SlideShare a Scribd company logo
Enviar búsqueda
Cargar
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
Denunciar
Compartir
IRJET Journal
Fast Track Publications
Seguir
•
0 recomendaciones
•
20 vistas
Ingeniería
https://www.irjet.net/archives/V6/i6/IRJET-V6I6295.pdf
Leer más
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
•
0 recomendaciones
•
20 vistas
IRJET Journal
Fast Track Publications
Seguir
Denunciar
Compartir
Ingeniería
https://www.irjet.net/archives/V6/i6/IRJET-V6I6295.pdf
Leer más
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
1 de 4
Descargar ahora
Recomendados
QR Codes seminar por
QR Codes seminar
Umsh23
8.2K vistas
•
14 diapositivas
Qr codes por
Qr codes
niyaj ahmed
2.6K vistas
•
32 diapositivas
QR Codes: A Point of View por
QR Codes: A Point of View
BBDO
5.3K vistas
•
24 diapositivas
15 Cool QR Code Things por
15 Cool QR Code Things
Spider Trainers
1.9K vistas
•
51 diapositivas
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY por
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
acijjournal
1K vistas
•
7 diapositivas
Qr code ppt por
Qr code ppt
mrudula14
20.2K vistas
•
24 diapositivas
Más contenido relacionado
La actualidad más candente
QR code por
QR code
Noah Kim
7.1K vistas
•
46 diapositivas
QR code por
QR code
anish kumar
20K vistas
•
18 diapositivas
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones por
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
35 vistas
•
8 diapositivas
Application of QR Codes in Academic Libraries: With Special Reference to Cent... por
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Jishnu Mandal
920 vistas
•
21 diapositivas
A low pre processing system for low quality QR code por
A low pre processing system for low quality QR code
shameedcm3
3.4K vistas
•
55 diapositivas
Qr codes por
Qr codes
jaiksolanki
483 vistas
•
13 diapositivas
La actualidad más candente
(20)
QR code por Noah Kim
QR code
Noah Kim
•
7.1K vistas
QR code por anish kumar
QR code
anish kumar
•
20K vistas
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones por Kamal Spring
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
•
35 vistas
Application of QR Codes in Academic Libraries: With Special Reference to Cent... por Jishnu Mandal
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Jishnu Mandal
•
920 vistas
A low pre processing system for low quality QR code por shameedcm3
A low pre processing system for low quality QR code
shameedcm3
•
3.4K vistas
Qr codes por jaiksolanki
Qr codes
jaiksolanki
•
483 vistas
IRJET- QR Code Techniques for Smart Shopping: A Review por IRJET Journal
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET Journal
•
48 vistas
QR CODES IN BUSINESS. por RobbySahoo
QR CODES IN BUSINESS.
RobbySahoo
•
3.9K vistas
Qr code (quick response code) por Rohan Sawant
Qr code (quick response code)
Rohan Sawant
•
3.4K vistas
Secured qr code [Pankaj Jeswani and Team] por Pank Jes
Secured qr code [Pankaj Jeswani and Team]
Pank Jes
•
3.6K vistas
Qr code por Ajay Verma
Qr code
Ajay Verma
•
685 vistas
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones por Kamal Spring
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
•
75 vistas
Three qr code por Hugo Satyre
Three qr code
Hugo Satyre
•
962 vistas
QR-CODE presentation slide por Ravindra Chaudhary
QR-CODE presentation slide
Ravindra Chaudhary
•
9.6K vistas
Use of QR Code: A Step Towards Development in India por IRJET Journal
Use of QR Code: A Step Towards Development in India
IRJET Journal
•
54 vistas
&^^& por Yahia Zakaria
&^^&
Yahia Zakaria
•
486 vistas
Qr codes por Ellinamama
Qr codes
Ellinamama
•
4.9K vistas
QR Code Mini Workshop por GSW
QR Code Mini Workshop
GSW
•
1.9K vistas
QR Codes: What, Why, How & Where por Robin M. Ashford, MSLIS
QR Codes: What, Why, How & Where
Robin M. Ashford, MSLIS
•
5.8K vistas
What is a QR Code? por Michael Sauers
What is a QR Code?
