Abstract— nowadays it is important to consider data security and
the effectiveness of securing data. There are various research studies
have been conducted relating to secure data field. However; due to
the increased of security requirement and the increase influence on
information exchange, a new secure QR code based RSA encryption
method is introduced. This paper illustrates a QR code system based
RSA algorithm, which can be used for bank customers to share their
data in secure way. The users will need to scan the code and acquire
their information which is stored in QR code. The paper explains the
high level implementation details of the proposed system.
Additionally, it deliberates how the system verifies for each user
identity to eliminate false registrations.
Keywords—QR Code; RSA algorithm; Bank System
Review on variants of Security aware AODVijsrd.com
Mobile ad-hoc network (MANET) is very sensitive network to security due to challenging characteristic such as decentralization, dynamic changing topology, and neighbor based routing. All existing MANET protocol are simply trust their neighbor and make route through them due to neighbor based routing network is disturbed by malicious node or intruder. Trust calculation is challenging task due to computation complexity constraints in MANET. In this paper we have presented variants of trust based security protocol in an on demand distance vector routing protocol and also proposed new mechanism for Network coding with RSA based Encryption and Decryption in an AODV which will improve the security level of MANET with acceptable overhead limit.
Nowadays, the information processing system plays crucial part in the internet. Online information security
has become the top priority in all sectors. Failing to provide online information security may cause loss of
critical information or someone may use or distribute such information for malicious purpose. Recently QR
barcodes have been used as an effective way to securely share information. This paper presents the survey
on information hiding techniques which can share high security information over network using QR
barcode
Survey on information hiding techniques using qr barcodecsandit
Nowadays, the information processing system plays c
rucial part in the internet. Online
information security has become the top priority in
all sectors. Failing to provide online
information security may cause loss of critical inf
ormation or someone may use or distribute
such information for malicious purpose. Recently QR
barcodes have been used as an effective
way to securely share information. This paper prese
nts the survey on information hiding
techniques which can share high security informatio
n over network using QR barcode
.
A novel paradigm in authentication systemIJNSA Journal
Maintaining the security of your computer, network and private/sensitive data against unauthorized access
and a wide variety of security threats can be challenging. Verifying data integrity and authentication are
essential security services in order to secure data transmission process. In this paper we propose a novel
security technique which uses new encryption and decryption algorithms to achieve authenticated
communication and enhanced data integrity. The proposed technique is very complex for attackers to
decode, and it is applicable to client-server architecture.
Review on variants of Security aware AODVijsrd.com
Mobile ad-hoc network (MANET) is very sensitive network to security due to challenging characteristic such as decentralization, dynamic changing topology, and neighbor based routing. All existing MANET protocol are simply trust their neighbor and make route through them due to neighbor based routing network is disturbed by malicious node or intruder. Trust calculation is challenging task due to computation complexity constraints in MANET. In this paper we have presented variants of trust based security protocol in an on demand distance vector routing protocol and also proposed new mechanism for Network coding with RSA based Encryption and Decryption in an AODV which will improve the security level of MANET with acceptable overhead limit.
Nowadays, the information processing system plays crucial part in the internet. Online information security
has become the top priority in all sectors. Failing to provide online information security may cause loss of
critical information or someone may use or distribute such information for malicious purpose. Recently QR
barcodes have been used as an effective way to securely share information. This paper presents the survey
on information hiding techniques which can share high security information over network using QR
barcode
Survey on information hiding techniques using qr barcodecsandit
Nowadays, the information processing system plays c
rucial part in the internet. Online
information security has become the top priority in
all sectors. Failing to provide online
information security may cause loss of critical inf
ormation or someone may use or distribute
such information for malicious purpose. Recently QR
barcodes have been used as an effective
way to securely share information. This paper prese
nts the survey on information hiding
techniques which can share high security informatio
n over network using QR barcode
.
A novel paradigm in authentication systemIJNSA Journal
Maintaining the security of your computer, network and private/sensitive data against unauthorized access
and a wide variety of security threats can be challenging. Verifying data integrity and authentication are
essential security services in order to secure data transmission process. In this paper we propose a novel
security technique which uses new encryption and decryption algorithms to achieve authenticated
communication and enhanced data integrity. The proposed technique is very complex for attackers to
decode, and it is applicable to client-server architecture.
