B. Jia et al. /Journal of Computational Information Systems 10: 24 (2014) 10519–10529 10521
2 The Relative Foundation Work
2.1 The analysis of the characteristics of two-dimensional code
The Two-dimensional Code was composed of the matrix graphics, the numbered UID and the
following captions. The matrix graphics and the numbered UID could encode the digital infor-
mation in the form of the bar code, such as the picture, the sounds, the text, the signature, the
fingerprint and etc. The Two-dimensional Code had the ability of accommodating up to 1850
capital letters or 2710 digits or 1108 bytes or more than 500 characters. When the two dimen-
sional barcode was locally damaged which was caused by some reasons such as perforation and
stained, it could still be read correctly and restore information, though damaged area up to 50%.
The reliability of decode was really high and the rate of the bit error was not more than one
over ten million. It had many characteristics to realize the paperless of information, for instance,
comprehensive read, high redundancy, the low cost, easy production, and durability.
2.2 The SM1, SM2 and SM3 encryption algorithm
The dense SM1 algorithm [17] was a kind of the commercial passwords grouping standard sym-
metric algorithm which was compiled by the state password administration of a grouping, and
its packet length and key length were 128 bits, not open, lying in the chip only in the form of IP
core. Something equaled to AES that was algorithm security strength and related hardware and
software implementation performance of the dense SM1 algorithm. It could be used to implement
plaintext encrypted. The dense SM2 algorithm [18] was based on the asymmetric algorithm of
elliptic curve of ECC but it was more complicated than the ECC algorithm published by the
international and slower than others in a way. Its safety performance was better. And under the
same security requirements, the size of the key SM2 requiring was much smaller than other public
key cryptography. SM2 could be used to realize digital signature to the data. The dense SM3
algorithm [19] was a kind of hash algorithm based on grouping iterative structure, and its results
was 256. The algorithm adopted the way of word processing with the messages of double word
combination and used the mixed operation from different group to implement the message rapidly
spread and chaos in the local scope and effectively prevented the bit tracking and the attack of
the analysis of other known methods. The security of the SM3 algorithm was good, the algorithm
suitable for the implementation of hardware and software and a smart card. The SM3 algorithm
was used to implement a HASH of the data information HASH and got the corresponding Num-
bers in this paper. The text would realize the data encryption including the Two-dimensional
Code information by the integrated use of the dense SM1 algorithm, SM2 algorithm and SM3
algorithm and the encryption form based on the hardware.
2.3 The digital watermarking and invisible element
The digital watermarking was a technology which did not affect the value of the original carrier
while some identified information was embedded in digital carriers in the form of a watermark and
persons could not perceive the form. The digital carriers included the multimedia, the documents,
the software and etc. Through these hidden information in the vehicle, we could achieved the
goals that was to confirm the content creators, buyers, transmit secret information and determine