Research on Two Dimensional Code Encryption Method Based on Embedded Device

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research on Traceability System of Food Safety Based on PDF417 Two-Dimensional Bar Code

In this paper, through the research on two-dimensional bar codes of food source tracking; a set of traceability tracking system was designed based on the two bar coding algorithm and decoding algorithms. This system could generate PDF417 code based on food production, logistics and transport, supermarket and other storage information. Consumers could identify PDF417 code through a client based ...

متن کامل

Research on the Method of Cloud Computing Storage Security based on the Homomorphic Encryption Method

Based on the idea of the encryption algorithm, a new method for data storage in cloud computing is designed. Experimental results show that the proposed method in data encryption, data decryption, data retrieval and other aspects of the implementation of the efficiency is significantly higher than the BGV algorithm, and more suitable for the safe storage of cloud data.

متن کامل

mortality forecasting based on lee-carter model

over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...

15 صفحه اول

Research on Design Method Based on Hardware Encryption and Two-way ID Authentication for Security Mobile Hard Disk

The design Method of the "Security Mobile Hard Disk Based on Hardware Encryption and Twoway ID Authentication" adopts the smart card-based technology of two way ID authentication, thus enables higher authentication strength than ordinary password authentication and USB-KEY one way certification; adoption of dedicated hardware encryption chip on encrypting the hard disk data enhances the encrypt...

متن کامل

New Image Encryption Method Based on ICA

Shot change detection is an essential step in video content analysis. However, automatic shot change detection often suffers high false detection rates when there are camera or object movements. In this paper, we propose an approach to solve this problem based on local keypoint matching of the video frames. Experimental results show that the proposed algorithm is effective for all kinds of shot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: E3S Web of Conferences

سال: 2021

ISSN: 2267-1242

DOI: 10.1051/e3sconf/202123301082