Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Private Information Sharing using Two Level QR Code

by V. V. Panchal, H. B. Torvi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 24
Year of Publication: 2018
Authors: V. V. Panchal, H. B. Torvi
10.5120/ijca2018916576

V. V. Panchal, H. B. Torvi . Private Information Sharing using Two Level QR Code. International Journal of Computer Applications. 180, 24 ( Mar 2018), 40-44. DOI=10.5120/ijca2018916576

@article{ 10.5120/ijca2018916576,
author = { V. V. Panchal, H. B. Torvi },
title = { Private Information Sharing using Two Level QR Code },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2018 },
volume = { 180 },
number = { 24 },
month = { Mar },
year = { 2018 },
issn = { 0975-8887 },
pages = { 40-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number24/29107-2018916576/ },
doi = { 10.5120/ijca2018916576 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:01:40.875758+05:30
%A V. V. Panchal
%A H. B. Torvi
%T Private Information Sharing using Two Level QR Code
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 24
%P 40-44
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Quick Response (QR) code is widely popular in daily life due to reading high speed application and grater storage capacity of storing information. In this paper, we present a new rich QR code that has two storage levels. Public level and Private level, The level one named a public level ,and level two named as private level. The Private level is designed by replacing the modules using specific textured pattern. It is to be made up or composed by q-ary code with an error correction capacity. This allows us not only increase the storage capacity but also improve the security of QR code. The public level is the same as the standard QR code storage level; therefore it is readable by any classical QR code application.

References
  1. Behrouz A Forouzan, “Data Communications and Networking”, McGraw-Hill, 4th Edition.
  2. Lu. Tkachenko,w.Puech,O.Strauss and C. Destruet J “Printed Document authentication Using Two Level QR Code”, ICASSP) 2016, pp2149-2153.
  3. ISO/IEC 16022:2006. Information technology - Automatic identification and data capture techniques - Data Matrix bar code symbology specification. 2006.
  4. ISO/IEC 18004:2000. Information technology - Automatic identification and data capture techniques - Bar code symbology - QR Code. 2000.
  5. Thach V. Bui, Nguyen K. Vu, Thong T.P. Nguyen, Isao Echizen and Thuc D. Nguyen,” Robust Message Hiding for QR Code”, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,pp.520-523.
  6. Pei-Yu Lin, Yi-Hui Chen, Eric Jui-Lin Lu and Ping-Jung Chen,” Secret Hiding Mechanism Using QR Barcode”, 2013 International Conference on Signal-Image Technology & Internet-Based Systems, pp.22-25.
  7. Marco Querini and Giuseppe F,” Facial Biometrics for 2D Barcodes”, Proceedings of the Federated Conference on Computer Science and Information Systems pp. 755–762
  8. Sartid Vongpradhip and Suppat Rungraungsilp,” QR Code Using Invisible Watermarking in Frequency Domain”, 2011 Ninth International Conference on ICT and Knowledge Engineering, pp.47-52.
  9. Z. Baharav and R. Kakarala. Visually significant QR codes: Image blending and statistical analysis. In Multimedia and Expo (ICME), 2013 IEEE International Conference on, pages 1–6. IEEE, 2013.
  10. B. Sklar. Digital communications, volume 2. Prentice Hall NJ, 2001.
  11. Gurpreet Singh, Supriya “ A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security” International Journal of Computer Applications (0975 – 8887) Volume 67– No.19, April 2013
  12. Akash Kumar Mandal, Chandra Parakash and Mrs. Archana Tiwari, “Performance Evaluation of Cryptographic Algorithms: DES and AES”, IEEE Students’ Conference on Electrical, Electronics and Computer Science, pp. 1-5, 2012.
  13. J. C. Chuang, Y. C. Hu and H. J. Ko, “A novel secret sharing technique using QR code,” International Journal of Image Processing, vol. 4, pp.468-475, 2010.
  14. Lin Liu, “A Survey of Digital Watermarking Technologies”, www.ee.sunysb.edu/~cvl/.../Lin%20Liu
  15. /ese558report_LinLiu.pdf
  16. Chung, Chin-Ho, Wen-Yuan Chen, and Ching-Ming Tu. Image hidden technique using QR-barcode. In Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP’09. Fifth International Conference on, pp. 522-525. IEEE, 2009.
  17. L. Yu, X. Niu, and S. Sun. Print-and-scan model and the watermarking countermeasure. In Image and Vision Computing, volume 23, pages 807–814. Elsevier, 2005.
  18. http://www.qrcode.com/.
  19. Geisel, William A. Tutorial On Reed-Solomon Error-Correction Coding. (1996).
Index Terms

Computer Science
Information Sciences

Keywords

QR code Public level Private level AES encryption Reed-Solomon code document authentication and Data hiding.