Paper Abstract and Keywords |
Presentation |
2014-03-07 15:00
[Poster Presentation]
Compatible 2d-code having tamper detection system with QR-code Takayuki Ishihara, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2013-106 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
into smartphone or cell phone through its digital camera easily, are rapidly becoming widespread
not only Japan but also Asia, Europe and America.
However, an attacker is easily able to lead malcious websites by putting
a unautheticated QR code on a authenticated QR code.
We propose a compatible 2d-code having tamper detection system with
QR-code.
In digital signature system, a hash value of a message is calculated firstly, and
then the hash value is encrypted by a secret key which is a pair of public
key cryptography system. Then, a sender sends the message and the encrypted hash
value to a receiver. In the receiver side, the hash value of a sent message
is calculated and the hash value with encrypted is decrypted using a public
key which is a pair of public key cryptography system. The receiver can
detect modification of the message by comparing the two hash values.
The crypted hash value is embedded by using Wet Paper code within cells
of QR-codes.
In this paper, we report the robustness of reading cells of QR code which plays an
important role in our code and the state of the progress for
the implementation of the proposed system. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
QR code / Digital signature / Wet Paper code / Tamper detection / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 113, no. 480, EMM2013-106, pp. 39-44, March 2014. |
Paper # |
EMM2013-106 |
Date of Issue |
2014-02-28 (EMM) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
EMM2013-106 |
Conference Information |
Committee |
EMM |
Conference Date |
2014-03-07 - 2014-03-08 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
JAIST |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Poster Session, etc. |
Paper Information |
Registration To |
EMM |
Conference Code |
2014-03-EMM |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Compatible 2d-code having tamper detection system with QR-code |
Sub Title (in English) |
|
Keyword(1) |
QR code |
Keyword(2) |
Digital signature |
Keyword(3) |
Wet Paper code |
Keyword(4) |
Tamper detection |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Takayuki Ishihara |
1st Author's Affiliation |
Kyushu Institute of Technology (Kyushu Inst. of Tech.) |
2nd Author's Name |
Michiharu Niimi |
2nd Author's Affiliation |
Kyushu Institute of Technology (Kyushu Inst. of Tech.) |
3rd Author's Name |
Hideki Noda |
3rd Author's Affiliation |
Kyushu Institute of Technology (Kyushu Inst. of Tech.) |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2014-03-07 15:00:00 |
Presentation Time |
120 minutes |
Registration for |
EMM |
Paper # |
EMM2013-106 |
Volume (vol) |
vol.113 |
Number (no) |
no.480 |
Page |
pp.39-44 |
#Pages |
6 |
Date of Issue |
2014-02-28 (EMM) |
|