IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code

IRJET Journal
IRJET JournalFast Track Publications

https://www.irjet.net/archives/V6/i6/IRJET-V6I6295.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1162
A Survey: Secret Sharing Approach with Cheater Prevention on
QR Code
Sarika Laiphrakpam1, Mrs. D. B. Gothawal2
1ME Student, Dept of Computer Engineering, DYPCOE, Pune, India
2Faculty, Dept of Computer Engineering, DYPCOE, Pune, India
------------------------------------------------------------------------***-------------------------------------------------------------------
Abstract -A QR code is thecommonlyusedtwo-dimensional
(2D) barcode which has high encryptionanddecryptionspeed;
it is not only restricted to error-correction ability, but alsocan
store large information. QR barcode are used considerably
because of their beneficial properties, including small tag,
large data capacity, reliability, and high-speed scanning.
However the limitation of this is it lacks adequate security
protection for private or confidential data. A secret QR
sharing approach is to protect the private QR data with a
secure and reliable distributed system. The QR code schemes
use the QR characteristics to achieve secret sharing and can
resist the print-and-scan operation. In the system, the secret
has been splitted and conveyedwithQRtagsinthedistribution
application, and the system can retrieve the lossless secret
with the authorized participants. Using a barcode reader, the
general browsers can read the original data from the marked
QR tags , and helps reduce the security risk of the secret. The
systems approach gives a feasible and provides content
readability, cheater detectability , and an adjustable secret
payload of the QR barcode.
Key Words: QR barcode, Secret sharing,cheaterprevention,
QR characteristics
1. INTRODUCTION
QR code (quick response code) is a type of two dimensional
barcode developed by Denso-Wave companyin1994[1].QR
code is a piece of long multilingual text, a linked URL, an
automated SMS message, a business card or just about any
information can be submerged into the two-dimensional
barcode. The QR code system became popular in the
automotive industry due to its high-speed scanning,
reliability, greater storage capacity compared to standard
UPC barcodes and fast readability. A secret QR sharing
approach is to protect the private QR data with a secure and
reliable distributed system.
 Barcode - a code consist of a group of printed
patterned bars and spacesandsometimesnumerals
that is designed to be scanned and read the
information it contain into computer memory.
Fig-1.1 Barcode
Fig -1.2: QR Code
1.1 QR Code
QR code is a two-dimensional code or a matrix barcode that
can be reading multiple ways like QR scanners, mobile
phones with a camera, and smart-phones.
Fig- 1.3: Overview of QR Code and working.
The QR Code, Information is encoded in both direction i.e.
Vertical and horizontal respectively, thus it holds hundred
times additional data than a traditional bar.
There are two types of QR Codes.
1. ONLINE CODES
2. It point to an Internet addresses and trigger a client
/ server interaction that requires an active Internet
connection. This involves the access of a mobile
website and the sending of an SMS message.
2. OFFLINE CODES
The name itself suggests that these codes do not need an
Internet connection. It directly resolved on the phone.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1163
Two-dimensional symbolsgenerallycontainmuchmore data
mounted on; it is compared with linear symbols and thus
requires much longer data processing time and more
complex process. Therefore, QR Code has much more
consideration for its finder pattern to enable high-speed
reading.
QR Codes have overtaken the popularity of classical barcode
in many areas. The key fact about typical barcode is that it
can hold maximum of 20 digits only, which is overcome by
QR code as it can hold up to 7,089 characters.
Fig-1.4: - The development of QR code.
QR Codes has the capability to encode same amount of data
approximately in one tenth the space of a traditional 1D
barcode. A great feature of QR Codes is that they do not need
to be scanned from one particular angle, as QR Codes can be
read regardless from any position respectively.
The most popular and commercial use for QR Codes is in the
telecommunications industry, where the increasing in the
adoption of smart-phones seems to be the biggest driver of
its popularity. QR Codes seem to be a suitable tool for quick
and efficient communication URLs to users.
1.2 Characteristics of QR code
 All-Direction (3600) High-speed Reading-
Reading in all directions (3600 ) the ratio between
black and white among the scan line that runs
through the finder patterns is always when seen
from any direction among the 360° surrounding it.
 Resistant to Distorted Symbols-
Symbols often get distorted as soon as they are
attached to a curved surface i.e. angled CCD sensor
face and the symbol face. To spot this distortion,QR
Code has alignment patterns arranged with a
regular interval within the range of the symbol.
 Data Restoration Functionality (Resistant to
smudged or damaged symbol):-