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
In the military devices there is need to transmission of data security and fast. These proposed technique presents the secure,
efficient and fast way to send images using Identity Based Cryptography and Visual Cryptography. In this application Identity Based
Cryptography is used with Visual cryptography. In Identity based cryptography the RSA Cryptosystem is used to generate public and
private key by using Ancient Indian Mathematics for fast mathematical calculation. RSA is the safest and standard algorithm. Vedic
method is so efficient in multiplication terms of area, speed compered to its modern mathematics implementation. The regeneration of
public/private key is adopted to make the system more secure from various attacks.
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
Websites such as email providers use Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) which is a simple test easily solved by humans but not by computers and hence provides a way of distinguishing a legitimate human user from an attacker. Methods have been developed like the Optical Character Recognition (OCR) and the third party human attack which have made CAPTCHAs vulnerable. The third party human attack poses a real threat to the use of CAPTCHA which can be easily shown using the Instant Messenger CAPTCHA Attack (IMCA). A new defense system, the interactive CAPTCHA (iCAPTCHA) was developed to defend against third party human solver attacks. The iCAPTCHA is solved via user interactions and the back-and-forth traffic between the client and server amplifies the statistical timing difference between a third party human attacker and a legitimate human user. The aim of this research is to use iCAPTCHA in Smartphones which will be solved after a certain number of password trials. However iCAPTCHA alone cannot provide sufficient security, therefore to further provide security, the iCAPTCHA will be encrypted using RSA and Elliptic Curve Cryptography.
http://www.skyriver.net/ - Skyriver Communications – Fixed Wireless Security. Skyriver is a leading business ISP, specializing in Fixed Wireless. Learn about Skyrivers’ innovative high performance broadband for business visit the site now.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient privacy preserving for Mobile and Pervasive Computinginventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
An Introduction to Authentication for ApplicationsUbisecure
This whitepaper is an ideal introduction on authentication categories and their suitability to different requirements. Recommended reading to anyone who wants to get more familiar with online authentication.
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
A new approach for providing limited information only that is necessary for fund
transfer during online shopping thereby safeguarding customer data and increasing customer
confidence and preventing identity theft has been proposed. When you make a payment, the
information will never be passed on your personal financial details to merchant sites, keeping your
data safe and your identity protected against fraud. A cryptographic technique based on visual secret
sharing is used for image encryption. Using k out of n (k, n) visual secret sharing scheme a secret
image is encrypted in shares which are meaningless images that can be transmitted or distributed over
an un-trusted communication channel. Only combining the k shares or more give the original secret
image. Phishing is an attempt by an individual or a group to thieve personal confidential information
such as passwords, credit card information etc., from unsuspecting victims for identity theft, financial
gain and other fraudulent activities The use of images is explored to preserve the privacy of image
captcha by decomposing the original image captcha into two shares that are stored in separate
database servers such that the original image captcha can be revealed only when both are
simultaneously available; the individual sheet images do not reveal the identity of the original image
captcha. Once the original image captcha is revealed to the user it can be used as the password.
Several solutions have been proposed to tackle phishing.
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Abstract: In an online security, authentication plays a crucial role in shielding resources against unauthorized and illegal use of information. Authentication processes may differ from simple password based authentication system to complex, costly and computation strengthened authentication systems. In recent days, increasing security has always been an important issue since Internet and Web Development came into actuality. Text based password is not enough to counter such problems, which is also an obsolete approach now. Consequently, this demands the need for something more secure along with being more user-friendly. Therefore, we have strained to rise the security by involving a multiple level security tactic, involving Text based using Cryptography, Grid Authentication and Image Based Password. The cryptography technique is very essential for the text based password while encrypting it with the principle of substitution method like Caesar Cipher. Session passwords are also necessary for eliminating the time factor attacks such as Brute Force attack. Grid Authentication makes the system more dynamic due ever changing nature. Image based authentication makes the system more user friendly, reliable and secure.Keywords: Cryptography, Grid Authentication, Image Based Password, Shoulder Attack.
Title: Multilevel Security and Authentication System
Author: Pratik Anap, Sanjay Gholap, Prasad Anpat, Abhijit Bhapkar
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
The art of information hiding has become an important issue in the recent years as security of information
has become a big concern in this internet era. Cryptography and Steganography play major role for
secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover
medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are
2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and
horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for
secret communication by combining the concepts of Steganography and QR codes. The suggested method
includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii)
Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it
will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate
(BER). Experimental result shows that the proposed method has high imperceptibility, integrity and
security..