Michael Sauers
•
1.8K vistas
Similar a IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-... por
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET Journal
12 vistas
•
4 diapositivas
IRJET - Color Qr Code por
IRJET - Color Qr Code
IRJET Journal
35 vistas
•
6 diapositivas
Qr codes web por
Qr codes web
Simran Gupta
322 vistas
•
26 diapositivas
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha... por
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
5 vistas
•
4 diapositivas
A Review on QR Code for Hiding Private Information por
A Review on QR Code for Hiding Private Information
IRJET Journal
40 vistas
•
3 diapositivas
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C... por
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET Journal
3 vistas
•
5 diapositivas
Similar a IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
(20)
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-... por IRJET Journal
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET Journal
•
12 vistas
IRJET - Color Qr Code por IRJET Journal
IRJET - Color Qr Code
IRJET Journal
•
35 vistas
Qr codes web por Simran Gupta
Qr codes web
Simran Gupta
•
322 vistas
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha... por IRJET Journal
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
•
5 vistas
A Review on QR Code for Hiding Private Information por IRJET Journal
A Review on QR Code for Hiding Private Information
IRJET Journal
•
40 vistas
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C... por IRJET Journal
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET Journal
•
3 vistas
CREATION AND DETECTION OF QR CODE.pptx por ELECTRONICSCOMMUNICA6
CREATION AND DETECTION OF QR CODE.pptx
ELECTRONICSCOMMUNICA6
•
13 vistas
DETECTION OF QR CODE.pptx por ELECTRONICSCOMMUNICA6
DETECTION OF QR CODE.pptx
ELECTRONICSCOMMUNICA6
•
13 vistas
3.2.qr code based information access system in shopping mall (1) por Tejas Lalwani
3.2.qr code based information access system in shopping mall (1)
Tejas Lalwani
•
973 vistas
Limitations of Barcode and QR code Scanner por IRJET Journal
Limitations of Barcode and QR code Scanner
IRJET Journal
•
7 vistas
QRC Presentation.pptx por GgDevil
QRC Presentation.pptx
GgDevil
•
10 vistas
IRJET-Implementation of QR Code on Data Protection of Cloud Computing por IRJET Journal
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET Journal
•
36 vistas
IRJET - Three Layered Security for Banking por IRJET Journal
IRJET - Three Layered Security for Banking
IRJET Journal
•
15 vistas
Qr code (quick response code) por Likan Patra
Qr code (quick response code)
Likan Patra
•
6K vistas
Advanced smart credential cum unique identification and recognition system por IAEME Publication
Advanced smart credential cum unique identification and recognition system
IAEME Publication
•
103 vistas
Advanced smart credential cum unique identification and recognition system por IAEME Publication
Advanced smart credential cum unique identification and recognition system
IAEME Publication
•
297 vistas
Qr code in education por Vasil Dimitrov
Qr code in education
Vasil Dimitrov
•
416 vistas
Implementation of 2D Optimal Barcode (QR Code) for Images por Editor IJCATR
Implementation of 2D Optimal Barcode (QR Code) for Images
Editor IJCATR
•
608 vistas
14 571 por Chaitanya Ram
14 571
Chaitanya Ram
•
185 vistas
Qr codes in academic libraries por Library and Information Science Blog
Qr codes in academic libraries
Library and Information Science Blog
•
85 vistas
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
25 vistas
•
7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 vistas
•
7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
8 vistas
•
5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 vistas
•
11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 vistas
•
6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 vistas
•
5 diapositivas
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
25 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
8 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 vistas
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 vistas
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
54 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
12 vistas
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 vistas
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 vistas
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
5 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 vistas
Último
