SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2857
Image Watermarking Using QR Code
Ajit N. Gedam1, Afiya Papde2, Pranalee Walunj3, Rana Shaikh4 ,Sakshi Kamble5
2,3,4,5Students, Computer Engineering Department, AISSMS Polytechnic, Pune, Maharastra, India
1Ajit N. Gedam Lecturer in Computer Engineering Department, AISSMS Polytechnic, Pune, Maharastra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Digital image security and integrity are the top
prioritized issue in today’s information World. Watermarking
is a famous technique that is used for copyrightprotectionand
authentication. Watermark Should be robust and
imperceptible. Digital image watermarking process is to
embed information of digital such as an image into digital
signal using a strong media QR code. It is very difficult to
identify that digital image watermarking has applied to the
data This is a competent way to restrict illegal copyrights of
Information from interactive multimedia networks.With
advanced technology in printing and scanning, creating
imitate documents have become an Uncomplicated task,
making it very difficult to understand between original and
the artificial. So, it is a very big challenge for providing
Security and verification of digital data. This paper put
forward an idea or intimation to provide an innovative
method to verify the digital documents. An advanced method
of QR code is bring here, which allow us to embed digital data
such as image in QR code. In this paper, we bring up a new
technique, where the image is encoded in QR i.e. [Quick
Response] Code in encrypted form, so that if a hacker tries to
modify or tries to tamper with the data the data then he will
be unsuccessful to do that. This is due to; the encryption key is
unknown to him except from the authorized person. It is
impossible to scan or have access to the encrypted QR code as
QR codes are robust.
Key Words: QR code, AES(Advanced Encryption Standard)
Algorithm, Android platform,Digtal image, Secret
key,Watermarking,Decryption
Problem Statement: After new technology of digitizing
information were developed,a huge amount of databases of
texts,images,scientific data,video,audiofilesandotherdigital
information had been appeared in the world. With
developing network and internet technologies and
connecting computers into the World Wide Web, databases
become available not only for authorize access butforillegal
access also.Much more digital data can be accessed to via
network now a days.The problem of data protectionisoneof
the most important .The methods of coding and hiding
information are well known from ancient times as a
cryptography and stegnography.
1. INTRODUCTION
A digital watermark is a kind of marker secretly embedded
in a noise-permit signal such as an image data. It is typically
used to identify proprietorship of the copyright of such
signal. "Watermarking" is the process of hiding digital
information in a carrier signal the hidden information
should, but doesn't need to, contain a relation to the carrier
signal. Digital watermarks may be used to prove the
authenticity or integrity of the carrier signal or to show the
identity of its proprietor. The informationtobeembedded in
a signal is called a digital watermark, although in some
condition the term digital watermark means the
dissimilarity between the watermarked signal andthecover
signal. The signal where the watermark is to be embeddedis
called the host signal. A watermarking system is usually
divided into three prominent steps, embedding, attack, and
perception. In embedding, an algorithm obtain the host and
the data to be submerged, and produces a watermarked
signal. this paper contain QR codeandsteganographyisused
to furnish the security to important data.
1.1 QR Code
QR codes are 2 dimensional matrix. It allows to store a large
volume of unique data. Bar-codes are one dimensional
vector. So compare to bar-codes QR codes are having more
storage size. QR codes can hold up to 7,089 numeric
characters and up to 4,296 alphanumerical letter values as
an information. The following figureshowsthestructure ofa
QR code.
Fig-1: QR Code
1.2 Steganography
Steganography is an embedding process to hide the data in
the form of an image or text. now a days sense of the word
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2858
sometimes refers to data or a file that has been hide within a
digital image. What Steganography basically does is utilize
human perception; the human sensesareunqualifiedtolook
for files that have data hidden inside them. Generally, in
steganography, the specific data isn't maintained in its
original format and thereby it's converted into an alternate
identical transmission file like image that successively is
being hidden among another object. This apparent message
(known as cover text in usual terms) is sent through the
network to the recipient, wherever the specific message is
separated from it. Steganography are used to achieve data
privacy over confidentiality.
2. LITERATURE SURVEY
1. Image steganography with using QR code and
cryptography: In this there is image stenography method
that’s enables us to to embed the encoded secret message
using Quick Response Code (QR) code into the image
information. Advanced Encryption Standard[AES]domainis
introduced for the encryption of the QR code, whereas
encrypting method is in addition secured by Advanced
Encryption Standard (AES) cipher algorithmic rule. Also,
typical characteristics of QR code was cracked using the
encryption, therefore it makes the method more secure. The
