[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110516775B - User secret information hiding method based on QR code - Google Patents

User secret information hiding method based on QR code Download PDF

Info

Publication number
CN110516775B
CN110516775B CN201910623205.8A CN201910623205A CN110516775B CN 110516775 B CN110516775 B CN 110516775B CN 201910623205 A CN201910623205 A CN 201910623205A CN 110516775 B CN110516775 B CN 110516775B
Authority
CN
China
Prior art keywords
code
information
user
secret information
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910623205.8A
Other languages
Chinese (zh)
Other versions
CN110516775A (en
Inventor
赵庆兰
杨舜同
郑东
张应辉
赖成喆
郭瑞
秦宝东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN201910623205.8A priority Critical patent/CN110516775B/en
Publication of CN110516775A publication Critical patent/CN110516775A/en
Application granted granted Critical
Publication of CN110516775B publication Critical patent/CN110516775B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06018Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding
    • G06K19/06028Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of information security, and discloses a secret information hiding method based on a QR code user, which comprises the steps of firstly generating a position sequence, and generating the position sequence for information hiding by a user by using a secret key and a pseudo-random number generator; and then the user uses the position sequence to hide the secret information into the encoding process of the QR code after encoding the secret information to be hidden. The hidden QR code can be scanned normally to read the cover information, so that the hidden QR code is not easy to draw attention of an attacker. Finally, the secret information can be recovered from the hidden QR code by the user by using the secret key. The invention utilizes the properties of QR codes, pseudo random number generators and information hiding to hide the privacy information of users, and only users with secret keys can read the hidden information. And the hiding and recovering algorithm has low computational complexity, can be used on low-power equipment, and has wide application scenes.

Description

基于QR码用户秘密信息隐藏方法User secret information hiding method based on QR code

技术领域technical field

本发明属于信息安全技术领域,尤其涉及一种基于QR码用户秘密信息隐藏方法。The invention belongs to the technical field of information security, in particular to a method for hiding user secret information based on a QR code.

背景技术Background technique

目前,最接近的现有技术:QR码是一种二维码或矩阵条形码,可以存储数据信息并设计为由智能手机读取。QR代表快速响应(Quick Response),表示代码内容应该以非常快的速度快速解码。QR码由在白色背景上以正方形图案排列的黑色模块组成。编码的信息可以是文本,URL或其他数据。QR码旨在允许其内容高速解码。因此其大容量,解码速度快的特点使得QR码的普及率在全世界迅速增长。如今,手机的内置摄像头普遍具有识别QR码的功能。Currently, the closest existing technology: a QR code is a two-dimensional code or matrix barcode that stores data information and is designed to be read by a smartphone. QR stands for Quick Response, which means that the code content should be quickly decoded at a very fast speed. The QR code consists of black modules arranged in a square pattern on a white background. The encoded information can be text, URL or other data. QR codes are designed to allow their content to be decoded at high speed. Therefore, its large capacity and fast decoding speed make the popularity of QR codes grow rapidly all over the world. Nowadays, the built-in cameras of mobile phones generally have the function of recognizing QR codes.

一般来说,为了保护条码数据的隐私,数据通常存储在后端数据库中,条形码显示数据库的Web链接。只有浏览器正确的访问数据库后才可以获取这些数据。然而QR码由于内容完全透明,仅作为一种编码方式被使用,因此业内研究多将其视为数据载体,没有在QR码的编码机制上提供安全保护。在QR码的应用中,多作为存储后端数据库链接以方便人们访问,但是后端数据库的网络链接的直接暴露容易造成用户不必要的隐私信息泄露等潜在的风险,可能会吸引入侵者的注意。而QR码作为数据载体并没有区分用户隐私信息和一般信息的作用,在QR码大量应用的今天,QR码信息隐私安全等信息安全问题是我们所面临的重要问题。Generally speaking, in order to protect the privacy of the barcode data, the data is usually stored in the back-end database, and the barcode displays the web link of the database. These data can only be obtained after the browser correctly accesses the database. However, because the content of QR code is completely transparent, it is only used as a coding method. Therefore, research in the industry mostly regards it as a data carrier, and does not provide security protection on the coding mechanism of QR code. In the application of QR code, it is mostly used to store the back-end database link to facilitate people's access, but the direct exposure of the network link of the back-end database is likely to cause potential risks such as unnecessary privacy information leakage of users, which may attract the attention of intruders. As a data carrier, QR code does not distinguish between user privacy information and general information. Today, when QR codes are widely used, information security issues such as QR code information privacy and security are important issues we face.

综上所述,现有技术存在的问题是:QR码由于内容完全透明,没有任何安全机制保护,后端数据库的网络链接的直接暴露造成了潜在的风险,可能会吸引入侵者的注意。To sum up, the problem in the prior art is that the content of the QR code is completely transparent without any security mechanism protection, and the direct exposure of the network link of the back-end database causes potential risks and may attract the attention of intruders.

解决上述技术问题的难度:因为QR码的编码方式透明,数据显示直观,没有读取权限分级,因此加密等密码学方法无法在保护特定数据的同时保证QR码被一般用户正常读取。因此需要一种新方法在不影响QR码正常封面信息读取的情况下,实现隐私信息保护。并且由于QR码扫描器以低功率移动设备为主,因此方案计算复杂度不应高。Difficulty in solving the above technical problems: Because the coding method of the QR code is transparent, the data display is intuitive, and there is no classification of reading permissions, cryptographic methods such as encryption cannot protect specific data while ensuring that the QR code is normally read by ordinary users. Therefore, a new method is needed to realize the protection of private information without affecting the reading of the normal cover information of the QR code. And since QR code scanners are mainly low-power mobile devices, the computational complexity of the scheme should not be high.

解决上述技术问题的意义:如今QR码被广泛应用的背景下,可以使用秘密信息隐藏方法实现对用户群体的区分或实现对用户隐私信息和一般信息的区分。可以在一些需要QR码大容量,快速读取的环境下提供用户隐私安全保障。The significance of solving the above technical problems: In the context of the widespread use of QR codes today, secret information hiding methods can be used to distinguish user groups or to distinguish user private information from general information. It can provide user privacy and security protection in some environments that require large capacity and fast reading of QR codes.