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
In the military devices there is need to transmission of data security and fast. These proposed technique presents the secure,
efficient and fast way to send images using Identity Based Cryptography and Visual Cryptography. In this application Identity Based
Cryptography is used with Visual cryptography. In Identity based cryptography the RSA Cryptosystem is used to generate public and
private key by using Ancient Indian Mathematics for fast mathematical calculation. RSA is the safest and standard algorithm. Vedic
method is so efficient in multiplication terms of area, speed compered to its modern mathematics implementation. The regeneration of
public/private key is adopted to make the system more secure from various attacks.
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
Websites such as email providers use Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) which is a simple test easily solved by humans but not by computers and hence provides a way of distinguishing a legitimate human user from an attacker. Methods have been developed like the Optical Character Recognition (OCR) and the third party human attack which have made CAPTCHAs vulnerable. The third party human attack poses a real threat to the use of CAPTCHA which can be easily shown using the Instant Messenger CAPTCHA Attack (IMCA). A new defense system, the interactive CAPTCHA (iCAPTCHA) was developed to defend against third party human solver attacks. The iCAPTCHA is solved via user interactions and the back-and-forth traffic between the client and server amplifies the statistical timing difference between a third party human attacker and a legitimate human user. The aim of this research is to use iCAPTCHA in Smartphones which will be solved after a certain number of password trials. However iCAPTCHA alone cannot provide sufficient security, therefore to further provide security, the iCAPTCHA will be encrypted using RSA and Elliptic Curve Cryptography.
http://www.skyriver.net/ - Skyriver Communications – Fixed Wireless Security. Skyriver is a leading business ISP, specializing in Fixed Wireless. Learn about Skyrivers’ innovative high performance broadband for business visit the site now.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient privacy preserving for Mobile and Pervasive Computinginventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
An Introduction to Authentication for ApplicationsUbisecure
This whitepaper is an ideal introduction on authentication categories and their suitability to different requirements. Recommended reading to anyone who wants to get more familiar with online authentication.
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
A new approach for providing limited information only that is necessary for fund
transfer during online shopping thereby safeguarding customer data and increasing customer
confidence and preventing identity theft has been proposed. When you make a payment, the
information will never be passed on your personal financial details to merchant sites, keeping your
data safe and your identity protected against fraud. A cryptographic technique based on visual secret
sharing is used for image encryption. Using k out of n (k, n) visual secret sharing scheme a secret
image is encrypted in shares which are meaningless images that can be transmitted or distributed over
an un-trusted communication channel. Only combining the k shares or more give the original secret
image. Phishing is an attempt by an individual or a group to thieve personal confidential information
such as passwords, credit card information etc., from unsuspecting victims for identity theft, financial
gain and other fraudulent activities The use of images is explored to preserve the privacy of image
captcha by decomposing the original image captcha into two shares that are stored in separate
database servers such that the original image captcha can be revealed only when both are
simultaneously available; the individual sheet images do not reveal the identity of the original image
captcha. Once the original image captcha is revealed to the user it can be used as the password.
Several solutions have been proposed to tackle phishing.
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Abstract: In an online security, authentication plays a crucial role in shielding resources against unauthorized and illegal use of information. Authentication processes may differ from simple password based authentication system to complex, costly and computation strengthened authentication systems. In recent days, increasing security has always been an important issue since Internet and Web Development came into actuality. Text based password is not enough to counter such problems, which is also an obsolete approach now. Consequently, this demands the need for something more secure along with being more user-friendly. Therefore, we have strained to rise the security by involving a multiple level security tactic, involving Text based using Cryptography, Grid Authentication and Image Based Password. The cryptography technique is very essential for the text based password while encrypting it with the principle of substitution method like Caesar Cipher. Session passwords are also necessary for eliminating the time factor attacks such as Brute Force attack. Grid Authentication makes the system more dynamic due ever changing nature. Image based authentication makes the system more user friendly, reliable and secure.Keywords: Cryptography, Grid Authentication, Image Based Password, Shoulder Attack.
Title: Multilevel Security and Authentication System
Author: Pratik Anap, Sanjay Gholap, Prasad Anpat, Abhijit Bhapkar
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
The art of information hiding has become an important issue in the recent years as security of information
has become a big concern in this internet era. Cryptography and Steganography play major role for
secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover
medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are
2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and
horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for
secret communication by combining the concepts of Steganography and QR codes. The suggested method
includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii)
Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it
will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate
(BER). Experimental result shows that the proposed method has high imperceptibility, integrity and
security..
