期刊文献+
共找到41篇文章
< 1 2 3 >
每页显示 20 50 100
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
1
作者 Saranya Vaithilingam Santhosh Aradhya Mohan Shankar 《International Journal of Intelligence Science》 2024年第2期49-57,共9页
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia... The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication. 展开更多
关键词 Artificial Intelligence Cyber Security qr codes Quishing AI Framework Machine Learning AI-Enhanced Security
在线阅读 下载PDF
Application of RS Codes in Decoding QR Code
2
作者 朱素霞 Ji +2 位作者 Zhenzhou Cao Zhiyan 《High Technology Letters》 EI CAS 2003年第4期67-69,共3页
The QR Code is a 2 dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents ... The QR Code is a 2 dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code’s virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm. 展开更多
关键词 qr Code RS codes DECODING flow chart
在线阅读 下载PDF
二维条码QR Code编码原理及实现 被引量:20
3
作者 黄吉兰 《电脑知识与技术》 2013年第4X期2904-2908,共5页
在二维码编码的实现过程中,分析了QR Code二维条码的结构、编码步骤、编码原理和Reed-Solomon算法,并以数字模式为实例按照QR Code编码原理直观的描述了实现二维码QR Code的编码、纠错等功能。采用VC++的编程环境,通过对二维码编码程序... 在二维码编码的实现过程中,分析了QR Code二维条码的结构、编码步骤、编码原理和Reed-Solomon算法,并以数字模式为实例按照QR Code编码原理直观的描述了实现二维码QR Code的编码、纠错等功能。采用VC++的编程环境,通过对二维码编码程序反复测试,实现了二维码QR Code的编码程序设计。 展开更多
关键词 qr Code 二维码 编码 VC++ 纠错
在线阅读 下载PDF
Lushang Group’s“One Inventory”Strategy
4
作者 Zhang Weilun 《China's Foreign Trade》 2025年第3期60-65,共6页
In the self-built fruit and vegetable sorting warehouse of Lushang Group,the system is automatically scanning the QR code for agricultural product and conducts pesticide residue testing on fruits and vegetables;new pr... In the self-built fruit and vegetable sorting warehouse of Lushang Group,the system is automatically scanning the QR code for agricultural product and conducts pesticide residue testing on fruits and vegetables;new products from foreign trade factories will be directly transported to Ginza Supermarket through the“Direct Express for Domestic Product”channel,and will be shelved on the“Lushang Life”service platform within 48 hours;in front of the campus intelligent milk cabinet independently launched by Lushang Technology,students receive pasteurized milk by brushing their faces,and the data about milk source farms and sterilization parameters are sent to the parents simultaneously.This is the daily scenario of digital applications by Lushang Group’s full supply chain management. 展开更多
关键词 smart milk cabinet direct express channel pesticide residue testing scanning qr code qr code scanning intelligent milk cabinet inventory management agricultural product
在线阅读 下载PDF
基于LabVIEW+FPGA的机器视觉检测系统设计
5
作者 刘继祥 陈光威 《工业控制计算机》 2025年第5期49-50,53,共3页
为了对重要产品相关参数信息加密,又要方便用户查阅该产品参数信息,以LabVIEW+FPGA为基础,提出了一种机器视觉检测系统的设计方法。该系统上位机采用机器视觉软件LabVIEW或微信小程序,其中LabVIEW除了完成产品信息AES加密并生成二维码外... 为了对重要产品相关参数信息加密,又要方便用户查阅该产品参数信息,以LabVIEW+FPGA为基础,提出了一种机器视觉检测系统的设计方法。该系统上位机采用机器视觉软件LabVIEW或微信小程序,其中LabVIEW除了完成产品信息AES加密并生成二维码外,还具有识别二维码图像并解密后显示的功能,微信小程序通过调用wx.scanCode函数获取手机相机中的图像信息、解密后显示二维码内容;下位机以KINTEX-7芯片XC7K325为核心,上位机调用Vision Development模块,接收视频信息,识别解密后显示。系统通过对产品信息进行AES加解密,实现产品信息加密要求;微信小程序既实现客户快速、高效获取产品信息需求,又兼具信息加密特性。 展开更多
关键词 LabVIEW+FPGA AES加密 qr code 微信小程序 机器视觉 UVC协议
在线阅读 下载PDF
一种基于QR码混沌图像加密算法研究
6
作者 吴源源 张亚军 +1 位作者 康凌 蔡江云 《中国新技术新产品》 2023年第3期29-32,共4页
随着资讯传播互联网化的程度越来越深,线上图像资源的版权保护受到越来越多的重视。该文提出了一种基于QR码(Quick response code)的利用Shearlet变换和线性螺旋变换的混沌图像数字水印算法。首先,对预加密图像资源生成版权QR码。其次,... 随着资讯传播互联网化的程度越来越深,线上图像资源的版权保护受到越来越多的重视。该文提出了一种基于QR码(Quick response code)的利用Shearlet变换和线性螺旋变换的混沌图像数字水印算法。首先,对预加密图像资源生成版权QR码。其次,用Arnold变换对QR码进行加扰。最后,用Shearlet变换、线性螺旋变换和离散余弦变换将版权水印信息嵌入图像的中频部分,以嵌入水印。提取则是嵌入过程的逆过程。经试验证明,该文提出的方法不仅具有较好的版权信息隐蔽性,而且还有较强的鲁棒性。嵌入的QR码对一定比例的图像遮挡和噪声具有抗攻击能力。 展开更多
关键词 qr码(Quick response code) ARNOLD变换 SHEARLET变换 线性螺旋变换 离散余弦变换 图像加密
在线阅读 下载PDF
On the Computing of the Minimum Distance of Linear Block Codes by Heuristic Methods
7
作者 Mohamed Askali Ahmed Azouaoui +1 位作者 Said Nouh Mostafa Belkasmi 《International Journal of Communications, Network and System Sciences》 2012年第11期774-784,共11页
