SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2357
A Review On QR Code For Hiding Private Information
Mr.V.V.Panchal1, Mr.H.B.Torvi2
1 Department of Computer science and Engineering, V.V.P. Institute of Engineering and Technology,
Solapur-413004.
2 Assistant Professor, Department of Computer Science and Engineering, V.V.P. Institute of Engineering and
Technology, Solapur-413004.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The Quick Response (QR) a high speed reading
application designed for storage of information. In this paper,
we present a new rich QR code that has two storage levels.
level one and level two The level one named a public level ,and
level two named as private level. The publiclevelis thesame as
the standard QR code storage level, therefore it is readable by
any classical QR code application. The private level is
constructed by replacing the black modules by specific
textured patterns. It consists of information encoded using q-
ary code with an error correction capacity. This allows us not
only to improve the security of the QR code, but also increase
the storage capacity of QR code and distinguish the original
document from a copy.
Key Words: QR code, two storage levels, private message,
data hiding, Watermark, Discrete Cosine Transform,
Steganography and Image Fusion
1.INTRODUCTION
The definition of information security given by National
Institute of standard and Technology (NIST) says that,” The
protection of information and information systems from
unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide
confidentiality, integrity, and availability.” integrity, which
means guarding against improper information modification
or destruction, and includes ensuring information non
repudiation and authenticity ;confidentiality, which means
preserving authorized restrictions on access and disclosure,
including means for protecting personal privacy and
proprietary information; and availability, which means
ensuring timely and reliable access to and use of
information. The term information forensics relating to the
application of scientific methods and technique to the
investigation of crime. For providingsecuritytoinformation,
hiding the information incryptographic frominanimage[9].
Quick response Code (QR code) is widely used in daily life in
recent years because it has high capacity encoding of data,
damage resistance, fast decoding and other good
characteristics. [5] QR code (quick response code) is a type
of two dimensional barcode developed by Denso-Wave
corporation in 1994 [1]. Todays, graphical codes, such as
EAN-13 barcode [1], Quick Response (QR) code [3],
DataMatrix [2], PDF417, are frequently used in our daily
lives. These codes have a huge number of applications
including: storage of information (advertising, museum art
description), redirection to web link, phone number track
and trace (for transportation tickets or brands),
identification (flight passenger information, supermarket
products) etc. Due to improving the reading speed of 2D-
barcodes get the name Quick Response (QR) Code.it is
extension of 2D-barcode.it contains data for both horizontal
and vertical dimension. The decoding speed of QR code can
be 20 times faster than that of other 2D symbols.
2. LITERATURE SURVEY
[4] Robust Message Hiding for QR Code
In [4], QR code is popular for exchange ofsecretinformation.
The authors analyzed the properties of each QR code before
embedding it in to this one. If they want to embed secret
message into QR code, they will encode it first. After that,
they exploit the structure of QR code which code they want
to use. It takes time, risks and cannotgetthesecretemessage
directly from this QR code. The Lin et al proposed to hide
secret message in to QR code is to use the error correction
capability. First of all, they encode the secret message sm by
using a shared key K and get EK(sm). After that, they embed
each bit of EK(sm) into QR code. Their first drawback is that
if any bit of EK(sm) is damaged, it is impossibletorecover sm
from QR code. The second drawback is that if an attacker
does not change any bit of EK(sm) but adds some extra error
values into QR code, they cannot recover their secret
message. Theirmaincontributionsaretoproposealgorithms
that hide a secret message into QR code. The secret message
is invisible to attackers and secure against modification or
damage attack.
[5] Secret Hiding Mechanism Using QR Barcode
In [5] this Paper, a new secret hiding mechanism for QR tag
based on the property of QR code. The new scheme exploits
the error correction capability to conceal the secret into a
