SlideShare a Scribd company logo
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1606
A Survey On Secrete Communication Through QR
Department Of Computer Engineering, RMD Sinhgad School Of Engineering, Warje , Pune.
---------------------------------------------------------------------***-------------------------------------------------------------------
Abstract: The quick response code (QR) has become
most popular barcode because of its larger data capacity
and increased damage resistance. Barcode scanners can
easily extract information hidden in the QR code when
scanning data forms. However, some confidential data
stored directly in QR codes are not secure in real world
QR apps. To proposed approach to visual secret sharing
scheme to encode a secret QR code into distinct shares. In
assessment with other techniques, the shares in proposed
scheme are valid QR codes that may be decoded with
some unique that means of a trendy QR code reader, so
that escaping increases suspicious attackers. An existing
sharing technique is subjected to loss of security. On this
premise, consider the strategy for (k, n) get to structures
by using the (k, k) sharing occurrence on each k-member
subset dependent on specific relationship. In addition, the
secret message is recovered with the aid of XOR-ing the
qualified shares .this operation which can effortlessly be
achieved the use of smartphones or different QR scanning
gadgets.
Keywords: Partitioning Algorithm, Quick Response code,
visual secret sharing scheme, high security, error
correction capacity.
I. INTRODUCTION
Quick Response code is still widely utilised. QR codes are
utilised on a regular basis in a variety of situations involving
data collecting, network connections, traceability,
verification, and authentication. To begin with, the QR code
makes it simple to detect computer equipment, such as
smart phones and scanning guns. Second, QR codes have a
large storage capacity and are inexpensive.
The QR code features a geometrical revamp and a
framework for quicker disengagement. Three location labels
are used for QR code recognition and direction changing. At
least one building style must be used in a twisting scheme.
The module is intended to handle the business.
Furthermore, the corporate data fields have varying degrees
of modification and coverage. The code type and error
correction bits are employed in the adaption data areas.
These attributes are mostly responsible for the popularity of
QR codes:
1. QR code-resistant duplication technique
2. Any computer or person can be easily read.
3. Bug fixes have improved its wide encoding capability.
Another milestone in visual cryptography sharing. It
improves hidden image sharing to reproduce the secret's
complexity using human eye decoding. In contrast to
traditional cryptography, it has the advantages of
camouflage, secrecy, and simplicity of covert retrieval. The
visual encryption solution met the consumers' high security
needs and protected them from a variety of security threats.
Making a motive for business applications is not difficult.
II. LITERATURE SURVEY
The paper [1] gives complete analysis of OR based and XOR
based Visual Cryptography System and proves how XVCS
performs better than OVCS. The contrast obtained using
XVCS is higher than OVCS .The contrast of XVCS is 2ˆ ((k-1))
times greater than OVCS. The monotone property of OR
operation degrades the visual quality of reconstructed image
for OR-based VCS (OVCS). Advantages are: Easily decode the
secret image by stacking operation. XVCS has better
reconstructed image than OVCS. Contrast obtained of the
decrypted image is more and so the quality of decrypted
image.
In paper [2], author proposed that, to accurately recognize
the information present in QR code it is necessary to correct
the QR code image and do corrections in it if required. So to
correct the QR distortion algorithm is proposed based on
geometric traditional geometric correction. the process
involves following steps, first to find the exact coordinates of
four vertices of the QR code image distortion preprocessing
of QR image is done. In second step based on coordinates
obtained geometric correction is carried out .In Third step
after correction the black and white data blocks of the QR
code are recognized and stored, and the QR code binary
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
Nikita Bhoskar1, Pradnya Ithape2, Bhagyashree Gavali3, Prof. Pradnya Kasture4
Code Steganography
For Military Application
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1607
image is restored accurately. that’s how it increases the
application area of QR code.
In paper [3],The two-level QR code (2LQR), has two public
and personal storage levels and may be used for document
authentication The general public level is that the same
because the standard QR code storage level; therefore it’s