发明内容Contents of the invention

针对现有技术存在的问题,本发明提供了一种基于QR码用户秘密信息隐藏方法Aiming at the problems existing in the prior art, the present invention provides a method for hiding user secret information based on QR code

本发明是这样实现的,一种基于QR码用户秘密信息隐藏方法,所述基于QR码用户秘密信息隐藏方法的用户使用伪随机发生器生成由用户密钥控制的伪随机序列,对伪随机序列进行编码处理得到隐藏信息的位置序列;根据QR码的编码过程将秘密信息根据位置序列嵌入QR码中;秘密恢复过程则在QR码的解码过程中直接通过位置序列进行读取,得到隐藏信息。The present invention is achieved in this way, a method for hiding user secret information based on QR codes, in which the user uses a pseudo-random generator to generate a pseudo-random sequence controlled by a user key, and encodes the pseudo-random sequence to obtain a position sequence of hidden information; according to the encoding process of the QR code, the secret information is embedded in the QR code according to the position sequence; the secret recovery process is directly read through the position sequence during the decoding process of the QR code to obtain hidden information.

进一步,所述基于QR码用户秘密信息隐藏方法包括以下步骤:Further, the method for hiding user secret information based on QR codes includes the following steps:

第一步,生成位置序列,用户使用密钥和伪随机数发生器生成信息隐藏用的位置序列;The first step is to generate a position sequence, and the user uses a key and a pseudo-random number generator to generate a position sequence for information hiding;

第二步,用户将需要隐藏的秘密信息编码后使用位置序列将秘密信息隐藏到QR码的编码过程中;In the second step, the user encodes the secret information to be hidden and uses the position sequence to hide the secret information into the encoding process of the QR code;

第三步,用户使用密钥可以在隐藏后的QR码中将秘密信息恢复。In the third step, the user can use the key to recover the secret information in the hidden QR code.

进一步,所述第一步的伪随机数发生器及QR码的选取:用户应选取周期尽量大的伪随机数发生器来保证随机性;并根据需要隐藏的秘密信息长度来决定QR码的版本和纠错级别;Further, the selection of the pseudo-random number generator and QR code in the first step: the user should select a pseudo-random number generator with a period as large as possible to ensure randomness; and determine the version and error correction level of the QR code according to the length of the secret information that needs to be hidden;

生成位置序列:首先用户通过密钥控制的伪随机数发生器产生一串长度大于当前版本QR码总块数的序列,去除重复项后,取前c项,保证前c项没有重复块。再将每项c与0~7进行遍历,使用密钥控制的伪随机数发生器进行混淆,得到8×c的序列,c为该QR码版本纠错级别最大纠错数;序列的结构为一串二维数组。Generate position sequence: First, the user generates a sequence with a length greater than the total number of blocks of the current version of the QR code through the pseudo-random number generator controlled by the key. After removing duplicates, take the first c items to ensure that there are no repeated blocks in the first c items. Then iterate through each item c and 0~7, use the pseudo-random number generator controlled by the key to confuse, and obtain a sequence of 8×c, c is the maximum error correction number of the QR code version error correction level; the structure of the sequence is a series of two-dimensional arrays.

进一步,所述第二步的QR码封面信息编码:在对QR码封面信息进行编码应停止在QR码计算并添加掩膜步骤前,在隐藏信息后再计算掩膜类型;Further, the QR code cover information encoding of the second step: before encoding the QR code cover information, it should stop before the QR code calculation and add the mask step, and then calculate the mask type after hiding the information;

秘密信息编码:对用户需要隐藏的秘密信息进行编码,将秘密信息编码为适合隐藏的二进制比特流,可使用QR码数据编码标准进行,也可直接使用Ascii码等编码方式转换。根据用户信息隐藏长度并在秘密信息序列最后两位设置长度位以方便解码;Secret information encoding: Encode the secret information that the user needs to hide, and encode the secret information into a binary bit stream suitable for hiding, which can be performed using the QR code data encoding standard, or directly converted using encoding methods such as Ascii code. Hide the length according to the user information and set the length bit in the last two bits of the secret information sequence to facilitate decoding;

秘密信息隐藏:用户使用密钥生成的位置序列和编码后的秘密信息序列进行隐藏。跟据位置信息序列,通过位置中每一项的位置信息依次将构造好的秘密序列编码进行嵌入。例如位置信息序列第一项为(8,1),即将秘密序列的第一位数据覆盖嵌入QR码第8块的第2位中,往后依次读取位置信息序列,以完成秘密信息嵌入。在完成对QR码数据码块的隐藏修改后,继续封面QR码的编码过程得到隐藏后的QR码。Secret information hiding: The user uses the key-generated position sequence and the encoded secret information sequence to hide. According to the position information sequence, the constructed secret sequence code is embedded in turn through the position information of each item in the position. For example, the first item of the position information sequence is (8,1), that is, the first bit data of the secret sequence is covered and embedded into the second bit of the 8th block of the QR code, and the position information sequence is read sequentially to complete the embedding of the secret information. After completing the hidden modification of the QR code data code block, continue the encoding process of the cover QR code to obtain the hidden QR code.

进一步,所述第三步的隐藏信息恢复:用户使用密钥生成的位置序列和隐藏后的QR码进行秘密信息恢复。将隐藏QR码去掩膜,纠错;然后根据位置序列直接读取出编码后的秘密序列,再通过解码得到用户秘密信息。Further, the hidden information recovery in the third step: the user uses the location sequence generated by the key and the hidden QR code to recover the secret information. Remove the mask of the hidden QR code and correct the error; then read the coded secret sequence directly according to the position sequence, and then obtain the user's secret information through decoding.