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...ijcisjournal
In this paper, we present an improved Paillier Cryptosystem for a secured data transmission based on the
Residue Number System (RNS). The current state of Paillier Cryptosystem allows the computation of the
plaintext from the cipher text without solving its security assumption of Decisional Composite Residuosity
or the knowledge of its private keys under mathematical attacks
In many of today’s computer application needs, faster operation is essential to the efficient implementation
of information security algorithm. RC4 has been used as the data encryption algorithm for many
applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. Several efficient
approaches to the implementation of RC4 have been proposed and we review some of those. More recently
some parallel approaches to faster implementation of RC4 have been presented and we include those in our
survey of efficient approaches to RC4. This paper presents an analysis of available hardware/software
parallel implementations of RC4 symmetric key-based algorithm and some security approaches which
make it more secure.
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORKijesajournal
It is well known that Named Data networking ensure data integrity so that every important data has to be
signed by its owner in order to send it safely inside the network. Similarly, in NDN we have to assure that
none could open the data except authorized users. Since only the endpoints have the right to sign the data
or check its validity during the verification process , we have considered that the data could be requested
from various types of devices used by different people, these devices could be anything like a smartphone,
PC, sensor node etc.b, with a different CPU descriptions, parameters, and memory sizes, however their
ability to check the high traffic of a data during the key generation and/or verification period is definitely a
hard task and it could exhaust the systems with low computational resources. RSA and ECDSA as digital
signature algorithms have proven their efficiency against cyber-attacks, they are characterized by their
speed to encrypt and decrypt data, in addition to their competence at checking the data integrity. The main
purpose of our research was to find the optimal algorithm that avoids the system’s overhead and offers the
best time during the signature scheme
Digital image security and integrity are the top
prioritized issue in today’s information World. Watermarking
is a famous technique that is used for copyright protection and
authentication. Watermark Should be robust and
imperceptible.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
Transferring the secure data becomes vital for the important data of every days life. The system is a secure data transferring, combining the two techniques, Advance Encryption Standard AES and RSA. The data file is encrypted by using AES with the randomly generated key. This key is also encrypted by RSA using the receivers public key. The encrypted data file and encrypted key file are combined to form an output file to send to the receiver. The file at the receivers side is separated into two files, the encrypted data file and encrypted key file. The encrypted key file is decrypted by RSA method using the receivers private key. The AES key is acquired, the encrypted data file is then decrypted by AES method using the acquired AES key. The system includes file transferring process based on the Java socket technology. Khet Khet Khaing Oo | Yan Naung Soe "Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29243.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29243/encryption-data-measurement-and-data-security-of-hybrid-aes-and-rsa-algorithm/khet-khet-khaing-oo
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsAM Publications
A large share of embedded applications are wireless, which makes the communication channel especially vulnerable. The research in the field of ECC is mostly focused on its implementation on application specific systems, which have restricted resources like storage, processing speed and domain specific CPU architecture. The focus of this research is on the implementation of ECC in an embedded iOS application to compare the performance measures obtained in the wireless environment or embedded systems by using elliptic curve cryptography (ECC), with a traditional cryptosystem like RSA.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
CryptoQR System based on RSA
1. CryptoQR System based on RSA
Homam Reda El-Taj
Computing Department
Global College of Engineering and
Technology (GCET)
homam@gcet.edu.om
Ruqaiya Alhadhrami
Computing Department
Global College of Engineering and
Technology (GCET)
20151139@gcet.edu.om
Abstract— nowadays it is important to consider data security and
the effectiveness of securing data. There are various research studies
have been conducted relating to secure data field. However; due to
the increased of security requirement and the increase influence on
information exchange, a new secure QR code based RSA encryption
method is introduced. This paper illustrates a QR code system based
RSA algorithm, which can be used for bank customers to share their
data in secure way. The users will need to scan the code and acquire
their information which is stored in QR code. The paper explains the
high level implementation details of the proposed system.
Additionally, it deliberates how the system verifies for each user
identity to eliminate false registrations.
Keywords—QR Code; RSA algorithm; Bank System
INTRODUCTION
In these modern days it has become a challenge to secure
and hide personal confidential information. Because of the lack
of security and confidentiality, confidential information forgery
can cause a person to lose a huge margin. Sharing personal
information between one person and another is become an
important now a days. One of the most popular examples in this
matter is the exchange of banking information, for example,
where it is common to exchange some of the banking
information between an institution and one of the clients in
order to solve a problem to facilitate the operations banking. As
some banks or other institutions allow this process for all users
to see some banking operations, such as transferring money to
other accounts and knowing the amount of the remaining
balance. Banks also allow through short text messages (SMS)
that you send to their users to provide them with the latest
banking expansions and offers similarly offered by each bank.