readable by any classical QR code application. The private
level is made by replacing the black modules by specific
textured patterns. It consists of data encoded using QR code
with a mistake correction capacity. It increases the storage
capacity of the QR code. The textured patterns used in 2LQR
sensitive to the PS process. Need to improve the pattern
identification method. The storage capacity of 2LQR can be
increased by replacing the white modules with textured
patterns.
In this paper [4],there is method to improve cost function of
JPEG Steganography By exploiting the texture in micro-scale
The proposed scheme is designed by using a microscope "to
highlight details in an image, so that distortion definition can
be more refined. Authors not extend the former work,
micro-scale steganography in the spatial domain, into
adaptive JPEG steganography.
This paper [5] ,propose sharing QR code secrets explodes
the error correction mechanism inherent in the structure of
the QR code, for circulate and encode data about a mystery
message into various activities. Each activity in the plan is
developed from a QR cover code, and each offer itself is a
legitimate QR code that can be examined and decoded by a
QR code reader. Advantages are: The secret message can be
recuperated the mystery message can be recouped by
consolidating the data contained in the QR code shares.
Disadvantages is: secrete sharing depends on code words.
This paper [6], Advanced cheating prevention mechanism to
QR code. First the sender of the image shares the keys with
the participants and after sending the share first participant
is authenticated by using validation code and key if any of
the participant is dishonest then secret decoding process
stops at that point itself. Highest version of the QR code that
is version 40 is used in the paper. Advantage is introduced
an advanced cheating-prevention visual secret-sharing.
Presented approach is tolerant to print and scan operation
to protect QR data in real world application.
In this paper [7],by using RISS algorithm for (k,n) threshold
Extended cover pattern to grays scale and color pattern.
Also polynomial –based ISS mechanism. using CRT ,Lower
computation cost and lossless reconstruction.RISS not
applicable for general (k,n) threshold scheme with any
n>=k>=2.The recovery method requires more computation.
In paper [8],One solution is to find a proper texture area in
the assemblage of candidate patches and replace the
mirroring area. Authors propose an attacking method on
this steganography, which can not only detect the stego-
images but can also extract the hidden messages.
In this paper [9], as first part, many types of secret sharing
schemes are examined and author proposed two Variant of a
secret sharing scheme using Gray code and XOR operation.
The Gray code is used to construct the shares and the XOR
operation is used to reconstruct the secret. The proposed
method can be used as a cryptographic algorithm and also
for secret sharing as well as visual secret sharing.
In this paper [10 ] ,considering the video steganography
methods to perform secure steganography communication.
Many methods have been proposed for video steganography
but they're no more different types of formats, secured,
quality, of the results. So here propose secure steganography
methods i.e. Secure base LSB method, Neural Networks &
Fuzzy logic, and check their using PSNR and MSE data of the
methods. That data-set has collected is from video streams.
And the result was seen with the more formats, more
security, quality of outputs, & accuracy values of PSNR &
MSE which is better than other proposed methods.
III. PROPOSED METHODOLOGY
In proposed system, a novel approach is introduced to
improve the security of QR codes using advanced
partitioning algorithm. An existing sharing technique is
subjected to loss of security. On this premise, consider the
strategy for (k, n) get to structures by using the (k, k)
sharing occurrence on each k-member subset dependent on
specific relationship. This methodology will require
countless examples as n increments. Therefore, presents
portioning calculations to group all the k-member subsets
into a few assortments, in which cases of various subsets can
be supplanted by just one. The designed scheme is feasible
to hide the secrets into a tiny QR tag as the purpose of visual
sharing schema. Only the authorized user with the private
key can additionally uncover the covered mystery
effectively.
A. Architecture
Following fig.1 shows the proposed architecture of
the given approach:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
Fig 1-system architecture
B. Algorithms
1. K-means clustering:
K-Means Clustering is an iterative, unsupervised algorithm
that is used to partition data into clusters based on the
similarity present among data points. In this work K-means
clustering is used in order to partition the secret message