relation between security and capability of the strategy was
improved by special confining of QR code before the
embedding method.
2. Information Hiding using Image Embedding in QR Codes
for Color Images: It is considered that embedding strategies
are designed to be
Consistent with standarddecodingapplicationsandmight be
Enforced to any color or gray scale image with full space
Coverage. The embedding technique consists of 2 main
following components. First element is that the use of
halftoning techniques for the choice Of varying the pixels to
interrupt and decrease the coarse square Architectureof the
QR code and second is that the brightness Level to that the
pixels square measure to be re-created. In such some way
that it shouldn’t be visible to naked eye on the Color image.
Afterwards decoding should be done for QR code from the
color image With minimum errors.
3. Confidential Encrypted Data Hiding and Retrieval Using
QR Authentication System: In this paper, there’s totally
different methodology, where the QR code is embedded into
the Image which act as a digital media. Then the message
which the user wants to send to the receiver is inserted in
that QR code which is hidden behind the image. After secret
key or encryption key will be entered, so that if an intruder
tries to modify the message then he cannot do this , as well
as there is an image in front and behind the image there is
QR code in which message is hidden In this project, message
is double secure as if any one try to see the message they
cannot this is because of the image in front of QR code
advantage of this is the image cannot be scanned . In this
Method encryption of the message is done using AES
Advanced encryption standard encryption algorithm. The
encrypted message are Entered inside QR code and that QR
code is also hidden behind the image . The message can then
be Accessed from the QR code and can be decrypted using
Decryption algorithm Reverse of AES. then the message will
be accessed using the secret key whichisknowntorecipient.
3.SYSTEM ARCHITECHTURE
System architecture is the theoretical designthatdefinesthe
structure and behavior of a system. An design explanationis
a prescribed description of a system, systematized in a way
that supports perceptive about the fundamental properties
of the system. It outlines the system modules or building
blocks and delivers a plan from which products can be
secured, and systems developed, that will work organized to
implement the whole system. The System architecture is
shown below.
Fig -2: Encryption
Fig -3: Decryption
4. CLASSIFICATION OF DIGITAL WATERMARKING
TECHNIQUES
A] Robustness
Robustness is crucial propertyforall watermarkingsystems.
There are so many ways by which watermark is degraded,
altered during transmission, striked by hackers in paid
media applications. So watermark should robust, So that it
will resist against all the attacks and threats.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2859
B] Effectiveness:
It is the most important property of watermark that the
watermark should be effective means it should surely be
detective. If this will not be happened then the goal of the
watermarking is not fulfilled.
C] Host signal Quality:
It is also important property of watermarking. Everyone
knows that in watermarking, watermark is embedded in
host signal (image, video, audio etc.). Thismayhaveaneffect
on the host signal. So the watermarking system should be
like that, it will least change the host signal and it should be
unobtrusive when watermark is invisible.
D] Watermark Size:
Watermark is often use to owner identification or security
approval of host signal and it always use when data is
transmitted. So it is important that the sizeofthewatermark
should be less because it will increase the size of data to be
transmitted.
E] Perception:
A digital watermark includes perception Presence in the
marked signal is visible On videos and Images, some are
made transparent/translucent for Convenience for
consumers due to the fact that they block Portion of the
view; therefore degrading it.
F] Capacity:
It can be described as number of data bits a Watermark gets
encoded within a unit of time or work. Watermark Should be
able to carry enough information that can Represent the
uniqueness of image.
5. ALGORITHM
The AES algorithm gains vast application in our daily life,
such as smart cards, cell phones, automated teller machines
and WWW servers. AES encodes a plain text to become a
cipher text, which can be decoded back to the original plain
text by using usual private key. It can be seen the cipher text
is much different from and gives no clue to the original plain
text.
All the computations in AES are implemented on bytes
instead of bits. Therefore, 128 bits of plain text is treated as
16 bytes. These 16 bytes are located in a matrix of four rows
and four columns. In AES 10 rounds are performed for 128
bit keys, 12 rounds for 192 bit keys, and 14 rounds for 256
bit keys. All of these rounds apply a different 128 bit key,
calculated from the original AES key.15 Following is the
Algorithm to encrypt the data:-
• Step 1:- Input a plain text of 128 bits of block cipher which
will be arranged as 16 bytes.
• Step 2: - Add Round Key: - each byte is integrated with a
block of the round key using bitwise XOR.
• Step 3:- Byte Substitution: - the 16 input bytes are
substituted by examining S- box. The result will be a 4x4
matrix.
• Step 4:- Shiftrow: - Every row of 4x4 matrixes will be