In recent years, the phenomenon of bank information stealing
by SMS intrusion has increased and spread rapidly. This type
of intrusion is widespread with technological development and
the presence of some spyware. In this paper, a system was
proposed that encrypt messages between one person and other
with the aim of ensuring a higher level of security in the QR
code by combining both the QR code and the RSA algorithm
together [1].
It appears that 70% of users use smartphones in the world.
Thus, with the spread of smartphones on a large scale among
all groups of society, this paper covered the problem of
insecurity in the way messages are exchanged between one
person and another, and not allowing any person to spy on
banking information or other personal information for everyone
and steal it. The proposed solution introduces the RSA
algorithm with a QR code for the user to allow them to scan and
read encryption massage. Otherwise, no one can read the QR
code unless the user himself, because he has a public and
private key [2].
This way, the system will secure not only QR code but also,
it secures the data which are shared between both sender and
receiver. It will secure up the process of sharing the data. It
gives users security in exchanging the massages through the
Crypto QR system.
The proposed system also takes care in preventing
unauthorized sharing of QR code image using multi-factor
authentication. That is, it is considered as an advanced stage in
the protection of information. As it is possible that the image of
the QR code is shared with many people, but one person is able
to decode the QR code.
This paper will be organized as follow, section two will
cover the related work. Section three will give an overview to
QR codes. Section four will give an overview to RSA
algorithm. Section five will describe the system methodology,
finally in section six will provide the overall conclusion of the
research.
RELATED APPROACHES/WORK
There are many researches talk about QR code and RSA
algorithm. As it is shows below there are four papers talk about
systems using QR code with RSA algorithm:
Abhijeet Mendhe et.al, they proposes three layered
architecture with QR code image to combine in one layer to
secure message sharing mechanism. The three layered
architecture make use of cryptography techniques. They
provide in this paper a higher level for securing the massage
sharing. [3]
Vitalii Susukailo et.al they proposed to provide secure
access control systems by using one of the asymmetric type
which is RSA algorithm. The aim of this project is to reduce the
number of the people who can access to the system .they work
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
13 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. to develop an encryption application to providing that
information security for access control systems beads on QR
code technology. [4]
Fadi Masalha et.al they proposes software application to be
installed in mobile phone. This application is used for checking
the student’s attendance. The students will scanning the QR
code to confirm their attendance in each lecture. [5]
Yijing Xun et.al, they proposed an anti-counterfeiting
method combining the coding characteristics of the two-
dimensional code and the digital watermark to enhance the
security of the QR code. The method uses RSA encryption
algorithm in the encoding process and DWT-SVD algorithm in
digital watermark process. The embedding watermark is very
good in invisibility and robustness, and it can implement cross
verification QR code image. [6]
The QR code has wide spread recently. It has become very
easy to access the QR code since any phone can decode the
response code. Therefore it has become easy to access it. Thus,
another proposal discusses another way to encrypt the QR code
using the RSA algorithm. This paper introduces a type of
encryption and decryption method based on image encrypt (QR
Code). As this process is done on a number of tasks. Each task
is performed separately to encrypt the image of QR code to gray
image, where white and black color are mixed, and to get
another new image that is completely encrypted from the first
image that was entered.[7]
By looking at the proposals above, it can be concluded that
there are many research papers that contribute significantly in
providing security to the quick response code. Each paper
presents a program that differs from the others in terms of
requirements. Some research can be seen that combines words
from a QR code with RSA.
QR CODE: QUICK RESPONSE CODE
Quick Response (QR) code used to store information by
encrypting it using eigenvalue algorithm. Eigenvalue are a
special set of scalars associated with a linear system of
equations (i.e., a matrix equation) that are sometimes also
known as characteristic roots, characteristic values. QR Code is
a 2D barcode which was invented by Denso Wave Incorporated
in 1994 as a type of data matrix codes There are 40 versions of
the QR code, starting with the smallest one (21*21) pixels up
to the largest one (177*177) pixels. There are four error
correction levels are available for users to choose according to
the operating environment. The levels are (L, M, Q, H) where
L allows the code to be read even if 7% of it is unreadable, M:
provides 15% error correction, Q: provides 25% and H:
provides 30%, error correction levels are illustrated in table 1
[8, 9].