into shares so that it can be distributed to participants. In K-
means data is partitioned in such a way that each data point
belongs to only one group so as reduce intra-class
dissimilarity and increase interclass dissimilarity. In this
work for division of message into cluster, a word is
compared with center of each cluster and it is then moved to
the cluster in which the distance is less from the center.
cluster center
 If the distance is near to the center then move to that
cluster.
equivalent ASCII code.
Steps:
 Conversion of ASCII code to equivalent 8 bit binary
number.
 Division of 8 bit binary number into two 4 bit parts.
Picking of random letters relating to the 4 bit parts.
 Meaningful sentence development by utilizing letters
got as the main letters of reasonable words.
 Omission of articles, pronoun, relational word,
intensifier, was/were, is/am/are, has/have/had,
will/will, and would/ought to in coding procedure to
give adaptability in sentence development.
 Encoding isn't case touchy.
3. Decoding
Steps:
 First letter in each word of encoded message is taken
code.
 Finally encoded message is recovered from ASCII codes.
IV. RESULTS AND DISCUSSION
Experiments can be performed on a personal
computer with a configuration: Intel (R) Core (TM) i7-2120
CPU @ 3.30GHz, 8GB memory, Windows, MySQL backend
database and Jdk 1.9. The application is web application
used tool for design code in Eclipse and execute on Tomcat
server.
The QR code security with texture patterns by
applying the X-OR ing based Visual Cryptography Scheme on
QR code for sharing secrets to the receiver. The figure shows
the QR code example. The experiment includes two
processes encryption process and decryption process.
A. Output Results
Steps:
 Give the number of cluster value as k.
 Randomly choose the k cluster centers
 Calculate mean or center of the cluster
 Calculate the distance between each word to each
 Otherwise move to next cluster.
 Re-estimate the center.
 Repeat the process until the center doesn’t move.
2. Encoding
Representation of each letter in secret message by its
and represented by 4 bit number.
 4 bit binary numbers of merged to obtain 8 bit number.
 Conversion of 8 bit binary number to equivalent ASCII
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1608
Input: I want to meet
Output:
Fig. 2.-QR Code
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1609
Figure 3 shows the secret shares generated of given
message.
Fig.4 Retrieve the original message using selected shares
Message - I want to meet
V. CONCLUSION
In this paper, a visual secret sharing scheme for QR code
applications, which makes improvement mainly on two
aspects: higher security and partitioning techniques based
on specific relationships. In addition, we extended the access
structure from (n, n) to (k, n) by further investigating the
error correction mechanism of QR codes. Two division
approaches are provided, effectively improving the sharing
efficiency of (k, n) method. Therefore, the computational
cost of our work is much smaller than that of the previous
studies which can also achieve (k, n) sharing method and
compare shared message with original message using
hashing techniques.
REFERENCES
[1] C. N. Yang, D. S. Wang, “Property Analysis of
XOR-Based Visual Cryptography,” IEEE Transactions on
Circuits Systems for Video Technology, vol. 24, no. 12 pp.
189-197, 2014..
[2] Wang Xuan, Cao Peng, Feng Liuping, Zhu
Jianle, Huo peijun,“Research on Correcting Algorithm of QR
Code Image’s Distortion ”17th IEEE International
Conference on Communication Technology 2017.
[3] I. Tkachenko, W. Puech, C. Destruel, et al.,
“Two-Level QR Code for Private Message Sharing and
Document Authentication,” IEEE Transactions on
Information Forensics Security, vol. 11, no. 13, pp. 571-583,
2016.
[6] P. Y. Lin, “Distributed Secret Sharing Approach
with Cheater Prevention Based on QR Code,” IEEE
Transactions on Industrial Informatics, vol. 12, no. 1, pp.
384-392, 2016.
[7] Xuehu Yan, Yuliang Lu, Lintao Liu , Xianhua
Song, “Reversible Image Secret Sharing”, IEEE,Vol-15,2020.
[8] Hang Zhou, Kejiang Chen, Weiming Zhang, and
Nenghai Yu, “Comments on Steganography Using Reversible
Texture Synthesis”, IEEE, VOL. 26, NO. 4, APRIL 2017.
[9] Deepika M P, A Sreekumar,” Secret Sharing
Scheme Using Gray Code and XOR Operation” IEEE 2017.
[10] Manohar N, Peetla Vijay Kumar, “Data Encryption and
Decryption using Steganography”, IEEE -Xplore Part
Number: CFP20K74-ART; ISBN: 978-1-7281-4876-2, 2020.
Fig.3 Secret Shares generated of given message
[4] Kejiang Chen, Hang Zhou, Wenbo Zhou,
Nenghai Yu, “ Defining Cost Functions for Adaptive JPEG
Steganography at the Microscale”, IEEE, 1556-6013 (c)
2018.
[5] Y W. Chow, W Susilo, G Yang, et al., “Exploiting the
Error Correction Mechanism in QR Codes for Secret
Sharing,” Information Security and Privacy, pp.409-425,
2016.

