CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Security System based on QR Code with Iris Recognition

Published on June 2016 by Tejas Mohod, Linu Thomas, Ranjit Thorat, Abhinandan Ohara, Manjushri Mahajan
National Conference on Advances in Computing, Communication and Networking
Foundation of Computer Science USA
ACCNET2016 - Number 7
June 2016
Authors: Tejas Mohod, Linu Thomas, Ranjit Thorat, Abhinandan Ohara, Manjushri Mahajan
b65b1b5c-9ca5-4f7a-af7f-d3c50ac85279

Tejas Mohod, Linu Thomas, Ranjit Thorat, Abhinandan Ohara, Manjushri Mahajan . Security System based on QR Code with Iris Recognition. National Conference on Advances in Computing, Communication and Networking. ACCNET2016, 7 (June 2016), 19-21.

@article{
author = { Tejas Mohod, Linu Thomas, Ranjit Thorat, Abhinandan Ohara, Manjushri Mahajan },
title = { Security System based on QR Code with Iris Recognition },
journal = { National Conference on Advances in Computing, Communication and Networking },
issue_date = { June 2016 },
volume = { ACCNET2016 },
number = { 7 },
month = { June },
year = { 2016 },
issn = 0975-8887,
pages = { 19-21 },
numpages = 3,
url = { /proceedings/accnet2016/number7/25014-2313/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing, Communication and Networking
%A Tejas Mohod
%A Linu Thomas
%A Ranjit Thorat
%A Abhinandan Ohara
%A Manjushri Mahajan
%T Security System based on QR Code with Iris Recognition
%J National Conference on Advances in Computing, Communication and Networking
%@ 0975-8887
%V ACCNET2016
%N 7
%P 19-21
%D 2016
%I International Journal of Computer Applications
Abstract

Now a day's security is inevitable in each aspect. There are some existing systems like smart cards, biometric etc. but they are vulnerable. These smart cards are meant to be carried and presented accordingly. Thus the user is entrusted with a responsibility of caring for the card. In biometric like fingerprint scanner, injury to the fingers of the user may result in the failure of the system. In retina scanning systems, if user suffers from diseases like cataract, diabetes then it causes slight deformation in retina, resulting to the failure of the system. By considering above flaws in systems the level of security is increased in the proposed system by using QR Code with Iris recognition. QR-Code is portable and can be used securely in untrusted computers. QR-Code is extremely secure as all the sensitive data stored and transmitted is encrypted, but it is also easy to use and cost-efficient solution. Iris doesn't get affected throughout the life of human being. By understanding the vulnerability of the existing system, a new two level security system is proposed. This system takes the best suitable characteristics of both iris and QR code; this enhances the isolation of the system.

References
  1. David Pintor Maestre "QRP: An improved secure authentication method using QR codes" Universitat Oberta de Catalunya 08018, Barcelona, Spain dpintor@uoc. edu June 8, 2012.
  2. Katharina Krombholz At el "QR Code Security: A Survey of Attacks and Challenges for Usable Security", @sba-research. org SBA Research, Vienna.
  3. Nikita Gupta At el. "QR code: A safe and secure method of authenticating legal documents",Jayawantrao Sawant College Of Engineering Pune, Maharashtra, India.
  4. Sheeba Jeya Sophia S. At el"Security System Based on Iris Recognition"Received 18th Feb 2013, revised 21th March 2013, accepted 25th March.
  5. www. fulcrumbiometrics. com.
  6. Denso-wave: http://www. denso-wave. com/qrcode/index-e. html
  7. Lee, Jaesik; Cho, Chang-Hyun; Jun, Moon-Seog: "Secure quick response-payment(QR-Pay) system using mobile device". Advanced Communication Technology (ICACT), 2011 13th International Conference, Feb. 2011.
  8. Maritz, Adrian: "Secure Payments Using Mobile Device". Proyect "iSpaza", Universityof Cape Town (South Africa).
  9. Rif_a-Pous, Helena : "A Secure Mobile-Based Authentication System for e-Banking". On the Move to Meaningful Internet Systems: OTM 2009. Confederated International Conferences, CoopIS, DOA, IS, and ODBASE, Nov. 2009.
  10. Young Sil Lee; Nack Hyun Kim; Hyotaek Lim; HeungKuk Jo; Hoon Jae Lee: "Online Banking Authentication System using Mobile-OTP with QR-code". Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference, Nov. -Dec. 2010.
  11. Kuan-Chieh Liao; Wei-Hsun Lee: "A Novel User Authentication Scheme Based on QR Code". Journal of Networks, Vol 5, No 8 (2010), 937-941, Aug. 2010.
  12. Mukhopadhyay, Syamantak; Argles, David: "An Anti-Phishing mechanism for Single Sign-On based on QR Code". The First International Workshop on Application of Artifcial Intelligence for Email Management (AAIEM 2011) in London (UK), June 2011.
  13. Starnberger, G. ; Froihofer, L. ; Goeschka, K. M. : "QR-TAN: Secure Mobile Transaction Authentication". Availability, Reliability and Security, 2009. ARES '09. International Conference, Mar. 2009.
  14. Felt, Adrienne Porter; Wagner, David: "Phishing on Mobile Devices". Workshop on Web2. 0 Security and Privacy (W2SP), 2011.
  15. DeFigueiredo, Dimitri: "The Case for Mobile Two-Factor Authentication". Security & Privacy, IEEE, Sept. -Oct. 2011.
  16. Shamir, Adi: "How to Share a Secret". Magazine Communications of the ACM CACM
  17. Homepage archive Volume 22 Issue 11, Nov. 1979.
Index Terms

Computer Science
Information Sciences

Keywords

Qr Code Iris Image Webcam.