The evaluation of the minimum distance of linear block codes remains an open problem in coding theory, and it is not easy to determine its true value by classical methods, for this reason the problem has been solved i... The evaluation of the minimum distance of linear block codes remains an open problem in coding theory, and it is not easy to determine its true value by classical methods, for this reason the problem has been solved in the literature with heuristic techniques such as genetic algorithms and local search algorithms. In this paper we propose two approaches to attack the hardness of this problem. The first approach is based on genetic algorithms and it yield to good results comparing to another work based also on genetic algorithms. The second approach is based on a new randomized algorithm which we call 'Multiple Impulse Method (MIM)', where the principle is to search codewords locally around the all-zero codeword perturbed by a minimum level of noise, anticipating that the resultant nearest nonzero codewords will most likely contain the minimum Hamming-weight codeword whose Hamming weight is equal to the minimum distance of the linear code. 展开更多
关键词 Minimum Distance Error Impulse Method Heuristic Methods Genetic Algorithms NP-HARDNESS Linear Error Correcting codes BCH codes qr codes Double Circulant codes
在线阅读 下载PDF
QR二维条形码攻击事件分析
8
作者 邢晓鹏 《价值工程》 2012年第27期210-211,共2页
对QR code attack安全事件分析。
关键词 qr—code CVE-2010-1807 The Jester
在线阅读 下载PDF
基于QR Code的校园ID身份生成识别系统的设计 被引量:1
9
作者 柴世杰 马佳琳 《电子技术与软件工程》 2021年第5期52-53,共2页
本文以“沈阳师范大学”为基础设计并开发了一款基于QR Code的校园ID身份生成识别系统。系统采用Visual Studio进行开发,借用jquery-qrcode开源第三方库,实现校园师生人员的相关信息录入编码纠错、生成载入解码显示QR-Code图形功能。防... 本文以“沈阳师范大学”为基础设计并开发了一款基于QR Code的校园ID身份生成识别系统。系统采用Visual Studio进行开发,借用jquery-qrcode开源第三方库,实现校园师生人员的相关信息录入编码纠错、生成载入解码显示QR-Code图形功能。防止个人信息的泄露,避免以往校园卡丢失的情况,做到信息资源整合,还可以便于应急防疫措施的展开,方便师生的使用。 展开更多
关键词 qr Code C# 数字校园ID
在线阅读 下载PDF
Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem 被引量:1
10
作者 Ramadhan J.Mstafa 《Computers, Materials & Continua》 SCIE EI 2022年第8期3349-3368,共20页
The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breache... The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breaches of privacy and data security.When it comes to protecting private information in today’s Internet era,digital steganography is vital.Many academics are interested in digital video because it has a great capability for concealing important data.There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data.The visual imperceptibility,robustness,and embedding capacity of these approaches are all challenges that must be addressed.In this paper,a novel solution to reversible video steganography based on Discrete Wavelet Transform(DWT)and Quick Response(QR)codes is proposed to address these concerns.In order to increase the security level of the suggested method,an enhanced ElGamal cryptosystem has also been proposed.Prior to the embedding stage,the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes.Concurrently,it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation(LL),Horizontal(LH),Vertical(HL),and Diagonal(HH)sub-bands.Then,the encrypted Low(L),Medium(M),Quantile(Q),and High(H)QR codes are embedded into the HL sub-band,HHsub-band,U-component,and V-component of video frames,respectively,using the Least Significant Bit(LSB)technique.As a consequence of extensive testing of the approach,it was shown to be very secure and highly invisible,as well as highly resistant to attacks from Salt&Pepper,Gaussian,Poisson,and Speckle noises,which has an average Structural Similarity Index(SSIM)of more than 0.91.Aside from visual imperceptibility,the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio(PSNR)average of 52.143 dB,and embedding capacity 1 bpp. 展开更多
关键词 Reversible video steganography qr code SECURITY ElGamal cryptosystem DWT
在线阅读 下载PDF
基于QR Code二维码的食品溯源系统的开发与设计 被引量:7