More Related Content

Similar to A Survey On Secrete Communication Through QR Code Steganography For Military Application

Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
csandit
 
Iris images encryption based on QR code and chaotic map
Iris images encryption based on QR code and chaotic mapIris images encryption based on QR code and chaotic map
Iris images encryption based on QR code and chaotic map
TELKOMNIKA JOURNAL
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
IRJET Journal
 
R04405103106
R04405103106R04405103106
R04405103106
IJERA Editor
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
 
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCBarcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
yeswanthkrishna2005
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtIAEME Publication
 
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
Vladimir Kulyukin
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
IRJET Journal
 
Seminar achu
Seminar achuSeminar achu
Seminar achu
Achu Anna
 
IRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data HidingIRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET Journal
 
CryptoQR System based on RSA
CryptoQR System based on RSACryptoQR System based on RSA
CryptoQR System based on RSA
IJCSIS Research Publications
 
pi code (picture embedding)
pi code (picture embedding)pi code (picture embedding)
pi code (picture embedding)
Naga Dinesh
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET Journal
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...
IJECEIAES
 
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
CSCJournals
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
 
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code Scanner
IRJET Journal
 

Similar to A Survey On Secrete Communication Through QR Code Steganography For Military Application (20)

Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
 
Iris images encryption based on QR code and chaotic map
Iris images encryption based on QR code and chaotic mapIris images encryption based on QR code and chaotic map
Iris images encryption based on QR code and chaotic map
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
R04405103106
R04405103106R04405103106
R04405103106
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCBarcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwt
 
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
 
Seminar achu
Seminar achuSeminar achu
Seminar achu
 
IRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data HidingIRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data Hiding
 
CryptoQR System based on RSA
CryptoQR System based on RSACryptoQR System based on RSA
CryptoQR System based on RSA
 
pi code (picture embedding)
pi code (picture embedding)pi code (picture embedding)
pi code (picture embedding)
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...
 
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
Vision-Based Localization and Scanning of 1D UPC and EAN Barcodes with Relaxe...
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code Scanner
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 

Recently uploaded (20)

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 

A Survey On Secrete Communication Through QR Code Steganography For Military Application

