SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1677
A Survey on Private Messaging based on QR Code using Visual Secret
Sharing Scheme
Pranav Hadawale1, Sumoli Vaje2, Dipali Wale3, Prof. Sachin Dighe4
1,2,3Student, Dept. of Computer Engg. Sahyadri Valley COE & Technology, Pune, Maharashtra, India
4Assistant Professor, Dept. of Computer Engg. Sahyadri Valley COE & Technology, Pune, Maharashtra, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The Quick Response (QR) code was frequently
implemented for data storage and data catchingapplications.
QR codes were extensively used in fast reading applications
such as statistics storage and high-speed device reading.
Anyone can gain get right of entry to data saved in QR codes.
Hence, they’re incompatible for encoding secret statistics
without the addition of cryptography or other safety. In this
we proposes a visual secret sharing scheme to encode a secret
QR code into distinct shares. In assessment with other
techniques, the shares in proposed scheme are valid QR codes
that may be decoded with some unique that means of a trendy
QR code reader, so that escaping increases suspicious
attackers. In addition, the secretmessageisrecoveredwiththe
aid of XOR-ing the qualified shares. The given scheme is
feasible and has low cost is proved experimentally. Two
division approaches are provided, which effectively improves
the sharing efficiency of (k, n) method. We proposed a
standard multi-color QR code using textured patterns on data
hiding by text steganography and providing security on data
by using visual secret sharing scheme
Key Words: Cryptography, QuickResponsecode,Visual
secret sharing scheme, High security, Blowfish
Algorithm, Division algorithm,Errorcorrectioncapacity.
1. INTRODUCTION
In recent years, the QR code is wide used. In
standard of living, QR codes are utilized in a range of
situations that embrace data storage, weblinks,traceability,
identification and authentication.First,theQR codeissimple
to be PC instrumentality identification, for example, mobile
phones, scanning guns. Second, QR code features a giant
storage capability, anti-damage strong, cheap and soon.The
QR code has a distinct structure for correction and fast
cryptography. The tags of position are used for QR code
detection and orientationcorrection.Oneormanyalignment
patterns need to use for code deformation arrangement.
After that, the format of information areas contain
error correction level andmask pattern. Theerrorcorrection
bits are keep within the data areas ofversion.Thepopularity
of QR codes is primarily because of the subsequent features
like The popularity of QR codes is primarily because of the
subsequent features like robust to the copying process, easy
reading by any device or any user, High encoding capacity
with error correction facilities, small size and robust to
geometrical distortion. Visual cryptography is a newest
technology for secret message sharing. It improves the key
share pictures to revive the quality of the key, relying on
human visual decryption. Plus point from traditional
cryptography, it has the advantages of information security,
information concealment and the ease of secret recovery.
The method of visual cryptography provided high security
necessities of the users and protects them against varied
security attacks. It is useful to implement for business
oriented applications. In this paper, proposed a standard
multi-color QR code using textured patterns on data hiding
by text steganography and providing security on data by
using visual secret sharing scheme.
The information is always needed to share between
the organizations or person to person. Security of
information has an important role in the information
communication. The proposed work reduces risk of
transmission and extends the security. We will develop a
method for encoding a secret image into n share images
which will displayed as noise for added security. Protection
against frequent security attacks and avoidancetosuspicion
by attackers is given in this.
2. LITRATURE SURVEY
The contrast of XVCS is times greater than OVCS is
stated by [1]. The attribute of OR operation reduces the
quality of visual of reconstructed image for OR-based VCS
(OVCS). XVCS uses XOR operation for decoding. Proposed
strategy enhances the characters. Advantages of this
includes easily decoding of the secret image by stacking