本发明的另一目的在于提供一种应用所述基于QR码用户秘密信息隐藏方法的信息数据处理终端。Another object of the present invention is to provide an information data processing terminal applying the method for hiding user secret information based on QR codes.

综上所述,本发明的优点及积极效果为:本发明利用QR码的性质对用户隐私进行隐藏和保护,未持有密钥的用户均不可得到隐藏信息,所有用户都可正常扫描封面二维码信息,不容易引起攻击者怀疑。目前现有的QR码隐藏等安全技术主要使用图像隐藏,水印等方式将秘密信息隐藏。但是图像隐藏和水印方法容量受图片大小或QR码图片大小限制,并且隐藏过程中使用离散小波变换(DWT),离散余弦变换(DCT)和离散傅立叶变换(DFT)等方法将秘密或秘密QR码嵌入到QR码图像或隐藏封面图像的频域中,计算复杂度极高。本发明隐藏算法简单高效,安全性直接由密钥控制,计算开销很低,同时又有效保护了用户隐私,为QR码提供了一种安全方案。To sum up, the advantages and positive effects of the present invention are: the present invention utilizes the nature of the QR code to hide and protect user privacy, and users who do not hold the key cannot obtain the hidden information, and all users can normally scan the QR code information on the cover, which is not easy to arouse the suspicion of attackers. At present, existing security technologies such as QR code hiding mainly use methods such as image hiding and watermarking to hide secret information. However, the capacity of image hiding and watermarking methods is limited by the size of the picture or the size of the QR code picture, and methods such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and discrete Fourier transform (DFT) are used in the hiding process to embed the secret or secret QR code into the frequency domain of the QR code image or hidden cover image, and the computational complexity is extremely high. The hiding algorithm of the invention is simple and efficient, the security is directly controlled by the key, the calculation cost is very low, and at the same time, the privacy of the user is effectively protected, and a security scheme is provided for the QR code.

本发明依据QR码人眼不易识别和纠错性强的特性,以信息隐藏的方式,确保用户身份等信息的安全性和隐秘性;依据QR码的特性,隐藏后的QR码可以正常扫描读取,不容易被攻击者怀疑,确保了隐秘性;除了拥有密钥的用户,其他扫描者都不能得到用户隐秘信息,保证了安全性;同时方案使用明文直接读写的方法,减少了隐藏/恢复时的计算复杂度,系统开销很低,扩大了应用场景范围,比如可以应用在秘密共享等密码学领域中,或与物联网,云计算等研究领域结合保护以QR码作为数据载体的用户数据隐私。Based on the characteristics of QR codes that are not easy to be recognized by human eyes and strong error correction, the present invention ensures the security and confidentiality of information such as user identities by means of information hiding; according to the characteristics of QR codes, the hidden QR codes can be scanned and read normally, and are not easily suspected by attackers, ensuring privacy; except for users with keys, other scanners cannot obtain the user's secret information, which ensures security; at the same time, the scheme uses the method of direct reading and writing of plain text, which reduces the computational complexity of hiding/recovering, the system overhead is very low, and the scope of application scenarios can be expanded. It is used in the field of cryptography such as secret sharing, or combined with research fields such as the Internet of Things and cloud computing to protect the privacy of user data that uses QR codes as data carriers.

本发明基于QR码对用户敏感隐私信息的隐藏方案,可用于QR码的息的机密性、认证性和完整性。本发明主要利用了QR码的性质来进行信息隐藏从而保护QR码的用户安全。提供一种在QR码中能够有效保护用户数据的信息隐藏方案,以简单高效地保护用户隐私数据,并可实现对扫描者身份的认证和鉴别。The present invention is based on a QR code hiding scheme for users' sensitive private information, and can be used for the confidentiality, authentication and integrity of the information of the QR code. The present invention mainly utilizes the property of the QR code to hide information so as to protect the user safety of the QR code. An information hiding scheme that can effectively protect user data in a QR code is provided, so as to simply and efficiently protect user privacy data, and realize authentication and identification of the identity of the scanner.

附图说明Description of drawings

图1是本发明实施例提供的基于QR码用户秘密信息隐藏方法流程图。FIG. 1 is a flowchart of a method for hiding user secret information based on a QR code provided by an embodiment of the present invention.

图2是本发明实施例提供的基于QR码用户秘密信息隐藏方法实现流程图。Fig. 2 is a flow chart of implementing a method for hiding user secret information based on a QR code provided by an embodiment of the present invention.

图3是本发明实施例提供的QR码信息隐藏流程图。Fig. 3 is a flowchart of QR code information hiding provided by an embodiment of the present invention.

图4是本发明实施例提供的QR码隐藏信息恢复图。Fig. 4 is a recovery diagram of QR code hidden information provided by an embodiment of the present invention.

图5是本发明实施例提供的信息隐藏算法实验结果示意图;Fig. 5 is a schematic diagram of the experimental results of the information hiding algorithm provided by the embodiment of the present invention;

图中:(a)为未隐藏秘密原始的QR码图像;(b)-(e)为隐藏秘密后的QR码图像。In the figure: (a) is the original QR code image without hiding the secret; (b)-(e) are the QR code images after hiding the secret.

具体实施方式Detailed ways

为了使本发明的目的、技术方案及优点更加清楚明白,以下结合实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

针对现有技术存在的问题,本发明提供了一种基于QR码用户秘密信息隐藏方法、信息数据处理终端,下面结合附图对本发明作详细的描述。Aiming at the problems existing in the prior art, the present invention provides a method for hiding user secret information based on a QR code and an information data processing terminal. The present invention will be described in detail below in conjunction with the accompanying drawings.

