Submit Search
Upload
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
•
0 likes
•
21 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i6/IRJET-V6I6295.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
QR Codes seminar
QR Codes seminar
Umsh23
Qr codes
Qr codes
niyaj ahmed
QR Codes: A Point of View
QR Codes: A Point of View
BBDO
15 Cool QR Code Things
15 Cool QR Code Things
Spider Trainers
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
acijjournal
Qr code ppt
Qr code ppt
mrudula14
CS4099Report
CS4099Report
Elliott Brooks
QR Code - Mobile readable Barcode
QR Code - Mobile readable Barcode
Rehan Guha
Recommended
QR Codes seminar
QR Codes seminar
Umsh23
Qr codes
Qr codes
niyaj ahmed
QR Codes: A Point of View
QR Codes: A Point of View
BBDO
15 Cool QR Code Things
15 Cool QR Code Things
Spider Trainers
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
acijjournal
Qr code ppt
Qr code ppt
mrudula14
CS4099Report
CS4099Report
Elliott Brooks
QR Code - Mobile readable Barcode
QR Code - Mobile readable Barcode
Rehan Guha
QR code
QR code
Noah Kim
QR code
QR code
anish kumar
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Jishnu Mandal
A low pre processing system for low quality QR code
A low pre processing system for low quality QR code
shameedcm3
Qr codes
Qr codes
jaiksolanki
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET Journal
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.
RobbySahoo
Qr code (quick response code)
Qr code (quick response code)
Rohan Sawant
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
Pank Jes
Qr code
Qr code
Ajay Verma
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
Three qr code
Three qr code
Hugo Satyre
QR-CODE presentation slide
QR-CODE presentation slide
Ravindra Chaudhary
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in India
IRJET Journal
&^^&
&^^&
Yahia Zakaria
Qr codes
Qr codes
Ellinamama
QR Code Mini Workshop
QR Code Mini Workshop
GSW
QR Codes: What, Why, How & Where
QR Codes: What, Why, How & Where
Robin M. Ashford, MSLIS
What is a QR Code?
What is a QR Code?
Michael Sauers
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET Journal
IRJET - Color Qr Code
IRJET - Color Qr Code
IRJET Journal
More Related Content
What's hot
QR code
QR code
Noah Kim
QR code
QR code
anish kumar
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Jishnu Mandal
A low pre processing system for low quality QR code
A low pre processing system for low quality QR code
shameedcm3
Qr codes
Qr codes
jaiksolanki
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET Journal
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.
RobbySahoo
Qr code (quick response code)
Qr code (quick response code)
Rohan Sawant
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
Pank Jes
Qr code
Qr code
Ajay Verma
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
Three qr code
Three qr code
Hugo Satyre
QR-CODE presentation slide
QR-CODE presentation slide
Ravindra Chaudhary
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in India
IRJET Journal
&^^&
&^^&
Yahia Zakaria
Qr codes
Qr codes
Ellinamama
QR Code Mini Workshop
QR Code Mini Workshop
GSW
QR Codes: What, Why, How & Where
QR Codes: What, Why, How & Where
Robin M. Ashford, MSLIS
What is a QR Code?
What is a QR Code?
Michael Sauers
What's hot
(20)
QR code
QR code
QR code
QR code
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
A low pre processing system for low quality QR code
A low pre processing system for low quality QR code
Qr codes
Qr codes
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.
Qr code (quick response code)
Qr code (quick response code)
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
Qr code
Qr code
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Three qr code
Three qr code
QR-CODE presentation slide
QR-CODE presentation slide
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in India
&^^&
&^^&
Qr codes
Qr codes
QR Code Mini Workshop
QR Code Mini Workshop
QR Codes: What, Why, How & Where
QR Codes: What, Why, How & Where
What is a QR Code?
What is a QR Code?