  • 1. © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1606 A Survey On Secrete Communication Through QR Department Of Computer Engineering, RMD Sinhgad School Of Engineering, Warje , Pune. ---------------------------------------------------------------------***------------------------------------------------------------------- Abstract: The quick response code (QR) has become most popular barcode because of its larger data capacity and increased damage resistance. Barcode scanners can easily extract information hidden in the QR code when scanning data forms. However, some confidential data stored directly in QR codes are not secure in real world QR apps. To proposed approach to visual secret sharing scheme to encode a secret QR code into distinct shares. In assessment with other techniques, the shares in proposed scheme are valid QR codes that may be decoded with some unique that means of a trendy QR code reader, so that escaping increases suspicious attackers. An existing sharing technique is subjected to loss of security. On this premise, consider the strategy for (k, n) get to structures by using the (k, k) sharing occurrence on each k-member subset dependent on specific relationship. In addition, the secret message is recovered with the aid of XOR-ing the qualified shares .this operation which can effortlessly be achieved the use of smartphones or different QR scanning gadgets. Keywords: Partitioning Algorithm, Quick Response code, visual secret sharing scheme, high security, error correction capacity. I. INTRODUCTION Quick Response code is still widely utilised. QR codes are utilised on a regular basis in a variety of situations involving data collecting, network connections, traceability, verification, and authentication. To begin with, the QR code makes it simple to detect computer equipment, such as smart phones and scanning guns. Second, QR codes have a large storage capacity and are inexpensive. The QR code features a geometrical revamp and a framework for quicker disengagement. Three location labels are used for QR code recognition and direction changing. At least one building style must be used in a twisting scheme. The module is intended to handle the business. Furthermore, the corporate data fields have varying degrees of modification and coverage. The code type and error correction bits are employed in the adaption data areas. These attributes are mostly responsible for the popularity of QR codes: 1. QR code-resistant duplication technique 2. Any computer or person can be easily read. 3. Bug fixes have improved its wide encoding capability. Another milestone in visual cryptography sharing. It improves hidden image sharing to reproduce the secret's complexity using human eye decoding. In contrast to traditional cryptography, it has the advantages of camouflage, secrecy, and simplicity of covert retrieval. The visual encryption solution met the consumers' high security needs and protected them from a variety of security threats. Making a motive for business applications is not difficult. II. LITERATURE SURVEY The paper [1] gives complete analysis of OR based and XOR based Visual Cryptography System and proves how XVCS performs better than OVCS. The contrast obtained using XVCS is higher than OVCS .The contrast of XVCS is 2ˆ ((k-1)) times greater than OVCS. The monotone property of OR operation degrades the visual quality of reconstructed image for OR-based VCS (OVCS). Advantages are: Easily decode the secret image by stacking operation. XVCS has better reconstructed image than OVCS. Contrast obtained of the decrypted image is more and so the quality of decrypted image. In paper [2], author proposed that, to accurately recognize the information present in QR code it is necessary to correct the QR code image and do corrections in it if required. So to correct the QR distortion algorithm is proposed based on geometric traditional geometric correction. the process involves following steps, first to find the exact coordinates of four vertices of the QR code image distortion preprocessing of QR image is done. In second step based on coordinates obtained geometric correction is carried out .In Third step after correction the black and white data blocks of the QR code are recognized and stored, and the QR code binary International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 Nikita Bhoskar1, Pradnya Ithape2, Bhagyashree Gavali3, Prof. Pradnya Kasture4 Code Steganography For Military Application
