Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 342-343.

• Information Security • Previous Articles     Next Articles

Two-dimensional Code Encryption Algorithm Based on Singular Value Decomposition

GE Ya-jing, ZHAO Li-feng   

  1. School of Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: With the rapid development of mobile Internet and smart phone,the security of information transmission in network is more and more important.As a new technology of information storage,transmission and recognition,two-dimensional code has been widely applied in many fields.However,because the two-dimensional code coding algorithm is open and its information encryption is unimplemented,there are information danger in some areas.In this paper,a new algorithm based on singular value decomposition (SVD) was proposed to encrypt encoded data through the study of two-dimensional code coding rules and encryption algorithms.Usually the digital image files in our computer is stored in the form of matrix,and each element of the matrix is also expressed in the corresponding image coordinates of pixel va-lue.Therefore,through the computer digital image processing,there is actually a series of non negative matrix operations.Decryption is the inverse process of encryption,by obtaining the singular value decomposition and encryption of the picture matrix,and the encrypted solution of the plaintext information.The experiment shows that this method is efficient in encryption and decryption,and has good security.

Key words: Encryption, Singular value, Two-dimensional code

CLC Number: 

  • TP311.1
[1]FU M S,AU O C.Self-conjugate watermarking technique for halftone image[J].Electronics Letters,2003,39(4):356-358.
[2]郑东,李祥学,黄征.密码学:密码算法与协议[M].北京:电子工业出版社,2009.
[3]任勇金.基于Rijndeal和异或运算的QR二维码双重加密研究[J].华章,2012(29):338.
[4]刘彦伟,王根英,刘云.QR码信息加密的研究与实现[J].推广与应用,2012,21(11):37-41.
[5]李东.基于加密和解密的二维条形码的实现[J].科学传播,2010(7):114-115.
[6]FU M S,AU O C.Self-conjugate watermarking technique for halftoneimages[J].Electronics Letters,2003,39(4):356-358.
[7]杨康,袁海东,郭渊博.基于属性加密的二维码分级加密研究[J].计算机工程,2018,44(6):136-140.
[8]张新文,李华康,杨一涛,等.基于二维码技术的个人信息隐私保护物流系统[J].计算机应用研究,2016,33(11):3455-3459.
[9]龙强,刘小华.基于非对称密码体制的二维码加密算法[J].重庆师范大学学报(自然科学版),2017,34(3):91-95.
[10]肖本海,郑莹娜,龙建明,等.基于SHA512哈希函数和Rijndael加密算法QR二维码信息安全设计[J].计算机系统应用,2015,24(7):149-154.
[11]王尧哲.基于奇异值分解的水印算法与RSA公钥密码的结合应用[D].长沙:湖南师范大学,2008.
[1] LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325.
[2] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[3] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[4] LI Li, HE Xin, HAN Zhi-jie. Review of Privacy-preserving Mechanisms in Crowdsensing [J]. Computer Science, 2022, 49(5): 303-310.
[5] QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346.
[6] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[7] REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong. Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [J]. Computer Science, 2022, 49(3): 70-76.
[8] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[9] LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345.
[10] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[11] LIANG Jian, HE Jun-hui. H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information [J]. Computer Science, 2022, 49(1): 314-320.
[12] ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358.
[13] ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie. Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment [J]. Computer Science, 2021, 48(9): 324-329.
[14] TANG Fei, CHEN Yun-long, FENG Zhuo. Electronic Prescription Sharing Scheme Based on Blockchain and Proxy Re-encryption [J]. Computer Science, 2021, 48(6A): 498-503.
[15] QIAN Xin-yuan, WU Wen-yuan. Identity-based Encryption Scheme Based on R-SIS/R-LWE [J]. Computer Science, 2021, 48(6): 315-323.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!