DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
The art of information hiding has become an important issue in the recent years as security of information
has become a big concern in this internet era. Cryptography and Steganography play major role for
secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover
medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are
2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and
horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for
secret communication by combining the concepts of Steganography and QR codes. The suggested method
includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii)
Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it
will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate
(BER). Experimental result shows that the proposed method has high imperceptibility, integrity and
security..
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
The art of information hiding has become an important issue in the recent years as security of information
has become a big concern in this internet era. Cryptography and Steganography play major role for
secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover
medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are
2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and
horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for
secret communication by combining the concepts of Steganography and QR codes. The suggested method
includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii)
Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it
will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate
(BER). Experimental result shows that the proposed method has high imperceptibility, integrity and
security..
A QR Code is a matrix barcode (or two-dimensional code), readable by QR scanners, mobile phones with a camera, and smartphones. The code consists of black modules arranged in a square pattern on white background. The information encoded can be text, URL or other data.
This presentation contains the total understanging of Digital Certificate ,What is the need and what are the main types of Digital certificates available.
Novel construction of Secure RFID Authentication ProtocolCSCJournals
This article proposes an efficient and secure authentication protocol for secure and low-cost RFID systems in random oracles. Security is one of the prime concerns of RFID system. Proposed protocol relies on Elliptic Curve Discrete Logarithm Problem (ECDLP) to achieve security. The protocol achieves the most important security goals scalability, anonymity and anti-cloning for RFID system. A password based protocol has vulnerability on fixed password. This can be exploited by threats. In the proposed protocol, there is a provision to change the password of the Tags. Hence the vulnerability can be reduced in an acceptable level. Computation cost is very less as compare to the other protocols.
Blogging for MSc in Biomedical InformaticsRikaz Sheriff
This presentation was done for the students of MSc in Biomedical Informatics as part of a orientation workshop on Thesis methodology.
Date: 18.8.11
Venue: PGIM, Colombo
A QR Code is a matrix barcode (or two-dimensional code), readable by QR scanners, mobile phones with a camera, and smartphones. The code consists of black modules arranged in a square pattern on white background. The information encoded can be text, URL or other data.
This presentation contains the total understanging of Digital Certificate ,What is the need and what are the main types of Digital certificates available.
Novel construction of Secure RFID Authentication ProtocolCSCJournals
This article proposes an efficient and secure authentication protocol for secure and low-cost RFID systems in random oracles. Security is one of the prime concerns of RFID system. Proposed protocol relies on Elliptic Curve Discrete Logarithm Problem (ECDLP) to achieve security. The protocol achieves the most important security goals scalability, anonymity and anti-cloning for RFID system. A password based protocol has vulnerability on fixed password. This can be exploited by threats. In the proposed protocol, there is a provision to change the password of the Tags. Hence the vulnerability can be reduced in an acceptable level. Computation cost is very less as compare to the other protocols.
Blogging for MSc in Biomedical InformaticsRikaz Sheriff
This presentation was done for the students of MSc in Biomedical Informatics as part of a orientation workshop on Thesis methodology.
Date: 18.8.11
Venue: PGIM, Colombo
We at Cloudeo would like to share the best info about how to make use of the vast advantages the Internet offers for entrepreneurs with you. We put our minds to it and put our knowledge into a compact, easy to read electronic Quick Guide that you can download from our website — free of charge.
The first Quick Guide is about social media, and how to use it in your business. We will familiarize you with the different social media services, and help you build a set of social media guidelines for your company. Get a direct competitive advatange by clicking below.
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-JM code group
주최 : 한국전기연구원 전문가 자문 발표
발표장소 : 한국전기연구원
발표주제 :전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
발표일:2009년 10월 20일
발표자 : 강장묵(세종대학교 정보통신공학과 BK사업단 소속 교수)
redsea@sejong.ac.kr
mooknc@gmail.com
The objective of this document is to highlight a vulnerability within the eID scheme ("Online-Ausweis-Funktion") of the German National Identity Card. This vulnerability compromises the hardware security, enabling an attacker to effectively carry out scalable Man-In-The-Middle attacks. The attack does not require remote code execution, physical access, or similar approaches and can be executed through apps uploaded to the official app stores. Such attacks compromise access to services that rely on eID security, including government services, eHealth platforms, and banking systems. Additionally, the attacker can extract the personal data stored in the eID. This attack requires no special privileges and can be executed remotely. Due to the nature of the vulnerability as a design flaw, implementing countermeasures may prove challenging or impractical. The vulnerability has the CVE ID CVE-2024-23674 and a CVSS rating of 9.7 (Critical).