cover QR code. Along with the QR version and the error
correction level, the designed algorithm can convey larger
secret into a cover QR code directly. Besides, the content of
the marked QR code is readable. That is, general browsers
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2358
can read the QR content from the marked QR code for the
sake of reducing the risk of attention. Only the validated
receiver can decode and encrypt the secret from the marked
QR code. The process of the new scheme is efficient and
feasible to be applied to the low-power QR readers and
mobile devices.
[6] QR Code Using Invisible Watermarking inFrequency
Domain
In [6] Digital watermark is a kind ofinformationsecurity and
protection technology. Watermarking is mostly similar to
steganography in a number of respects. The main idea of
steganography is the embedding of secret information into
data under assumption that others cannot know the secret
information in data. In general, the resultsofthismethod are
not robust against attacks. The main idea of watermark is to
check if the secret information is embedded in data or not
and the secret information that is embedded is robust
against attacks or edition when it is discovered.Theresultof
this method is more robust than previous method.
Watermark is the embedding of information in media for
exchange the information within the group. The input to the
scheme is the watermark, the cover-data and an optional
public or secret key. The key may be used to enforcesecurity
that is the prevention of unauthorized parties from
recovering and manipulating the watermark. All practical
systems employ at a key. In combination with a secret or a
public key, the watermarking techniques are usually
referred to as secret and public watermarking techniques,
respectively. The output of the watermarking scheme is the
watermarked data.
This paper uses DCT to embed an image of secret
information inside QR Code image. The main arguments for
using DCT in watermarking are the following. Embedding
rules operating in the DCT domain is often more robust to
image compression. WatermarkingintheDCTdomainoffers
the possibility of directly realizing the embedding operator
in the compressed domain in order to minimize the
computation time. The DCT coefficients of the QR Code
image and the DCT coefficients of the watermark text(secret
information) can be added. In more subtle algorithms,
relationships between multiple DCT coefficients can be
imposed according to the bit values of the watermark.
Furthermore, their quantization can be disturbed according
to the watermark bits.
[7] Visually significant QR Codes: Image blending and
Statistical analysis
In [7] this paper, a simple method of decoding allows for
some latitude in QR code design. If we treat luminance
values as normalized to the interval [0, 1], then sensed
values in the range [λ,1] are considered white by the
decoder, and those in the interval [0,λ] are considered black.
Therefore, we may in theory modify the QR code source
pixels so that pixels in a white module are transformed from
white to any RGB coordinatewhoseluminancevalueexceeds
λ, without creating a decoding error; similarly, we can
modify black modules of the QR source so that their
luminance falls below λ. In practice,theluminancesensed by
the camera fluctuates due to lighting conditions and noise.
Therefore, it is prudent to use upper and lower modification
thresholds denoted Tu , Tl, respectively, so that white pixels
are modified to have luminance Tu where Tu > λ, and black
pixels to have luminance Tl < λ. The differences Tu - λ and λ -
Tl provide a margin to reduce decoding error. Below, we
analyze statistically the effect of threshold choices on error.
[8] Facial Biometrics for 2D Barcodes
In [8] this paper, focus on the verification problem, in which
the system needs to confirm or reject the claimed identity
based on the input face, and do not address identification
problems (where the input is an unknown face, and the
system reports back thedeterminedidentityfroma database
of known individuals). Although computer chips and RFID
tags have been previously used for storing biometric
information(e.g.,Germanyintroducedits electronicpassport
containing a chip with a digital photo as biometric identifier
[7]), they are not suitable for low-cost solutions, such as
those involving paper documents (i.e., paper tickets) rather
than smart cards (i.e., pass cards). Compared to computer
chips and RFID tags, barcodes have smaller storage capacity
and cannot be used as active elements, but they are much
cheaper and do not require specialized hardware for