Design of machine elements-UNIT 3.pptx por
Design of machine elements-UNIT 3.pptx
gopinathcreddy
34 vistas
•
31 diapositivas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn
6 vistas
•
210 diapositivas
Proposal Presentation.pptx por
Proposal Presentation.pptx
keytonallamon
63 vistas
•
36 diapositivas
GDSC Mikroskil Members Onboarding 2023.pdf por
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil
59 vistas
•
62 diapositivas
Ansari: Practical experiences with an LLM-based Islamic Assistant por
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous
7 vistas
•
29 diapositivas
Design_Discover_Develop_Campaign.pptx por
Design_Discover_Develop_Campaign.pptx
ShivanshSeth6
45 vistas
•
20 diapositivas
Último
(20)
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptx
gopinathcreddy
•
34 vistas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn
•
6 vistas
Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptx
keytonallamon
•
63 vistas
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil
•
59 vistas
Ansari: Practical experiences with an LLM-based Islamic Assistant por M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous
•
7 vistas
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptx
ShivanshSeth6
•
45 vistas
START Newsletter 3 por Start Project
START Newsletter 3
Start Project
•
6 vistas
_MAKRIADI-FOTEINI_diploma thesis.pptx por fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi
•
10 vistas
MK__Cert.pdf por Hassan Khan
MK__Cert.pdf
Hassan Khan
•
16 vistas
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
19 vistas
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptx
deepmitra8
•
16 vistas
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf por AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure
•
6 vistas
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth por Innomantra
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra
•
10 vistas
Web Dev Session 1.pptx por VedVekhande
Web Dev Session 1.pptx
VedVekhande
•
13 vistas
802.11 Computer Networks por TusharChoudhary72015
802.11 Computer Networks
TusharChoudhary72015
•
13 vistas
REACTJS.pdf por ArthyR3
REACTJS.pdf
ArthyR3
•
35 vistas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
•
165 vistas
sam_software_eng_cv.pdf por sammyigbinovia
sam_software_eng_cv.pdf
sammyigbinovia
•
9 vistas
Pitchbook Repowerlab.pdf por VictoriaGaleano
Pitchbook Repowerlab.pdf
VictoriaGaleano
•
5 vistas
Renewal Projects in Seismic Construction por Engineering & Seismic Construction
Renewal Projects in Seismic Construction
Engineering & Seismic Construction
•
5 vistas
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1162 A Survey: Secret Sharing Approach with Cheater Prevention on QR Code Sarika Laiphrakpam1, Mrs. D. B. Gothawal2 1ME Student, Dept of Computer Engineering, DYPCOE, Pune, India 2Faculty, Dept of Computer Engineering, DYPCOE, Pune, India ------------------------------------------------------------------------***------------------------------------------------------------------- Abstract -A QR code is thecommonlyusedtwo-dimensional (2D) barcode which has high encryptionanddecryptionspeed; it is not only restricted to error-correction ability, but alsocan store large information. QR barcode are used considerably because of their beneficial properties, including small tag, large data capacity, reliability, and high-speed scanning. However the limitation of this is it lacks adequate security protection for private or confidential data. A secret QR sharing approach is to protect the private QR data with a secure and reliable distributed system. The QR code schemes use the QR characteristics to achieve secret sharing and can resist the print-and-scan operation. In the system, the secret has been splitted and conveyedwithQRtagsinthedistribution application, and the system can retrieve the lossless secret with the authorized participants. Using a barcode reader, the general browsers can read the original data from the marked QR tags , and helps reduce the security risk of the secret. The systems approach gives a feasible and provides content readability, cheater detectability , and an adjustable secret payload of the QR barcode. Key Words: QR barcode, Secret sharing,cheaterprevention, QR characteristics 1. INTRODUCTION QR code (quick response code) is a type of two dimensional barcode developed by Denso-Wave companyin1994[1].QR code is a piece of long multilingual text, a linked URL, an automated SMS message, a business card or just about any information can be