Important paper-based documents exposed to forgery such as: official certificates, birth, marriage, death certificates, selling and buying documents and other legal documents is more and more serious and sophisticated. With the purposes of fraud, appropriation of property, job application and assignment in order to swindle public authorities, this forgery has led to material loss, belief deterioration as well as social instability. There are many techniques has been proposed to overcome this issue such as: ink stamps, live signatures, documented the transaction in third party like the court or notary. In this paper, it’s proposed a feasible solution for forgery prevention for paper-based documents using cloud computing application. With the application of quick response bidirectional barcode and the usage of hash algorithm. The study aims at developing an electronic verification system for official and issued books (documents, endorsements, and other official books) to/from different sections of the Institute using QR technology.
Design and implementation a network mobile application for plants shopping ce...IJECEIAES
During the revolution of developing mobile phone applications, they can be used in different fields like business, health, transportation, communications and tourism, and other uses. This paper presents QR based information management system for plants shopping centers. This system includes two main sides: mobile and server. The proposed application is used as a substitute for the human guide that each visitor needs in the plants shopping center. The complete information can be provided on any seedling displayed in the shop depending on the QR code technology. Each branch of the same enterprise includes sub-server that is linked to the main server using a private computer network. The server side contains information of all plants and all branches for such enterprise in the form of text and image in different languages. The proposed application facilitates the movement of the customer inside the place, the ease in preparing bills electronically that helps the visitor to save the time of queue to preparing the bill and paying. The proposed system is tested over different case studies to prove the efficiency in terms of information and selling management.
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
This document discusses techniques for smart shopping using QR codes. It provides an overview of how QR codes can be generated and embedded with product information like name, number, location, and details. By scanning these QR codes using a smartphone camera and app, users can get product information on their phone. The document then reviews different techniques used for QR code generation and recognition, including REST protocols, multiplexing/demultiplexing algorithms, and QR filtering methods. It discusses how these techniques can enable features like adding items to a shopping cart, checking product offers, and digital payment. The techniques aim to make the shopping experience more convenient and efficient compared to traditional physical shopping.
Forgery of documents has increased with cheaper technology making it easier. Governments and companies lose revenue and reputation due to sophisticated forgeries being hard to detect and prove. A proposed solution embeds secure QR codes with digital signatures in documents to allow easy verification of authenticity by scanning the code. This prevents forgery by linking documents securely to their issuers digitally.
The document discusses the design of a mobile payment system using QR codes in Zimbabwe. It aims to provide a more secure and cost-effective alternative to current mobile payment methods like USSD, which have vulnerabilities. The proposed system has three parts: a QR code for identification, a Qpay Android app, and a payment server. The QR code would be scanned by the app to process encrypted payments via a HTTPS connection to the server. The system is designed to address security issues through authentication management, session management, certification management, and key management components. It is argued that QR code payments could provide a fast and simple bridge from physical goods to digital payments for micropayments, though mobile platform diversity poses challenges.
IRJET - Digital KYC with Auto Form FillingIRJET Journal
This document describes a system for digital KYC verification and automated form filling. The system extracts key information from identity documents using optical character recognition. It stores this in user profiles. When a user needs to fill out a form, the system automatically populates it with the stored information from their profile, eliminating manual form filling. This streamlines the KYC process and makes it paperless and more efficient. The system was created to reduce human errors and make compliance and record keeping easier for organizations.
Online data processing functions to Loginworks software has reduced costs, increased profitability and delivered greater core value and operational excellence to our customers. We help you capture, extract and digitize and process data from various sources. We are equipped with over a decade of experience in delivering outstanding data process outsourcing services to global customers at such affordable rates. Our Online Data Processing services are valid for all kinds of textual data capturing which includes printed text and manuscripts scanned images.
