Font Size: a A A

Research And Implementation Of A Technology To Hide Sensitive Information Based On Two-Dimensional Bar Code

Posted on:2015-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:X CaoFull Text:PDF
GTID:2298330467463323Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The modern information age, information security has become increasingly critical attention. Information security has not only been used by professional areas of Internet, communications companies and various other units and departments, but penetrated into all aspects of banking, health care, transportation, office and so many other areas of social life. In order to ensure the security and privacy of information, information hiding technology had to be called a major research topic in the field of information security. At the same time, a variety of information hiding technology is gradually being studied and used, such as a wide variety of encryption technology, digital watermarking technology, hidden writing technology, hidden agreements and so on. With the rapid development of smart phones at the same time, smart watches, tablet computers and some other column with the advent of electronic terminal products, bar code applications have not only limited to the early years of the instruments, books and other merchandise categories of applications, but more and more been used in the mobile terminal, so user can read and cognition the information with it.This paper based on the existing technical means, while by hiding information technology and conform barcode technology development trend, mix the two-dimensional bar code technology, the classic DES encryption and image embedding technology together, the technical capabilities of each technology will be available expand and extend, through the formation of a three-layer encryption and confidentiality of information hiding system, enabling the protection of sensitive deep critical information. This paper studies the classical DES encryption algorithm, and as a basis to achieve the DES encryption algorithm based on encryption and decryption module; study a variety of two-dimensional bar code technologies, and select corrective PDF417two-dimensional coding to encode sensitive information and stored it; study the internal structure bmp bitmap image and the discrete cosine transform algorithm. Ultimately making to be hiding sensitive information via three encryption key is stored in a hidden bmp bitmap to achieve its purpose of strict confidentiality. This process also realize the complete decoding encrypted key information related functions, thus forming a complete set of encryption and decryption, encoding and decoding, hiding and extraction system.Finally, on the subject to design and implement a system for functional evaluation, test and analyze the aspects of two-dimensional bar code technology and the DCT transform combining on information hiding. Using a variety of attacks on the attack contained test of secret image, indicate the superiority of hiding method designed by the article and find out some disadvantages, analysis and study of which lack the depth to further improve with full preparations.
Keywords/Search Tags:information hiding, DES encryption algorithm, PDF417two-dim-ensional bar code, BMP bitmap, DCT discrete cosine transform
PDF Full Text Request
Related items