Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Message Security with QR Code

Published on June 2018 by Manjusha Deshmukh, Supriya Subhash
International Conference on Emerging Trends in Computing and Communication
Foundation of Computer Science USA
ICETCC2017 - Number 2
June 2018
Authors: Manjusha Deshmukh, Supriya Subhash
f524317c-ad08-463e-95b1-8e9968c8f2d6

Manjusha Deshmukh, Supriya Subhash . Message Security with QR Code. International Conference on Emerging Trends in Computing and Communication. ICETCC2017, 2 (June 2018), 1-5.

@article{
author = { Manjusha Deshmukh, Supriya Subhash },
title = { Message Security with QR Code },
journal = { International Conference on Emerging Trends in Computing and Communication },
issue_date = { June 2018 },
volume = { ICETCC2017 },
number = { 2 },
month = { June },
year = { 2018 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icetcc2017/number2/29462-cc77/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Emerging Trends in Computing and Communication
%A Manjusha Deshmukh
%A Supriya Subhash
%T Message Security with QR Code
%J International Conference on Emerging Trends in Computing and Communication
%@ 0975-8887
%V ICETCC2017
%N 2
%P 1-5
%D 2018
%I International Journal of Computer Applications
Abstract

A QR Code is a specific matrix barcode (or two-dimensional code), readable by dedicated QR barcode readers and camera phones. The code consists of black modules arranged in a square pattern on a white background. The information encoded can be text, URL or other data. Common in Japan, where it was created by Toyota subsidiary Denso-Wave in1994, the QR code is one of the most popular types of two-dimensional barcodes. QR is the abbreviation for Quick Response, as the creator intended the code to allow its contents to be decoded at high speed. QR codes were originally made to track parts in vehicle manufacturing. QR codes are free to anyone who wants to make them or use them for any kind of tracking or promotional service. QR codes contain embedded information that can only be read by QR code readers that are usually downloaded by smart phones. The purpose of QR codes is to give a consumer additional information about the product, an event, or even a promotion. It is widely used in daily life because it has high capacity encoding of data, damage resistance, fast decoding. QR code technique can be used for Steganography which leads to many problems, so to recover or retrieve the hidden secret information, the Reed Solomon and list decoding scheme being used. QR code technique also used in cryptography, as it has mainly used to convey or store message because they have large storage capacity than conventional barcode. Here the information being send (which is in an encrypted format) securely and safely to authorized party. The focus of this paper is to explore and analysis the compilation of data and research regarding the current digital functionalities, benefits, limitations and future expectations of QR code in digital technology.

References
  1. Information Technology—Automatic Identi?cation and Data Capture Techniques—EAN/UPC Bar Code Symbology Speci?cation, ISO/IEC Standard 15420:2009, 2009.
  2. Information Technology—Automatic Identi?cation and Data Capture Techniques—Data Matrix Bar Code Symbology Speci?cation, ISO/IEC Standard 16022:2006, 2006.
  3. Information Technology—Automatic Identi?cation and Data Capture Techniques—Bar Code Symbology—QR Code, ISO/IEC Standard 18004:2000, 2000.
  4. T. V. Bui, N. K. Vu, T. T. P. Nguyen, I. Echizen, and T. D. Nguyen, "Robust message hiding for QR code," in Proc. IEEE 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. (IIH-MSP), Aug. 2014, pp. 520–523.
  5. Iuliia Tkachenko, William Puech, Senior Member, IEEE, Christophe Destruel, Olivier Strauss, Jean-Marc Gaudin, and Christian Guichard, "Two level QR code for private message sharing and document authentication", in proc. IEEE transaction on information forensics and security, vol. 11, NO. 3, March 2016.
  6. Iu. Tkachenko1,2, W. Puech1, O. Strauss1, C. Destruel2, J. -M. Gaudin2, "Printed document authentication using two level QR code", in proc. IEEE conf. Acoustics, speech and signal processing, 20-25. March 2016.
  7. Somdip Dey, "SD-EQR: A New Technique To Use QR code in Cryptography", in proc. IEEE conference on wireless communication, Aug 2015.
  8. Zhibo Yang, Zhiyi Cheng, Chen Change Loy, Wing Cheong Lau, Chak Man Li, Guanchen Li "Towards robust colour recovery for high capacity color QR code", in proc. IEEE conf. digital communication, 2016.
  9. M. Mary, S. R. , & K. Rosemary, E. (2016). Data security through Qr code Encryption and Steganography. Advanced Computing: An International Journal, 7(1/2), 1–7. doi:10. 5121/acij. 2016. 7201
  10. M. Querini, A. Grillo, A. Lentini, and G. F. Italiano, "2D color barcodes for mobile phones," Int. J. Comput. Sci. Appl. , vol. 8, no. 1, pp. 136–155, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Standard Qr Code Two Level Qr Code Technique Cryptography Steganography Document Authentication