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1607 image is restored accurately. that’s how it increases the application area of QR code. In paper [3],The two-level QR code (2LQR), has two public and personal storage levels and may be used for document authentication The general public level is that the same because the standard QR code storage level; therefore it’s readable by any classical QR code application. The private level is made by replacing the black modules by specific textured patterns. It consists of data encoded using QR code with a mistake correction capacity. It increases the storage capacity of the QR code. The textured patterns used in 2LQR sensitive to the PS process. Need to improve the pattern identification method. The storage capacity of 2LQR can be increased by replacing the white modules with textured patterns. In this paper [4],there is method to improve cost function of JPEG Steganography By exploiting the texture in micro-scale The proposed scheme is designed by using a microscope "to highlight details in an image, so that distortion definition can be more refined. Authors not extend the former work, micro-scale steganography in the spatial domain, into adaptive JPEG steganography. This paper [5] ,propose sharing QR code secrets explodes the error correction mechanism inherent in the structure of the QR code, for circulate and encode data about a mystery message into various activities. Each activity in the plan is developed from a QR cover code, and each offer itself is a legitimate QR code that can be examined and decoded by a QR code reader. Advantages are: The secret message can be recuperated the mystery message can be recouped by consolidating the data contained in the QR code shares. Disadvantages is: secrete sharing depends on code words. This paper [6], Advanced cheating prevention mechanism to QR code. First the sender of the image shares the keys with the participants and after sending the share first participant is authenticated by using validation code and key if any of the participant is dishonest then secret decoding process stops at that point itself. Highest version of the QR code that is version 40 is used in the paper. Advantage is introduced an advanced cheating-prevention visual secret-sharing. Presented approach is tolerant to print and scan operation to protect QR data in real world application. In this paper [7],by using RISS algorithm for (k,n) threshold Extended cover pattern to grays scale and color pattern. Also polynomial –based ISS mechanism. using CRT ,Lower computation cost and lossless reconstruction.RISS not applicable for general (k,n) threshold scheme with any n>=k>=2.The recovery method requires more computation. In paper [8],One solution is to find a proper texture area in the assemblage of candidate patches and replace the mirroring area. Authors propose an attacking method on this steganography, which can not only detect the stego- images but can also extract the hidden messages. In this paper [9], as first part, many types of secret sharing schemes are examined and author proposed two Variant of a secret sharing scheme using Gray code and XOR operation. The Gray code is used to construct the shares and the XOR operation is used to reconstruct the secret. The proposed method can be used as a cryptographic algorithm and also for secret sharing as well as visual secret sharing. In this paper [10 ] ,considering the video steganography methods to perform secure steganography communication. Many methods have been proposed for video steganography but they're no more different types of formats, secured, quality, of the results. So here propose secure steganography methods i.e. Secure base LSB method, Neural Networks & Fuzzy logic, and check their using PSNR and MSE data of the methods. That data-set has collected is from video streams. And the result was seen with the more formats, more security, quality of outputs, & accuracy values of PSNR & MSE which is better than other proposed methods. III. PROPOSED METHODOLOGY In proposed system, a novel approach is introduced to improve the security of QR codes using advanced partitioning algorithm. An existing sharing technique is subjected to loss of security. On this premise, consider the strategy for (k, n) get to structures by using the (k, k) sharing occurrence on each k-member subset dependent on specific relationship. This methodology will require countless examples as n increments. Therefore, presents portioning calculations to group all the k-member subsets into a few assortments, in which cases of various subsets can be supplanted by just one. The designed scheme is feasible to hide the secrets into a tiny QR tag as the purpose of visual sharing schema. Only the authorized user with the private key can additionally uncover the covered mystery effectively. A. Architecture Following fig.1 shows the proposed architecture of the given approach:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 Fig 1-system architecture B. Algorithms 1. K-means clustering: K-Means Clustering is an iterative, unsupervised algorithm that is used to partition data into clusters based on the similarity present among data points. In this work K-means clustering is used in order to partition the secret message into shares so that it can be distributed to participants. In K- means data is partitioned in such a way that each data point belongs to only one group so as reduce intra-class dissimilarity and increase interclass dissimilarity. In this work for division of message into cluster, a word is compared with center of each cluster and it is then moved to the cluster in which the distance is less from the center. cluster center  If the distance is near to the center then move to that cluster. equivalent ASCII code. Steps:  Conversion of ASCII code to equivalent 8 bit binary number.  