QR Code has four different error correction levels
7%, 15%, 25% and 30% that depend on symbol
area. The error correction functionality is
implemented according to the smudged/damage,
and it is utilizing the code which is highly resistant
to error.
 Linking Functionality of the Symbols:-
A single symbol is represented in several symbols
on dividing it by using linking functionality.Asingle
symbol can be dividedatmaximuminto16symbols.
 High Capacity Encoding of Data:-
QR Code is efficient to handle all types of data, like
numeric and alphabetic characters, Kanji, Kana,
Hiragana symbols, binary, control codes and etc. In
one symbol up to 7,089 characters can be encoded.
 Small Printout Size:- Since QR Code carries
information both horizontally and vertically, QR
Code is capable of encoding the same amount of
data in approximately one-tenth the space of a
traditional bar code.
2. LITERATURE SURVEY
Different from the conventional QR application, the
purposed approach utilizes the characteristics of QR
modules to satisfy the essential of steganography,
readability, robustness, adjustable secret capability, blind
extraction, cheater detection, and identification for secret
sharing mechanism[1]. The QR sharing system can achieve
satisfactory performance when compared to related
attempts.
[2] In this paper, a security system for QR codes that
guarantees both users and generators security concerns is
implemented. Thesystemis reversecompatiblewithpresent
standards that are used for encodingQRcodes.Thesystemis
implemented and then tested by using an Android-based
smart-phone. The system introduces a small overhead in
terms of the delay that is required for integrity verification
and content validation.
[3] Security has become extremely important in the digital
society. Authentication process should be seriously
examined by services that store sensitive information. Most
of the users have android smart phones. The Smart phones
have good memory size as well as good processing power
too. As a mobile phone has become an essential accessory in
real life, compared with the traditional key or access card.
Sending the authentication by using mobile phones through
MMS (Multimedia Messaging Service) allows the user to
carry objects but not any extra specific hardware cost. Using
QR Code successful authentication can be done.
[4] 2LQR code has two levels: a public level and a private
level. The public level can be read by any QR code reading
application, while the private level needs a specific
application with specific input information. 2LQR code can
be used for private message sharing or for authentication
scenarios. The private level is created by replacing black
modules with Specific textured patterns. These textured
patterns are considered as black modules by standard QR
code reader. Thus the private level is invisible to standard
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1164
QR code readers. In addition, the private level doesnotaffect
in anyway the reading process of the public level.
[5] The paper refers the authentication problem of real-
world goods on which 2D bar-codes (2D-BC) were printed
and we take the challengers view. The challengers are
assumed to have access to noisy copies of an original 2D-BC.
A simple estimator of the 2D-BC is depends on copies
averages is proposed, letting the challengers print a fake
2DBC with as original by the system detector. Performance
of the estimator in terms of error probability at the detector
side is then derived with respect to Nc and compared with
experimental results on real 2D-BC. It is shown that the
adversary can produce a fake that successfully fools the
detector with a reasonable number of genuine goods.
Advantage: Create a fake 2D-BCs declared as genuine by the
detector. Disadvantage: Requireadditional noisetogenerate
fake barcode. Generating fake 2D QR code declared as
original by QR code reader.
3. SYSTEM ARCHITECTURE
The system used a secret (n,n)-Threshold QR code sharing
approach ,the scheme designs an (n, n)-threshold sharing
system so that the privacy of a secret is provided, making it
unavailable to a cheater. In the system, a dealer and n
participants exist, where n ≥ 2. [1] So the dealer is
responsible for splitting the secret into n marked QR tags.
And the n marked QR tags can be distributed to the n
corresponding participants. The authorized QR tags with n
participants only are qualified to obtain the shared secret,
and no subset of less than n tags can leak any information
about the secret.[1]
Fig -3.1. Architecture for System
Assume that QRi are the n covers of QR barcodes with the
same QR version and error correction level, i=1, 2, 3…., n,
and the data of QRi can be different. That is, the barcode
reader can scan and decode diverse data from QRi. Let S be
the private QR data to be protected.[1]
Here the input secret data is handled by Shadow Derivation
Phase where secret data is split into bundle of 2, first is
shadow i.e. si and second is authenticationvi andsoon.Later
this set of (S,V) are pass to the next phase i.e. to
Concealment Phase and here QR code is marked and
concealed by applying the wet paper codes(WPC)Algorithm
and then finally these set of QRn’ is send for transmission.[1]
