(3.238.173.209) 您好!臺灣時間:2021/05/09 17:10
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:翁仍方
研究生(外文):Jeng-fang Weng
論文名稱:行動條碼加密機制之研究
論文名稱(外文):The Study of RSA Algorithm on QR Code Design
指導教授:謝尚琳謝尚琳引用關係黃有評黃有評引用關係
指導教授(外文):Shang-lin HsiehYo-ping Huang
學位類別:碩士
校院名稱:大同大學
系所名稱:資訊工程學系(所)
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:英文
論文頁數:75
中文關鍵詞:RSA演算法二維條碼導覽系統公開鑰匙加密
外文關鍵詞:QR CodeGuide SystemPublic-Key CryptographyRSA Algorithm
相關次數:
  • 被引用被引用:6
  • 點閱點閱:1477
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:301
  • 收藏至我的研究室書目清單書目收藏:2
由於二維條碼具儲存量大、製作成本低廉、抗損壞能力強等特性,使得其極具有應用發展之潛力,舉凡物流管理、訊息交換、身份識別等皆能利用二維條碼完成。近年來,台灣政府也陸續推動二維條碼相關研究與發展,國內也有越來越多的廠商將二維條碼技術實際導入應用於企業或工廠的營運並且得到不錯的效果。
二維條碼本身已具有保密及不易偽造的特性,因為無法直接解析隱藏在二維條碼內的訊息,但對於熟悉二維條碼技術的人員無法真正的有效防範,故當二維條碼需要儲存較需要受到保密的訊息時,將訊息進行資訊隱藏的動作是不可或缺的。
本論文將密碼學方法導入二維條碼技術,利用QR Code結合公開鑰匙加密機制的RSA演算法來進一步產生RSA QR Code,運用此方法不僅能將儲存於QR Code內的訊息進行隱藏,提高安全性,亦可使QR Code提供服務更多元化。當二維條碼技術應用於展覽品的解說與導覽應用時,為了避免智慧財產權的侵犯或是非法的複製,通常需要使用者利用會場提供的硬體裝置進行解碼,但使用者容易因不熟悉設備或租借手續繁雜因而降低使用意願。有鑑於此,本論文亦將RSA QR Code導入導覽系統來進行應用上的實作,利用密碼學的加解密特性,將使得解碼的訊息有所差異,根據解碼訊息的差異可用來提供不同的導覽與解說服務。結合密碼學方法的二維條碼技術,不僅具備資訊隱藏的特性,同時還可以用於提供不同層級存取服務,相信這樣的機制可以使二維條碼應用層面更為廣泛。
With the features of large storage capacity, low cost and anti-damage, the 2D (Two-Dimensional) barcodes have potential for developing various applications. Utilizing 2D barcodes, many applications such as logistics management, information exchange and identification can be realized. Recently, Taiwan government and industry sectors are striving to promote 2D barcodes related research. Consequently, more and more manufacturers apply 2D barcode technology to the operation of business and factories and good remuneration has been returned.
The 2D barcode has the properties of security and not easy to forge itself because the embedded information cannot be decoded directly. Nevertheless, perfect security is not guaranteed to someone who is familiar with 2D barcode technologies. Information hideaway is indispensable in storing the message in 2D barcode.
In our research, the cryptology has been integrated with 2D barcode technology. RSA algorithm of public- key cryptology has been employed into RSA QR Code to fulfill a guide system. This method can not only enhance the security of the information but also provide diversified services. While 2D barcode technology has been applied in the exhibit exposition or illustration, the intellectual property rights or illegal copy problems can be avoided. Moreover, multiple level accesses to the information can be achieved. We believe such a mechanism can make 2D barcode application more widespread.