retrieving data: indeed, barcodes are inexpensive, passive
read-only elements whose contentcannotbealteredandcan
be decoded by many ubiquitous and low-cost devices,
including smartphones.
The main contributions of this paper are the following.First,
they investigate techniques for the extraction of facial
characteristics whichare not onlyrobusttodistortions(such
as pose and illumination changes) but also suitableforbeing
embedded into barcodes. This study leads us to identify the
most suitable facial features that can be stored in 2D
barcodes, while still supportingreasonablygood recognition
performances. Second, they engineer existing 2D color
barcodes in order to increase their data density, so that they
can store a sufficient number of facial features and a
reasonable cryptographic payload. In particular, they show
how to modify HCC2D, the High Capacity Colored 2-
Dimensional Barcode so as to increase its data density up to
3,904 bytes per square inch.
3. PROPOSED SYSTEM
In our propose system, a new two level QR code generated,
which having two storage levelspublicandprivatelevelscan
be used for documentauthentication.ThisnewgeneratedQR
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2359
code, called as two levels QR code (2LQR). In the public level
is the same as the standard QR code storage level; therefore
it is readable by any QR code application. The private level is
constructed by replacing the black modules by specific
textured patterns. In our system we encrypt the private
message which generates the code words . It consists of
information encoded using q-ary code with an error
correction capacity. That allows us not only to improve the
security of the QR code, but also to distinguish the original
document from a copy. And increase the storage capacity of
QR code.
Fig -1: System Architecture
4. CONCLUSIONS
In the proposed system we are going to improvethesecurity
and storage capacity of two levels QR code. The public level
and private level in the public level public informationwhich
is visible to all over and the private level contains private
information which can access only authorized user of
system. Objective of our project is to increase the storage
capacity and improve the security.
REFERENCES
[1] ISO/IEC 15420:2009. Information technology -
Automatic identification and data capture techniques -
EAN/UPC bar code symbology specification. 2009.
[2] ISO/IEC 16022:2006. Information technology -
Automatic identification and data capture techniques - Data
Matrix bar code symbology specification. 2006.
[3] ISO/IEC 18004:2000. Information technology -
Automatic identification and data capture techniques - Bar
code symbology - QR Code. 2000.
[4] Thach V. Bui, Nguyen K. Vu, Thong T.P. Nguyen, Isao
Echizen and Thuc D. Nguyen,” Robust MessageHidingfor QR
Code”, 2014 Tenth International Conference on Intelligent
Information Hiding and Multimedia Signal
Processing,pp.520-523.
[5] Pei-Yu Lin, Yi-Hui Chen, Eric Jui-Lin Lu and Ping-Jung
Chen,” Secret Hiding Mechanism Using QR Barcode”, 2013
International Conference on Signal-Image Technology &
Internet-Based Systems, pp.22-25.
[6] Sartid Vongpradhipand SuppatRungraungsilp,” QRCode
Using Invisible Watermarking in Frequency Domain”, 2011
Ninth International Conference on ICT and Knowledge
Engineering, pp.47-52.
[7] Z. Baharav and R. Kakarala.VisuallysignificantQRcodes:
Image blending and statistical analysis. In Multimedia and
Expo (ICME), 2013 IEEE International Conference on, pages
1–6. IEEE, 2013.
[8] Marco Querini and Giuseppe F,” Facial Biometrics for 2D
Barcodes”, Proceedings of the Federated Conference on
Computer Science and Information Systems pp. 755–762
[9] Richard Kissel” Glossary of Key Information Security
Terms”, National Institute of Standards and Technology
(NIST) May 2013, pp1-222.
[10] J. C. Chuang, Y. C. Hu and H. J. Ko, “A novel secret sharing
technique using QR code,” International Journal of Image
Processing, vol. 4, pp.468-475, 2010.
[11] Lin Liu, “A Survey of Digital Watermarking
Technologies”, www.ee.sunysb.edu/~cvl/.../Lin%20Liu
/ese558report_LinLiu.pdf
[12] Chung, Chin-Ho, Wen-Yuan Chen, and Ching-Ming Tu.
Image hidden technique using QR-barcode. In Intelligent
Information Hiding and Multimedia Signal Processing,2009.
IIH-MSP’09. Fifth International Conference on, pp. 522-525.
IEEE, 2009.
[13] L. Yu, X. Niu, and S. Sun. Print-and-scan model and the
watermarking countermeasure. In Image and Vision
Computing, volume 23, pages 807–814. Elsevier, 2005.
[14] Geisel, William A. Tutorial On Reed-Solomon Error-
Correction Coding. (1996).
[15] http://www.qrcode.com/.