Shadow derivation phase:
Step 1: derive the master key K
Step 2: Generate n authentication streams
Step 3: Generate (n-1)random binary shadows
Step 4: Derive the n-th binary shadow.
A reliable distributed secret storagesystemwiththeQRcode
can be applicable in some applications,suchasauthorization
in e-commerce (like e-coupon and e-ticket) and the
distributed secret sharing. Recently, most QR-related
research has used thetraditional watermarkingtechniqueor
the traditional image hiding manner without utilizing the
characteristics of the QR barcode. These schemes do not
operate on the QR tag directly, so they are not capable of the
practice of hiding/reading the secret from the QR code
directly. In real-world applications, the capability of
detecting the cheaters is a significantrequirementbeforethe
secret data are revealed.
Algorithms
Steganography Algorithm:
1) Creating a QR Code
Step 1: Data Analysis
Step 2: Data EncodinG
Step 3: Error Correction Coding
Step 4: Structure Final Message
Step 5: Module Placement in Matrix
Step 6: Data Masking
Step 7: Format and Version Information
Encoding:-
Representation of each letter in secret message by its
equivalent ASCII code.
 Conversion of ASCII code to equivalent 8 bit binary
number.
 Division of 8 bit binary number into two 4 bit parts.
Choosing of suitable letters corresponding to the 4
bit parts.
 Meaningful sentence construction by using letters
obtained as the first letters of suitable words.
 Omission of articles, pronoun, preposition, adverb,
was/were,is/am/are,has/have/had,will/shall,and
would/should in coding process to giveflexibilityin
sentence construction.
 Encoding is not case sensitive.
Decoding
Steps:
 First letter in each word of cover message is taken
and represented by corresponding 4 bit number.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1165
 4 bit binary numbers of combined to obtain 8 bit
number.
 ASCII codes are obtained from 8 bit numbers.
 Finally secret message is recovered from ASCII
codes.
ADVANTAGE:
1. The key advantage of the QR code is its versatility.
2. Relatively small in size. These codes are designed small
in size than the information they contain.
3. Very quick transfer of information.
DISADVANTAGE:
1. One disadvantage of QR codes and perhapsitisthe biggest
problem that the lack of familiarity of the QR code among
people.
2. Another major disadvantage of a QR code is codes
dependability on a mobile device or smart-phone.
3. Security issues. The transfer of data between two devices
can always lead to security issues.
4. CONCLUSIONS
Compared with the different conventional QR application,
the system utilizes the characteristics of QR modules to
satisfy the essential needs of steganography, readability,
robustness, secret capacity, blind extraction , cheater
detection and identification for the sharing mechanism.Also
the QR code security is essential and QR codes are
increasingly used in all life fields, this system can protect
users’ privacy and identity in addition to their smart phone
devices. The proposed secure QR code application provides
more security level as well as maintains backward
compatibility with QR codes that do notincorporatesecurity
features. Even if the QR code does not contain digital
signature, the application can still verify onlinecontents and
malicious contents. However, itwill warntheuseraboutthat
before giving the users the choice to continue or not.
In the future, can extend the work for other barcode types,
enhance the implementation andaddmoresecurityfeatures.
REFERENCES
[1] Pei-Yu Lin” Distributed Secret Sharing Approach with
Cheater Prevention based on QR Code” 2016 IEEE.
[2] Raed M. Bani-Hani,YarubA.Wahsheh,MohammadB.Al-
Sarhan.”Secure QR Code System” 2014 IEEE.
[3] Ms. Dhanashree Patil, Mrs. Shanti. K. Guru. “Secured
Authentication using Challenge-Response and Quick-
Response Code for Android Mobiles” 2014 IEEE.
[4] William Puech, ChristopheDestruel, Olivier Strauss,
Jean-Marc Gaudin, andChristianGuichard”Twolevel QR
code for private message sharing and document
authentication” 2016 IEEE.
[5] C. Baras and F. Cayre, “2D bar-codes for authentication:
A security approach,” in Proc. 20th Eur. Signal Process.
Conf. (EUSIPCO), Aug. 2012, pp.1760–1766.
[6] T. V. Bui, N. K. Vu, T. T. P. Nguyen, I. Echizen, and T. D.
Nguyen, “Robust message hiding for QR code,” in Proc.
IEEE 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal
Process. (IIH-MSP), Aug. 2014, pp. 520–523.
[7] Hsiang-Cheh Huang, Feng-Cheng Chang, and Wai-Chi
Fang.” Reversible Data Hiding with Histogram-Based
Difference Expansion for QR Code Applications” 2011
IEEE.
[8] Yang-Wai Chow,IWilly SusiloD , Joseph Tonien , Elena
Vlahu-GjorgievskaandGuominYang”CooperativeSecret
Sharing Using QRCodesand SymmetricKeys”Symmetry
2018.
[9] Jun-Chou Chuang, Yu-Chen Hu &Hsien-JuKo.” A Novel
Secret Sharing Technique Using QR Code” International
Journal of Image Processing (IJIP), Volume (4) : Issue
(5).
[10] Prof. PallaviTekade , RutujaMhaskar , PriyaSurywanshi,
AishwaryaShirgurkar , AniketPanmalkar , Rohit Patil.”
QR Code Implementation in Car Parking Locator”
International Journal of Innovative Research in
Computer and CommunicationEngineering.Vol.5,Issue
3, March 2017.

