2i2.365 |
| Rights: | Copyright (c) 2020 Liuyi Lu ; https://creativecommons.org/licenses/by-nc/4.0 |
| Accession Number: | edsbas.BC8DBB8A |
| Database: | BASE |
| Abstract: | Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes. |
|---|---|
| DOI: | 10.18282/ii.v2i2.365 |
Nájsť tento článok vo Web of Science