shifted to left. Entries which will be on the left side now will
be on the right side.
• Step 5:- Mix Columns: - Every column of four bytes will be
transformed by applying a distinctive mathematical function
(Galois Field).
• Step 6:- Add Round Key: - The 16 bytes of matrix will be
scrutinized as 128 bits and will be XORed to 128 bits of the
round key.
• Step 7:- This 128 bits will be taken as 16 bytes and similar
rounds will be performed.
• Step 8:- At the 10th round which will be last round a
ciphered text will be produced.
Initially, the plain text of 128 bits of block cipher will be
input, which will be treated as 16 bytes. Then, each byte will
be non-discriminated with a block of the round key using
bitwise XOR. From S-Box the 16 input bytes will be
exchanged resulting 4x4 matrices.All rowsofthismatrix will
be shifted to left. Shifting will be done as follows:-
1) First row will be not shifted.
2) Second row will be moved one position left.
3) Third row will be switched two positions to the left.
4) Fourth row will be shifted three positions to the left 16
As a result new matrices will be produced containing same
16 bytes but shifted with respect to each other. In
MixColumn, every column of the matrix will be transformed
by applying mathematical function such as Galois Field. The
16 bytes of matrix will be considered as 128 bits and will be
XORed to 128 bits of round key.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2860
6. APPLICATIONS
Digital watermarking may be used for a variety of
Applications like :
1. Copyright protection.
2. Source tracking (different recipients get differently
Watermarked content).
3. Broadcast monitoring (television news often contains
4. Watermarked video from international agencies).
5. Video authentication.
6. Content management on social networks.
7. CONCLUSION
In this method we have implemented a advanced solutionto
protect the asset of the user or owner by providing security
by using method Digital Watermarking technique whose
work is to protect the authenticity,copyright protection of
owner using a strong media QR code.In addition to, the QR
code is also hidden behind the image so that seeing at it the
person will not be able to recognize that it contains QR code.
We also classified the watermarking algorithms based On
spatial and transform domain. Watermarking, whichBelong
to the data hiding field, has seen a lot of Research interest
recently. There is a lot of work begin Conducted in different
branches in this field. We classify the Techniques based on
different areas in which data is Embedded. AES (Advanced
Encryption Standard ) provides more security (it is less
susceptible to cryptanalysis than 3DES).
REFERENCES
[1] Image Steganography and Data hiding in QR Code
Rutuja Kakade1, Nikita Kasar2, Shruti Kulkarni3,
Shubham Kumbalpuri4, Sonali Patil5 Student, Dept of
Computer Engineering, PCCOE, Maharashtra, India
Associate Professor, Dept of Computer Engineering,
PCCOE, Maharashtra, India
[2] V.Hajduk , M.Broda , O.Kováþ and D.Levický, “Image
steganography with using QR code and cryptography,”
26th Conference Radioelektronika, IEEE pp. 978-1-
5090-1674-7, 2016
[3] A. Gaikwad and K.R.Singh, “Information Hiding using
Image Embedding in QR Codes for Color Images: A
Review,” International Journal ofComputer Scienceand
Information Technologies, Vol. 6 (1) , 2015
[4] M. Broda, V. Hajduk, D. Levický, “Image steganography
based on combination of YCbCr color model and DWT,”
in ELMAR, 2015 57th International Symposium, pp.
201- 204, 28-30, 2015.
[5] S. Dey, A.Nath and S. Agarwal, “Confidential Encrypted
Data Hiding and Retrieval Using QR Authentication
System,” International Conference on Com
Improvement in the Performance and Security of
Advanced Encryption Standard Using AES Algorithm
and Comparison with Blowfish Amit Verma,
Simarpreet Kaur, Bharti Chhabra, M. Tech. Research
Scholar, Computer Science & Engineering, Chandigarh
Engineering College 3Assistant Professor, Computer
Science& Engineering,ChandigarhEngineeringCollege,
Landran, Punjab, India, Professor and Head of
Department, Computer Science&
Engineering,Chandigar Engineering
College,Landran,Punjab.
[6] A Survey of Digital Watermarking Techniques and its
Applications, Lalit Kumar Saini1, Vishal Shrivastava,
M.Tech Research Scholar, Professor Department of
Computer Science and Engineering, Arya College of
Engineering. & Information Technology, Jaipur, India.
[7] “Digital Image Security Using Digital Watermarking “
Prof.A.S.Kapse, Sharayu Belokar, Yogita Gorde, Radha
Rane, Shrutika Yewtkar, Professor. A.S.Kapse, Dept.
Computer Science & Engineering, P.R. Pote College of
Engineering & Tech, Amravati, Maharashtra, India. BE
student, Dept. of Computer Science & Engineering, P.R.
Pote College of Engineering & Tech, Amravati,
Maharashtra, India.
[8] Improvement in the Performance and Security of
Advanced Encryption Standard Using AES Algorithm
and Comparison withBlowfish AmitVerma,Simarpreet
Kaur, Bharti Chhabra M. Tech. Research Scholar,
Computer Science & Engineering, Chandigarh
Engineering College Assistant Professor, Computer
Science& Engineering,ChandigarhEngineeringCollege,
Landran, Punjab, India Professor and Head of
Department, Computer Science& Engineering,
Chandigarh Engineering College, Landran,Punjab,
[9] Chi-Feng Lu , Fast implementation of AES
cryptographic algorithms in smart cards; Yan-Shun
Kao; Hsia-Ling Chiang; Chung-Huang Yang; Security
Technology, 2003.
[10] FIPS PUB 197, Advanced Encryption Standard (AES),
National Institute of standards and Technology.