Recomendados

QR Codes seminar por
QR Codes seminarQR Codes seminar
QR Codes seminarUmsh23
8.2K vistas14 diapositivas
Qr codes por
Qr codesQr codes
Qr codesniyaj ahmed
2.6K vistas32 diapositivas
QR Codes: A Point of View por
QR Codes: A Point of ViewQR Codes: A Point of View
QR Codes: A Point of ViewBBDO
5.3K vistas24 diapositivas
15 Cool QR Code Things por
15 Cool QR Code Things15 Cool QR Code Things
15 Cool QR Code ThingsSpider Trainers
1.9K vistas51 diapositivas
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY por
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
1K vistas7 diapositivas
Qr code ppt por
Qr code pptQr code ppt
Qr code pptmrudula14
20.2K vistas24 diapositivas

Más contenido relacionado

La actualidad más candente

QR code por
QR codeQR code
QR codeNoah Kim
7.1K vistas46 diapositivas
QR code por
QR codeQR code
QR codeanish kumar
20K vistas18 diapositivas
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones por
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesKamal Spring
35 vistas8 diapositivas
Application of QR Codes in Academic Libraries: With Special Reference to Cent... por
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Jishnu Mandal
920 vistas21 diapositivas
A low pre processing system for low quality QR code por
A low pre processing system for low quality QR codeA low pre processing system for low quality QR code
A low pre processing system for low quality QR codeshameedcm3
3.4K vistas55 diapositivas
Qr codes por
Qr codesQr codes
Qr codesjaiksolanki
483 vistas13 diapositivas

La actualidad más candente(20)

QR code por Noah Kim
QR codeQR code
QR code
Noah Kim7.1K vistas
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones por Kamal Spring
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring35 vistas
Application of QR Codes in Academic Libraries: With Special Reference to Cent... por Jishnu Mandal
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Jishnu Mandal920 vistas
A low pre processing system for low quality QR code por shameedcm3
A low pre processing system for low quality QR codeA low pre processing system for low quality QR code
A low pre processing system for low quality QR code
shameedcm33.4K vistas
IRJET- QR Code Techniques for Smart Shopping: A Review por IRJET Journal
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET Journal48 vistas
QR CODES IN BUSINESS. por RobbySahoo
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.
RobbySahoo3.9K vistas
Qr code (quick response code) por Rohan Sawant
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
Rohan Sawant3.4K vistas
Secured qr code [Pankaj Jeswani and Team] por Pank Jes
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
Pank Jes3.6K vistas
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones por Kamal Spring
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring75 vistas
Use of QR Code: A Step Towards Development in India por IRJET Journal
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in India
IRJET Journal54 vistas
Qr codes por Ellinamama
Qr codesQr codes
Qr codes
Ellinamama4.9K vistas
QR Code Mini Workshop por GSW
QR Code Mini WorkshopQR Code Mini Workshop
QR Code Mini Workshop
GSW1.9K vistas

