Presentation is loading. Please wait.

Presentation is loading. Please wait.

QR Code Authentication with Embedded Message Authentication Code

Similar presentations


Presentation on theme: "QR Code Authentication with Embedded Message Authentication Code"— Presentation transcript:

1 QR Code Authentication with Embedded Message Authentication Code
Source: Mobile Networks and Applications, pp , (published online: 17 Nov. 2016) Authors: Changsheng Chen Speaker: Huang Peng-Cheng Date: 12/2/2018 Shenzhen Univesity

2 Outline Related Works The Proposed Scheme Experimental results
Conclusions Comments

3 Related works(1/2) --QR code
The structure for QR code of version 6 with error correction level medium

4 Related Works(2/2) The mask operation in the QR code generation process.

5 The proposed scheme (1/4)

6 The proposed scheme (2/4)

7 The proposed scheme (3/4) --The choice of cryptography algorithms
Using message authentication code with symmetric cryptography where only a single party is involved in the barcode enrollment and authentication. Universal Message Authentication Code (UMAC) F: AES=>41 bytes the length of S is designed to be 4, 8, 12, or 16 bytes Application: applied on preventing receipt forgery in return fraud

8 The proposed scheme (4/4) --The choice of cryptography algorithms
Using digital signature with asymmetric cryptography where multiple parties is involved in the barcode enrollment and authentication. The Elliptic Curve Digital Signature Algorithm (ECDSA) Application: payment information authentication

9 Experimental results (1/5) --Decoding performances

10 Experimental results (2/5) --Decoding performances

11 Experimental results (3/5) --Decrement of barcode module size

12 Experimental results (4/5) --Security considerations on data authentication
For the case using message authentication code: The length of UAMC L is 4, 8, 12, or 16 bytes For the case using digital signature : the ECDSA signature is of 41 bytes, so L=41

13 Experimental results (5/5) --Comparisons of embedding capacity with the existing data embedding approaches 17. Yang H, Kot AC (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimedia 9(3):475–486 18. Yang H, Kot AC, Rahardja S (2008) Orthogonal data embedding for binary images in morphological transform domain- a high-capacity approach. IEEE Trans Multimedia 10(3):339–351

14 Conclusions Off-line certification High security High capacity

15 comments The approach is implemented with the error correction mechanism of QR code. Embed the authentication code by using data hiding approach. The secret payload can be improved by exploiting the characteristic of RS code.


Download ppt "QR Code Authentication with Embedded Message Authentication Code"

Similar presentations


Ads by Google