More Related Content

What's hot

Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline QueriesEfficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
ijtsrd
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
IJMTST Journal
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET Journal
 
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET Journal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
Pank Jes
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business Cards
IRJET Journal
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
IJERA Editor
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET Journal
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
 
BIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATIONBIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATION
Journal For Research
 
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
John Britto
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET Journal
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
 
Finding Benefits of Utilizing RFID Technology
Finding Benefits of Utilizing RFID TechnologyFinding Benefits of Utilizing RFID Technology
Finding Benefits of Utilizing RFID Technology
siskum
 
10.1.1.70.1834
10.1.1.70.183410.1.1.70.1834
10.1.1.70.1834
Bhaskar Reddy
 

What's hot (20)

Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline QueriesEfficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business Cards
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
 
BIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATIONBIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATION
 
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Finding Benefits of Utilizing RFID Technology
Finding Benefits of Utilizing RFID TechnologyFinding Benefits of Utilizing RFID Technology
Finding Benefits of Utilizing RFID Technology
 
10.1.1.70.1834
10.1.1.70.183410.1.1.70.1834
10.1.1.70.1834
 

Similar to A Review on QR Code for Hiding Private Information

Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
aissmsblogs
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
IRJET Journal
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET Journal
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
csandit
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharing
ijcisjournal
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
IAEME Publication
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET Journal
 
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...
IRJET Journal
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
IRJET Journal
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET Journal
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwt
IAEME Publication
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
IRJET Journal
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET Journal
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
IRJET Journal
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET Journal
 

Similar to A Review on QR Code for Hiding Private Information (20)

Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharing
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwt
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
sachin chaurasia
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
Shiny Christobel
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 

Recently uploaded (20)

Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 

A Review on QR Code for Hiding Private Information

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2357 A Review On QR Code For Hiding Private Information Mr.V.V.Panchal1, Mr.H.B.Torvi2 1 Department of Computer science and Engineering, V.V.P. Institute of Engineering and Technology, Solapur-413004. 2 Assistant Professor, Department of Computer Science and Engineering, V.V.P. Institute of Engineering and Technology, Solapur-413004. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The Quick Response (QR) a high speed reading application designed for storage of information. In this paper, we present a new rich QR code that has two storage levels. level one and level two The level one named a public level ,and level two named as private level. The publiclevelis thesame as the standard QR code storage level, therefore it is readable by any classical QR code application. The private level is constructed by replacing the black modules by specific textured patterns. It consists of information encoded using q- ary code with an error correction capacity. This allows us not only to improve the security of the QR code, but also increase the storage capacity of QR code and distinguish the original document from a copy. Key Words: QR code, two storage levels, private message, data hiding, Watermark, Discrete Cosine Transform, Steganography and Image Fusion 1.INTRODUCTION The definition of information security given by National Institute of standard and Technology (NIST) says that,” The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.” integrity, which means guarding against improper information modification or destruction, and includes ensuring information non repudiation and authenticity ;confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and availability, which means ensuring timely and reliable access to and use of information. The term information forensics relating to the application of scientific methods and technique to the investigation of crime. For providingsecuritytoinformation, hiding the information incryptographic frominanimage[9]. Quick response Code (QR code) is widely used in daily life in recent years because it has high capacity encoding of data, damage resistance, fast decoding and other good characteristics. [5] QR code (quick response code) is a type of two dimensional barcode developed by Denso-Wave corporation in 1994 [1]. Todays, graphical codes, such as EAN-13 barcode [1], Quick Response (QR) code [3], DataMatrix [2], PDF417, are frequently used in our daily lives. These codes have a huge number of applications including: storage of information (advertising, museum art description), redirection to web link, phone number track and trace (for transportation tickets or brands), identification (flight passenger information, supermarket products) etc. Due to improving the reading speed of 2D- barcodes get the name Quick Response (QR) Code.it is extension of 2D-barcode.it contains data for both horizontal and vertical dimension. The decoding speed of QR code can be 20 times faster than that of other 2D symbols. 2. LITERATURE SURVEY [4] Robust Message Hiding for QR Code In [4], QR code is popular for exchange ofsecretinformation. The authors analyzed the properties of each QR code before embedding it in to this one. If they want to embed secret message into QR code, they will encode it first. After that, they exploit the structure of QR code which code they want to use. It takes time, risks and cannotgetthesecretemessage directly from this QR code. The Lin et al proposed to hide secret message in to QR code is to use the error correction capability. First of all, they encode the secret message sm by using a shared key K and get EK(sm). After that, they embed each bit of EK(sm) into QR code. Their first drawback is that if any bit of EK(sm) is damaged, it is impossibletorecover sm from QR code. The second drawback is that if an attacker does not change any bit of EK(sm) but adds some extra error values into QR code, they cannot recover their secret message. Theirmaincontributionsaretoproposealgorithms that hide a secret message into QR code. The secret message is invisible to attackers and secure against modification or damage attack. [5] Secret Hiding Mechanism Using QR Barcode In [5] this Paper, a new secret hiding mechanism for QR tag based on the property of QR code. The new scheme exploits the error correction capability to conceal the secret into a cover QR code. Along with the QR version and the error correction level, the designed algorithm can convey larger secret into a cover QR code directly. Besides, the content of the marked QR code is readable. That is, general browsers
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2358 can read the QR content from the marked QR code for the sake of reducing the risk of attention. Only the validated receiver can decode and encrypt the secret from the marked QR code. The process of the new scheme is efficient and feasible to be applied to the low-power QR readers and mobile devices. [6] QR Code Using Invisible Watermarking inFrequency Domain In [6] Digital watermark is a kind ofinformationsecurity and protection technology. Watermarking is mostly similar to steganography in a number of respects. The main idea of steganography is the embedding of secret information into data under assumption that others cannot know the secret information in data. In general, the resultsofthismethod are not robust against attacks. The main idea of watermark is to check if the secret information is embedded in data or not and the secret information that is embedded is robust against attacks or edition when it is discovered.Theresultof this method is more robust than previous method. Watermark is the embedding of information in media for exchange the information within the group. The input to the scheme is the watermark, the cover-data and an optional public or secret key. The key may be used to enforcesecurity that is the prevention of unauthorized parties from recovering and manipulating the watermark. All practical systems employ at a key. In combination with a secret or a public key, the watermarking techniques are usually referred to as secret and public watermarking techniques, respectively. The output of the watermarking scheme is the watermarked data. This paper uses DCT to embed an image of secret information inside QR Code image. The main arguments for using DCT in watermarking are the following. Embedding rules operating in the DCT domain is often more robust to image compression. WatermarkingintheDCTdomainoffers the possibility of directly realizing the embedding operator in the compressed domain in order to minimize the computation time. The DCT coefficients of the QR Code image and the DCT coefficients of the