11
作者 刘韬 都洪韬 +4 位作者 丁润东 吴芮豪 许鑫 崔煦晨 王亚 《阜阳师范大学学报(自然科学版)》 2021年第4期89-94,共6页
食品安全问题与人们的生活密切关联,为了消费者放心选择食品、企业经营者有效监管食品,构建食品溯源系统尤为重要。在云平台环境下,基于二维码设计开发了一套食品溯源系统,该系统主要由三个部分组成。首先,采用QR(Quick Response)Code... 食品安全问题与人们的生活密切关联,为了消费者放心选择食品、企业经营者有效监管食品,构建食品溯源系统尤为重要。在云平台环境下,基于二维码设计开发了一套食品溯源系统,该系统主要由三个部分组成。首先,采用QR(Quick Response)Code技术设计食品二维码标签,记录食品的生产、运输、销售等信息。其次,在搭载Ubuntu系统的服务器上,结合MySQL数据库和高性能的Nginx服务器,搭建了后端云平台。采用Python+Flask框架构建后端系统,并部署在云平台上。最后,开发设计了前端微信小程序,及时方便地获取二维码中存储的食品信息。该系统利用"互联网+食品"模式为食品溯源提供了一种新途径。 展开更多
关键词 食品溯源 云平台 qr Code 微信小程序
在线阅读 下载PDF
A Secure Visual Secret Sharing Scheme with Authentication Based on QR Code 被引量:1
12
作者 Xinwei Zhong Lizhi Xiong Zhihua Xia 《Journal on Big Data》 2021年第2期85-95,共11页
With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response... With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response(QR)code has been widely researched in IoT.However,the security of privacy data in IoT is also a very important issue.At the same time,because IoT is developing towards low-power devices in order to be applied to more fields,the technology protecting the security of private needs to have the characteristics of low computational complexity.Visual Secret Sharing(VSS),with its features of safety and low computational cost,can fully meet the requirements of communication security in IoT.Therefore,a VSS scheme with QR code(VSS-QR)was proposed and has been applied to some extent.In VSS-QR,the secret is shared into a series of shares.These shares are usually common QR codes,which cannot cause the attention of the attacker.However,if there is dishonesty among participants,the secret cannot be recovered,which will lead to VSS-QR cannot be widely used due to its inadequate security.In this paper,we propose a visual secret sharing scheme with authentication based on QR code(VSSA-QR).Both the reconstructed secret QR code and shares can be verified whether they are forged by attackers.The above-mentioned operations conveniently are performed on low-power QR scanning devices.Not only does the proposed scheme prevent some dishonest participants or attackers from cheating,but also prevent all participants from conspiring.In addition,the payload is the QR code itself,which is higher than other schemes.Theoretical analysis and experiments prove that the proposed scheme is effective. 展开更多
关键词 qr code visual secret sharing low computational complexity AUTHENTICATION
在线阅读 下载PDF
QR Code码在成品油水上供应业务中的应用
13
作者 张俊晓 《中国储运》 2007年第12期103-104,共2页
  1、问题的提出   随着中国成品油销售市场的逐步开放,成品油水上供应领域的竞争日益加剧.为了及时掌握市场、客户需求的变化情况,提高应变能力和市场占有率,降低经营风险,各个企业都相继建立起了各类管理信息系统.以国内船用油...   1、问题的提出   随着中国成品油销售市场的逐步开放,成品油水上供应领域的竞争日益加剧.为了及时掌握市场、客户需求的变化情况,提高应变能力和市场占有率,降低经营风险,各个企业都相继建立起了各类管理信息系统.以国内船用油供应行业中的A公司为例,该公司于2000年建立了基于B/S架构的业务管理系统,由分布于全国沿海沿江的各个供油网点负责及时录入供油凭证、发票及其他相关销售信息,系统自动生成一系列分析报表,指导该公司及时对区域价格、采购倾向、库存数量和库存结构等进行调整;同时,A公司为加强财务管理,亦建立了财务管理系统对发票进行专门的管理.由于在数据的保密性、准确率、录入接口以及入帐时间等方面存在不一致现象或具有不同要求,这两个管理信息系统一直无法实现数据的共享.…… 展开更多
关键词 成品油 qr Code 图像 财务管理系统 发票 石油产品 原始凭证 二维条形码 二维条码 供油船 船用油 油水
在线阅读 下载PDF
Book Retrieval Method Based on QR Code and CBIR Technology
14
作者 Qiuyan Wang Haibing Dong 《Journal on Artificial Intelligence》 2019年第2期101-110,共10页
It is the development trend of library information management,which applies the mature and cutting-edge information technology to library information retrieval.In order to realize the rapid retrieval of massive book i... It is the development trend of library information management,which applies the mature and cutting-edge information technology to library information retrieval.In order to realize the rapid retrieval of massive book information,this paper proposes a book retrieval method combining QR code with image retrieval technology.This method analyzes the visual features of book images,design a book image retrieval method based on boundary contour and regional pixel distribution features,and realizes the association retrieval of book information combined with the QR code,so as to improve the efficiency of book retrieval.The experimental results show that,the books can be retrieved effectively through the boundary contour and regional pixel distribution features,the book information can be displayed through QR code,readers can be provided with fast and intelligent massive book retrieval services. 展开更多