Division of 8 bit binary number into two 4 bit parts. Picking of random letters relating to the 4 bit parts.  Meaningful sentence development by utilizing letters got as the main letters of reasonable words.  Omission of articles, pronoun, relational word, intensifier, was/were, is/am/are, has/have/had, will/will, and would/ought to in coding procedure to give adaptability in sentence development.  Encoding isn't case touchy. 3. Decoding Steps:  First letter in each word of encoded message is taken code.  Finally encoded message is recovered from ASCII codes. IV. RESULTS AND DISCUSSION Experiments can be performed on a personal computer with a configuration: Intel (R) Core (TM) i7-2120 CPU @ 3.30GHz, 8GB memory, Windows, MySQL backend database and Jdk 1.9. The application is web application used tool for design code in Eclipse and execute on Tomcat server. The QR code security with texture patterns by applying the X-OR ing based Visual Cryptography Scheme on QR code for sharing secrets to the receiver. The figure shows the QR code example. The experiment includes two processes encryption process and decryption process. A. Output Results Steps:  Give the number of cluster value as k.  Randomly choose the k cluster centers  Calculate mean or center of the cluster  Calculate the distance between each word to each  Otherwise move to next cluster.  Re-estimate the center.  Repeat the process until the center doesn’t move. 2. Encoding Representation of each letter in secret message by its and represented by 4 bit number.  4 bit binary numbers of merged to obtain 8 bit number.  Conversion of 8 bit binary number to equivalent ASCII © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1608 Input: I want to meet Output: Fig. 2.-QR Code
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1609 Figure 3 shows the secret shares generated of given message. Fig.4 Retrieve the original message using selected shares Message - I want to meet V. CONCLUSION In this paper, a visual secret sharing scheme for QR code applications, which makes improvement mainly on two aspects: higher security and partitioning techniques based on specific relationships. In addition, we extended the access structure from (n, n) to (k, n) by further investigating the error correction mechanism of QR codes. Two division approaches are provided, effectively improving the sharing efficiency of (k, n) method. Therefore, the computational cost of our work is much smaller than that of the previous studies which can also achieve (k, n) sharing method and compare shared message with original message using hashing techniques. REFERENCES [1] C. N. Yang, D. S. Wang, “Property Analysis of XOR-Based Visual Cryptography,” IEEE Transactions on Circuits Systems for Video Technology, vol. 24, no. 12 pp. 189-197, 2014.. [2] Wang Xuan, Cao Peng, Feng Liuping, Zhu Jianle, Huo peijun,“Research on Correcting Algorithm of QR Code Image’s Distortion ”17th IEEE International Conference on Communication Technology 2017. [3] I. Tkachenko, W. Puech, C. Destruel, et al., “Two-Level QR Code for Private Message Sharing and Document Authentication,” IEEE Transactions on Information Forensics Security, vol. 11, no. 13, pp. 571-583, 2016. [6] P. Y. Lin, “Distributed Secret Sharing Approach with Cheater Prevention Based on QR Code,” IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 384-392, 2016. [7] Xuehu Yan, Yuliang Lu, Lintao Liu , Xianhua Song, “Reversible Image Secret Sharing”, IEEE,Vol-15,2020. [8] Hang Zhou, Kejiang Chen, Weiming Zhang, and Nenghai Yu, “Comments on Steganography Using Reversible Texture Synthesis”, IEEE, VOL. 26, NO. 4, APRIL 2017. [9] Deepika M P, A Sreekumar,” Secret Sharing Scheme Using Gray Code and XOR Operation” IEEE 2017. [10] Manohar N, Peetla Vijay Kumar, “Data Encryption and Decryption using Steganography”, IEEE -Xplore Part Number: CFP20K74-ART; ISBN: 978-1-7281-4876-2, 2020. Fig.3 Secret Shares generated of given message [4] Kejiang Chen, Hang Zhou, Wenbo Zhou, Nenghai Yu, “ Defining Cost Functions for Adaptive JPEG Steganography at the Microscale”, IEEE, 1556-6013 (c) 2018. [5] Y W. Chow, W Susilo, G Yang, et al., “Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing,” Information Security and Privacy, pp.409-425, 2016.