More Related Content

What's hot

IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep LearningIRJET Journal
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...IRJET Journal
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET Journal
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemIRJET Journal
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET Journal
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes csandit
 

What's hot (19)

PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAINPATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
 
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATIONEFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
C6524029320
C6524029320C6524029320
C6524029320
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 

Similar to Irjet v7 i3570

IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET Journal
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationIRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET Journal
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodecsandit
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...IRJET Journal
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmIRJET Journal
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...IRJET Journal
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET Journal
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiIAEME Publication
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharingijcisjournal
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalIRJET Journal
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...IRJET Journal
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 

Similar to Irjet v7 i3570 (20)

IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharing
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 

More from aissmsblogs

Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdf
Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdfPaper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdf
Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdfaissmsblogs
 
PPT- RVN (1).pptx
PPT- RVN (1).pptxPPT- RVN (1).pptx
PPT- RVN (1).pptxaissmsblogs
 
Newsletter _Brother’s kitchen. updated.pdf
Newsletter _Brother’s kitchen. updated.pdfNewsletter _Brother’s kitchen. updated.pdf
Newsletter _Brother’s kitchen. updated.pdfaissmsblogs
 
Research paper description suk
Research paper description sukResearch paper description suk
Research paper description sukaissmsblogs
 
Research paper mrpr
Research paper mrprResearch paper mrpr
Research paper mrpraissmsblogs
 
Ijsartv6 i336124
Ijsartv6 i336124Ijsartv6 i336124
Ijsartv6 i336124aissmsblogs
 
356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeastaissmsblogs
 
422 3 smart_e-health_care_using_iot_and_machine_learning
422 3 smart_e-health_care_using_iot_and_machine_learning422 3 smart_e-health_care_using_iot_and_machine_learning
422 3 smart_e-health_care_using_iot_and_machine_learningaissmsblogs
 