如图1所示,本发明实施例提供的基于QR码用户秘密信息隐藏方法包括以下步骤:As shown in Figure 1, the QR code-based user secret information hiding method provided by the embodiment of the present invention includes the following steps:

S101:生成位置序列,用户使用密钥和伪随机数发生器生成信息隐藏用的位置序列;S101: Generating a position sequence, the user uses a key and a pseudo-random number generator to generate a position sequence for information hiding;

S102:用户将需要隐藏的秘密信息编码后使用位置序列将秘密信息隐藏到QR码的编码过程中;隐藏后的QR码可以被正常扫描,读取封面信息,因此不容易引起攻击者注意;S102: The user encodes the secret information that needs to be hidden and uses the position sequence to hide the secret information in the encoding process of the QR code; the hidden QR code can be scanned normally to read the cover information, so it is not easy to attract the attention of the attacker;

S103:用户使用密钥可以在隐藏后的QR码中将秘密信息恢复。S103: The user can recover the secret information in the hidden QR code by using the key.

如图2所示,本发明实施例提供的基于QR码用户秘密信息隐藏方法具体包括以下步骤:As shown in Figure 2, the QR code-based user secret information hiding method provided by the embodiment of the present invention specifically includes the following steps:

(1)伪随机数发生器及QR码的选取:用户应选取周期尽量大的伪随机数发生器来保证随机性。并根据需要隐藏的秘密信息长度来决定QR码的版本和纠错级别。(1) Selection of pseudo-random number generator and QR code: users should select a pseudo-random number generator with as large a period as possible to ensure randomness. And the version and error correction level of the QR code are determined according to the length of the secret information that needs to be hidden.

(2)生成位置序列:用户通过密钥控制的伪随机数发生器产生一串长度8×c的序列,c为该QR码版本纠错级别最大纠错数。序列的结构为一串二维数组,如:[12,1],[22,5],[15,1]。其中第一项为改变的纠错块位置,需在QR码的数据码块中进行选取,避免因QR码污损造成的隐藏信息丢失。第二项为该数据块中的位置,取值应在0~7之间。因此该8×c的序列不应存在重复项,应完整遍历该8×c项。(2) Generate position sequence: the user generates a sequence of length 8×c through the pseudo-random number generator controlled by the key, and c is the maximum error correction number of the error correction level of the QR code version. The structure of the sequence is a string of two-dimensional arrays, such as: [12,1],[22,5],[15,1]. The first item is the position of the changed error correction block, which needs to be selected in the data code block of the QR code to avoid the loss of hidden information caused by the defacement of the QR code. The second item is the position in the data block, and its value should be between 0 and 7. Therefore, there should be no duplicate items in the 8×c sequence, and the 8×c items should be completely traversed.

(3)QR码封面信息编码:在对QR码封面信息进行编码应停止在QR码计算并添加掩膜步骤前,在隐藏信息后再计算掩膜类型可以使生成的隐藏QR码更不易引起怀疑。(3) Coding of QR code cover information: Encoding of QR code cover information should stop before the step of QR code calculation and adding mask. Calculating the mask type after hiding information can make the generated hidden QR code less likely to arouse suspicion.

(4)秘密信息编码:对用户需要隐藏的秘密信息进行编码,需要根据用户信息隐藏长度并在秘密信息序列最后两位设置长度位以方便解码。(4) Secret information encoding: To encode the secret information that the user needs to hide, it is necessary to hide the length according to the user information and set the length bit in the last two bits of the secret information sequence to facilitate decoding.

(5)秘密信息隐藏:用户使用密钥生成的位置序列和编码后的秘密信息序列进行隐藏,如序列[12,1],[22,5],[15,1],则将秘密序列的三位分别写入QR码的第12块第2位,第22块第6位和第15块第2位。然后继续封面QR码的编码过程就可以得到隐藏后的QR码。(5) Secret information hiding: The user uses the position sequence generated by the key and the coded secret information sequence to hide, such as the sequence [12,1], [22,5], [15,1], then write the three digits of the secret sequence into the 12th digit of the QR code, the 22nd digit of the 6th digit, and the 15th digit of the QR code. Then continue the encoding process of the cover QR code to get the hidden QR code.

(6)隐藏信息恢复:用户使用密钥生成的位置序列和隐藏后的QR码进行秘密信息恢复。将隐藏QR码去掩膜,纠错,然后根据位置序列直接读取出编码后的秘密序列,再通过解码得到用户秘密信息。(6) Hidden information recovery: The user uses the location sequence generated by the key and the hidden QR code to recover the secret information. Remove the mask of the hidden QR code, correct the error, and then directly read the encoded secret sequence according to the position sequence, and then obtain the user's secret information through decoding.

下面结合附图对本发明的技术方案作进一步的描述。The technical scheme of the present invention will be further described below in conjunction with the accompanying drawings.

1、QR码1. QR code

QR码由白色和黑色两种方形模块构成,代表数字0和1,通过2D矩阵表示。QR码标准提供了40个QR版本,可编码各种数据,其中版本1容量最小,版本40容量最大。用户使用的版本取决于字母数字、二进制、汉字或其组合编码的数据量以及纠错级别。另外,QR码非常可靠性,即使条形码的部分脏污或损坏,也可以正确地读取数据。QR码采用Reed-Solomon错误控制编码进行错误检测和纠正。用户可以选择L,M,Q和H等4种错误纠正级别,每个级别提供不同的纠错能力,更高的纠错级别具有更好的纠错能力,但也会增加要编码的数据量。QR码的编码过程主要分为三步。第一步生成数据块。数据码字使用交错的方式编码,纠错码字附加到数据码字序列的末尾,可以尽量减少因局部损坏而导致QR码变得不可解码的可能性。第二步填充QR码图像,并根据QR码标准计算掩膜类型并添加掩码。在对数据码字进行编码之后,将平衡白和黑模块的掩码应用于编码区域。掩膜类型总共有8种(0~7),选择合适掩膜类型能减少可能会混淆QR码阅读器的不良图案。第三步添加格式信息和版本信息。The QR code consists of two square modules, white and black, representing the numbers 0 and 1, represented by a 2D matrix. The QR code standard provides 40 QR versions that can encode various data, among which version 1 has the smallest capacity and version 40 has the largest capacity. The version you use depends on the amount of data encoded in alphanumeric, binary, Chinese characters, or a combination thereof, and the level of error correction. In addition, the QR code is very reliable, and even if part of the bar code is dirty or damaged, the data can be read correctly. QR codes employ Reed-Solomon error control coding for error detection and correction. Users can choose 4 error correction levels such as L, M, Q and H. Each level provides different error correction capabilities. Higher error correction levels have better error correction capabilities, but also increase the amount of data to be encoded. The coding process of QR code is mainly divided into three steps. The first step is to generate data blocks. The data codewords are encoded in an interleaved manner, and the error correction codewords are appended to the end of the data codeword sequence, which can minimize the possibility of the QR code becoming undecodable due to partial damage. The second step fills the QR code image, and calculates the mask type and adds the mask according to the QR code standard. After encoding the data codewords, a mask that balances white and black modules is applied to the encoded region. There are a total of 8 mask types (0-7), and choosing a suitable mask type can reduce bad patterns that may confuse the QR code reader. The third step is to add format information and version information.