submerged into the two-dimensional barcode. The QR code system became popular in the automotive industry due to its high-speed scanning, reliability, greater storage capacity compared to standard UPC barcodes and fast readability. A secret QR sharing approach is to protect the private QR data with a secure and reliable distributed system. Barcode - a code consist of a group of printed patterned bars and spacesandsometimesnumerals that is designed to be scanned and read the information it contain into computer memory. Fig-1.1 Barcode Fig -1.2: QR Code 1.1 QR Code QR code is a two-dimensional code or a matrix barcode that can be reading multiple ways like QR scanners, mobile phones with a camera, and smart-phones. Fig- 1.3: Overview of QR Code and working. The QR Code, Information is encoded in both direction i.e. Vertical and horizontal respectively, thus it holds hundred times additional data than a traditional bar. There are two types of QR Codes. 1. ONLINE CODES 2. It point to an Internet addresses and trigger a client / server interaction that requires an active Internet connection. This involves the access of a mobile website and the sending of an SMS message. 2. OFFLINE CODES The name itself suggests that these codes do not need an Internet connection. It directly resolved on the phone.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1163 Two-dimensional symbolsgenerallycontainmuchmore data mounted on; it is compared with linear symbols and thus requires much longer data processing time and more complex process. Therefore, QR Code has much more consideration for its finder pattern to enable high-speed reading. QR Codes have overtaken the popularity of classical barcode in many areas. The key fact about typical barcode is that it can hold maximum of 20 digits only, which is overcome by QR code as it can hold up to 7,089 characters. Fig-1.4: - The development of QR code. QR Codes has the capability to encode same amount of data approximately in one tenth the space of a traditional 1D barcode. A great feature of QR Codes is that they do not need to be scanned from one particular angle, as QR Codes can be read regardless from any position respectively. The most popular and commercial use for QR Codes is in the telecommunications industry, where the increasing in the adoption of smart-phones seems to be the biggest driver of its popularity. QR Codes seem to be a suitable tool for quick and efficient communication URLs to users. 1.2 Characteristics of QR code All-Direction (3600) High-speed Reading- Reading in all directions (3600 ) the ratio between black and white among the scan line that runs through the finder patterns is always when seen from any direction among the 360° surrounding it. Resistant to Distorted Symbols- Symbols often get distorted as soon as they are attached to a curved surface i.e. angled CCD sensor face and the symbol face. To spot this distortion,QR Code has alignment patterns arranged with a regular interval within the range of the symbol. Data Restoration Functionality (Resistant to smudged or damaged symbol):- QR Code has four different error correction levels 7%, 15%, 25% and 30% that depend on symbol area. The error correction functionality is implemented according to the smudged/damage, and it is utilizing the code which is highly resistant to error. Linking Functionality of the Symbols:- A single symbol is represented in several symbols on dividing it by using linking functionality.Asingle symbol can be dividedatmaximuminto16symbols. High Capacity Encoding of Data:- QR Code is efficient to handle all types of data, like numeric and alphabetic characters, Kanji, Kana, Hiragana symbols, binary, control codes and etc. In one symbol up to 7,089 characters can be encoded. Small Printout Size:- Since QR Code carries information both horizontally and vertically, QR Code is capable of encoding the same amount of data in approximately one-tenth the space of a traditional bar code. 2. LITERATURE SURVEY Different from the conventional QR application, the purposed approach utilizes the characteristics of QR modules to satisfy the essential of steganography, readability, robustness, adjustable secret capability, blind extraction, cheater detection, and identification for secret sharing mechanism[1]. The QR sharing system can achieve satisfactory performance when compared to related attempts. [2] In this paper, a security system for QR codes that guarantees both users and generators security concerns is implemented. Thesystemis