Ijsartv6 i336122
Ijsartv6 i336122Ijsartv6 i336122
Ijsartv6 i336122aissmsblogs
 

More from aissmsblogs (20)

Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdf
Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdfPaper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdf
Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdf
 
PPT- RVN (1).pptx
PPT- RVN (1).pptxPPT- RVN (1).pptx
PPT- RVN (1).pptx
 
Newsletter _Brother’s kitchen. updated.pdf
Newsletter _Brother’s kitchen. updated.pdfNewsletter _Brother’s kitchen. updated.pdf
Newsletter _Brother’s kitchen. updated.pdf
 
45 (1)
45 (1)45 (1)
45 (1)
 
Research paper description suk
Research paper description sukResearch paper description suk
Research paper description suk
 
Research paper mrpr
Research paper mrprResearch paper mrpr
Research paper mrpr
 
Ijsartv6 i336124
Ijsartv6 i336124Ijsartv6 i336124
Ijsartv6 i336124
 
356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeast
 
422 3 smart_e-health_care_using_iot_and_machine_learning
422 3 smart_e-health_care_using_iot_and_machine_learning422 3 smart_e-health_care_using_iot_and_machine_learning
422 3 smart_e-health_care_using_iot_and_machine_learning
 
Ijsartv6 i336122
Ijsartv6 i336122Ijsartv6 i336122
Ijsartv6 i336122
 
Ijsrdv6 i120151
Ijsrdv6 i120151Ijsrdv6 i120151
Ijsrdv6 i120151
 
Ijsrdv8 i10424
Ijsrdv8 i10424Ijsrdv8 i10424
Ijsrdv8 i10424
 
Ijsrdv8 i10550
Ijsrdv8 i10550Ijsrdv8 i10550
Ijsrdv8 i10550
 
Ijsrdv8 i10398
Ijsrdv8 i10398Ijsrdv8 i10398
Ijsrdv8 i10398
 
Ijsrdv7 i10842
Ijsrdv7 i10842Ijsrdv7 i10842
Ijsrdv7 i10842
 
Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 
Irjet v7 i3290
Irjet v7 i3290Irjet v7 i3290
Irjet v7 i3290
 
Ijsrdv7 i10318
Ijsrdv7 i10318Ijsrdv7 i10318
Ijsrdv7 i10318
 
Irjet v7 i31040
Irjet v7 i31040Irjet v7 i31040
Irjet v7 i31040
 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Irjet v7 i3570