2、伪随机数发生器2. Pseudo-random number generator

伪随机数发生器是由计算机通过伪随机算法和种子来产生有很长的周期性随机数。它们不真正地随机,因为它们实际上是可以计算出来的,但是它们具有类似于随机数的统计特征,具有密码学安全伪随机性。即给定随机样本的一部分和随机算法,不能有效的演算出随机样本的剩余部分。Pseudo-random number generators are generated by computers through pseudo-random algorithms and seeds with long periodic random numbers. They are not truly random, since they can actually be calculated, but they have statistical characteristics similar to random numbers, with cryptographically secure pseudo-randomness. That is, given a part of the random sample and the random algorithm, the remaining part of the random sample cannot be efficiently calculated.

3信息隐藏3 information hiding

信息隐藏是把机密信息隐藏在大量信息中不让对手发觉的一种方法。信息隐藏的方法主要有隐写术、数字水印技术、可视密码、潜信道、隐匿协议等。Information hiding is a method of hiding confidential information in a large amount of information to prevent the opponent from discovering it. The methods of information hiding mainly include steganography, digital watermarking technology, visible cipher, submerged channel, hidden protocol and so on.

如图3和图4所示,本发明的具体过程如下:As shown in Figure 3 and Figure 4, the concrete process of the present invention is as follows:

步骤一、生成位置序列LNStep 1: Generate a location sequence L N .

用户应选取合适的伪随机数发生器,并设置用户密钥K,使用K和伪随机数发生器生成QR码数据块数量d的序列,其中每块的标号仅出现一次,取d的前c项,c为QR码该版本纠错级别的纠错能力。将前c项的序列每项分为8项并使用K和伪随机数发生器进行重排,得到长度为8×c的位置序列LNThe user should select an appropriate pseudo-random number generator and set the user key K, and use K and the pseudo-random number generator to generate a sequence of QR code data block number d, in which the label of each block appears only once, and the first c item of d is taken, and c is the error correction level of the QR code version. Each item of the sequence of the first c items is divided into 8 items and rearranged using K and a pseudo-random number generator to obtain a position sequence L N with a length of 8×c.

步骤二、秘密信息编码。Step 2, secret information encoding.

为了更方便解码,需要对隐藏的秘密S进行编码。根据QR码的版本和纠错级别选取长度位的长度,并在秘密信息编码后将秘密信息长度编码加在秘密信息后,得到编码后的秘密信息序列SNFor easier decoding, the hidden secret S needs to be encoded. The length of the length bit is selected according to the version and error correction level of the QR code, and the secret information length code is added to the secret information after the secret information is encoded to obtain the encoded secret information sequence S N .

步骤三、秘密信息隐藏。Step 3, secret information hiding.

根据位置序列LN和秘密信息序列SN,在QR码完成数据编码和填充后,在计算添加掩膜之前数据块区域DQR中写入秘密信息序列SN。如序列LN为[12,1],[22,5],[15,1],则将秘密序列SN的三位分别写入DQR中第12块第2位,第22块第6位和第15块第2位。然后继续封面QR码的编码过程就可以得到隐藏后的QR码。According to the position sequence L N and the secret information sequence S N , after the data encoding and filling of the QR code are completed, the secret information sequence S N is written in the data block area D QR before calculating the added mask. If the sequence L N is [12,1], [22,5], [15,1], write the three digits of the secret sequence S N into the second digit of the 12th block, the sixth digit of the 22nd block and the second digit of the 15th block in D QR respectively. Then continue the encoding process of the cover QR code to get the hidden QR code.

步骤四、隐藏信息恢复。Step 4. Hidden information recovery.

根据用户秘钥K和去除掩膜并纠错后的隐藏QR码数据块DQR,用户通过秘钥K生成位置序列LN直接读取出编码后的秘密序列SN,解码后即得到用户秘密S。According to the user secret key K and the hidden QR code data block D QR after removing the mask and error correction, the user generates the position sequence L N through the secret key K and directly reads the encoded secret sequence S N , and obtains the user secret S after decoding.

下面结合实验对本发明的技术效果作详细的描述。The technical effects of the present invention will be described in detail below in conjunction with experiments.

正面实验数据:根据上述方案,在linux的环境下使用python3语言的实验数据如下:图为方案的仿真结果,其中所有QR码均为版本为1-H的QR码,且均可以被正常扫描读取。Positive experimental data: According to the above scheme, the experimental data using python3 language in the linux environment is as follows: The picture shows the simulation results of the scheme, in which all QR codes are QR codes with version 1-H, and can be scanned and read normally.

图5(a)为未隐藏秘密原始的QR码图像,其中封面数据为“Hallo”,封面数据编码后数据码块DQR为[64,84,134,22,198,198,240,236,17,246,192,246,119,46,148,193,221,87,192,157,115,154,73,193,130,113]。根据QR码编码计算出的掩膜类型为7。Figure 5(a) is the original QR code image without hiding the secret, where the cover data is "Hallo", and the data code block D QR after encoding the cover data is [64,84,134,22,198,198,240,236,17,246,192,246,119,46,148,193,221,87,192,157,115,154,73 ,193,130,113]. The mask type calculated from the QR code encoding is 7.