Similar a IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code

Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-... por
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...IRJET Journal
12 vistas4 diapositivas
IRJET - Color Qr Code por
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr CodeIRJET Journal
35 vistas6 diapositivas
Qr codes web por
Qr codes webQr codes web
Qr codes webSimran Gupta
322 vistas26 diapositivas
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha... por
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET Journal
5 vistas4 diapositivas
A Review on QR Code for Hiding Private Information por
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationIRJET Journal
40 vistas3 diapositivas
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C... por
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...IRJET Journal
3 vistas5 diapositivas

Similar a IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code(20)

Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-... por IRJET Journal
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET Journal12 vistas
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha... por IRJET Journal
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal5 vistas
A Review on QR Code for Hiding Private Information por IRJET Journal
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET Journal40 vistas
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C... por IRJET Journal
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET Journal3 vistas
3.2.qr code based information access system in shopping mall (1) por Tejas Lalwani
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)
Tejas Lalwani973 vistas
Limitations of Barcode and QR code Scanner por IRJET Journal
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code Scanner
IRJET Journal7 vistas
QRC Presentation.pptx por GgDevil
QRC Presentation.pptxQRC Presentation.pptx
QRC Presentation.pptx
GgDevil10 vistas
IRJET-Implementation of QR Code on Data Protection of Cloud Computing por IRJET Journal
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET Journal36 vistas
IRJET - Three Layered Security for Banking por IRJET Journal
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
IRJET Journal15 vistas
Qr code (quick response code) por Likan Patra
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
Likan Patra6K vistas
Advanced smart credential cum unique identification and recognition system por IAEME Publication
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
IAEME Publication103 vistas
Advanced smart credential cum unique identification and recognition system por IAEME Publication
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
IAEME Publication297 vistas
Implementation of 2D Optimal Barcode (QR Code) for Images por Editor IJCATR
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
Editor IJCATR608 vistas

Más de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
25 vistas7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 vistas7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
8 vistas5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 vistas11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 vistas6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 vistas5 diapositivas

Más de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal25 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal8 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 vistas
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 vistas
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal54 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal12 vistas
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 vistas
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 vistas
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal5 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 vistas

Último

Design of machine elements-UNIT 3.pptx por
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptxgopinathcreddy
34 vistas31 diapositivas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...csegroupvn
6 vistas210 diapositivas
Proposal Presentation.pptx por
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptxkeytonallamon
63 vistas36 diapositivas
GDSC Mikroskil Members Onboarding 2023.pdf por
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdfgdscmikroskil
59 vistas62 diapositivas
Ansari: Practical experiences with an LLM-based Islamic Assistant por
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic AssistantM Waleed Kadous
7 vistas29 diapositivas
Design_Discover_Develop_Campaign.pptx por
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptxShivanshSeth6
45 vistas20 diapositivas

Último(20)

Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy34 vistas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn6 vistas
Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptx
keytonallamon63 vistas
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil59 vistas
Ansari: Practical experiences with an LLM-based Islamic Assistant por M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous7 vistas
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth645 vistas
_MAKRIADI-FOTEINI_diploma thesis.pptx por fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi10 vistas
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra816 vistas
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf por AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure6 vistas
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth por Innomantra
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra 10 vistas
Web Dev Session 1.pptx por VedVekhande
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptx
VedVekhande13 vistas
REACTJS.pdf por ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR335 vistas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78165 vistas

IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1162 A Survey: Secret Sharing Approach with Cheater Prevention on QR Code Sarika Laiphrakpam1, Mrs. D. B. Gothawal2 1ME Student, Dept of Computer Engineering, DYPCOE, Pune, India 2Faculty, Dept of Computer Engineering, DYPCOE, Pune, India ------------------------------------------------------------------------***------------------------------------------------------------------- Abstract -A QR code is thecommonlyusedtwo-dimensional (2D) barcode which has high encryptionanddecryptionspeed; it is not only restricted to error-correction ability, but alsocan store large information. QR barcode are used considerably because of their beneficial properties, including small tag, large data capacity, reliability, and high-speed scanning. However the limitation of this is it lacks adequate security protection for private or confidential data. A secret QR sharing approach is to protect the private QR data with a secure and reliable distributed system. The QR code schemes use the QR characteristics to achieve secret sharing and can resist the print-and-scan operation. In the system, the secret has been splitted and conveyedwithQRtagsinthedistribution application, and the system can retrieve the lossless secret with the authorized participants. Using a barcode reader, the general browsers can read the original data from the marked QR tags , and helps reduce the security risk of the secret. The systems approach gives a feasible and provides content readability, cheater detectability , and an adjustable secret payload of the QR barcode. Key Words: QR barcode, Secret sharing,cheaterprevention, QR characteristics 1. INTRODUCTION QR code (quick response code) is a type of two dimensional barcode developed by Denso-Wave companyin1994[1].QR code is a piece of long multilingual text, a linked URL, an automated SMS message, a business card or just about any information can be submerged into the two-dimensional barcode. The QR code system became popular in the automotive industry due to its high-speed scanning, reliability, greater storage capacity compared to standard UPC barcodes and fast readability. A secret QR sharing approach is to protect the private QR data with a secure and reliable distributed system.  Barcode - a code consist of a group of printed patterned bars and spacesandsometimesnumerals that is designed to be scanned and read the information it contain into computer memory. Fig-1.1 Barcode Fig -1.2: QR Code 1.1 QR Code QR code is a two-dimensional code or a matrix barcode that can be reading multiple ways like QR scanners, mobile phones with a camera, and smart-phones. Fig- 1.3: Overview of QR Code and working. The QR Code, Information is encoded in both direction i.e. Vertical and horizontal respectively, thus it holds hundred times additional data than a traditional bar. There are two types of QR Codes. 1. ONLINE CODES 2. It point to an Internet addresses and trigger a client / server interaction that requires an active Internet connection. This involves the access of a mobile website and the sending of an SMS message. 2. OFFLINE CODES The name itself suggests that these codes do not need an Internet connection. It directly resolved on the phone.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1163 Two-dimensional symbolsgenerallycontainmuchmore data mounted on; it is compared with linear symbols and thus requires much longer data processing time and more complex process. Therefore, QR Code has much more consideration for its finder pattern to enable high-speed reading. QR Codes have overtaken the popularity of classical barcode in many areas. The key fact about typical barcode is that it can hold maximum of 20 digits only, which is overcome by QR code as it can hold up to 7,089 characters. Fig-1.4: - The development of QR code. QR Codes has the capability to encode same amount of data approximately in one tenth the space of a traditional 1D barcode. A great feature of QR Codes is that they do not need to be scanned from one particular angle, as QR Codes can be read regardless from any position respectively. The most popular and commercial use for QR Codes is in the telecommunications industry, where the increasing in the adoption of smart-phones seems to be the biggest driver of its popularity. QR Codes seem to be a suitable tool for quick and efficient communication URLs to users. 1.2 Characteristics of QR code  All-Direction (3600) High-speed Reading- Reading in all directions (3600 ) the ratio between black and white among the scan line that runs through the finder patterns is always when seen from any direction among the 360° surrounding it.  Resistant to Distorted Symbols- Symbols often get distorted as soon as they are attached to a curved surface i.e. angled CCD sensor face and the symbol face. To spot this distortion,QR Code has alignment patterns arranged with a regular interval within the range of the symbol.  Data Restoration Functionality (Resistant to smudged or damaged symbol):- QR Code has four different error correction levels 7%, 15%, 25% and 30% that depend on symbol area. The error correction functionality is implemented according to the smudged/damage, and it is utilizing the code which is highly resistant to error.  