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2857 Image Watermarking Using QR Code Ajit N. Gedam1, Afiya Papde2, Pranalee Walunj3, Rana Shaikh4 ,Sakshi Kamble5 2,3,4,5Students, Computer Engineering Department, AISSMS Polytechnic, Pune, Maharastra, India 1Ajit N. Gedam Lecturer in Computer Engineering Department, AISSMS Polytechnic, Pune, Maharastra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Digital image security and integrity are the top prioritized issue in today’s information World. Watermarking is a famous technique that is used for copyrightprotectionand authentication. Watermark Should be robust and imperceptible. Digital image watermarking process is to embed information of digital such as an image into digital signal using a strong media QR code. It is very difficult to identify that digital image watermarking has applied to the data This is a competent way to restrict illegal copyrights of Information from interactive multimedia networks.With advanced technology in printing and scanning, creating imitate documents have become an Uncomplicated task, making it very difficult to understand between original and the artificial. So, it is a very big challenge for providing Security and verification of digital data. This paper put forward an idea or intimation to provide an innovative method to verify the digital documents. An advanced method of QR code is bring here, which allow us to embed digital data such as image in QR code. In this paper, we bring up a new technique, where the image is encoded in QR i.e. [Quick Response] Code in encrypted form, so that if a hacker tries to modify or tries to tamper with the data the data then he will be unsuccessful to do that. This is due to; the encryption key is unknown to him except from the authorized person. It is impossible to scan or have access to the encrypted QR code as QR codes are robust. Key Words: QR code, AES(Advanced Encryption Standard) Algorithm, Android platform,Digtal image, Secret key,Watermarking,Decryption Problem Statement: After new technology of digitizing information were developed,a huge amount of databases of texts,images,scientific data,video,audiofilesandotherdigital information had been appeared in the world. With developing network and internet technologies and connecting computers into the World Wide Web, databases become available not only for authorize access butforillegal access also.Much more digital data can be accessed to via network now a days.The problem of data protectionisoneof the most important .The methods of coding and hiding information are well known from ancient times as a cryptography and stegnography. 1. INTRODUCTION A digital watermark is a kind of marker secretly embedded in a noise-permit signal such as an image data. It is typically used to identify proprietorship of the copyright of such signal. "Watermarking" is the process of hiding digital information in a carrier signal the hidden information should, but doesn't need to, contain a relation to the carrier signal. Digital watermarks may be used to prove the authenticity or integrity of the carrier signal or to show the identity of its proprietor. The informationtobeembedded in a signal is called a digital watermark, although in some condition the term digital watermark means the dissimilarity between the watermarked signal andthecover signal. The signal where the watermark is to be embeddedis called the host signal. A watermarking system is usually divided into three prominent steps, embedding, attack, and perception. In embedding, an algorithm obtain the host and the data to be submerged, and produces a watermarked signal. this paper contain QR codeandsteganographyisused to furnish the security to important data. 1.1 QR Code QR codes are 2 dimensional matrix. It allows to store a large volume of unique data. Bar-codes are one dimensional vector. So compare to bar-codes QR codes are having more storage size. QR codes can hold up to 7,089 numeric characters and up to 4,296 alphanumerical letter values as an information. The following figureshowsthestructure ofa QR code. Fig-1: QR Code 1.2 Steganography Steganography is an embedding process to hide the data in the form of an image or text. now a days sense of the word
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2858 sometimes refers to data or a file that has been hide within a digital image. What Steganography basically does is utilize human perception; the human sensesareunqualifiedtolook for files that have data hidden inside them. Generally, in steganography, the specific data isn't maintained in its original format and thereby it's converted into an alternate identical transmission file like image that successively is being hidden among another object. This apparent message (known as cover text in usual terms) is sent through the network to the recipient, wherever the specific message is separated from it. Steganography are used to achieve data privacy over confidentiality. 2. LITERATURE SURVEY 1. Image steganography with using QR code and cryptography: In this there is image stenography method that’s enables us to to embed the encoded secret message using Quick Response Code (QR) code into the image information. Advanced Encryption Standard[AES]domainis introduced for the encryption of the QR code, whereas encrypting method is in addition secured by Advanced Encryption Standard (AES) cipher algorithmic rule. Also, typical characteristics of QR code was cracked using the encryption, therefore it makes the method more secure. The relation between security and capability of the strategy was improved by special confining of QR code before the embedding method. 