图5(b-e)为隐藏秘密后的QR码图像,封面数据均为“Hallo”,因此在嵌入隐藏前QR码块DQR的数据与图(a)相同。以下数据中LN为密钥生成的位置序列,DQR(hiding)为隐藏后的QR码数据码块。Figure 5(be) is the QR code image after hiding the secret, and the cover data are all "Hallo", so the data of the QR code block D QR before embedding and hiding is the same as that in Figure (a). In the following data, L N is the position sequence of key generation, and D QR (hiding) is the hidden QR code data code block.

在图5(b)中,隐藏的秘密信息为“pwd”,用户密钥为“1q2w3e4r”。In Figure 5(b), the hidden secret information is “pwd” and the user key is “1q2w3e4r”.

LN=[(6,1),(20,7),(20,3),(11,1),(22,4),(11,7),(12,6),(9,0),(9,1),(18,0),(20,1),(22,0),(12,3),(11,3),(12,5),(9,5),(16,7),(20,0),(16,5),(18,5),(6,4),(18,4),(16,1),(22,6),(16,2),(20,2),(18,3),(22,3),(16,0),(22,7),(9,7),(6,6),(6,0),(11,6),(16,6),(18,6),(6,5),(9,4),(11,0),(22,1),(12,0),(20,6),(9,6),(18,1),(20,5),(11,2),(6,3),(9,3),(11,4),(12,7),(20,4),(12,1),(22,5),(22,2),(12,2),(9,2),(12,4),(16,4),(16,3),(6,2),(6,7),(18,7),(18,2),(11,5)]LN=[(6,1),(20,7),(20,3),(11,1),(22,4),(11,7),(12,6),(9,0),(9,1),(18,0),(20,1),(22,0),(12,3),(11,3),(12,5),(9,5),(16,7),(20, 0),(16,5),(18,5),(6,4),(18,4),(16,1),(22,6),(16,2),(20,2),(18,3),(22,3),(16,0),(22,7),(9,7),(6,6),(6,0),(11,6),(16,6),(18,6 ),(6,5),(9,4),(11,0),(22,1),(12,0),(20,6),(9,6),(18,1),(20,5),(11,2),(6,3),(9,3),(11,4),(12,7),(20,4),(12,1),(22,5),(22,2), (12,2),(9,2),(12,4),(16,4),(16,3),(6,2),(6,7),(18,7),(18,2),(11,5)]

DQR(hiding)=[64,84,134,22,198,198,21,236,17,15,192,218,164,46,148,193,20,87,234,157,255,154,228,193,130,113]D QR (hiding)=[64,84,134,22,198,198, 21 ,236,17, 15 ,192, 218 , 164 ,46,148,193, 20 ,87, 234 , 157 , 255 ,154, 228 ,193,130,113]

其中[6,9,11,12,16,18,20,22]块被改变,改变部分在DQR(hiding)中使用下划线标出,因为加入秘密信息后的QR码数据块经过计算掩膜后,掩膜类型依旧为7,所以隐藏后的QR码与图(a)相比变化不大。Among them, blocks [6,9,11,12,16,18,20,22] are changed, and the changed part is underlined in D QR (hiding), because the mask type of the QR code data block after adding secret information is still 7 after calculating the mask, so the hidden QR code has little change compared with Figure (a).

在图5(c)中,隐藏的秘密信息为“key”,用户密钥为“1q2w3e4r”。In Figure 5(c), the hidden secret information is “key” and the user key is “1q2w3e4r”.

DQR(hiding)=[64,84,134,22,198,198,173,236,17,191,192,184,98,46,148,193,14,87,214,157,243,154,122,193,130,113] D QR ( hiding ) [ 64,84,134,22,198,198,173,236,17,191,192,184,98,46,148,193,14,87,214,157,243,154,122,193,130,113 ]

因为用户密钥与图(b)相同,所以LN相同,其中[6,9,11,12,16,18,20,22]块被改变,改变部分在DQR(hiding)中使用下划线标出,因为加入秘密信息后的QR码数据块经过计算掩膜后,掩膜类型为0,所以隐藏后的QR码与图(a)相比变化较大。Because the user key is the same as in Figure (b), L N is the same, where [6,9,11,12,16,18,20,22] blocks are changed, and the changed part is marked with an underline in D QR (hiding), because the QR code data block after adding secret information is calculated and the mask type is 0, so the QR code after hiding changes greatly compared with Figure (a).

在图5(d)中,隐藏的秘密信息为“pwd”,用户密钥为“google”In Figure 5(d), the hidden secret information is “pwd” and the user key is “google”

LN=[(18,6),(18,0),(6,5),(18,2),(23,3),(15,4),(18,1),(6,6),(4,3),(15,6),(7,1),(7,0),(25,2),(23,5),(6,1),(25,3),(23,1),(18,4),(4,4),(12,3),(18,7),(4,5),(7,2),(25,1),(6,3),(23,0),(15,5),(12,6),(4,2),(15,3),(23,2),(25,7),(25,6),(23,6),(6,7),(7,4),(12,4),(4,1),(12,7),(7,6),(18,3),(18,5),(4,7),(25,0),(4,6),(7,7),(7,5),(25,4),(12,0),(15,1),(15,2),(6,2),(7,3),(23,4),(15,0),(23,7),(12,2),(12,1),(6,0),(12,5),(4,0),(6,4),(25,5),(15,7)]LN=[(18,6),(18,0),(6,5),(18,2),(23,3),(15,4),(18,1),(6,6),(4,3),(15,6),(7,1),(7,0),(25,2),(23,5),(6,1),(25,3),(23,1),(18,4) ,(4,4),(12,3),(18,7),(4,5),(7,2),(25,1),(6,3),(23,0),(15,5),(12,6),(4,2),(15,3),(23,2),(25,7),(25,6),(23,6),(6,7),(7,4),(12 ( 23,7),(12,2),(12,1),(6,0),(12,5),(4,0),(6,4),(25,5),(15,7)]

DQR(hiding)=[64,84,134,22,207,198,196,222,17,246,192,246,137,46,148,162,221,87,188,157,115,154,73,174,130,148]D QR (HIDING) = [64,84,134,22, 207 , 198, 196 , 222 , 17,246,192,246, 137 , 46,148, 162 , 221,88, 157,115,154,73, 174 , 130, 148 ] 148] 148, 148] 148, 148] 148, 148, 148, 148, 148, 148, 148] 148, 148, 148, 148, 148, 148, 148, 148, 148, 148 , 148, 148, 148, 148, 148].