Linking Functionality of the Symbols:- A single symbol is represented in several symbols on dividing it by using linking functionality.Asingle symbol can be dividedatmaximuminto16symbols.  High Capacity Encoding of Data:- QR Code is efficient to handle all types of data, like numeric and alphabetic characters, Kanji, Kana, Hiragana symbols, binary, control codes and etc. In one symbol up to 7,089 characters can be encoded.  Small Printout Size:- Since QR Code carries information both horizontally and vertically, QR Code is capable of encoding the same amount of data in approximately one-tenth the space of a traditional bar code. 2. LITERATURE SURVEY Different from the conventional QR application, the purposed approach utilizes the characteristics of QR modules to satisfy the essential of steganography, readability, robustness, adjustable secret capability, blind extraction, cheater detection, and identification for secret sharing mechanism[1]. The QR sharing system can achieve satisfactory performance when compared to related attempts. [2] In this paper, a security system for QR codes that guarantees both users and generators security concerns is implemented. Thesystemis reversecompatiblewithpresent standards that are used for encodingQRcodes.Thesystemis implemented and then tested by using an Android-based smart-phone. The system introduces a small overhead in terms of the delay that is required for integrity verification and content validation. [3] Security has become extremely important in the digital society. Authentication process should be seriously examined by services that store sensitive information. Most of the users have android smart phones. The Smart phones have good memory size as well as good processing power too. As a mobile phone has become an essential accessory in real life, compared with the traditional key or access card. Sending the authentication by using mobile phones through MMS (Multimedia Messaging Service) allows the user to carry objects but not any extra specific hardware cost. Using QR Code successful authentication can be done. [4] 2LQR code has two levels: a public level and a private level. The public level can be read by any QR code reading application, while the private level needs a specific application with specific input information. 2LQR code can be used for private message sharing or for authentication scenarios. The private level is created by replacing black modules with Specific textured patterns. These textured patterns are considered as black modules by standard QR code reader. Thus the private level is invisible to standard
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1164 QR code readers. In addition, the private level doesnotaffect in anyway the reading process of the public level. [5] The paper refers the authentication problem of real- world goods on which 2D bar-codes (2D-BC) were printed and we take the challengers view. The challengers are assumed to have access to noisy copies of an original 2D-BC. A simple estimator of the 2D-BC is depends on copies averages is proposed, letting the challengers print a fake 2DBC with as original by the system detector. Performance of the estimator in terms of error probability at the detector side is then derived with respect to Nc and compared with experimental results on real 2D-BC. It is shown that the adversary can produce a fake that successfully fools the detector with a reasonable number of genuine goods. Advantage: Create a fake 2D-BCs declared as genuine by the detector. Disadvantage: Requireadditional noisetogenerate fake barcode. Generating fake 2D QR code declared as original by QR code reader. 3. SYSTEM ARCHITECTURE The system used a secret (n,n)-Threshold QR code sharing approach ,the scheme designs an (n, n)-threshold sharing system so that the privacy of a secret is provided, making it unavailable to a cheater. In the system, a dealer and n participants exist, where n ≥ 2. [1] So the dealer is responsible for splitting the secret into n marked QR tags. And the n marked QR tags can be distributed to the n corresponding participants. The authorized QR tags with n participants only are qualified to obtain the shared secret, and no subset of less than n tags can leak any information about the secret.[1] Fig -3.1. Architecture for System Assume that QRi are the n covers of QR barcodes with the same QR version and error correction level, i=1, 2, 3…., n, and the data of QRi can be different. That is, the barcode reader can scan and decode diverse data from QRi. Let S be the private QR data to be protected.[1] Here the input secret data is handled by Shadow Derivation Phase where secret data is split into bundle of 2, first is shadow i.e. si and second is authenticationvi andsoon.Later this set of (S,V) are pass to the next phase i.e. to Concealment Phase and here QR code is marked and concealed by applying the wet paper codes(WPC)Algorithm and then finally these set of QRn’ is send for transmission.