Similar to IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET Journal
IRJET - Color Qr Code
IRJET - Color Qr Code
IRJET Journal
Qr codes web
Qr codes web
Simran Gupta
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET Journal
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET Journal
CREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptx
ELECTRONICSCOMMUNICA6
DETECTION OF QR CODE.pptx
DETECTION OF QR CODE.pptx
ELECTRONICSCOMMUNICA6
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)
Tejas Lalwani
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code Scanner
IRJET Journal
QRC Presentation.pptx
QRC Presentation.pptx
GgDevil
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET Journal
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
IRJET Journal
Qr code (quick response code)
Qr code (quick response code)
Likan Patra
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
IAEME Publication
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
IAEME Publication
Qr code in education
Qr code in education
Vasil Dimitrov
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
Editor IJCATR
14 571
14 571
Chaitanya Ram
QR codes in libraries (By Gaurav Boudh)
QR codes in libraries (By Gaurav Boudh)
Library and Information Science Blog
Similar to IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
(20)
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET - Color Qr Code
IRJET - Color Qr Code
Qr codes web
Qr codes web
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
CREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptx
DETECTION OF QR CODE.pptx
DETECTION OF QR CODE.pptx
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code Scanner
QRC Presentation.pptx
QRC Presentation.pptx
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
Qr code (quick response code)
Qr code (quick response code)
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
Qr code in education
Qr code in education
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
14 571
14 571
QR codes in libraries (By Gaurav Boudh)
QR codes in libraries (By Gaurav Boudh)
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
jaychoudhary37
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Internship report on mechanical engineering
Internship report on mechanical engineering
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1162 A Survey: Secret Sharing Approach with Cheater Prevention on QR Code Sarika Laiphrakpam1, Mrs. D. B. Gothawal2 1ME Student, Dept of Computer Engineering, DYPCOE, Pune, India 2Faculty, Dept of Computer Engineering, DYPCOE, Pune, India ------------------------------------------------------------------------***------------------------------------------------------------------- Abstract -A QR code is thecommonlyusedtwo-dimensional (2D) barcode which has high encryptionanddecryptionspeed; it is not only restricted to error-correction ability, but alsocan store large information. QR barcode are used considerably because of their beneficial properties, including small tag, large data capacity, reliability, and high-speed scanning. However the limitation of this is it lacks adequate security protection for private or confidential data. A secret QR sharing approach is to protect the private QR data with a secure and reliable distributed system. The QR code schemes use the QR characteristics to achieve secret sharing and can resist the print-and-scan operation. In the system, the secret has been splitted and conveyedwithQRtagsinthedistribution application, and the system can retrieve the lossless secret with the authorized participants. Using a barcode reader, the general browsers can read the original data from the marked QR tags , and helps reduce the security risk of the secret. The systems approach gives a feasible and provides content readability, cheater detectability , and an adjustable secret payload of the QR barcode. Key Words: QR barcode, Secret sharing,cheaterprevention, QR characteristics 1. INTRODUCTION QR code (quick response code) is a type of two dimensional barcode developed by Denso-Wave companyin1994[1].QR code is a piece of long multilingual text, a linked URL, an automated SMS message, a business card or just about any information can be submerged into the two-dimensional barcode. The QR code system became popular in the automotive industry due to its high-speed scanning, reliability, greater storage capacity compared to standard UPC barcodes and fast readability. A secret QR sharing approach is to protect the private QR data with a secure and reliable distributed system. Barcode - a code consist of a group of printed patterned bars and spacesandsometimesnumerals that is designed to be scanned and read the information it contain into computer memory. Fig-1.1 Barcode Fig -1.2: QR Code 1.1 QR Code QR code is a two-dimensional code or a matrix barcode that can be reading multiple ways like QR scanners, mobile phones with a camera, and smart-phones. Fig- 1.3: Overview of QR Code and working. The QR Code, Information is encoded in both direction i.e. Vertical and horizontal respectively, thus it holds hundred times additional data than a traditional bar. There are two types of QR Codes. 1. ONLINE CODES 2. It point to an Internet addresses and trigger a client / server interaction that requires an active Internet connection. This involves the access of a mobile website and the sending of an SMS message. 2. OFFLINE CODES The name itself suggests that these codes do not need an Internet connection. It directly resolved on the phone.