其中[4,6,7,12,15,18,23,25]块被改变,改变部分在DQR(hiding)中使用下划线标出,因为加入秘密信息后的QR码数据块经过计算掩膜后,掩膜类型为5,所以隐藏后的QR码与图(a)和图(c)相比变化较大。Among them, blocks [4, 6, 7, 12, 15, 18, 23, 25] have been changed, and the changed part is underlined in D QR (hiding). Because the QR code data block after adding secret information is calculated and masked, the mask type is 5, so the QR code after hiding changes greatly compared with Figure (a) and Figure (c).

在图5(e)中,隐藏的秘密信息为“key”,用户密钥为“google”In Figure 5(e), the hidden secret information is "key" and the user key is "google"

DQR(hiding)=[64,84,134,22,201,198,39,75,17,246,192,246,223,46,148,134,221,87,205,157,115,154,73,189,130,218] D QR ( hiding ) [ 64,84,134,22,201,198,39,75,17,246,192,246,223,46,148,134,221,87,205,157,115,154,73,189,130,218 ]

因为用户密钥与图(d)相同,所以LN相同,其中[4,6,7,12,15,18,23,25]块被改变,改变部分在DQR(hiding)中使用下划线标出,因为加入秘密信息后的QR码数据块经过计算掩膜后,掩膜类型为5,所以隐藏后的QR码与图5(a)和图5(c)相比变化较大,与图5(d)相比变化较小。Because the user key is the same as in Figure (d), L N is the same, where the [4,6,7,12,15,18,23,25] block is changed, and the changed part is underlined in D QR (hiding), because the QR code data block after adding secret information is calculated and the mask type is 5, so the hidden QR code has a large change compared with Figure 5(a) and Figure 5(c), and a small change compared with Figure 5(d).

以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modifications, equivalent replacements and improvements made within the spirit and principles of the present invention shall be included within the protection scope of the present invention.

Claims (2)

1.一种基于QR码用户秘密信息隐藏方法,其特征在于,所述基于QR码用户秘密信息隐藏方法的用户使用伪随机发生器生成由用户密钥控制的伪随机序列,对伪随机序列进行编码处理得到隐藏信息的位置序列;根据QR码的编码过程将秘密信息根据位置序列嵌入QR码中;秘密恢复过程则在QR码的解码过程中直接通过位置序列进行读取,得到隐藏信息;1. A user secret information hiding method based on a QR code, characterized in that, the user of the QR code user secret information hiding method uses a pseudo-random generator to generate a pseudo-random sequence controlled by a user key, and encodes the pseudo-random sequence to obtain a position sequence of hidden information; according to the encoding process of the QR code, the secret information is embedded in the QR code according to the position sequence; the secret recovery process is then directly read through the position sequence in the decoding process of the QR code to obtain the hidden information; 所述基于QR码用户秘密信息隐藏方法包括以下步骤:Described user's secret information hiding method based on QR code comprises the following steps: 第一步,生成位置序列,用户使用密钥和伪随机数发生器生成信息隐藏用的位置序列;The first step is to generate a position sequence, and the user uses a key and a pseudo-random number generator to generate a position sequence for information hiding; 第二步,用户将需要隐藏的秘密信息编码后使用位置序列将秘密信息隐藏到QR码的编码过程中;In the second step, the user encodes the secret information to be hidden and uses the position sequence to hide the secret information into the encoding process of the QR code; 第三步,用户使用密钥可以在隐藏后的QR码中将秘密信息恢复;In the third step, the user can use the key to recover the secret information in the hidden QR code; 所述第一步的伪随机数发生器及QR码的选取:用户应选取周期尽量大的伪随机数发生器来保证随机性;并根据需要隐藏的秘密信息长度来决定QR码的版本和纠错级别;The selection of the pseudo-random number generator and QR code of the first step: the user should select a pseudo-random number generator with a period as large as possible to ensure randomness; and determine the version and error correction level of the QR code according to the length of the secret information that needs to be hidden; 生成位置序列:用户通过密钥控制的伪随机数发生器产生一串长度8×c的序列,c为该QR码版本纠错级别最大纠错数;序列的结构为一串二维数组;Generate position sequence: the user generates a sequence of length 8×c through the pseudo-random number generator controlled by the key, and c is the maximum error correction number of the error correction level of the QR code version; the structure of the sequence is a string of two-dimensional arrays; 所述第二步的QR码封面信息编码:在对QR码封面信息进行编码应停止在QR码计算并添加掩膜步骤前,在隐藏信息后再计算掩膜类型;The QR code cover information encoding of the second step: before the QR code cover information is encoded, the QR code calculation and adding mask step should be stopped, and the mask type is calculated after hiding the information; 秘密信息编码:对用户需要隐藏的秘密信息进行编码,根据用户信息隐藏长度并在秘密信息序列最后两位设置长度位以方便解码;Secret information encoding: encode the secret information that the user needs to hide, and set the length bit in the last two digits of the secret information sequence according to the hidden length of the user information to facilitate decoding; 秘密信息隐藏:用户使用密钥生成的位置序列和编码后的秘密信息序列进行隐藏;继续封面QR码的编码过程得到隐藏后的QR码;Secret information hiding: the user uses the position sequence generated by the key and the encoded secret information sequence to hide; continue the encoding process of the cover QR code to get the hidden QR code; 所述第三步的隐藏信息恢复:用户使用密钥生成的位置序列和隐藏后的QR码进行秘密信息恢复;将隐藏QR码去掩膜,纠错;然后根据位置序列直接读取出编码后的秘密序列,再通过解码得到用户秘密信息。The hidden information recovery in the third step: the user uses the position sequence generated by the key and the hidden QR code to recover the secret information; removes the mask of the hidden QR code and corrects errors; then directly reads the encoded secret sequence according to the position sequence, and then obtains the user's secret information through decoding. 2.一种应用权利要求1所述基于QR码用户秘密信息隐藏方法的信息数据处理终端。2. An information data processing terminal applying claim 1 based on the QR code user secret information hiding method.
CN201910623205.8A 2019-07-11 2019-07-11 User secret information hiding method based on QR code Active CN110516775B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910623205.8A CN110516775B (en) 2019-07-11 2019-07-11 User secret information hiding method based on QR code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910623205.8A CN110516775B (en) 2019-07-11 2019-07-11 User secret information hiding method based on QR code

