Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Technique to Hide Encrypted Data in QR Codes using EK-EQR Algorithm

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Neeraj Naik, Niraj Kadam, Manish Bhalekar
10.5120/ijca2017913397

Neeraj Naik, Niraj Kadam and Manish Bhalekar. Technique to Hide Encrypted Data in QR Codes using EK-EQR Algorithm. International Journal of Computer Applications 161(12):25-28, March 2017. BibTeX

@article{10.5120/ijca2017913397,
	author = {Neeraj Naik and Niraj Kadam and Manish Bhalekar},
	title = {Technique to Hide Encrypted Data in QR Codes using EK-EQR Algorithm},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {161},
	number = {12},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {25-28},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume161/number12/27201-2017913397},
	doi = {10.5120/ijca2017913397},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

There are various types of information which being transferred from the known source to required destination. The data that is being transferred can be confidential which should be handled with much care. The transferring of data can be done using various technique and numerous types of algorithms. QR code is one of the technique which can be used to transfer the data with maximum amount of security being involved. In this paper the author present a new technique of data encryption method using QR code. The ideology of this method is to encrypt the data by using the concept of EK-EQR algorithm. This data hiding technique can be used in various government sectors for data transfer.

References

  1. Vanishree and Sunitha,”Encryption and decryption of data using Quick response code”, ISSN (Online): 2347 - 2812, Volume-2, Issue - 3, 2014.
  2. Kevin Peng, Harry Sanabria, Derek Wu and Charlotte Zhu, “Security Overview of QR Codes”, Massachusetts Institute of Technology 6.857 Computer and Network Security,E-Book
  3. Nikita Gupta, Nagesh Mokashe and Mangesh Parihar, “QR code: A safe and secure method of authenticating legal documents,” International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 2015.
  4. Somdip Dey, “SD-EQR:A New Technique To Use QR Codes TM in Cryptography”, International Conference on Emerging Trends of Computer & Information Technology ( ICETCIT 2012 ) – India.
  5. Jaesik Lee, Chang-Hyun Cho, Moon-Seog Jun,’’Secure Quick Response Payment(QR-Pay) System using Mobile Device”, Feb 2011
  6. Somdip Dey, Asoke Nath, Shalabh Agarwal, ”Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System”, International Conference on Communication Systems and Network Technologies, 2013.
  7. Sana Nseir, Nael Hirzallah, Musbah Aqel, ”A Secure Mobile Payment System using QR Code”, 5th International Conference on Computer Science and Information Technology (CSIT), 2013. [
  8. Dante D’Orazlo. Google experiments with new QR-based secure login. The Verge. 17 Jan 2012. Web. 14 May 2014
  9. T. Falas and H. Kashani, “Two-dimensional barcode decoding with camera-equipped mobile phones”.
  10. Eisaku Ohbuchi, Hiroshi Hanaizumi, Lim Ah Hock,” Barcode Readers using the Camera Device in Mobile Phones”, IEEE paper.

Keywords

Encryption, QR Code, EK-EQR algorithm, EQR Algorithm, Data Hiding