期刊文献+

混沌数码防伪技术研究与应用 被引量:3

Research and Application of Chaotic Digital Anti-counterfeiting Technology
在线阅读 下载PDF
导出
摘要 基于混沌密码技术,提出并完善了一种混沌密码数码防伪技术,以解决数码防伪技术长期面临的技术难题.研究一种混沌加密算法以生成商品防伪码和验证码,并提出一种支持多种查询方式多次查询验证的"双向验证"算法,形成并优化了"双标双码、双向验证"防伪工作机制;同时构建了一套既可现场识别又可通过电话、短信、网络(Internet、WAP)查询验证的全方位数码防伪系统,实现了防伪查询智能鉴别,以此证明所提数码防伪技术的有效性和可靠性. A novel chaotic digital anti-counterfeiting technology is proposed and improved based on chaotic cryptography, ordering to resolve the long-term technical problems. A new chaotic encryption algorithm is studied to generate commodity security codes and verification codes, and a new type of checking algorithm of "two-way authentication" is proposed which can provide many ways to search and multiple query verification, so as to form and optimize an anti-counterfeiting mechanism of "two codes, two-way authentication". Then a comprehensive digital anti-counterfeiting system is constructed to realize intelligent identification, which provides not only site identification but also checking by phone, short message and network (Internet or WAP). It is proved that the proposed technology is effective and reliable.
作者 盛苏英 陈轶
出处 《微电子学与计算机》 CSCD 北大核心 2012年第8期169-174,共6页 Microelectronics & Computer
基金 国家自然科学基金项目(61004027 61174065) 江苏省自然科学基金项目(BK2010275) 南通市应用研究计划项目(K2010017) 江苏省高校自然科学研究项目(10KJB120002) 江苏省高等学校大学生实践创新训练计划项目
关键词 混沌密码 数码防伪 双标双码 双向验证 防伪码 验证码 查询验证 chaotic cryptography digital anti-counterfeiting double-label with double-code two-wayauthentication security codes verification codes query validation
  • 相关文献

参考文献11

二级参考文献28

共引文献26

同被引文献39

  • 1钟云飞,胡垚坚,刘春燕.基于莫尔纹的印刷防伪技术研究[J].中国印刷与包装研究,2010,2(S1):166-166. 被引量:4
  • 2钟云飞.数字水印技术在包装防伪上的应用研究[J].包装工程,2005,26(2):60-62. 被引量:6
  • 3钟云飞,游诗英.数字印前包装防伪技术[J].包装工程,2006,27(3):82-84. 被引量:6
  • 4姚建松,杨胜利.三级关联数码组合防伪方案在香烟防伪中的应用[J].包装工程,2007,28(8):85-86. 被引量:3
  • 5沈阳立方资讯有限公司.防伪短信信息技术方法[P].中国专利:101437210,2009-05-20.
  • 6Wang Y.Design of an Anti-counterfeiting system based on SMS[C].IEEE International Conference on Granular Computing(GRC’09),2009:572-575.
  • 7Zheng Y F,Chen G R,Zhu C Y.A system inversion approach to chaos_based secure speech communication[J].International Journal of Bifurcation and Chaos(Int.JBC),2005,15(8):2569-2566.
  • 8Liu Y,Mao Y,Tang W K,et al.Cryptanalysis of chaotic communication schemes by dynamical minimization algorithm[J].International Journal of Bifurcation and Chaos(Int.JBC),2009,19(7):2429-2437.
  • 9Kanso A.Cipher Syetem Based on Controlled Exact Chaotic Maps[J].International Journal of Bifurcation and Chaos(Int.JBC),2010,20(12):4039-4053.
  • 10Akhshani A,Akhavan A,Mobaraki A.Pseudo Random Number Generator Based on Quantum Chaotic Map[J].Communications in Nonlinear Science and Numerical Simulation,2014,19(1):101-111.

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部