Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code

Gespeichert in:
Bibliographische Detailangaben
Titel: Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code
Autoren: Lu, Liuyi
Quelle: Insight - Information; Vol. 2 No. 2 (2020) ; 2661-4081
Verlagsinformationen: PiscoMed Publishing Pte Ltd
Publikationsjahr: 2020
Schlagwörter: AES Algorithm, RSA Algorithm, Two-Dimensional Code, Encryption, Security
Beschreibung: Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes.
Publikationsart: article in journal/newspaper
Dateibeschreibung: application/pdf
Sprache: English
Relation: https://insight.piscomed.com/index.php/II/article/view/365/273; https://insight.piscomed.com/index.php/II/article/view/365
DOI: 10.18282/ii.v2i2.365
Verfügbarkeit: https://insight.piscomed.com/index.php/II/article/view/365
https://doi.org/10.18282/ii.v2i2.365
Rights: Copyright (c) 2020 Liuyi Lu ; https://creativecommons.org/licenses/by-nc/4.0
Dokumentencode: edsbas.BC8DBB8A
Datenbank: BASE
Beschreibung
Abstract:Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes.
DOI:10.18282/ii.v2i2.365