QR code (quick response code) is used due to its beneficial properties, especially in the mobile payment field. However, there exists an inevitable risk in the transaction process. It is not easily perceived that the attacker tampers with or replaces the QR code that contains merchant’s beneficiary account. Thus, it is of great urgency to conduct authentication of QR code. In this study, we propose a novel mechanism based on visual cryptography scheme (VCS) and aesthetic QR code, which contains three primary schemes for different concealment levels. The main steps of these schemes are as follows. Firstly, one original QR code is split into two shadows using VC multiple rules; secondly, the two shadows are embedded into the same background image, respectively, and the embedded results are fused with the same carrier QR code, respectively, using XOR mechanism of RS and QR code error correction mechanism. Finally, the two aesthetic QR codes can be stacked precisely and the original QR code is restored according to the defined VCS. Experiments corresponding to three proposed schemes are conducted and demonstrate the feasibility and security of the mobile payment authentication, the significant improvement of the concealment for the shadows in QR code, and the diversity of mobile payment authentication.
from #AlexandrosSfakianakis via Alexandros G.Sfakianakis on Inoreader http://ift.tt/2nUdZsv
via IFTTT
Εγγραφή σε:
Σχόλια ανάρτησης (Atom)
Δημοφιλείς αναρτήσεις
-
This case report outlines the possibility of accelerated tooth movement with the combination of microosteoperforation and mini-screws. A 14-...
-
by Sofie V. Nielsen, Amelie Stein, Alexander B. Dinitzen, Elena Papaleo, Michael H. Tatham, Esben G. Poulsen, Maher M. Kassem, Lene J. Rasm...
-
from #AlexandrosSfakianakis via Alexandros G.Sfakianakis on Inoreader http://ift.tt/2juls25 via IFTTT
-
The secondary channel (SC) of multisubunit RNA polymerases (RNAPs) allows access to the active site and is a nexus for the regulation of tra...
-
A phase 1 dose-escalation and expansion study of binimetinib (MEK162), a potent and selective oral MEK1/2 inhibitor British Journal of Canc...
-
Immunotherapy for metastatic melanoma has a decades-long history, and the relatively recent use of checkpoint inhibitors has revolutionized...
-
Long-term clinical outcomes and economic evaluation of the ketogenic diet versus care as usual in children and adolescents with intract...
-
Viruses, Vol. 10, Pages 107: Recombinant Goose Circoviruses Circulating in Domesticated and Wild Geese in Poland Viruses doi: 10.3390/v1003...
-
ACS Nano DOI: 10.1021/acsnano.6b08387 from #AlexandrosSfakianakis via Alexandros G.Sfakianakis on Inoreader http://ift.tt/2jIA5i2 via...
Δεν υπάρχουν σχόλια:
Δημοσίευση σχολίου