Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Message Security with QR Code

Print
PDF
IJCA Proceedings on International Conference on Emerging Trends in Computing and Communication
© 2018 by IJCA Journal
ICETCC 2017 - Number 2
Year of Publication: 2018
Authors:
Manjusha Deshmukh
Supriya Subhash

Manjusha Deshmukh and Supriya Subhash. Article: Message Security with QR Code. IJCA Proceedings on International Conference on Emerging Trends in Computing and Communication ICETCC 2017(2):1-5, June 2018. Full text available. BibTeX

@article{key:article,
	author = {Manjusha Deshmukh and Supriya Subhash},
	title = {Article: Message Security with QR Code},
	journal = {IJCA Proceedings on International Conference on Emerging Trends in Computing and Communication},
	year = {2018},
	volume = {ICETCC 2017},
	number = {2},
	pages = {1-5},
	month = {June},
	note = {Full text available}
}

Abstract

A QR Code is a specific matrix barcode (or two-dimensional code), readable by dedicated QR barcode readers and camera phones. The code consists of black modules arranged in a square pattern on a white background. The information encoded can be text, URL or other data. Common in Japan, where it was created by Toyota subsidiary Denso-Wave in1994, the QR code is one of the most popular types of two-dimensional barcodes. QR is the abbreviation for Quick Response, as the creator intended the code to allow its contents to be decoded at high speed. QR codes were originally made to track parts in vehicle manufacturing. QR codes are free to anyone who wants to make them or use them for any kind of tracking or promotional service. QR codes contain embedded information that can only be read by QR code readers that are usually downloaded by smart phones. The purpose of QR codes is to give a consumer additional information about the product, an event, or even a promotion. It is widely used in daily life because it has high capacity encoding of data, damage resistance, fast decoding. QR code technique can be used for Steganography which leads to many problems, so to recover or retrieve the hidden secret information, the Reed Solomon and list decoding scheme being used. QR code technique also used in cryptography, as it has mainly used to convey or store message because they have large storage capacity than conventional barcode. Here the information being send (which is in an encrypted format) securely and safely to authorized party. The focus of this paper is to explore and analysis the compilation of data and research regarding the current digital functionalities, benefits, limitations and future expectations of QR code in digital technology.

References

  • Information Technology—Automatic Identi?cation and Data Capture Techniques—EAN/UPC Bar Code Symbology Speci?cation, ISO/IEC Standard 15420:2009, 2009.
  • Information Technology—Automatic Identi?cation and Data Capture Techniques—Data Matrix Bar Code Symbology Speci?cation, ISO/IEC Standard 16022:2006, 2006.
  • Information Technology—Automatic Identi?cation and Data Capture Techniques—Bar Code Symbology—QR Code, ISO/IEC Standard 18004:2000, 2000.
  • T. V. Bui, N. K. Vu, T. T. P. Nguyen, I. Echizen, and T. D. Nguyen, "Robust message hiding for QR code," in Proc. IEEE 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. (IIH-MSP), Aug. 2014, pp. 520–523.
  • Iuliia Tkachenko, William Puech, Senior Member, IEEE, Christophe Destruel, Olivier Strauss, Jean-Marc Gaudin, and Christian Guichard, "Two level QR code for private message sharing and document authentication", in proc. IEEE transaction on information forensics and security, vol. 11, NO. 3, March 2016.
  • Iu. Tkachenko1,2, W. Puech1, O. Strauss1, C. Destruel2, J. -M. Gaudin2, "Printed document authentication using two level QR code", in proc. IEEE conf. Acoustics, speech and signal processing, 20-25. March 2016.
  • Somdip Dey, "SD-EQR: A New Technique To Use QR code in Cryptography", in proc. IEEE conference on wireless communication, Aug 2015.
  • Zhibo Yang, Zhiyi Cheng, Chen Change Loy, Wing Cheong Lau, Chak Man Li, Guanchen Li "Towards robust colour recovery for high capacity color QR code", in proc. IEEE conf. digital communication, 2016.
  • M. Mary, S. R. , & K. Rosemary, E. (2016). Data security through Qr code Encryption and Steganography. Advanced Computing: An International Journal, 7(1/2), 1–7. doi:10. 5121/acij. 2016. 7201
  • M. Querini, A. Grillo, A. Lentini, and G. F. Italiano, "2D color barcodes for mobile phones," Int. J. Comput. Sci. Appl. , vol. 8, no. 1, pp. 136–155, 2011.