reversecompatiblewithpresent standards that are used for encodingQRcodes.Thesystemis implemented and then tested by using an Android-based smart-phone. The system introduces a small overhead in terms of the delay that is required for integrity verification and content validation. [3] Security has become extremely important in the digital society. Authentication process should be seriously examined by services that store sensitive information. Most of the users have android smart phones. The Smart phones have good memory size as well as good processing power too. As a mobile phone has become an essential accessory in real life, compared with the traditional key or access card. Sending the authentication by using mobile phones through MMS (Multimedia Messaging Service) allows the user to carry objects but not any extra specific hardware cost. Using QR Code successful authentication can be done. [4] 2LQR code has two levels: a public level and a private level. The public level can be read by any QR code reading application, while the private level needs a specific application with specific input information. 2LQR code can be used for private message sharing or for authentication scenarios. The private level is created by replacing black modules with Specific textured patterns. These textured patterns are considered as black modules by standard QR code reader. Thus the private level is invisible to standard
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1164 QR code readers. In addition, the private level doesnotaffect in anyway the reading process of the public level. [5] The paper refers the authentication problem of real- world goods on which 2D bar-codes (2D-BC) were printed and we take the challengers view. The challengers are assumed to have access to noisy copies of an original 2D-BC. A simple estimator of the 2D-BC is depends on copies averages is proposed, letting the challengers print a fake 2DBC with as original by the system detector. Performance of the estimator in terms of error probability at the detector side is then derived with respect to Nc and compared with experimental results on real 2D-BC. It is shown that the adversary can produce a fake that successfully fools the detector with a reasonable number of genuine goods. Advantage: Create a fake 2D-BCs declared as genuine by the detector. Disadvantage: Requireadditional noisetogenerate fake barcode. Generating fake 2D QR code declared as original by QR code reader. 3. SYSTEM ARCHITECTURE The system used a secret (n,n)-Threshold QR code sharing approach ,the scheme designs an (n, n)-threshold sharing system so that the privacy of a secret is provided, making it unavailable to a cheater. In the system, a dealer and n participants exist, where n ≥ 2. [1] So the dealer is responsible for splitting the secret into n marked QR tags. And the n marked QR tags can be distributed to the n corresponding participants. The authorized QR tags with n participants only are qualified to obtain the shared secret, and no subset of less than n tags can leak any information about the secret.[1] Fig -3.1. Architecture for System Assume that QRi are the n covers of QR barcodes with the same QR version and error correction level, i=1, 2, 3…., n, and the data of QRi can be different. That is, the barcode reader can scan and decode diverse data from QRi. Let S be the private QR data to be protected.[1] Here the input secret data is handled by Shadow Derivation Phase where secret data is split into bundle of 2, first is shadow i.e. si and second is authenticationvi andsoon.Later this set of (S,V) are pass to the next phase i.e. to Concealment Phase and here QR code is marked and concealed by applying the wet paper codes(WPC)Algorithm and then finally these set of QRn’ is send for transmission.[1] Shadow derivation phase: Step 1: derive the master key K Step 2: Generate n authentication streams Step 3: Generate (n-1)random binary shadows Step 4: Derive the n-th binary shadow. A reliable distributed secret storagesystemwiththeQRcode can be applicable in some applications,suchasauthorization in e-commerce (like e-coupon and e-ticket) and the distributed secret sharing. Recently, most QR-related research has used thetraditional watermarkingtechniqueor the traditional image hiding manner without utilizing the characteristics of the QR barcode. These schemes do not operate on the QR tag directly, so they are not capable of the practice of hiding/reading the secret from the QR code directly. In