Table 1: four error correction levels [10]
Levels of error correction Recovery capacity (%)
L Approx. 7%
M Approx. 15%
Q Approx. 25%
H Approx. 30%
QR system has two type (generator and scanner). To
generate QR code there are many website to convert the data
such as email to QR code by inserting the data. Finally will get
the QR code with the data encrypted in it. QR Scanner (Reader)
is an application used to convert the QR code to get the original
data (decrypting data).
Figure: 1 QR code [11]
RSA algorithm:
RSA Encryption method named by the initials of its co-
founders family name which are Ron Rivest, Adi Shamir and
Leonard Adleman[12].
RSA scheme is a cipher in which the plaintext and cipher
text are integers between 0 and n - 1 for some n. A typical size
for n is 1024 bits, or 309 decimal digits. That is, n is less than
21024. Plaintext is encrypted in blocks, with each block having
a binary value less than some number n. That is, the block size
must be less than or = 2( ) + 1. [13]RSA set of rules is
one of the famous safety cryptosystem based totally on range
concept. RSA method guarantees that data is exclusive and
authenticated, as a result it affords steady conversation over the
community. RSA encryption makes use of top factorization
because of the trapdoor for encryption. It makes use of public
key encryption in which all of us use public key to encrypt the
statistics and send over the network. However; it provides
authentication and safety over the community with a purpose to
provide personal key to decrypt the information. Therefore;
only indented receiver can decrypt the facts. RSA algorithm is
used for both records encryption and digital signature [14, 15].
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
14 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. THE PROPOSED SYSTEM
At the time, the protection of the information of the
customer is the significant concern for large, medium and small
companies. Therefore, many companies seek to provide their
customers with complete confidentiality in preserving data and
also not allowing another party to tamper with this information.
The proposed scheme is a strategic combination of QR code
with RSA algorithm. This system focused on enhancing the
security requirements by using QR code with RSA algorithm.
A two layers architecture is proposed in order to accomplish the
task. In the first layer the QR code include two phases (sending
and Receiving) massage. In the second layer, RSA algorithm
also have two phases (Encryption and Decryption) methods.
The system requires a simple login process by the admin
through its Server to generate an encrypted QR code with
specific information. This can be done by leading the admin to
insert the massage and encrypted to start generating the QR
code. After selecting the receiver the QR code will be
transformation successfully. The receiver will open his / her
page to encode the QR code to get what is inside it.
There are two layers to describe the overall system work:
First layer:
QR System got two phases (Sending, Receiving):
Phase One: (Sending Phase).
Figure 2 shows the process of sending and data. The Plain
data is encrypted by using the RSA process to get encrypted
data as cipher data, the cipher data will be processed by the QR
generator to generate a QR code.
Phase Two: (Receiving Phase).
Figure 3 illustrated the receiving phase. When the receiver
receives QR code, the QR scanner will process the QR code to
get the Data (encrypted data) then RSA method will decrypt the
encrypted data to get the plain data. RSA Method got two
phases (Encryption and Decryption).
Figure2: Sending Phase Figure3: Receiving Phase
Second layer:
RSA Method got two phases (Encryption and Decryption)
Phase One: (Encryption phase).
Figure 4 shows RSA encryption method. Plain data will be
converted to numbers, then these numbers will be encrypted by
using the public key for the receiver and the privet key of the
sender. The final step is to get encrypted data.
Phase Two: (Decryption Phase).
Figure 5 shows the process of decryption data by using
RSA. Encryption data will be used as input. This encryption
data will be decrypted by using the public key for the sender
and the privet key of the receiver. However; the decrypted data
will present as numbers which should be converted to text. The
final result will plain data.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
15 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. Figure4: Encryption Data by RSA Figure5: Receiving data by RSA
As mentioned earlier, the system is composed of two parts:
the database and the system part. The following subsection will
describe the tasks for each part
Database part:
The database used for the following tasks:
• Store the user information of registration process.
• Fetch data for login process
• Store E, R and N for generating the keys.
• Store QR image after encryption process.
The database used to store information of each user. Also it
used for storing the QR code after generating it in the
application.
System part:
The system is holding the RSA algorithm, create QR code
and reading QR code methods. This three methods will work
together to send the QR code with encryption massage by RSA
to other side. Figure 6 show how the Crypto QR system is
working.
As it is shown in Figure6 there are six step explain
CryptoQR ideas. First of all the user will enter the massage he
or she want to send it in the text filed as it is shows in figure A.