ACKNOWLEDGMENTS ii
ENGLISH ABSTRACT iii
CHINESE ABSTRACT iv
TABLE OF CONTENTS v
LIST OF FIGURES vii
LIST OF TABLES ix
CHAPTER 1 INTRODUCTION 1
1.1 Motivation 1
1.2 Objective 2
1.3 Method 3
1.4 Thesis Organization 4
CHAPTER 2 RELATED WORK 5
2.1 Evolution of Barcode 5
2.2 2D Barcode Overviews 7
2.3 QR Code Overviews 13
2.4 Principles of Public-Key Cryptographic System 19
2.5 RSA Algorithm 23
CHAPTER 3 SYSTEM IMPLEMENTATION 28
3.1 The Flowchart of RSA QR Code Architecture 28
3.2 Development Environment 34
3.3 Implementation 35
CHAPTER 4 EXPERIMENTAL RESULTS AND DISCUSSION 46
4.1 RSA Algorithm Testing 46
4.2 RSA QR Code Testing 48
4.3 Discussion of RSA QR Code Constraint 52
4.4 Superiority of RSA QR Code Applications 56
4.5 Discussion of RSA QR Code Security and Advance 57
CHAPTER 5 CONCLUSIONS AND FUTURE EORK 60
REFERENCES 62
[1] F. Bellotti, R. Berta and M. Margarone, “User testing a hypermedia tour guide,” IEEE Pervasive Computing, vol. 1, no. 2, pp.33-41, Jun 2002.
[2] H. Katoand and K.-T. Tan, “Pervasive 2D barcodes for camera phone applications,” IEEE Pervasive Computing, vol. 6, no. 4, pp.76-85, Dec. 2007.
[3] E. Toye, R. Sharp, A. Madhavapeddy, D. Scott, E. Upton and A. Blackwell, ”Interacting with mobile services: an evaluation of camera-phones,” Personal and Ubiquitous Computing, vol. 11, no. 2, pp.97-106, Jan. 2007.
[4] E. Ouaviani, A. Pavan, M. Bottazzi, E. Brunelli, F. Caselli and M. Guerrero, “A common image processing framework for 2D barcode reading,” Proc. of the 7th IEEE Int. Conf. on Image Processing and Its Applications, Manchester, Greater Manchester, United Kingdom, vol. 2, pp.652-655, Jul. 1999.
[5] J. Rekimoto and Y. Ayatsuka, “Cybercode: Designing augmented reality environments with visual tags,” Proc. of ACM Conf. on Designing Augmented Reality Environments, Elsinore, Denmark, pp.1-10, Apr. 2000.
[6] J.-S. Tan, “QR Code: the 2D code of 21st century and its applications,” Information Technology Standards Committee Synthesis Journal, pp.7-14, Oct. 2002.
[7] K. Seino, S. Kuwabara, S. Mikami, Y. Takahashi, M. Yoshikawa, H. Narumi, K. Koganezaki, T. Wakabayashi and A. Nagano, “Development of the traceability system which secures the safety of fishery products using the QR Code and a digital signature,” Proc. of MTS/IEEE TECHNO-OCEAN, Kobe, Japan, vol. 1, pp.476-481, Nov. 2004.
[8] R. Ballagas, M. Rohs and J. Sheridan, “Mobile phones as pointing devices,” Pervasive Workshop on Pervasive Mobile Interaction Devices, Munich, Germany, pp.27-30, May 2005.
[9] C.-H. Chu, D.-N. Yang and M.-S Chen, “Image stabilization for 2D barcode in handheld devices,” Proc. of the 15th ACM Int. Conf. on Multimedia, Augsburg, Germany, pp.697-706, Sep. 2007.
[10] Y. Liu and M. Liu, “Automatic recognition algorithm of Quick Response Code based on embedded system,” Proc. of the 6th IEEE Int. Conf. on Intelligent Systems Design and Applications, Jinan, China, vol. 2, pp.783-788, Oct. 2006.
[11] E. Ohbuchi, H. Hanaizumi and L.A. Hock, “Barcode readers using the camera device in mobile phones,” Proc. of IEEE Int. Conf. on CYBERWORLDS, Tokyo, Japan, pp.260-265, Nov. 2004.
[12] S. Siltanen and J. Hyvakka, “Implementing a natural user interface for camera phones using visual tags,” Proc. of the 7th ACM Int. Conf. on Australasian User Interface, Hobart, Australia, vol. 50, pp.113-116, Jan. 2006.
[13] W. Claycomb and D. Shin, “Using a two dimensional colorized barcode solution for authentication in pervasive computing,” Proc. of the ACS/IEEE Int. Conf. on Pervasive Services, Lyon, France, pp.173-180, Jun. 2006.
[14] T.-Y. Liu, T.-H. Tan and Y.-L. Chu, “2D barcode and augmented reality supported english learning system,” Proc. of the 6th IEEE/ACIS Int. Conf. on Computer and Information Science, Melbourne, Australia, pp.5-10, Jul. 2007.