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1163 Two-dimensional symbolsgenerallycontainmuchmore data mounted on; it is compared with linear symbols and thus requires much longer data processing time and more complex process. Therefore, QR Code has much more consideration for its finder pattern to enable high-speed reading. QR Codes have overtaken the popularity of classical barcode in many areas. The key fact about typical barcode is that it can hold maximum of 20 digits only, which is overcome by QR code as it can hold up to 7,089 characters. Fig-1.4: - The development of QR code. QR Codes has the capability to encode same amount of data approximately in one tenth the space of a traditional 1D barcode. A great feature of QR Codes is that they do not need to be scanned from one particular angle, as QR Codes can be read regardless from any position respectively. The most popular and commercial use for QR Codes is in the telecommunications industry, where the increasing in the adoption of smart-phones seems to be the biggest driver of its popularity. QR Codes seem to be a suitable tool for quick and efficient communication URLs to users. 1.2 Characteristics of QR code All-Direction (3600) High-speed Reading- Reading in all directions (3600 ) the ratio between black and white among the scan line that runs through the finder patterns is always when seen from any direction among the 360° surrounding it. Resistant to Distorted Symbols- Symbols often get distorted as soon as they are attached to a curved surface i.e. angled CCD sensor face and the symbol face. To spot this distortion,QR Code has alignment patterns arranged with a regular interval within the range of the symbol. Data Restoration Functionality (Resistant to smudged or damaged symbol):- QR Code has four different error correction levels 7%, 15%, 25% and 30% that depend on symbol area. The error correction functionality is implemented according to the smudged/damage, and it is utilizing the code which is highly resistant to error. Linking Functionality of the Symbols:- A single symbol is represented in several symbols on dividing it by using linking functionality.Asingle symbol can be dividedatmaximuminto16symbols. High Capacity Encoding of Data:- QR Code is efficient to handle all types of data, like numeric and alphabetic characters, Kanji, Kana, Hiragana symbols, binary, control codes and etc. In one symbol up to 7,089 characters can be encoded. Small Printout Size:- Since QR Code carries information both horizontally and vertically, QR Code is capable of encoding the same amount of data in approximately one-tenth the space of a traditional bar code. 2. LITERATURE SURVEY Different from the conventional QR application, the purposed approach utilizes the characteristics of QR modules to satisfy the essential of steganography, readability, robustness, adjustable secret capability, blind extraction, cheater detection, and identification for secret sharing mechanism[1]. The QR sharing system can achieve satisfactory performance when compared to related attempts. [2] In this paper, a security system for QR codes that guarantees both users and generators security concerns is implemented. Thesystemis reversecompatiblewithpresent standards that are used for encodingQRcodes.Thesystemis implemented and then tested by using an Android-based smart-phone. The system introduces a small overhead in terms of the delay that is required for integrity verification and content validation. [3] Security has become extremely important in the digital society. Authentication process should be seriously examined by services that store sensitive information. Most of the users have android smart phones. The Smart phones have good memory size as well as good processing power too. As a mobile phone has become an essential accessory in real life, compared with the traditional key or access card. Sending the authentication by using mobile phones through MMS (Multimedia Messaging Service) allows the user to carry objects but not any extra specific hardware cost. Using QR Code successful authentication can be done. [4] 2LQR code has two levels: a public level and a private level. The public level can be read by any QR code reading application, while the private level needs a specific application with specific input information. 2LQR code can be used for private message sharing or for authentication scenarios. The private level is created by replacing black modules with Specific textured patterns. These textured patterns are considered as black modules by standard QR code reader. Thus the private level is invisible to standard
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1164 QR code readers. In addition, the private level doesnotaffect in anyway the reading process of the public level. [5] The paper refers the authentication problem of real- world goods on which 2D bar-codes (2D-BC) were printed and we take the challengers view. The challengers are assumed to have access to noisy copies of an original 2D-BC. A simple estimator of the 2D-BC is depends on copies averages is proposed, letting the challengers print a fake 2DBC with as original by the system detector. Performance of the estimator in terms of error probability at the detector side is then derived with respect to Nc and compared with experimental results on real 2D-BC. It is shown that the adversary can produce a fake that successfully fools the detector with a reasonable number of genuine goods. Advantage: Create a fake 2D-BCs declared as genuine by the detector. Disadvantage: Requireadditional noisetogenerate fake barcode. Generating fake 2D QR code declared as original by QR code reader. 3. SYSTEM ARCHITECTURE The system used a secret (n,n)-Threshold QR code sharing approach ,the scheme designs an (n, n)-threshold sharing system so that the privacy of a secret is provided, making it unavailable to a cheater. In the system, a dealer and n participants exist, where n ≥ 2. [1] So the dealer is responsible for splitting the secret into n marked QR tags. And the n marked QR tags can be distributed to the n corresponding participants. The authorized QR tags with n participants only are qualified to obtain the shared secret, and no subset of less than n tags can leak any information about the secret.