The massage which is the user interred in the text filed will
encrypted by RSA algorithm after the user will inter in encrypt
button shows in figure B. However after applying RSA
algorithm to the massage, we will get an encryption massage
next step is to apply the encrypted massage to QR code by using
create QR code method in the system. Now the QR code is
ready to send it to selected user shows in figure C. The receiver
will receive the QR code as it is shows in figure D. in the next
step the QR code was decrypted and the result is RSA stander
massage(encrypt massage). At final step will decrypt the RSA
massage to normal massage, so the receiver can read it
(readable) format. Other ways cannot any one to read it.
Figure 6: CryptoQR idea
ANALYSIS
It is important to secure any system with username and
password. Therefore, it is important to take this step to prevent
unauthorized access to the system and tamper with user
information. Including the entry of those who are not
authorized into the system to perform some fraudulent
operations and spying on customer information. Including in
contravention of the privacy policy.
The system requires three steps. The first step is to open the
application and insert to the system username and password. If
the user is new it is requires him/her to log in as a new user and
fill out his/her form containing the email and other information.
After the user successfully logs in, the user will take the next
step, and the system will allow the user to encrypt any text
he/she needs and convert it into a QR code image. As for the
third step, which is to send a QR code to the required person, it
must be registered in the system.
When the user will runs the application it will appear page
to start Register and log in process. Then, if the user first time
to use this application, they should register themselves in the
application by clicking on the registration button and the form
will appear. The user should fills the registration fields. After
all the fields filled the user presses the Register button to store
the data into the database. Once the registration process is
completed next is the login process. Login process is done by
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
16 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. filling out the field’s username and password fields, by pressing
the Login button will execute the login process. The application
will verify the username and password input by the user. If the
password corrects the application home page will display.
However, if the username, password, or both incorrect, then
massage appears that tell (Username or password is incorrect)
and user cannot access to the next application process.
Generate QR Code:
Starting Generate QR Code process, the user will type
whatever want to write. Once the user is finished typed then
clicking on encryption button the next step is to select the name
of the receiver. After that convert user's massage to encryption
massage and store it in side QR code. Once the process is
finished user are ready to send this QR code to others as it is
shows in figure 8.
As it shows in figure 9, sender page is display the QR code
with the massage which is encrypt by using RSA algorithm
when the sender enter show detail the encryption massage and
decryption massage will display . Other ways if this QR code
scanned by any other person he / she will get only the
encryption massage. The right person which is the receiver only
will be able to read this QR code.
After the sender send the QR code successfully to the
receiver, the receiver page will display as it shows in figure 10.
Only the person how is mentioned by the sender can read
the QR code other ways they will get as encryption massage
which cannot be read the QR code.
If the user will try to open another user profile which is not
the right person to receive the QR code they cannot read the QR
code as illustrated in figure 11.
CONCLUSION
With the rapid development in the technology’s field, it has
become an important to use some technologies to increase
privacy and security for all users. Also, with the increase in
attacks on users and the breach of their privacy, it has become
important to use algorithms for security problems. Keeping up
with these technologies has become necessary to enable the
user to protect their information and give them the security in
the field of technology. The proposed system allows the
exchange of messages and other texts by encoding and storing
them within the quick response code to allow both the sender
and the recipient to exchange messages in secure conditions in
the field of modern technology.
Figure 7: Step one (login)
Figure 8: Step two (insert the massage)
Figure 9: Step three (QR code with RSA algorithm)
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
17 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. Figure 10: receiver home page
Figure 11: receiver error home page
ACKNOWLEDGMENT
Thanks to Global College of Engineering and Technology
(GCET) for the financial support.
REFERENCES
[1] M. S. Ahamed and H. Asiful Mustafa, "A Secure QR Code System
for Sharing Personal Confidential Information," 2019 International Conference
on Computer, Communication, Chemical, Materials and Electronic
Engineering (IC4ME2), Rajshahi, Bangladesh, 2019, pp. 1-4.
[2] Osman, M.A., Talib, A.Z., Sanusi, Z.A., Shiang-Yen, T. and Alwi,
A.S. (2012) A Study of the Trend of Smartphone and its Usage Behavior in
Malaysia.