[15] R.-J. Hwang, F.-F. Su, Y.-S. Yeh and C.-Y. Chen, “An efficient decryption method for RSA cryptosystem,” Proc. of the 19th AINA Int. Conf. on Advanced Information Networking and Applications, Taipei, Taiwan, vol. 1, pp.585-590, Mar. 2005.
[16] H. Ge, “An efficient key management scheme for pervasive computing,” Proc. of the 7th IEEE Int. Symposium on Multimedia, Irvine, California, USA, pp.5, Dec. 2005.
[17] S.J. Aboud1, M.A. AL-Fayoumi1, M. Al-Fayoumi and H.S. Jabbar, “An efficient RSA public key encryption scheme,” Proc. of the 5th IEEE Int. Conf. on Information Technology: New Generations, Las Vegas, Nevada, USA, pp.127-130, Apr. 2008.
[18] Q. Yang, X. Wu, R. Zhou and R. Lu, “An embedded RSA processor for encryption and decryption,” Proc. of the 4th IEEE Int. Conf. on ASIC, Shanghai, China, pp.356-359, Oct. 2001.
[19] H. Jiang and Z. Mao, “Design of an RSA module against power analysis attacks,” Proc. of the 5th IEEE Int. Conf. on ASIC, Beijing, China, vol. 2, pp.1308-1311, Oct. 2003.
[20] C.-H. Chu, D.-N. Yang and M.-S. Chen, “Extracting barcodes from a camera-shaken image on camera phones,” Proc. of the IEEE Int. Conf. on Multimedia and Expo, Beijing, China, pp.2062-2065, Jul. 2007.
[21] M. Shand and J. Vuillemin, “Fast implementations of RSA cryptography,” Proc. of the 11th IEEE Symposium on Computer Arithmetic, Windsor, Ontario, Canada, pp.252-259, Jun.-Jul. 1993.
[22] H. Kato and K.T. Tan, “First read rate analysis of 2D-barcodes for camera phone applications as a ubiquitous computing tool,” Proc. of the IEEE TENCON Int. Conf., Taipei, Taiwan, pp.1-4, Oct.-Nov. 2007.
[23] A. Chu and M. Sima, “Reconfigurable RSA cryptography for embedded devices,” Proc. of the IEEE Canadian Conf. on Electrical and Computer Engineering, Ottawa, Ontario, Canada, pp.1312-1315, May 2006.
[24] M.J.B Robshaw, “Security estimates for 512-bit RSA,” Proc. of the IEEE WESCON Conf., San Francisco, California, USA, pp.409-412, Nov. 1995.
[25] T. Krivoruchko, J. Diamond and J. Hooper, “Storing RSA private keys in your head,” Proc. of the 12th IEEE Pacific Rim Int. Symposium on Dependable Computing, Riverside, California, USA, pp.129-138, Dec 2006.
[26] A. Sun, Y. Sun and C. Liu, “The QR-code reorganization in illegible snapshots taken by mobile phones,” Proc. of the IEEE Int. Conf. on Computational Science and its Applications, Kuala Lumpur, Malaysia, pp.532-538, Aug. 2007.
[27] J. Z. Gao, L. Prakash and R. Jagatesan, “Understanding 2D-barcode technology and applications in M-commerce - design and implementation of a 2D barcode processing solution,” Proc. of the IEEE 31st Annual International Computer Software and Applications Conf., Beijing, China, vol. 2, pp.49-56, Jul. 2007.
[28] M. Wiener, “Cryptanalysis of short RSA secret exponents,” IEEE Transactions on Information Theory, vol. 36, no. 3, pp. 553-558, May 1990.
[29] The official website of QR Code, http://qrcode.com/
[30] The reference C# code for QR Code, http://twit88.com/home
[31] The structure of QR Code, http://www.swetake.com/qr/index-e.html
[32] The reference libraries of QR Code, http://sourceforge.jp/projects/qrcode/
[33] The open mobile internet alliance, OMIA, http://www.omia.org.tw/
[34] S. William, Cryptography and Network Security: Principles and Practice, Prentice Hall Publishing, Upper Saddle River, New Jersey, USA, 1999.
[35] Asymmetric Ciphers,
http:// en.wikibooks.org/wiki/Cryptography/Asymmetric_Ciphers
[36] Diffie-Hellman, http://en.wikibooks.org/wiki/Cryptography/Diffie-Hellman
[37] Public-key cryptography, http://en.wikipedia.org/wiki/Public-key_cryptography
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