watermark text(secret information) can be added. In more subtle algorithms, relationships between multiple DCT coefficients can be imposed according to the bit values of the watermark. Furthermore, their quantization can be disturbed according to the watermark bits. [7] Visually significant QR Codes: Image blending and Statistical analysis In [7] this paper, a simple method of decoding allows for some latitude in QR code design. If we treat luminance values as normalized to the interval [0, 1], then sensed values in the range [λ,1] are considered white by the decoder, and those in the interval [0,λ] are considered black. Therefore, we may in theory modify the QR code source pixels so that pixels in a white module are transformed from white to any RGB coordinatewhoseluminancevalueexceeds λ, without creating a decoding error; similarly, we can modify black modules of the QR source so that their luminance falls below λ. In practice,theluminancesensed by the camera fluctuates due to lighting conditions and noise. Therefore, it is prudent to use upper and lower modification thresholds denoted Tu , Tl, respectively, so that white pixels are modified to have luminance Tu where Tu > λ, and black pixels to have luminance Tl < λ. The differences Tu - λ and λ - Tl provide a margin to reduce decoding error. Below, we analyze statistically the effect of threshold choices on error. [8] Facial Biometrics for 2D Barcodes In [8] this paper, focus on the verification problem, in which the system needs to confirm or reject the claimed identity based on the input face, and do not address identification problems (where the input is an unknown face, and the system reports back thedeterminedidentityfroma database of known individuals). Although computer chips and RFID tags have been previously used for storing biometric information(e.g.,Germanyintroducedits electronicpassport containing a chip with a digital photo as biometric identifier [7]), they are not suitable for low-cost solutions, such as those involving paper documents (i.e., paper tickets) rather than smart cards (i.e., pass cards). Compared to computer chips and RFID tags, barcodes have smaller storage capacity and cannot be used as active elements, but they are much cheaper and do not require specialized hardware for retrieving data: indeed, barcodes are inexpensive, passive read-only elements whose contentcannotbealteredandcan be decoded by many ubiquitous and low-cost devices, including smartphones. The main contributions of this paper are the following.First, they investigate techniques for the extraction of facial characteristics whichare not onlyrobusttodistortions(such as pose and illumination changes) but also suitableforbeing embedded into barcodes. This study leads us to identify the most suitable facial features that can be stored in 2D barcodes, while still supportingreasonablygood recognition performances. Second, they engineer existing 2D color barcodes in order to increase their data density, so that they can store a sufficient number of facial features and a reasonable cryptographic payload. In particular, they show how to modify HCC2D, the High Capacity Colored 2- Dimensional Barcode so as to increase its data density up to 3,904 bytes per square inch. 3. PROPOSED SYSTEM In our propose system, a new two level QR code generated, which having two storage levelspublicandprivatelevelscan be used for documentauthentication.ThisnewgeneratedQR
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2359 code, called as two levels QR code (2LQR). In the public level is the same as the standard QR code storage level; therefore it is readable by any QR code application. The private level is constructed by replacing the black modules by specific textured patterns. In our system we encrypt the private message which generates the code words . It consists of information encoded using q-ary code with an error correction capacity. That allows us not only to improve the security of the QR code, but also to distinguish the original document from a copy. And increase the storage capacity of QR code. Fig -1: System Architecture 4. CONCLUSIONS In the proposed system we are going to improvethesecurity and storage capacity of two levels QR code. The public level and private level in the public level public informationwhich is visible to all over and the private level contains private information which can access only authorized user of system. Objective of our project is to increase the storage capacity and improve the security. REFERENCES [1] ISO/IEC 15420:2009. Information technology - Automatic identification and data capture techniques - EAN/UPC bar code symbology specification. 2009. [2] ISO/IEC 16022:2006. Information technology - Automatic identification and data capture techniques - Data Matrix bar code symbology specification. 2006. [3] ISO/IEC 18004:2000. Information technology - Automatic identification and data capture techniques - Bar code symbology - QR Code. 2000. [4] Thach V. Bui, Nguyen K. Vu, Thong T.P. Nguyen, Isao Echizen and Thuc D. Nguyen,” Robust MessageHidingfor QR Code”, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,pp.520-523. [5] Pei-Yu Lin, Yi-Hui Chen, Eric Jui-Lin Lu and Ping-Jung Chen,” Secret Hiding Mechanism Using QR Barcode”, 2013 International Conference on Signal-Image Technology & Internet-Based Systems, pp.22-25. [6] Sartid Vongpradhipand SuppatRungraungsilp,” QRCode Using Invisible Watermarking in Frequency Domain”, 2011 Ninth International Conference on ICT and Knowledge Engineering, pp.47-52. [7] Z. Baharav and R. Kakarala.VisuallysignificantQRcodes: Image blending and statistical analysis. In Multimedia and Expo (ICME), 2013 IEEE International Conference on, pages 1–6. IEEE, 2013. [8] Marco Querini and Giuseppe F,” Facial Biometrics for 2D Barcodes”, Proceedings of the Federated Conference on Computer Science and Information Systems pp. 755–762 [9] Richard Kissel” Glossary of Key Information Security Terms”, National Institute of Standards and Technology (NIST) May 2013, pp1-222. [10] J. C. Chuang, Y. C. Hu and H. J. Ko, “A novel secret sharing technique using QR code,” International Journal of Image Processing, vol. 4, pp.468-475, 2010. [11] Lin Liu, “A Survey of Digital Watermarking Technologies”, www.ee.sunysb.edu/~cvl/.../Lin%20Liu /ese558report_LinLiu.pdf [12] Chung, Chin-Ho, Wen-Yuan Chen, and Ching-Ming Tu. Image hidden technique using QR-barcode. In Intelligent Information Hiding and Multimedia Signal Processing,2009. IIH-MSP’09. Fifth International Conference on, pp. 522-525. IEEE, 2009. [13] L. Yu, X. Niu, and S. Sun. Print-and-scan model and the watermarking countermeasure. In Image and Vision Computing, volume 23, pages 807–814. Elsevier, 2005. [14] Geisel, William A. Tutorial On Reed-Solomon Error- Correction Coding. (1996). [15] http://www.qrcode.com/.