Publications (2)

Publication Number Publication Date
CN110516775A CN110516775A (en) 2019-11-29
CN110516775B true CN110516775B (en) 2023-07-25

Family

ID=68622595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910623205.8A Active CN110516775B (en) 2019-07-11 2019-07-11 User secret information hiding method based on QR code

Country Status (1)

Country Link
CN (1) CN110516775B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112926087B (en) * 2021-03-09 2023-05-05 南京信息工程大学 Secret sharing method with verification function and high embedding capacity based on two-dimensional code
CN113011543B (en) * 2021-03-10 2021-10-29 南京信息职业技术学院 Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system
CN116506232B (en) * 2023-06-28 2023-10-10 南京畅洋科技有限公司 High-capacity Internet of things hidden channel construction method based on channel coding

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1276936A (en) * 1997-08-18 2000-12-13 索拉纳技术开发公司 Post-compression hidden data transport for video
EP3319070A1 (en) * 2016-11-02 2018-05-09 Skeyecode Method for authenticating a user by means of a non-secure terminal
CN109120377A (en) * 2018-07-19 2019-01-01 华北水利水电大学 Information concealing method, storage medium in a kind of new data transmission
CN109190741A (en) * 2018-08-21 2019-01-11 福建工程学院 A kind of private information management method and terminal based on QR code

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2230071A1 (en) * 1996-06-20 1997-12-24 Masayuki Numao Data hiding and extraction methods
US7243193B2 (en) * 2004-05-27 2007-07-10 Silverbrook Research Pty Ltd Storage of program code in arbitrary locations in memory
US10152663B2 (en) * 2015-09-11 2018-12-11 Graphiclead LLC Method to store a secret QR code into a colored secure QR code
CN105847629B (en) * 2016-03-18 2018-09-07 大连大学 A kind of reversible information hidden method of encrypted image
CN109325367B (en) * 2018-08-24 2020-07-14 中国人民解放军国防科技大学 Information hiding method, device, equipment and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1276936A (en) * 1997-08-18 2000-12-13 索拉纳技术开发公司 Post-compression hidden data transport for video
EP3319070A1 (en) * 2016-11-02 2018-05-09 Skeyecode Method for authenticating a user by means of a non-secure terminal
CN109120377A (en) * 2018-07-19 2019-01-01 华北水利水电大学 Information concealing method, storage medium in a kind of new data transmission
CN109190741A (en) * 2018-08-21 2019-01-11 福建工程学院 A kind of private information management method and terminal based on QR code

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
:"一种基于 QR 条形码的数字水印新算法";贾志强;《中国优秀硕士学位论文全文数据库》;全文 *
CH Chung等."Image hidden technique using QR-barcode".《ieee》.2009,全文. *
Qinglan Zhao等."A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things".《Security and Communication》.2019,全文. *
YW Chow."Exploiting the error correction mechanism in QR codes for secret sharing".《Springer》.2016,全文. *

Also Published As

Publication number Publication date
CN110516775A (en) 2019-11-29

Similar Documents

Publication Publication Date Title
Tai et al. Image self-recovery with watermark self-embedding
CN103605950B (en) Method and system for hiding signature in credible two-dimensional code
Pal et al. Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image
CN106650869B (en) Information hiding method based on two-dimensional code
US8297510B1 (en) Mathematical method of 2D barcode authentication and protection for embedded processing
CN110516775B (en) User secret information hiding method based on QR code
Raj et al. A survey on fragile watermarking based image authentication schemes
Chang et al. A block-based watermarking scheme for image tamper detection and self-recovery
Chiang et al. Blind QR code steganographic approach based upon error correction capability
Liu et al. Rich QR codes with three-layer information using hamming code
Xiong et al. QR-3S: A high payload QR code secret sharing system for industrial Internet of Things in 6G networks
Huang et al. Efficient QR code authentication mechanism based on Sudoku
Pal et al. Robust watermarking scheme for tamper detection and authentication exploiting CA
Huang et al. Efficient scheme for secret hiding in QR code by improving exploiting modification direction
Lin et al. QR code steganography with secret payload enhancement
Yu et al. Reversible data hiding in encrypted images for coding channel based on adaptive steganography
Huang et al. Sudoku-based secret sharing approach with cheater prevention using QR code
Yu et al. A Novel Three‐Layer QR Code Based on Secret Sharing Scheme and Liner Code
Wu Quantization-based image authentication scheme using QR error correction
Zhong et al. A secure visual secret sharing scheme with authentication based on qr code
Cao et al. Using image sensor PUF as root of trust for birthmarking of perceptual image hash
CN104715442A (en) Hamming-code-based quantum image watermarking method
Bhoskar et al. A Survey on secrete communication through QR code steganography for military application
CN111737713A (en) Two-dimensional code secret sharing method based on visual password
Charoghchi et al. A secure secret image sharing with steganography and authentication by Hamming code (15, 11) for compressed images

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant