Font Size: a A A

Studies On Book Anti-counterfeiting Technology Based On Two-dimensional Code

Posted on:2015-04-21Degree:MasterType:Thesis
Country:ChinaCandidate:C W LiFull Text:PDF
GTID:2298330467964538Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of market economy, book copyright piracy has become increasingly popular, a serious infringement to the legitimate interests of both producers and consumers. Currently book anti-counterfeiting technology in China mainly covers digital code anti-counterfeiting technology and laser holographic anti-counterfeiting technology. Although digital code anti-counterfeiting technology is typical of low cost, but users are required to pay additional fees for their query. Partial statistics shows successful digital query rate is quite small (less than5%), which is a good opportunity for piracy of counterfeiters. However, the identification of laser holographic anti-counterfeiting technology is difficult for consumers. What’s more, laser coding machine features high costs, difficult to be popularizes among small enterprises. Once this technology becomes available to counterfeiters, the anti-counterfeiting function will become invalid immediately.As an automatic identification technology, two-dimensional code technology is based on one-dimensional code. With the increasing popularization of smartphones, two-dimensional code technology has been widely used throughout the world. Compared with one-dimensional code, two-dimensional code technology is characterized in large storage capacity, diversified coding, outstanding fault tolerance ability, high coding reliability, and convenience in encryption. Because of these kinds of features, two-dimensional code technology has been widely used in various anti-counterfeiting fields. In this paper, the application of two-dimensional code technology to book anti-counterfeiting is explored.Considering the existing weakness in anti-counterfeiting technology, this study uses QR two-dimensional code as carrier for information storage, and in combination of RSA public key encryption technology, this study has explored and realized a anti-counterfeiting system with book anti-counterfeiting used as examples. It has realized the module functions like QR two-dimensional code generation, recognition and information encryption. The anti-counterfeiting procedure works like this:enter relevant information of each book, use RSA public key to encrypt the sole number and code and generate image, label the two-dimensional code image at appropriate place of the book, and then consumers will get the encrypted information by scanning the two-dimensional code image and decide on the book authenticity by decoding the encrypted information via the system’s private key.
Keywords/Search Tags:two-dimensional code, RSA public key encryption technology, book anti-counterfeiting
PDF Full Text Request
Related items