硕士论文-移动二维条码电子票证安全数字水印方案研究

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

上海交通大学硕士学位论文移动二维条码电子票证安全数字水印方案研究姓名:欧阳麒申请学位级别:硕士专业:通信与信息系统指导教师:李建华20070101-I-PDF417PDF417-II-mPDF417WPDF417matlabPDF417-III-ANEWSECURITYFRAMEWORKOFMOBILETWO-DIMENSIONALBARCODEELECTRONICTICKETSYSTEM——BASEDONDIGITALWATERMARKAbstractMobiletwo-dimensionalbarcodeelectronicticketsystemisanewthingburstfromtraditionalticketandmotionnetwork.Thepaperhasdonemuchprofitableresearchaboutthesecurityframeworkofthemobiletwo-dimensionalbarcodeelectronicticketsystemandproposedanewsecurityframeworkofthemobiletwo-dimensionalbarcodeelectronicticketsystem,whichisbasedondigitalwatermark.Thepaperhasalsodoneresearchaboutthetwo-dimensionalbarcodedigitalwatermarkarithmetic,whichissuitableforthenewsecurityframework;andanovelspatialdomainfragiledigitalwatermarkschemehasbeenproposed.Thenewsecurityframeworkappliesthedigitalwatermarkandencryptiontechniquesintothemobiletwo-dimensionalbarcodeelectronicticketsystem,addsthreenewsecuritymechanisms:ElectronicticketbindsonlyoneSIMcardEncryptedtwo-dimensionalbarcodeandDigitalwatermarkidentityvalidation,solvesthesecurityproblemfacedbythetraditionalelectronicticketsystemperfectly.First,thenewframeworkusesthewatermarkastheidentityoftheelectronicticket,stopstheforgeryoftheelectronicticketradically.Second,-IV-theelectronicticketsinthenewframeworkshouldbetransmittedindirectly,so,thelawlesstransmissionofelectronicticketcan’tbeexisted.Third,encryptedtwo-dimensionalbarcankeepsecrettheticketinformationcontainedinthebarcode,grantingthattheassaultergottheticketillegallycan’tprintorcopytheticket..Thepaperhasalsodoneresearchinthedigitalwatermarkarithmeticwhichissuitableforthenewsecurityframework,andproposedanovelspatialdomainfragiledigitalwatermarkschemewhichisbasedonPDF417code,includingthemaking,imbedding,detectingofthewatermark.Inthenovelscheme,thewatermarkisrandom,sothewatermarkisshady.Thewatermarkinformationisembeddedinthesuitableedgeofthepicture,whichmakestheembedmentofthewatermarkshady.ThenovelschemecanbalancetheembedmentcapabilityandthepicturedistortionbyadjustingtheparameterW.Thedetectingofthenovelschemeisblinddetecting;it’seasytogetthewatermarkafterfindingouttheembeddededges.Thenovelschemeisbasedonthetwo-dimensionalbarcode,andisfragile,sothenovelschemeissuitableforthenewsecurityframework.Inthelast,thematlabsimulationhasvalidatedthenovelscheme.KEYWORDS:Two-dimensionalbarcode,Electronicticket,PDF417code,Digitalwatermark,Encrypt2007118___20071182007118-1-11.1()2005103.83-2-2006625“”“”“”-3-4.5“”1.220012003[1][2][3][4]-4-3G3G“”JuniperResearch2007(Mcommerce)20093902009880JuniperResearchMarcAmbasna-Jones20055.3810%0.522.69-5-20047000100033G3G3GMP320104.5“”80“”E200820101.3-6-“”[5][6][7]1.4PDF417[8][9][10][11][12][13][14]1.5-7-PDF417matlab-8-22.12.1.11234567[15][16]()12-9-3452.1.2StackedBarCodeDotMatrixBarCode1Code49PDF417Code16K1K210CodeoneAztecDataMatrixQRCode3PostnetBPO4-State2.1.3PDF4171PDF417PDF417[17][18][19][20][21]PDF417-10-SYMBOLPDF(PortableDataFile)4417PDF4172.12-1PDF417Figure2-1PDF417BarCodePDF417PDF417185011082710PDF4179PDF4171PDF4173-90130174416PDF4172PDF4179293PDF417PDF417510PDF4179PDF417-11-2.11~40241~1603161~3204321~86352.1PDF4174PDF4175GlobalLabelIdentifierGLIGLIGLISPDF4176PDF417PDF417PDF417PDF417PDF4177PDF4172-22-2PDF417Figure2-2TheSymbolStructureofPDF417BarCode-12-abcd4efghi8441-644172-32-3PDF417Figure2-3TheCharacterStructureofPDF417BarCode2PDF417PDF417PDF417[22][23]12501100(2/376mmX25mmPDF417184827295002PDF4173PDF417-13-50%4PDF4175PDF4176/PVCPDF417PDF4177PDF4173PDF417PDF417[8]90(AIM)(ANSI)PDF417EDIPDF417PDF417EDI19971225GB/T17172-1997[20]199881PDF417952.22.2.1[24][25][9][10]2090-14-K.Tanaka1990(DigitalWatermark)Internet[24]-15-InternetIBMIEEESPIE863973Internet/-16-2.2.21[26][27][28]2[29][30][31][28][32][33][34]3[35][36]4-17-()5[37][38]6DCT[39][40]DWT[41][42][43]-18-2.2.3[44][45]2.2.41(-19-)2Hash3DCT42.32.3.1[46][47][48](Keyword)-20-1M2C3KKKeKdK=(KeKd)4EMcKeEffMCC=f(M,Ke))5DcMKdDgM=g(C,Kd)(2.3)KeKd2.3.2-21-12.1234DESIDEARC5-22-2.3.3;:();1n2n2-23-RSA122.4PDF417PDF417()PDF(PortableDataFile)-24-(DigitalWatermark)(Keyword)-25-33.13.1.120043-1-26-3-13-1Figure3-1ThemodelofTheTraditionalframework3.1.21-27-3-23-2Figure3-2TheFlowChartofBuyingTicketinTheTraditionalSystem-28-233.1.33-33-3Figure3-3TheMakingofTicketinTheTraditionalSystem1395867586856-29-3.1.43.1.51-30-23.23.2.11-31-23-43/3-5-32-3-4Figure3-4TheModulesofMobileTerminal3-5Figure3-5TheModulesofTicketCompany/-33-3.2.2123AAABAABBBBB3-6-34-3-6Figure3-6TheFlowChartofTheTransmissionofTheElectronicTicketAABBB3.2.3-35-MMNTGMDDPM4W4WPPWFPWPWM3-73-7Figure3-7TheFlowChartofTheMakingofTheElectronicTicket-36-3.2.4AABBCDDFCF3-8Figure3-8TheFlowChartofTheValidationofTheElectronicTicket-37-3.2.5DESRSADES[49][50][51]RSADESRSA1DESRSADES56RSA200DESDES2RSADESRSADESDESDES3DESRSADES3.3-38-3.3.11SIMSIMSIMSIMSIMSIMSIMSIM23-39-3.3.23.1.5SIMSIM3.4/-40-//DESSIMSIMSIM-41-44.14.1.14-1(M,X,W,K,G,Em,At,D,Ex)1M2Xx3Ww4Kk5GmkxG:MXKW,w=G(m,x,k)××→(4.1)6EmwxwEm:XWX,x=Em(x,w)×→(4.2)xwx-42-7Atwxw'At:XKX,x=At(x,k)×→(4.3)'k$x8D101xw(H)D:XK{0,1},D(x,K)=0xw(H)×→(4.4)1H0H9ExEx:XKW,E

1 / 75
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功