关键词 Book retrieval image retrieval qr code visual features.
在线阅读 下载PDF
A Distributed Secret Sharing Method with QR Code Based on Information Hiding
15
作者 Pengcheng Jiang Yu Xue 《Journal of Cyber Security》 2021年第4期217-225,共9页
QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not ... QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not have the ability of hiding information,which leads to everyone can get access to read the content in any QR code,including those hiding some secret content in the bytes of QR code.Therefore,in recent years,information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently,especially in the financial field and multi-party verification scenarios.QR codes are almost impossible to use in these scenarios.Therefore,this paper proposes a distributed information sharing method based on information hiding QR code.This method can make secret code in QR code safer and robust,and the secret shared between receivers can be used for decryption and attacking detection.Therefore,on the one hand,the information hiding method can maximize the capacity of embedded secret information,on the other hand,it can prevent attacks by disguised attackers and recover hidden secret information through reconstruction.This paper illustrates the feasibility of this scheme through the form of theoretical proof. 展开更多
关键词 qr code image encryption information hiding secret sharing
在线阅读 下载PDF
A QR Data Hiding Method Based on Redundant Region and BCH
16
作者 Ying Zhou Weiwei Luo 《Journal on Big Data》 2021年第3期127-133,共7页
In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code do... In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code does not have the ability of information hiding,any device can access the content in QR code.Thus,hiding the secret data in QR code becomes a hot topic.Previously,the information hiding methods based on QR code all use the way of information hiding based on image,mostly using digital watermarking technology,and not using the coding rules of QR code to hide information.Therefore,we propose a distributed information sharing method based on QR code information hiding.On the one hand,we can start from the coding rules of QR code and use the information hiding method to maximize the capacity of secret information embedded in QR code.On the other hand,the distributed information sharing method is used to decentralize.At the same time,experimental results and analysis show that the proposed scheme can prevent the attack of camouflage attacker,and finally recover hidden information by secret reconstruction. 展开更多
关键词 qr code image encryption information hiding secret sharing
在线阅读 下载PDF
Technical specifcations issued to regulate QR code payment
17
《China Standardization》 2018年第1期7-7,共1页
The People’s Bank of China(PBOC)recently issued the regulations on QR code payment service(Trial)and two other relevant technical specifications to regulate payments by scanning two-dimensional barcode,which are ... The People’s Bank of China(PBOC)recently issued the regulations on QR code payment service(Trial)and two other relevant technical specifications to regulate payments by scanning two-dimensional barcode,which are to take effect on April 1,2018.Payment institutions must obtain proper permits to offer barcode-based payment services by then.Payments with QR codes are increasingly common in China for purchases in large or small shops, 展开更多
关键词 qr Technical specifcations issued to regulate qr code payment
原文传递
Development of ISO TS on NFC or/and QR code seals of freight container