operation. XVCS has better reconstructed image than OVCS.
Disadvantages of this can be viewed as more complicated
proposed algorithm.
The [2] present a blind, key based watermarking
technique, which embeds a converted binary value of the
watermark information into the domain of the cover image
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1678
and uses a unique image code for the detection of image
distortion. The QR code isembeddedintotheattack resistant
HH element of 1st level domain of the cover image
associated to find malicious interference by an attacker.
Advantages of this are that more informationrepresentation
per bit change combined with error correction capabilities.
This scheme increases the watermark data usability and
maintains robustnessagainstvisuallyinvariantdata removal
attacks. Disadvantages includes limited LSB bit inthespatial
domain of the image intensity values.
As the spatial domain is very well suspicious to
attacks, it is not useful. Designing a private sharing strategy
which will protect the secret QR data with reliable system is
given by [3]. This approach differs from connected QR code
schemes in this it uses the QR characteristics to attain secret
sharing and might resist the print and scan operation.
Advantages of this can be viewed as decrease in the security
related issues of the secret information.Approachisfeasible.
It gives the readability to content, detectability for attacks
and secret payload of the QR barcode. Disadvantages is that
there is need to improve the security of the QR barcode. QR
technique requires reducing the modifications.
The two-level QR code (2LQR), has two public and
private storage levels and can be used for document
authentication is stated by [4]. The public level is that the
same because the normal QR code storage level; so it’s
readable by any classical QR code application. The private
level is made by exchange the black modules by specific
unsmooth patterns. It consists of data encodedusing q-array
code with a mistake correction capability. Advantages
includes that it increases the storage capacity oftheclassical
QR code. The textured patterns used in 2LQR sensitivity to
the PS process. Disadvantages of this are includes need to
improve the pattern recognition method. By replacing the
white modules with textured patterns, we can efficient the
data storage limit of 2LQR.
For securing secret information, [5] gives the
characteristics of QR barcodes to design a secret hiding
mechanism for the QR barcode with a higher payload
compared to the past ones. For a traditional scanner, a
browser can only reveal the formal information from the
marked QR code. Advantages from this includes that
designed scheme is feasible to hide the secrets into a tinyQR
tag as the purpose of steganography. Onlytheapproveduser
with the personal key will more reveal the concealed secret
with success. Disadvantages of can be viewedastheneed for
increasing the security.
3. PROPOSED APPROACH
Security for QR codes can be improved by proposed
work. The important characteristics of QR code in the error
correction capability is that the QR code readers can
correctly decode data, even when parts of the QR image are
damaged or demolished. The secret message data is
encrypted into different form by using the Blowfish
algorithm. Then the encrypted message data is splitedinto n
no. of partitions called as shares and stored in different QR
code share images. Then it will send to the user that is
receiver. The security of the communication can be
maintained by the Division Algorithm. At the receiver end,it
has to merge all the QR code shares to retrieve the original
secret message. The retrieving of the original message data
is done by merging the QR codes shares using the generated
secret key. In the proposed system the message is
transmitted with the additional security by implementing
the division algorithm. The system includes two users, a
sender and a receiver. The sender have login by using his
registered username and password and have select the
receiver from the bunch of anotherregisteredusers.Thenhe
will send him the message. The receiver must connected to
the internet to get the related key for unlocking the secret
message. The secret message data from the sender is
received in the form of shares of QR code. The receiver
should merge the QR codesbyusingtherespectivealgorithm