real-world applications, the capability of detecting the cheaters is a significantrequirementbeforethe secret data are revealed. Algorithms Steganography Algorithm: 1) Creating a QR Code Step 1: Data Analysis Step 2: Data EncodinG Step 3: Error Correction Coding Step 4: Structure Final Message Step 5: Module Placement in Matrix Step 6: Data Masking Step 7: Format and Version Information Encoding:- Representation of each letter in secret message by its equivalent ASCII code. Conversion of ASCII code to equivalent 8 bit binary number. Division of 8 bit binary number into two 4 bit parts. Choosing of suitable letters corresponding to the 4 bit parts. Meaningful sentence construction by using letters obtained as the first letters of suitable words. Omission of articles, pronoun, preposition, adverb, was/were,is/am/are,has/have/had,will/shall,and would/should in coding process to giveflexibilityin sentence construction. Encoding is not case sensitive. Decoding Steps: First letter in each word of cover message is taken and represented by corresponding 4 bit number.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1165 4 bit binary numbers of combined to obtain 8 bit number. ASCII codes are obtained from 8 bit numbers. Finally secret message is recovered from ASCII codes. ADVANTAGE: 1. The key advantage of the QR code is its versatility. 2. Relatively small in size. These codes are designed small in size than the information they contain. 3. Very quick transfer of information. DISADVANTAGE: 1. One disadvantage of QR codes and perhapsitisthe biggest problem that the lack of familiarity of the QR code among people. 2. Another major disadvantage of a QR code is codes dependability on a mobile device or smart-phone. 3. Security issues. The transfer of data between two devices can always lead to security issues. 4. CONCLUSIONS Compared with the different conventional QR application, the system utilizes the characteristics of QR modules to satisfy the essential needs of steganography, readability, robustness, secret capacity, blind extraction , cheater detection and identification for the sharing mechanism.Also the QR code security is essential and QR codes are increasingly used in all life fields, this system can protect users’ privacy and identity in addition to their smart phone devices. The proposed secure QR code application provides more security level as well as maintains backward compatibility with QR codes that do notincorporatesecurity features. Even if the QR code does not contain digital signature, the application can still verify onlinecontents and malicious contents. However, itwill warntheuseraboutthat before giving the users the choice to continue or not. In the future, can extend the work for other barcode types, enhance the implementation andaddmoresecurityfeatures. REFERENCES [1] Pei-Yu Lin” Distributed Secret Sharing Approach with Cheater Prevention based on QR Code” 2016 IEEE. [2] Raed M. Bani-Hani,YarubA.Wahsheh,MohammadB.Al- Sarhan.”Secure QR Code System” 2014 IEEE. [3] Ms. Dhanashree Patil, Mrs. Shanti. K. Guru. “Secured Authentication using Challenge-Response and Quick- Response Code for Android Mobiles” 2014 IEEE. [4] William Puech, ChristopheDestruel, Olivier Strauss, Jean-Marc Gaudin, andChristianGuichard”Twolevel QR code for private message sharing and document authentication” 2016 IEEE. [5] C. Baras and F. Cayre, “2D bar-codes for authentication: A security approach,” in Proc. 20th Eur. Signal Process. Conf. (EUSIPCO), Aug. 2012, pp.1760–1766. [6] T. V. Bui, N. K. Vu, T. T. P. Nguyen, I. Echizen, and T. D. Nguyen, “Robust message hiding for QR code,” in Proc. IEEE 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. (IIH-MSP), Aug. 2014, pp. 520–523. [7] Hsiang-Cheh Huang, Feng-Cheng Chang, and Wai-Chi Fang.” Reversible Data Hiding with Histogram-Based Difference Expansion for QR Code Applications” 2011 IEEE. [8] Yang-Wai Chow,IWilly SusiloD , Joseph Tonien , Elena Vlahu-GjorgievskaandGuominYang”CooperativeSecret Sharing Using QRCodesand SymmetricKeys”Symmetry 2018. [9] Jun-Chou Chuang, Yu-Chen Hu &Hsien-JuKo.” A Novel Secret Sharing Technique Using QR Code” International Journal of Image Processing (IJIP), Volume (4) : Issue (5). [10] Prof. PallaviTekade , RutujaMhaskar , PriyaSurywanshi, AishwaryaShirgurkar , AniketPanmalkar , Rohit Patil.” QR Code Implementation in Car Parking Locator” International Journal of Innovative Research in Computer and CommunicationEngineering.Vol.5,Issue 3, March 2017.
Descargar ahora