Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code

Saved in:
Bibliographic Details
Title: Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code
Authors: Lu, Liuyi
Source: Insight - Information; Vol. 2 No. 2 (2020) ; 2661-4081
Publisher Information: PiscoMed Publishing Pte Ltd
Publication Year: 2020
Subject Terms: AES Algorithm, RSA Algorithm, Two-Dimensional Code, Encryption, Security
Description: Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes.
Document Type: article in journal/newspaper
File Description: application/pdf
Language: English
Relation: https://insight.piscomed.com/index.php/II/article/view/365/273; https://insight.piscomed.com/index.php/II/article/view/365
DOI: 10.18282/ii.v2i2.365
Availability: https://insight.piscomed.com/index.php/II/article/view/365
https://doi.org/10.18282/ii.v2i2.365
Rights: Copyright (c) 2020 Liuyi Lu ; https://creativecommons.org/licenses/by-nc/4.0
Accession Number: edsbas.BC8DBB8A
Database: BASE
Description
Abstract:Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes.
DOI:10.18282/ii.v2i2.365