and by using his key he can decrypt the message with
protection and security. As using this proposed scheme, the
third party malicious user unable to detect the original
message data.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1679
The sender sends the secret data orinformationand
that private message will be encrypted with cryptographic
algorithm, the encrypted cipher is then partitionedinshares
of QR code for additional security and to avoid the common
time whole access of the secret message.
Advantages of this scheme:
 Secure encoding of document or text secret data by
algorithm.
 Higher security and more flexible accessstructures.
 To integrate a VCS, where the recovery requires
only OR or XOR operations.
 No need to use LSB or extra hash function to extract
secret data
 VCS has less computational complexity and
computation cost.
4. STUDY OF BLOWFISH ALGORITHM
Blowfish algorithm is a replacement of DES or IDEA.Itis
a symmetric block cipher with a 64-bit block size. It ismeant
to be significantly faster than DES. The keys are of variable
size from 32 bits to 448 bits, but default size is 128 bits. The
total no. of rounds to be perform is 16.
Algorithm:
1. Convert input key into 18 sub keys of size 32 bits
& store it in P arrays.
2. There are four S-boxes, which are 32-bit arrays
with 256 entries in each.
3. XOR first 32 bits of the original key with P1.
4. Similarly, XOR second 32 bits of the original key
with P2 and so on up to P18.
5. Divide Plaintext into two 32-bit halves:
XL, XR.
6. For i = 1 to 16.
{
XL = XL XOR Pi
XR = F (XL) XOR XR
Swap XL and XR
}
7. Swap XL and XR.
8. XR = XR XOR P17.
9. XL = XL XOR P18.
10. Concatenate XL and XR.
The Function F from algorithm works as follows.
3. CONCLUSION
In this paper, we proposed a strategy for QR code
applications by visual secret sharing scheme. This makes
great improvement mainly on two aspects, higher security
and more flexible QR code access structures. So that’s why
the computation cost of our scheme is much less than that of
the previous works.
REFERENCES
[1] C. N. Yang, D. S. Wang, “Property Analysis of XOR-Based
Visual Cryptography,” IEEE Transactions on Circuits
Systems for Video Technology, vol. 24, no. 12 pp. 189-
197, 2014.
[2] P. P. Thulasidharan, M. S. Nair, “QR code based blind
digital image watermarking with attack detectioncode,”
AEU - International Journal of Electronics and
Communications, vol. 69, no. 7, pp. 1074-1084, 2015.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1680
[3] P. Y. Lin, “Distributed Secret Sharing Approach with
Cheater Prevention Based on QR Code,” IEEE
Transactions on Industrial Informatics, vol.12,no.1, pp.
384-392 , 2016.
[4] I. Tkachenko, W. Puech, C. Destruel,etal.,“Two-Level QR
Code for Private Message Sharing and Document
Authentication,” IEEE Transactions on Information
Forensics Security, vol. 11, no. 13, pp. 571-583, 2016.
[5] P. Y. Lin, Y. H. Chen, “High payload secret hiding
technology for QR codes,” Eurasip Journal on Image
Video Processing, vol. 2017, no. 1, pp. 14, 2017.
[6] Y. Cheng, Z. Fu and B. Yu, "Improved Visual Secret
Sharing Scheme for QR Code Applications," in IEEE
Transactions on Information ForensicsandSecurity, vol.
13, no. 9, pp. 2393-2403, Sept. 2018.
[7] F. Liu, Guo T: Privacy protectiondisplayimplementation
method based on visual passwords. CN Patent App. CN
201410542752, 2015.
[8] S J Shyu, M C Chen, “Minimizing Pixel Expansion in
Visual Cryptographic Scheme for General Access
Structures,” IEEE Transactions on Circuits Systems for
Video Technology, vol. 25, no. 9, pp.1-1,2015.
[9] H. D. Yuan, “Secret sharing with multi-cover adaptive
steganography,” Information Sciences,vol.254,pp.197–
212, 2014.
[10] J. Weir, W. Q. Yan, “Authenticating Visual Cryptography
Shares Using 2 D Barcodes,” in Digital Forensics and
Watermarking. Berlin, German: Springer Berlin
Heidelberg, 2011, pp. 196-210.
BIOGRAPHIES
Mr. Pranav Vijay Hadawale,
Student, Bachelor of Engineering,
Dept. Of Computer Engineering,
Sahyadri Valley COE & Technology,
Pune.
Miss. Sumoli Lahu Vaje,
Student, Bachelor of Engineering,
Dept. Of Computer Engineering,
Sahyadri Valley COE & Technology,
Pune.
Miss. Dipali Sampat Wale,
Student, Bachelor of Engineering,
Dept. Of Computer Engineering,
Sahyadri Valley COE & Technology,
Pune.
Prof. Sachin Dighe,
Assistant Professor,
Dept. Of Computer Engineering,
Sahyadri Valley COE & Technology,
Pune.

