{"title":"一种基于数字水印的二维码安全认证方法","authors":"Yang Yuwei, Yu Su","doi":"10.1145/3411016.3411164","DOIUrl":null,"url":null,"abstract":"A security authentication method of QR code based on digital watermarking is proposed to improve the security of two-dimensional code. This method can be applied to verify the authenticity of QR code. Firstly, the host image is partitioned into blocks and then the Two-dimensional Discrete Cosine Transform(2D-DCT) is applied for each block. Secondly, a smaller block is selected from each block in the process above, and then the Singular Value Decomposition (SVD) is applied for the smaller block. At last, the 2D-DCT and SVD transforms are applied for the image of watermark, after that the watermark is embedded by modifying the characteristic value of the SVD. The process of extracting watermark image is opposite to the process of embedding watermark. Computer simulation and experimental results prove this method has the characteristics of strong robustness, invisibility, high security and low computational cost.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"169 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A two-dimensional code security authentication method based on digital watermarking\",\"authors\":\"Yang Yuwei, Yu Su\",\"doi\":\"10.1145/3411016.3411164\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A security authentication method of QR code based on digital watermarking is proposed to improve the security of two-dimensional code. This method can be applied to verify the authenticity of QR code. Firstly, the host image is partitioned into blocks and then the Two-dimensional Discrete Cosine Transform(2D-DCT) is applied for each block. Secondly, a smaller block is selected from each block in the process above, and then the Singular Value Decomposition (SVD) is applied for the smaller block. At last, the 2D-DCT and SVD transforms are applied for the image of watermark, after that the watermark is embedded by modifying the characteristic value of the SVD. The process of extracting watermark image is opposite to the process of embedding watermark. Computer simulation and experimental results prove this method has the characteristics of strong robustness, invisibility, high security and low computational cost.\",\"PeriodicalId\":251897,\"journal\":{\"name\":\"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research\",\"volume\":\"169 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3411016.3411164\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3411016.3411164","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A two-dimensional code security authentication method based on digital watermarking
A security authentication method of QR code based on digital watermarking is proposed to improve the security of two-dimensional code. This method can be applied to verify the authenticity of QR code. Firstly, the host image is partitioned into blocks and then the Two-dimensional Discrete Cosine Transform(2D-DCT) is applied for each block. Secondly, a smaller block is selected from each block in the process above, and then the Singular Value Decomposition (SVD) is applied for the smaller block. At last, the 2D-DCT and SVD transforms are applied for the image of watermark, after that the watermark is embedded by modifying the characteristic value of the SVD. The process of extracting watermark image is opposite to the process of embedding watermark. Computer simulation and experimental results prove this method has the characteristics of strong robustness, invisibility, high security and low computational cost.