[1] Shadow derivation phase: Step 1: derive the master key K Step 2: Generate n authentication streams Step 3: Generate (n-1)random binary shadows Step 4: Derive the n-th binary shadow. A reliable distributed secret storagesystemwiththeQRcode can be applicable in some applications,suchasauthorization in e-commerce (like e-coupon and e-ticket) and the distributed secret sharing. Recently, most QR-related research has used thetraditional watermarkingtechniqueor the traditional image hiding manner without utilizing the characteristics of the QR barcode. These schemes do not operate on the QR tag directly, so they are not capable of the practice of hiding/reading the secret from the QR code directly. In real-world applications, the capability of detecting the cheaters is a significantrequirementbeforethe secret data are revealed. Algorithms Steganography Algorithm: 1) Creating a QR Code Step 1: Data Analysis Step 2: Data EncodinG Step 3: Error Correction Coding Step 4: Structure Final Message Step 5: Module Placement in Matrix Step 6: Data Masking Step 7: Format and Version Information Encoding:- Representation of each letter in secret message by its equivalent ASCII code.  Conversion of ASCII code to equivalent 8 bit binary number.  Division of 8 bit binary number into two 4 bit parts. Choosing of suitable letters corresponding to the 4 bit parts.  Meaningful sentence construction by using letters obtained as the first letters of suitable words.  Omission of articles, pronoun, preposition, adverb, was/were,is/am/are,has/have/had,will/shall,and would/should in coding process to giveflexibilityin sentence construction.  Encoding is not case sensitive. Decoding Steps:  First letter in each word of cover message is taken and represented by corresponding 4 bit number.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1165  4 bit binary numbers of combined to obtain 8 bit number.  ASCII codes are obtained from 8 bit numbers.  Finally secret message is recovered from ASCII codes. ADVANTAGE: 1. The key advantage of the QR code is its versatility. 2. Relatively small in size. These codes are designed small in size than the information they contain. 3. Very quick transfer of information. DISADVANTAGE: 1. One disadvantage of QR codes and perhapsitisthe biggest problem that the lack of familiarity of the QR code among people. 2. Another major disadvantage of a QR code is codes dependability on a mobile device or smart-phone. 3. Security issues. The transfer of data between two devices can always lead to security issues. 4. CONCLUSIONS Compared with the different conventional QR application, the system utilizes the characteristics of QR modules to satisfy the essential needs of steganography, readability, robustness, secret capacity, blind extraction , cheater detection and identification for the sharing mechanism.Also the QR code security is essential and QR codes are increasingly used in all life fields, this system can protect users’ privacy and identity in addition to their smart phone devices. The proposed secure QR code application provides more security level as well as maintains backward compatibility with QR codes that do notincorporatesecurity features. Even if the QR code does not contain digital signature, the application can still verify onlinecontents and malicious contents. However, itwill warntheuseraboutthat before giving the users the choice to continue or not. In the future, can extend the work for other barcode types, enhance the implementation andaddmoresecurityfeatures. REFERENCES [1] Pei-Yu Lin” Distributed Secret Sharing Approach with Cheater Prevention based on QR Code” 2016 IEEE. [2] Raed M. Bani-Hani,YarubA.Wahsheh,MohammadB.Al- Sarhan.”Secure QR Code System” 2014 IEEE. [3] Ms. Dhanashree Patil, Mrs. Shanti. K. Guru. “Secured Authentication using Challenge-Response and Quick- Response Code for Android Mobiles” 2014 IEEE. [4] William Puech, ChristopheDestruel, Olivier Strauss, Jean-Marc Gaudin, andChristianGuichard”Twolevel QR code for private message sharing and document authentication” 2016 IEEE. [5] C. Baras and F. Cayre, “2D bar-codes for authentication: A security approach,” in Proc. 20th Eur. Signal Process. Conf. (EUSIPCO), Aug. 2012, pp.1760–1766. [6] T. V. Bui, N. K. Vu, T. T. P. Nguyen, I. Echizen, and T. D. Nguyen, “Robust message hiding for QR code,” in Proc. IEEE 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. (IIH-MSP), Aug. 2014, pp. 520–523. [7] Hsiang-Cheh Huang, Feng-Cheng Chang, and Wai-Chi Fang.” Reversible Data Hiding with Histogram-Based Difference Expansion for QR Code Applications” 2011 IEEE. [8] Yang-Wai Chow,IWilly SusiloD , Joseph Tonien , Elena Vlahu-GjorgievskaandGuominYang”CooperativeSecret Sharing Using QRCodesand SymmetricKeys”Symmetry 2018. [9] Jun-Chou Chuang, Yu-Chen Hu &Hsien-JuKo.” A Novel Secret Sharing Technique Using QR Code” International Journal of Image Processing (IJIP), Volume (4) : Issue (5). [10] Prof. PallaviTekade , RutujaMhaskar , PriyaSurywanshi, AishwaryaShirgurkar , AniketPanmalkar , Rohit Patil.” QR Code Implementation in Car Parking Locator” International Journal of Innovative Research in Computer and CommunicationEngineering.Vol.5,Issue 3, March 2017.