More Related Content

What's hot

Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Adz91 Digital Ads Pvt Ltd
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyShahrukh Ali
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
 
An Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive ComputingAn Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive Computinginventionjournals
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingswathi78
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...SBGC
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecuritySBGC
 
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET Journal
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsIRJET Journal
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloudrahulmonikasharma
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
 

What's hot (20)

Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
Nz2422822287
Nz2422822287Nz2422822287
Nz2422822287
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
An Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive ComputingAn Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive Computing
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
 
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business Cards
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 

Similar to Survey on Private Messaging QR Codes

A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...IRJET Journal
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodecsandit
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalIRJET Journal
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...IRJET Journal
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharingijcisjournal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr CodeIRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerIRJET Journal
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmIRJET Journal
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaIRJET Journal
 

Similar to Survey on Private Messaging QR Codes (20)

Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharing
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
CryptoQR System based on RSA
CryptoQR System based on RSACryptoQR System based on RSA
CryptoQR System based on RSA
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code Scanner
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in India
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Survey on Private Messaging QR Codes

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1677 A Survey on Private Messaging based on QR Code using Visual Secret Sharing Scheme Pranav Hadawale1, Sumoli Vaje2, Dipali Wale3, Prof. Sachin Dighe4 1,2,3Student, Dept. of Computer Engg. Sahyadri Valley COE & Technology, Pune, Maharashtra, India 4Assistant Professor, Dept. of Computer Engg. Sahyadri Valley COE & Technology, Pune, Maharashtra, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The Quick Response (QR) code was frequently implemented for data storage and data catchingapplications. QR codes were extensively used in fast reading applications such as statistics storage and high-speed device reading. Anyone can gain get right of entry to data saved in QR codes. Hence, they’re incompatible for encoding secret statistics without the addition of cryptography or other safety. In this we proposes a visual secret sharing scheme to encode a secret QR code into distinct shares. In assessment with other techniques, the shares in proposed scheme are valid QR codes that may be decoded with some unique that means of a trendy QR code reader, so that escaping increases suspicious attackers. In addition, the secretmessageisrecoveredwiththe aid of XOR-ing the qualified shares. The given scheme is feasible and has low cost is proved experimentally. Two division approaches are provided, which effectively improves the sharing efficiency of (k, n) method. We proposed a standard multi-color QR code using textured patterns on data hiding by text steganography and providing security on data by using visual secret sharing scheme Key Words: Cryptography, QuickResponsecode,Visual secret sharing scheme, High security, Blowfish Algorithm, Division algorithm,Errorcorrectioncapacity. 1. INTRODUCTION In recent years, the QR code is wide used. In standard of living, QR codes are utilized in a range of situations that embrace data storage, weblinks,traceability, identification and authentication.First,theQR codeissimple to be PC instrumentality identification, for example, mobile phones, scanning guns. Second, QR code features a giant storage capability, anti-damage strong, cheap and soon.The QR code has a distinct structure for correction and fast cryptography. The tags of position are used for QR code detection and orientationcorrection.Oneormanyalignment patterns need to use for code deformation arrangement. After that, the format of information areas contain error correction level andmask pattern. Theerrorcorrection bits are keep within the data areas ofversion.Thepopularity of QR codes is primarily because of the subsequent features like The popularity of QR codes is primarily because of the subsequent features like robust to the