[3] A. Mendhe, D. K. Gupta and K. P. Sharma, "Secure QR-Code Based
Message Sharing System Using Cryptography and Steganography," 2018 First
International Conference on Secure Cyber Computing and Communication
(ICSCCC), Jalandhar, India, 2018, pp. 188-191
[4] V. Susukailo and Y. Lakh, "Access Control System Based on
Encryption in QR-Code Technology," 2018 IEEE 4th International Symposium
on Wireless Systems within the International Conferences on Intelligent Data
Acquisition and Advanced Computing Systems (IDAACS-SWS), Lviv, 2018,
pp. 158-161
[5] Almasalha, F., Masalha, F. and Hirzallah, N. (2014) A Students
Attendance System Using QR Code Smart Attendance System View project
Studying and evaluating several aspects of the Internet of Things (IoT)
platforms and implementations View project A Students Attendance System
Using QR Code. Article in International Journal of Advanced Computer
Science and Applications
[6] Xun, Y., Li, Z., Zhong, X., Li, S., Su, J. and Zhang, K. (2019) Dual
Anti-counterfeiting of QR Code Based on Information Encryption and Digital
Watermarking. In: Lecture Notes in Electrical Engineering. 2019 (no place)
Springer Verlag. pp. 187–196.
[7] Muming Li, P. Cao, Lifang Yu, Liuping Feng, Jianbo Chen and Jing
Wang, "The research of information hiding and extraction based on QR code
positioning function," 2016 2nd IEEE International Conference on Computer
and Communications (ICCC), Chengdu, 2016, pp. 589-593
[8] S. Tiwari, "An Introduction to QR Code Technology," 2016
International Conference on Information Technology (ICIT), Bhubaneswar,
2016, pp. 39-44, doi: 10.1109/ICIT.2016.021.
[9] M. S. Ahamed and H. Asiful Mustafa, "A Secure QR Code System
for Sharing Personal Confidential Information," 2019 International Conference
on Computer, Communication, Chemical, Materials and Electronic
Engineering (IC4ME2), Rajshahi, Bangladesh, 2019, pp. 1-4
[10] G. Patel and G. Panchal, "Quick response codes decodability
improvements using error correction levels," 2017 International Conference on
Intelligent Sustainable Systems (ICISS), Palladam, 2017, pp. 231-234
[11] M. Li, P. Cao, L. Feng, L. Yu, J. Chen and J. Wang, "The research
of QR code image correction based on image gray feature," 2017 First
International Conference on Electronics Instrumentation & Information
Systems (EIIS), Harbin, 2017, pp. 1-5
[12] K. N. Bangera, N. V. S. Reddy, Y. Paddambail and G. Shivaprasad,
"Multilayer security using RSA cryptography and dual audio steganography,"
2017 2nd IEEE International Conference on Recent Trends in Electronics,
Information & Communication Technology (RTEICT), Bangalore, 2017, pp.
492-495
[13] N. M. S. Iswari, "Key generation algorithm design combination of
RSA and ElGamal algorithm," 2016 8th International Conference on
Information Technology and Electrical Engineering (ICITEE), Yogyakarta,
2016, pp. 1-5, doi: 10.1109/ICITEED.2016.7863255.
[14] F. J. Aufa, Endroyono and A. Affandi, "Security System Analysis
in Combination Method: RSA Encryption and Digital Signature Algorithm,"
2018 4th International Conference on Science and Technology (ICST),
Yogyakarta, 2018, pp. 1-5
[15] Y. Liu, W. Gong and W. Fan, "Application of AES and RSA Hybrid
Algorithm in E-mail," 2018 IEEE/ACIS 17th International Conference on
Computer and Information Science (ICIS), Singapore, 2018, pp. 701-703
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
18 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. AUTHORS PROFILE
Homam Reda El-Taj finished his Bachelor degree in
Computer Science (CSCIS) from Philadelphia University
Jordan in 2003, then he continued his graduate studies in
Universiti Sains Malaysia (USM), he finished his master degree
on distributed systems, and PhD on Network Security.
Homam published several articles on Computer Networks
field to cover subjects as: Real time Network Security
(Botnets/Worms/viruses), Intelligent Techniques in Detecting
Network threats, Advanced Networking Mechanisms and
protocols, Intrusion Detection of DOS & DDOS, Intrusion
Anomaly Detection Methods, Intrusion Prevention Techniques,
Intrusion Prevention, Decision Making, Intrusion Prevention
Threats Behavior, Application Network traffic tracing,
Network users and misuse detection, Intrusion Detection on QR
Code, and Overlay Network.
Ruqaiya Mohamed Alhadhrami is a software engineering
student in Global College of Engineering and Technology
(GCET), her research interests focus on cryptography and
network security.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
19 https://sites.google.com/site/ijcsis/
ISSN 1947-5500