Volume 48 Issue 5
May  2019
Turn off MathJax
Article Contents

Liu Yiqun, Wei Yuechuan, Zhang Minqing, Zhou Tanping, Yang Xiaoyuan. Secure quick response code based on the technology of three-dimensional imaging[J]. Infrared and Laser Engineering, 2019, 48(5): 503003-0503003(7). doi: 10.3788/IRLA201948.0503003
Citation: Liu Yiqun, Wei Yuechuan, Zhang Minqing, Zhou Tanping, Yang Xiaoyuan. Secure quick response code based on the technology of three-dimensional imaging[J]. Infrared and Laser Engineering, 2019, 48(5): 503003-0503003(7). doi: 10.3788/IRLA201948.0503003

Secure quick response code based on the technology of three-dimensional imaging

doi: 10.3788/IRLA201948.0503003
  • Received Date: 2018-12-12
  • Rev Recd Date: 2019-01-16
  • Publish Date: 2019-05-25
  • The security of electronic payment has become an urgent problem. A secure Quick Response(QR) code system was proposed based on the technology of three-dimensional(3D) imaging and 3D authentication information. Firstly, the integral imaging technology was used to generate 3D digital watermark as the logo of the merchant. Secondly, identity based digital signature was carried out. Then, in the Fresnel domain, the 3D digital watermark with signature information was carried by using a secure QR code system, which was then compressed and hidden in the QR code. Finally, the users scan QR code to identify and extract the hidden data. If the signature information of verification was confirmed by users, the algorithm of reconstruction was executed, and the 3D digital watermark images were displayed. The payments were confirmed after the users were authenticated. The process of interactive authentication was completed. According to the results of experiments, the schemes can effectively prevent the 3D digital watermark from being tamper-bent, falsified, and unjustified. The proposed method not only enhances the security of scanning mobile payment, but also improves the real-time and convenience of the system. When multiple parameters of the proposed system are combined as keys, the dimensions of keys are effectively increased. The key space is broadened. The difficulty of illegal attack is enhanced, and the safety and stability of the system are improved too. It can protect the security of personal fund, and also maintain the reputation and property security of enterprises.
  • [1] 沈昌祥, 张焕国, 冯登国, 等. 信息安全综述[J]. 中国科学E辑:信息科学, 2007, 37(2):129-150.
    [2] Langelaar G, Setyawan I, Lagendijk R. Watermarking digital image and video data[J]. IEEE Signal Processing Magazine, 2000, 17(5):20-46.
    [3] Song Chunlin, Sudirman Sud, Merabti Madjid. A robust region-adaptive dual image watermarking technique[J]. Journal of Visual Communication and Image Representation, 2012, 23(3):549-568.
    [4] Nezhadarya Ehsan, Ward Rabab K. Multiscale derivative transform and its application to image watermarking[J]. Digital Signal Processing, 2014, 33(6):148-155.
    [5] Huang Hsiangcheh, Chang Fengcheng, Fang Waichi. Reversible data hiding with histogram-based difference expansion for QR code applications[J]. IEEE Transactions on Consumer Electronics, 2011, 57(2):779-787.
    [6] Wang Hongjuan, Wang Zhipeng, Zhang Yingying, et al. Using QR codes in multi-image optical interference encryption system to reconstruct high quality original information[J]. Acta Optica Sinica, 2014, 34(9):0907001. (in Chinese)王红娟, 王志鹏, 张颖颖, 等. 利用QR码在光学干涉多图像加密系统中实现信息高质量恢复[J]. 光学学报, 2014, 34(9):0907001.
    [7] Kim Soogil. Analysis of effect of phase error sources of polarization components in incoherent triangular holography[J]. Journal of the Optical Society of Korea, 2012, 16(3):256-262.
    [8] Muniraj Inbarasan, Kim Byoungho, Lee Byung-Guen. Encryption and volumetric 3D object reconstruction using multispectral computational integral imaging[J]. Applied Optics, 2014, 53(27):25-32.
    [9] Piao Yongri, Shin Donghak, Kim Eunsoo. Robust image encryption by combined use of integral imaging and pixel scrambling techniques[J]. Optics and Lasers in Engineering, 2009, 47(11):1273-1281.
    [10] Kishk S, Javidi B. Watermarking of three-dimensional objects by digital holography[J]. Optics Letters, 2003, 28(3):167-169.
    [11] Peng X, Cui Z, Tan T. Information encryption with virtual-optics imaging system[J]. Optics Communications, 2002, 212(4-6):235-245.
    [12] Kim K T, Kim J J, Kim E S. Information hiding technique using optical correlators[C]//SPIE. 2001:565-574.
    [13] Zhang Jianlei, Wang Xiaorui, Liu Yiqun, et al. Wide-viewing integral imaging display with programmable directional backlight[J]. Optik-International Journal for Light and Electron Optics, 2016, 127(20):9244-9249.
    [14] Liu Yiqun, Zhang Jianqi, Yang Xiaoyuan, et al. An encryption method of the three-dimensional optical image[J]. Journal of Sichun University(Engineering Science Edition), 2016, 48(1):126-131. (in Chinese)刘轶群, 张建奇, 杨晓元, 等. 一种3维光学图像加密方法[J]. 四川大学学报(工程科学版), 2016, 48(1):126-131.
    [15] Liu Yiqun, Wang Xiaorui, Zhang Jianqi, et al. An improved security 3D watermarking method using computational integral imaging cryptosystem[J]. International Journal of Technology and Human Interaction, 2016, 12(2):1-21.
    [16] Wang Xiaorui, Guo Qiang. Enhancing computational integral imaging performance using an interpolation method based on non-zero-pixel derivation[J]. Appl Opt, 2010, 49(20):3997-4003.
    [17] Wang Xiaorui, Bu Qingfeng, Zhang Dongyang. Method for quantifying the effects of aliasing on the viewing resolution of integral images[J]. Opt Lett, 2009, 34(21):3382-3384.
    [18] Hwang Dongchoon, Shin Donghak, Kim Eunsoo. A novel three-dimensional digital watermarking scheme basing on integral imaging[J]. Optics Communications, 2007, 277(1):40-49.
    [19] Li Xiaowei, Wang Qionghua, Kim Seoktae, et al. Encrypting 2D/3D image using improved lensless integral imaging in Fresnel domain[J]. Optics Communications, 2016, 381:260-270.
    [20] Zhao Min, Xiong Zhaolong, Xing Yan, et al. Real-time integral imaging pickup system based on binocular stereo camera[J]. Infrared and Laser Engineering, 2017, 46(11):1103007. (in Chinese)赵敏, 熊召龙, 邢妍, 等. 采用双目立体相机的实时集成成像拍摄系统[J]. 红外与激光工程, 2017, 46(11):1103007.
  • 加载中
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Article Metrics