copying process, easy reading by any device or any user, High encoding capacity with error correction facilities, small size and robust to geometrical distortion. Visual cryptography is a newest technology for secret message sharing. It improves the key share pictures to revive the quality of the key, relying on human visual decryption. Plus point from traditional cryptography, it has the advantages of information security, information concealment and the ease of secret recovery. The method of visual cryptography provided high security necessities of the users and protects them against varied security attacks. It is useful to implement for business oriented applications. In this paper, proposed a standard multi-color QR code using textured patterns on data hiding by text steganography and providing security on data by using visual secret sharing scheme. The information is always needed to share between the organizations or person to person. Security of information has an important role in the information communication. The proposed work reduces risk of transmission and extends the security. We will develop a method for encoding a secret image into n share images which will displayed as noise for added security. Protection against frequent security attacks and avoidancetosuspicion by attackers is given in this. 2. LITRATURE SURVEY The contrast of XVCS is times greater than OVCS is stated by [1]. The attribute of OR operation reduces the quality of visual of reconstructed image for OR-based VCS (OVCS). XVCS uses XOR operation for decoding. Proposed strategy enhances the characters. Advantages of this includes easily decoding of the secret image by stacking operation. XVCS has better reconstructed image than OVCS. Disadvantages of this can be viewed as more complicated proposed algorithm. The [2] present a blind, key based watermarking technique, which embeds a converted binary value of the watermark information into the domain of the cover image
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1678 and uses a unique image code for the detection of image distortion. The QR code isembeddedintotheattack resistant HH element of 1st level domain of the cover image associated to find malicious interference by an attacker. Advantages of this are that more informationrepresentation per bit change combined with error correction capabilities. This scheme increases the watermark data usability and maintains robustnessagainstvisuallyinvariantdata removal attacks. Disadvantages includes limited LSB bit inthespatial domain of the image intensity values. As the spatial domain is very well suspicious to attacks, it is not useful. Designing a private sharing strategy which will protect the secret QR data with reliable system is given by [3]. This approach differs from connected QR code schemes in this it uses the QR characteristics to attain secret sharing and might resist the print and scan operation. Advantages of this can be viewed as decrease in the security related issues of the secret information.Approachisfeasible. It gives the readability to content, detectability for attacks and secret payload of the QR barcode. Disadvantages is that there is need to improve the security of the QR barcode. QR technique requires reducing the modifications. The two-level QR code (2LQR), has two public and private storage levels and can be used for document authentication is stated by [4]. The public level is that the same because the normal QR code storage level; so it’s readable by any classical QR code application. The private level is made by exchange the black modules by specific unsmooth patterns. It consists of data encodedusing q-array code with a mistake correction capability. Advantages includes that it increases the storage capacity oftheclassical QR code. The textured patterns used in 2LQR sensitivity to the PS process. Disadvantages of this are includes need to improve the pattern recognition method. By replacing the white modules with textured patterns, we can efficient the data storage limit of 2LQR. For securing secret information, [5] gives the characteristics of QR barcodes to design a secret hiding mechanism for the QR barcode with a higher payload compared to the past ones. For a traditional scanner, a browser can only reveal the formal information from the marked QR code. Advantages from this includes that designed scheme is feasible to hide the secrets into a tinyQR tag as the purpose of steganography. Onlytheapproveduser with the personal key will more reveal the concealed secret with success. Disadvantages of can be viewedastheneed for increasing the security. 