2. Information Hiding using Image Embedding in QR Codes for Color Images: It is considered that embedding strategies are designed to be Consistent with standarddecodingapplicationsandmight be Enforced to any color or gray scale image with full space Coverage. The embedding technique consists of 2 main following components. First element is that the use of halftoning techniques for the choice Of varying the pixels to interrupt and decrease the coarse square Architectureof the QR code and second is that the brightness Level to that the pixels square measure to be re-created. In such some way that it shouldn’t be visible to naked eye on the Color image. Afterwards decoding should be done for QR code from the color image With minimum errors. 3. Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System: In this paper, there’s totally different methodology, where the QR code is embedded into the Image which act as a digital media. Then the message which the user wants to send to the receiver is inserted in that QR code which is hidden behind the image. After secret key or encryption key will be entered, so that if an intruder tries to modify the message then he cannot do this , as well as there is an image in front and behind the image there is QR code in which message is hidden In this project, message is double secure as if any one try to see the message they cannot this is because of the image in front of QR code advantage of this is the image cannot be scanned . In this Method encryption of the message is done using AES Advanced encryption standard encryption algorithm. The encrypted message are Entered inside QR code and that QR code is also hidden behind the image . The message can then be Accessed from the QR code and can be decrypted using Decryption algorithm Reverse of AES. then the message will be accessed using the secret key whichisknowntorecipient. 3.SYSTEM ARCHITECHTURE System architecture is the theoretical designthatdefinesthe structure and behavior of a system. An design explanationis a prescribed description of a system, systematized in a way that supports perceptive about the fundamental properties of the system. It outlines the system modules or building blocks and delivers a plan from which products can be secured, and systems developed, that will work organized to implement the whole system. The System architecture is shown below. Fig -2: Encryption Fig -3: Decryption 4. CLASSIFICATION OF DIGITAL WATERMARKING TECHNIQUES A] Robustness Robustness is crucial propertyforall watermarkingsystems. There are so many ways by which watermark is degraded, altered during transmission, striked by hackers in paid media applications. So watermark should robust, So that it will resist against all the attacks and threats.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2859 B] Effectiveness: It is the most important property of watermark that the watermark should be effective means it should surely be detective. If this will not be happened then the goal of the watermarking is not fulfilled. C] Host signal Quality: It is also important property of watermarking. Everyone knows that in watermarking, watermark is embedded in host signal (image, video, audio etc.). Thismayhaveaneffect on the host signal. So the watermarking system should be like that, it will least change the host signal and it should be unobtrusive when watermark is invisible. D] Watermark Size: Watermark is often use to owner identification or security approval of host signal and it always use when data is transmitted. So it is important that the sizeofthewatermark should be less because it will increase the size of data to be transmitted. E] Perception: A digital watermark includes perception Presence in the marked signal is visible On videos and Images, some are made transparent/translucent for Convenience for consumers due to the fact that they block Portion of the view; therefore degrading it. F] Capacity: It can be described as number of data bits a Watermark gets encoded within a unit of time or work. Watermark Should be able to carry enough information that can Represent the uniqueness of image. 5. ALGORITHM The AES algorithm gains vast application in our daily life, such as smart cards, cell phones, automated teller machines and WWW servers. AES encodes a plain text to become a cipher text, which can be decoded back to the original plain text by using usual private key. It can be seen the cipher text is much different from and gives no clue to the original plain text. All the computations in AES are implemented on bytes instead of bits. Therefore, 128 bits of plain text is treated as 16 bytes. These 16 bytes are located in a matrix of four rows and four columns. In AES 10 rounds are performed for 128 bit keys, 12 rounds for 192 bit keys, and 14 rounds for 256 bit keys. All of these rounds apply a different 128 bit key, calculated from the original AES key.15 Following is the Algorithm to encrypt the data:- • Step 1:- Input a plain text of 128 bits of block cipher which will be arranged as 16 bytes. • Step 2: - Add Round Key: - each byte is integrated with a block of the round key using bitwise XOR. • Step 3:- Byte Substitution: - the 16 input bytes are substituted by examining S- box. The result will be a 4x4 matrix. • Step 4:- Shiftrow: - Every row of 4x4 matrixes will be shifted