Article views(674) PDF downloads(93) Cited by()

Related
Proportional views

Secure quick response code based on the technology of three-dimensional imaging

doi: 10.3788/IRLA201948.0503003
  • 1. Key Laboratory of CAPF Network & Information Security,Cryptology Engineering College,Engineering University of the Armed Police Force,Xi'an 710086,China

Abstract: The security of electronic payment has become an urgent problem. A secure Quick Response(QR) code system was proposed based on the technology of three-dimensional(3D) imaging and 3D authentication information. Firstly, the integral imaging technology was used to generate 3D digital watermark as the logo of the merchant. Secondly, identity based digital signature was carried out. Then, in the Fresnel domain, the 3D digital watermark with signature information was carried by using a secure QR code system, which was then compressed and hidden in the QR code. Finally, the users scan QR code to identify and extract the hidden data. If the signature information of verification was confirmed by users, the algorithm of reconstruction was executed, and the 3D digital watermark images were displayed. The payments were confirmed after the users were authenticated. The process of interactive authentication was completed. According to the results of experiments, the schemes can effectively prevent the 3D digital watermark from being tamper-bent, falsified, and unjustified. The proposed method not only enhances the security of scanning mobile payment, but also improves the real-time and convenience of the system. When multiple parameters of the proposed system are combined as keys, the dimensions of keys are effectively increased. The key space is broadened. The difficulty of illegal attack is enhanced, and the safety and stability of the system are improved too. It can protect the security of personal fund, and also maintain the reputation and property security of enterprises.

Reference (20)

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return