3. PROPOSED APPROACH Security for QR codes can be improved by proposed work. The important characteristics of QR code in the error correction capability is that the QR code readers can correctly decode data, even when parts of the QR image are damaged or demolished. The secret message data is encrypted into different form by using the Blowfish algorithm. Then the encrypted message data is splitedinto n no. of partitions called as shares and stored in different QR code share images. Then it will send to the user that is receiver. The security of the communication can be maintained by the Division Algorithm. At the receiver end,it has to merge all the QR code shares to retrieve the original secret message. The retrieving of the original message data is done by merging the QR codes shares using the generated secret key. In the proposed system the message is transmitted with the additional security by implementing the division algorithm. The system includes two users, a sender and a receiver. The sender have login by using his registered username and password and have select the receiver from the bunch of anotherregisteredusers.Thenhe will send him the message. The receiver must connected to the internet to get the related key for unlocking the secret message. The secret message data from the sender is received in the form of shares of QR code. The receiver should merge the QR codesbyusingtherespectivealgorithm and by using his key he can decrypt the message with protection and security. As using this proposed scheme, the third party malicious user unable to detect the original message data.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1679 The sender sends the secret data orinformationand that private message will be encrypted with cryptographic algorithm, the encrypted cipher is then partitionedinshares of QR code for additional security and to avoid the common time whole access of the secret message. Advantages of this scheme:  Secure encoding of document or text secret data by algorithm.  Higher security and more flexible accessstructures.  To integrate a VCS, where the recovery requires only OR or XOR operations.  No need to use LSB or extra hash function to extract secret data  VCS has less computational complexity and computation cost. 4. STUDY OF BLOWFISH ALGORITHM Blowfish algorithm is a replacement of DES or IDEA.Itis a symmetric block cipher with a 64-bit block size. It ismeant to be significantly faster than DES. The keys are of variable size from 32 bits to 448 bits, but default size is 128 bits. The total no. of rounds to be perform is 16. Algorithm: 1. Convert input key into 18 sub keys of size 32 bits & store it in P arrays. 2. There are four S-boxes, which are 32-bit arrays with 256 entries in each. 3. XOR first 32 bits of the original key with P1. 4. Similarly, XOR second 32 bits of the original key with P2 and so on up to P18. 5. Divide Plaintext into two 32-bit halves: XL, XR. 6. For i = 1 to 16. { XL = XL XOR Pi XR = F (XL) XOR XR Swap XL and XR } 7. Swap XL and XR. 8. XR = XR XOR P17. 9. XL = XL XOR P18. 10. Concatenate XL and XR. The Function F from algorithm works as follows. 3. CONCLUSION In this paper, we proposed a strategy for QR code applications by visual secret sharing scheme. This makes great improvement mainly on two aspects, higher security and more flexible QR code access structures. So that’s why the computation cost of our scheme is much less than that of the previous works. REFERENCES [1] C. N. Yang, D. S. Wang, “Property Analysis of XOR-Based Visual Cryptography,” IEEE Transactions on Circuits Systems for Video Technology, vol. 24, no. 12 pp. 189- 197, 2014. [2] P. P. Thulasidharan, M. S. Nair, “QR code based blind digital image watermarking with attack detectioncode,” AEU - International Journal of Electronics and Communications, vol. 69, no. 7, pp. 1074-1084, 2015.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1680 [3] P. Y. Lin, “Distributed Secret Sharing Approach with Cheater Prevention Based on QR Code,” IEEE Transactions on Industrial Informatics, vol.12,no.1, pp. 384-392 , 2016. [4] I. Tkachenko, W. Puech, C. Destruel,etal.,“Two-Level QR Code for Private Message Sharing and Document Authentication,” IEEE Transactions on Information Forensics Security, vol. 11, no. 13, pp. 571-583, 2016. [5] P. Y. Lin, Y. H. Chen, “High payload secret hiding technology for QR codes,” Eurasip Journal on Image Video Processing, vol. 2017, no. 1, pp. 14, 2017. [6] Y. Cheng, Z. Fu and B. Yu, "Improved Visual Secret Sharing Scheme for QR Code Applications," in IEEE Transactions on Information ForensicsandSecurity, vol. 13, no. 9, pp. 2393-2403, Sept. 2018. [7] F. Liu, Guo T: Privacy protectiondisplayimplementation method based on visual passwords. CN Patent App. CN 201410542752, 2015. [8] S J Shyu, M C Chen, “Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures,” IEEE Transactions on Circuits Systems for Video Technology, vol. 25, no. 9, pp.1-1,2015. [9] H. D. Yuan, “Secret sharing with multi-cover adaptive steganography,” Information Sciences,vol.254,pp.197– 212, 2014. [10] J. Weir, W. Q. Yan, “Authenticating Visual Cryptography Shares Using 2 D Barcodes,” in Digital Forensics and Watermarking. Berlin, German: Springer Berlin Heidelberg, 2011, pp. 196-210. BIOGRAPHIES Mr. Pranav Vijay Hadawale, Student, Bachelor of Engineering, Dept. Of Computer Engineering, Sahyadri Valley COE & Technology, Pune. Miss. Sumoli Lahu Vaje, Student, Bachelor of Engineering, Dept. Of Computer Engineering, Sahyadri Valley COE & Technology, Pune. Miss. Dipali Sampat Wale, Student, Bachelor of Engineering, Dept. Of Computer Engineering, Sahyadri Valley COE & Technology, Pune. Prof. Sachin Dighe, Assistant Professor, Dept. Of Computer Engineering, Sahyadri Valley COE & Technology, Pune.