Font Size: a A A

The Research And Realize Of Two-dimensional Code Label's Authentication Based On Digital Signature

Posted on:2018-03-24Degree:MasterType:Thesis
Country:ChinaCandidate:T YanFull Text:PDF
GTID:2348330512953957Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
As the most widely used electronic label, how to verify the source of the message and how to judge the integrity of the content is the hot point of today's research. In this paper, digital signature technology and digital watermarking technology are discussed, and then two-dimensional code is considered as image Information, combined with these two techniques, we realized the authenticity of two-dimensional code, which can verify the source of the message and image source and judge the integrity of the content. Meanwhile, we can ensure the sender who make the two-dimensional code label can not deny his responsible.This paper introduces the significance of the two-dimensional code label's authentication, and analyzes the advantages of combining the digital signature technology and the digital watermarking technology to authenticate the two-dimensional code label. It also introduces the digital signature technology and digital watermarking technology's current research status from domestic and abroad. And then digital watermarking algorithm and digital signature algorithm's basic theory are described, after that we realize and improve the concrete algorithm.The digital signature algorithm is studied. Firstly, the classic RSA digital signature algorithm is studied, used the mathematical problem which relay on a prime number's factorization. Secondly, through study of the SM2 standard which designed by our country, improves the SM2 digital signature algorithm and explains its' implementation principle, then analyzes its security and computing speed. It also analyzes the possibility of applying the digital signature algorithm combining with SM3 function to authenticate image. Lastly, A new method based on lattice theory of NTRU(Number Theory Research(SVP) is studied and improved, This paper illustrates the principle and validity of the algorithm, and then analyzes and explains the security and computation speed of the algorithm.The digital watermarking algorithm is studied. Firstly, a watermarking algorithm based on LSB is studied, and the principle of the algorithm is analyzed. Secondly, the digital watermarking algorithm based on DCT transform is studied. The principle of the algorithm is introduced, then illustrate the watermark embedding and the extraction process, meanwhile, we analyze the results of the experiment.Two schemes used for the two-dimensional code label's authentication which combining digital signature and digital watermarking are designed. Combined with SM2 digital signature algorithm and digital watermarking algorithm based on LSB, a scheme used for the two-dimensional code label's authentication which embedding its own two-dimensional code information and digital signature information is designed, at the same time, this scheme has the property which can avoid trade disavowing. Combined with the digital signature algorithm based on NTRU and digital watermarking algorithm based on DCT, a scheme used for the two-dimensional code label's authentication which embedding its own two-dimensional code information and digital signature information is designed, which realizes the authentication of two-dimensional code image and enhances the robustness in the first scheme.
Keywords/Search Tags:Two-dimensional code, Image authentication, Digital signature, Digital watermarking, Robustness
PDF Full Text Request
Related items