At the end of this presentation, you will learn:
-Different types of smart cards
-What are differences between MIFARE family members
-How and where to use each technology in payment solutions
-The NFC business ecosystem, use-cases and secure element’s basics
-How to secure e-banking and e-commerce authentication
-The differences between Apple Pay and Android Pay
-Why the world is migrating to EMV
-What are the emerging payment technologies
3. IBBT focus areas
Every focus area needs information security!
eHealth: patient data protection
New Media: digital rights management & trusted
archiving
eGovernment: secure identification & identity
management
eID cards and embedded biometry
Mobility: trusted communication
In mobile terminals, in RFID devices
Other applications:
eVoting, eCommerce, eBusiness, …
3
4. Partners
Security requires a wide range of technologies:
K.U.Leuven – COSIC
Computer Security and Industrial cryptography
K.U.Leuven – Distrinet
Secure software
K.U.Leuven – ICRI
Legal aspects
U. Gent
Network security
V.U.B
Multimedia security
4
5. Expertise 1: fundamental research
Cryptographic algorithms and protocols
Technologies for privacy and anonymity
Chip cards and secure tokens
Secure software and hardware obfuscation & side-channel
attacks
Digital rights management, watermarking and perceptual
hashing
Trusted computing
Biometry
Document security
5
6. Example: Rijndael/AES
S S S S S S S S S S S S S S S S
round
Key Schedule
round S S S S S S S S S S S S S S S S
MixColumns MixColumns MixColumns MixColumns
round key length: 16/24/32 bytes
block length:
.
.
. Rijndael: 16/24/32 bytes
.
. AES: 16 bytes
round
6
7. Expertise 2:
Security for state of the art systems
Network security (fixed, ad-hoc and wireless)
Embedded systems
RFID and sensor nodes
Ambient intelligence and pervasive
Confidentialit
y
Identification
Integrity
SIM
SIM
7
8. Example: secure embedded systems
Confidentiality
Integrity Protocol: Wireless authentication protocol
Identification design
SIM
Cipher Design, Algorithm: Embedded fingerprint matching
Biometrics
algorithms, crypto algorithms
Java
JCA Architecture: Co-design, HW/SW, SOC
KVM
JVM
CPU
Crypto Micro-Architecture: co-processor design
MEM
Vcc
D
Q Circuit: Circuit techniques to combat side
CLK
channel analysis attacks
8
10. Expertise 3: Security for software platforms
Enterprise middleware & application servers
Web services
AAA (Authentication, Authorization, Access control)
services
Identity and credential management
Non repudiation services and accountability
Time stamping and trusted archiving
Such research has for instance been conducted in the T-
CASE project (see further).
10
11. Expertise 4: Secure development
Analysis of security requirements
Development process and certification
Secure software architecture
Software security
Software verification and assurance
Such research has for instance been conducted in the
IDEM project (https://projects.ibbt.be/idem)
11
12. Expertise 5:
Security management & deployment
Risk analysis
Policy language and policy enforcement
Architectures for monitoring and management
Run-time verification
Security infrastructures
12
13. Demonstration:
Belgian eID card & RFID Passport
Identity file Citizen’s main address file
Chip-specific: Street + number
Zip code
Chip number Municipality
Citizen-specific: Digital signature on main address issued by RRN
Name Citizen’s JPEG photo ~3 Kbyte
First 2 names
First letter of 3rd first name
RRN identification number King, Prince, Count, Earl, Baron,…
Baron,…
Nationality
No status, white cane (blind
Birth location and date people), yellow cane (partially
Gender sighted people), extended minority,
Noble condition any combination
Special status
SHA-1 hash of citizen photo
Card-specific:
Card number
Validity’s begin and end date
Card delivery municipality
Document type
Digital signature on identity file issued by
RRN
Belgian citizen or child, European community citizen, non-
European community citizen, bootstrap card,
habilitation/machtigings card 13
14. To illustrate the approach: 4 projects
4 projects demonstrated in the back of the room
ISBO – QOE: (security part of it): anonymous Voice over
IP
IPEA (security part of it): format compliant encryption of
video stream
TCASE – Technologies and Capabilities for Service
Enabling
EHIP – E-Health Information Platforms
14