to left. Entries which will be on the left side now will be on the right side. • Step 5:- Mix Columns: - Every column of four bytes will be transformed by applying a distinctive mathematical function (Galois Field). • Step 6:- Add Round Key: - The 16 bytes of matrix will be scrutinized as 128 bits and will be XORed to 128 bits of the round key. • Step 7:- This 128 bits will be taken as 16 bytes and similar rounds will be performed. • Step 8:- At the 10th round which will be last round a ciphered text will be produced. Initially, the plain text of 128 bits of block cipher will be input, which will be treated as 16 bytes. Then, each byte will be non-discriminated with a block of the round key using bitwise XOR. From S-Box the 16 input bytes will be exchanged resulting 4x4 matrices.All rowsofthismatrix will be shifted to left. Shifting will be done as follows:- 1) First row will be not shifted. 2) Second row will be moved one position left. 3) Third row will be switched two positions to the left. 4) Fourth row will be shifted three positions to the left 16 As a result new matrices will be produced containing same 16 bytes but shifted with respect to each other. In MixColumn, every column of the matrix will be transformed by applying mathematical function such as Galois Field. The 16 bytes of matrix will be considered as 128 bits and will be XORed to 128 bits of round key.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2860 6. APPLICATIONS Digital watermarking may be used for a variety of Applications like : 1. Copyright protection. 2. Source tracking (different recipients get differently Watermarked content). 3. Broadcast monitoring (television news often contains 4. Watermarked video from international agencies). 5. Video authentication. 6. Content management on social networks. 7. CONCLUSION In this method we have implemented a advanced solutionto protect the asset of the user or owner by providing security by using method Digital Watermarking technique whose work is to protect the authenticity,copyright protection of owner using a strong media QR code.In addition to, the QR code is also hidden behind the image so that seeing at it the person will not be able to recognize that it contains QR code. We also classified the watermarking algorithms based On spatial and transform domain. Watermarking, whichBelong to the data hiding field, has seen a lot of Research interest recently. There is a lot of work begin Conducted in different branches in this field. We classify the Techniques based on different areas in which data is Embedded. AES (Advanced Encryption Standard ) provides more security (it is less susceptible to cryptanalysis than 3DES). REFERENCES [1] Image Steganography and Data hiding in QR Code Rutuja Kakade1, Nikita Kasar2, Shruti Kulkarni3, Shubham Kumbalpuri4, Sonali Patil5 Student, Dept of Computer Engineering, PCCOE, Maharashtra, India Associate Professor, Dept of Computer Engineering, PCCOE, Maharashtra, India [2] V.Hajduk , M.Broda , O.Kováþ and D.Levický, “Image steganography with using QR code and cryptography,” 26th Conference Radioelektronika, IEEE pp. 978-1- 5090-1674-7, 2016 [3] A. Gaikwad and K.R.Singh, “Information Hiding using Image Embedding in QR Codes for Color Images: A Review,” International Journal ofComputer Scienceand Information Technologies, Vol. 6 (1) , 2015 [4] M. Broda, V. Hajduk, D. Levický, “Image steganography based on combination of YCbCr color model and DWT,” in ELMAR, 2015 57th International Symposium, pp. 201- 204, 28-30, 2015. [5] S. Dey, A.Nath and S. Agarwal, “Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System,” International Conference on Com Improvement in the Performance and Security of Advanced Encryption Standard Using AES Algorithm and Comparison with Blowfish Amit Verma, Simarpreet Kaur, Bharti Chhabra, M. Tech. Research Scholar, Computer Science & Engineering, Chandigarh Engineering College 3Assistant Professor, Computer Science& Engineering,ChandigarhEngineeringCollege, Landran, Punjab, India, Professor and Head of Department, Computer Science& Engineering,Chandigar Engineering College,Landran,Punjab. [6] A Survey of Digital Watermarking Techniques and its Applications, Lalit Kumar Saini1, Vishal Shrivastava, M.Tech Research Scholar, Professor Department of Computer Science and Engineering, Arya College of Engineering. & Information Technology, Jaipur, India. [7] “Digital Image Security Using Digital Watermarking “ Prof.A.S.Kapse, Sharayu Belokar, Yogita Gorde, Radha Rane, Shrutika Yewtkar, Professor. A.S.Kapse, Dept. Computer Science & Engineering, P.R. Pote College of Engineering & Tech, Amravati, Maharashtra, India. BE student, Dept. of Computer Science & Engineering, P.R. Pote College of Engineering & Tech, Amravati, Maharashtra, India. [8] Improvement in the Performance and Security of Advanced Encryption Standard Using AES Algorithm and Comparison withBlowfish AmitVerma,Simarpreet Kaur, Bharti Chhabra M. Tech. Research Scholar, Computer Science & Engineering, Chandigarh Engineering College Assistant Professor, Computer Science& Engineering,ChandigarhEngineeringCollege, Landran, Punjab, India Professor and Head of Department, Computer Science& Engineering, Chandigarh Engineering College, Landran,Punjab, [9] Chi-Feng Lu , Fast implementation of AES cryptographic algorithms in smart cards; Yan-Shun Kao; Hsia-Ling Chiang; Chung-Huang Yang; Security Technology, 2003. [10] FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of standards and Technology.