18
作者 Meng Shu Bao Qifan +2 位作者 Jiang Xia Peng Deyan Ren Guohua 《China Standardization》 2022年第S01期18-22,共5页
This paper briefly introduces the development process,technical content and focus of ISO/TS 7352,Freight Container-NFC or/and QR code seals,which is a project carried out by East China Normal University and submitted ... This paper briefly introduces the development process,technical content and focus of ISO/TS 7352,Freight Container-NFC or/and QR code seals,which is a project carried out by East China Normal University and submitted through Standardization Administration of China(SAC).The successful development of this technical specification will greatly enhance container identification and communication technology. 展开更多
关键词 new international standards container NFC/qr code seals
原文传递
Application of Narration in QR Code Image Design
19
作者 Kaixin Yao 《Journal of Contemporary Educational Research》 2022年第10期62-67,共6页
Narrative design was originated in the 20th century.As a kind of design thinking,it runs through various fields such as architecture,environment,and new media.The QR code design has gradually become a bridge for media... Narrative design was originated in the 20th century.As a kind of design thinking,it runs through various fields such as architecture,environment,and new media.The QR code design has gradually become a bridge for media integration design,and its importance is becoming increasingly obvious.An optimized QR code design may gradually replace the original LOGO of certain goods or brand.In this study,narration is embedded into the QR code design,and a new QR code design image is gradually constructed through three ways of planarization,spatialization,and narration. 展开更多
关键词 NARRATION qr code image Design optimization
在线阅读 下载PDF
Efficient Malicious QR Code Detection System Using an Advanced Deep Learning Approach
20
作者 Abdulaziz A.Alsulami Qasem Abu Al-Haija +4 位作者 Badraddin Alturki Ayman Yafoz Ali Alqahtani Raed Alsini Sami Saeed Binyamin 《Computer Modeling in Engineering & Sciences》 2025年第10期1117-1140,共24页
QR codes are widely used in applications such as information sharing,advertising,and digital payments.However,their growing adoption has made them attractive targets for malicious activities,including malware distribu... QR codes are widely used in applications such as information sharing,advertising,and digital payments.However,their growing adoption has made them attractive targets for malicious activities,including malware distribution and phishing attacks.Traditional detection approaches rely on URL analysis or image-based feature extraction,whichmay introduce significant computational overhead and limit real-time applicability,and their performance often depends on the quality of extracted features.Previous studies in malicious detection do not fully focus on QR code securitywhen combining convolutional neural networks(CNNs)with recurrent neural networks(RNNs).This research proposes a deep learning model that integrates AlexNet for feature extraction,principal component analysis(PCA)for dimensionality reduction,and RNNs to detect malicious activity in QR code images.The proposed model achieves both efficiency and accuracy by transforming image data into a compact one-dimensional sequence.Experimental results,including five-fold cross-validation,demonstrate that the model using gated recurrent units(GRU)achieved an accuracy of 99.81%on the first dataset and 99.59%in the second dataset with a computation time of only 7.433 ms per sample.A real-time prototype was also developed to demonstrate deployment feasibility.These results highlight the potential of the proposed approach for practical,real-time QR code threat detection. 展开更多
关键词 Cybersecurity quick response(qr)code deep learning recurrent neural network(RNN) gated recurrent unit(GRU) long short-term memory(LSTM)
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部