[1] Fig -3.1. Architecture for System Assume that QRi are the n covers of QR barcodes with the same QR version and error correction level, i=1, 2, 3…., n, and the data of QRi can be different. That is, the barcode reader can scan and decode diverse data from QRi. Let S be the private QR data to be protected.[1] Here the input secret data is handled by Shadow Derivation Phase where secret data is split into bundle of 2, first is shadow i.e. si and second is authenticationvi andsoon.Later this set of (S,V) are pass to the next phase i.e. to Concealment Phase and here QR code is marked and concealed by applying the wet paper codes(WPC)Algorithm and then finally these set of QRn’ is send for transmission.[1] Shadow derivation phase: Step 1: derive the master key K Step 2: Generate n authentication streams Step 3: Generate (n-1)random binary shadows Step 4: Derive the n-th binary shadow. A reliable distributed secret storagesystemwiththeQRcode can be applicable in some applications,suchasauthorization in e-commerce (like e-coupon and e-ticket) and the distributed secret sharing. Recently, most QR-related research has used thetraditional watermarkingtechniqueor the traditional image hiding manner without utilizing the characteristics of the QR barcode. These schemes do not operate on the QR tag directly, so they are not capable of the practice of hiding/reading the secret from the QR code directly. In real-world applications, the capability of detecting the cheaters is a significantrequirementbeforethe secret data are revealed. Algorithms Steganography Algorithm: 1) Creating a QR Code Step 1: Data Analysis Step 2: Data EncodinG Step 3: Error Correction Coding Step 4: Structure Final Message Step 5: Module Placement in Matrix Step 6: Data Masking Step 7: Format and Version Information Encoding:- Representation of each letter in secret message by its equivalent ASCII code. Conversion of ASCII code to equivalent 8 bit binary number. Division of 8 bit binary number into two 4 bit parts. Choosing of suitable letters corresponding to the 4 bit parts. Meaningful sentence construction by using letters obtained as the first letters of suitable words. Omission of articles, pronoun, preposition, adverb, was/were,is/am/are,has/have/had,will/shall,and would/should in coding process to giveflexibilityin sentence construction. Encoding is not case sensitive. Decoding Steps: First letter in each word of cover message is taken and represented by corresponding 4 bit number.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1165 4 bit binary numbers of combined to obtain 8 bit number. ASCII codes are obtained from 8 bit numbers. Finally secret message is recovered from ASCII codes. ADVANTAGE: 1. The key advantage of the QR code is its versatility. 2. Relatively small in size. These codes are designed small in size than the information they contain. 3. Very quick transfer of information. DISADVANTAGE: 1. One disadvantage of QR codes and perhapsitisthe biggest problem that the lack of familiarity of the QR code among people. 2. Another major disadvantage of a QR code is codes dependability on a mobile device or smart-phone. 3. Security issues. The transfer of data between two devices can always lead to security issues. 4. CONCLUSIONS Compared with the different conventional QR application, the system utilizes the characteristics of QR modules to satisfy the essential needs of steganography, readability, robustness, secret capacity, blind extraction , cheater detection and identification for the sharing mechanism.Also the QR code security is essential and QR codes are increasingly used in all life fields, this system can protect users’ privacy and identity in addition to their smart phone devices. The proposed secure QR code application provides more security level as well as maintains backward compatibility with QR codes that do notincorporatesecurity features. Even if the QR code does not contain digital signature, the application can still verify onlinecontents and malicious contents. However, itwill warntheuseraboutthat before giving the users the choice to continue or not. In the future, can extend the work for other barcode types, enhance the implementation andaddmoresecurityfeatures. REFERENCES [1] Pei-Yu Lin” Distributed Secret Sharing Approach with Cheater Prevention based on QR Code” 2016 IEEE. [2] Raed M. Bani-Hani,YarubA.Wahsheh,MohammadB.Al- Sarhan.”Secure QR Code System” 2014 IEEE. [3] Ms. Dhanashree Patil, Mrs. Shanti. K. Guru. “Secured Authentication using Challenge-Response and Quick- Response Code for Android Mobiles” 2014 IEEE. [4] William Puech, ChristopheDestruel, Olivier Strauss, Jean-Marc Gaudin, andChristianGuichard”Twolevel QR code for private message sharing and document authentication” 2016 IEEE. [5] C. Baras and F. Cayre, “2D bar-codes for authentication: A security approach,” in Proc. 20th Eur. Signal Process. Conf. (EUSIPCO), Aug. 2012, pp.1760–1766. [6] T. V. Bui, N. K. Vu, T. T. P. Nguyen, I. Echizen, and T. D. Nguyen, “Robust message hiding for QR code,” in Proc. IEEE 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. (IIH-MSP), Aug. 2014, pp. 520–523. [7] Hsiang-Cheh Huang, Feng-Cheng Chang, and Wai-Chi Fang.” Reversible Data Hiding with Histogram-Based Difference Expansion for QR Code Applications” 2011 IEEE. [8] Yang-Wai Chow,IWilly SusiloD , Joseph Tonien , Elena Vlahu-GjorgievskaandGuominYang”CooperativeSecret Sharing Using QRCodesand SymmetricKeys”Symmetry 2018. [9] Jun-Chou Chuang, Yu-Chen Hu &Hsien-JuKo.” A Novel Secret Sharing Technique Using QR Code” International Journal of Image Processing (IJIP), Volume (4) : Issue (5). [10] Prof. PallaviTekade , RutujaMhaskar , PriyaSurywanshi, AishwaryaShirgurkar , AniketPanmalkar , Rohit Patil.” QR Code Implementation in Car Parking Locator” International Journal of Innovative Research in Computer and CommunicationEngineering.Vol.5,Issue 3, March 2017.
Download now