https://www.loginworks.com/data-processing/
A Secure and Robust Cloud-based Prototype for Online Transaction using Androi...IJMTST Journal
The document discusses a proposed secure and robust cloud-based system for online transactions using Android mobile devices. The proposed system aims to develop a secure Android application with a multi-level security model to preserve user identity and financial credentials during online transactions. It includes customer, merchant and banking modules. The system is designed to ensure transactions can occur without revealing personal details of users to each other or a trusted third party. It uses encryption techniques like AES and MD5 along with device IDs to authenticate users securely while only transmitting hashed data over networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design and implementation a network mobile application for plants shopping ce...IJECEIAES
During the revolution of developing mobile phone applications, they can be used in different fields like business, health, transportation, communications and tourism, and other uses. This paper presents QR based information management system for plants shopping centers. This system includes two main sides: mobile and server. The proposed application is used as a substitute for the human guide that each visitor needs in the plants shopping center. The complete information can be provided on any seedling displayed in the shop depending on the QR code technology. Each branch of the same enterprise includes sub-server that is linked to the main server using a private computer network. The server side contains information of all plants and all branches for such enterprise in the form of text and image in different languages. The proposed application facilitates the movement of the customer inside the place, the ease in preparing bills electronically that helps the visitor to save the time of queue to preparing the bill and paying. The proposed system is tested over different case studies to prove the efficiency in terms of information and selling management.
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
This document discusses techniques for smart shopping using QR codes. It provides an overview of how QR codes can be generated and embedded with product information like name, number, location, and details. By scanning these QR codes using a smartphone camera and app, users can get product information on their phone. The document then reviews different techniques used for QR code generation and recognition, including REST protocols, multiplexing/demultiplexing algorithms, and QR filtering methods. It discusses how these techniques can enable features like adding items to a shopping cart, checking product offers, and digital payment. The techniques aim to make the shopping experience more convenient and efficient compared to traditional physical shopping.
Forgery of documents has increased with cheaper technology making it easier. Governments and companies lose revenue and reputation due to sophisticated forgeries being hard to detect and prove. A proposed solution embeds secure QR codes with digital signatures in documents to allow easy verification of authenticity by scanning the code. This prevents forgery by linking documents securely to their issuers digitally.
The document discusses the design of a mobile payment system using QR codes in Zimbabwe. It aims to provide a more secure and cost-effective alternative to current mobile payment methods like USSD, which have vulnerabilities. The proposed system has three parts: a QR code for identification, a Qpay Android app, and a payment server. The QR code would be scanned by the app to process encrypted payments via a HTTPS connection to the server. The system is designed to address security issues through authentication management, session management, certification management, and key management components. It is argued that QR code payments could provide a fast and simple bridge from physical goods to digital payments for micropayments, though mobile platform diversity poses challenges.
IRJET - Digital KYC with Auto Form FillingIRJET Journal
This document describes a system for digital KYC verification and automated form filling. The system extracts key information from identity documents using optical character recognition. It stores this in user profiles. When a user needs to fill out a form, the system automatically populates it with the stored information from their profile, eliminating manual form filling. This streamlines the KYC process and makes it paperless and more efficient. The system was created to reduce human errors and make compliance and record keeping easier for organizations.
Online data processing functions to Loginworks software has reduced costs, increased profitability and delivered greater core value and operational excellence to our customers. We help you capture, extract and digitize and process data from various sources. We are equipped with over a decade of experience in delivering outstanding data process outsourcing services to global customers at such affordable rates. Our Online Data Processing services are valid for all kinds of textual data capturing which includes printed text and manuscripts scanned images.
https://www.loginworks.com/data-processing/
A Secure and Robust Cloud-based Prototype for Online Transaction using Androi...IJMTST Journal
The document discusses a proposed secure and robust cloud-based system for online transactions using Android mobile devices. The proposed system aims to develop a secure Android application with a multi-level security model to preserve user identity and financial credentials during online transactions. It includes customer, merchant and banking modules. The system is designed to ensure transactions can occur without revealing personal details of users to each other or a trusted third party. It uses encryption techniques like AES and MD5 along with device IDs to authenticate users securely while only transmitting hashed data over networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...IRJET Journal
This document proposes a system called the "Multi Bank Family Card" which allows multiple users to access their bank accounts from different banks using a single ATM card. The system uses RFID technology, integrates user accounts onto a single card along with unique PIN numbers for each account. It also monitors user behavior during cash withdrawals using a Hidden Markov Model and implements a formula-based authentication for security. The system aims to make ATM transactions more convenient by allowing users to withdraw cash from any linked account with different banks using only one card.
Continuous improvements in technology and quality of life have had a strong impact on the development of payment techniques. With the evolution of near-field communication (NFC) technology, contactless payment has received recent attention because of its short-range, conducive nature. As mobile computing made great leaps due to enormous development in the smart phone platform, companies like Google, Samsung, and Apple embedded NFC in smart phones to provide on-the-go payment capabilities, eliminating the need for payment cards. But due to interoperability and high cost, these technologies are not available to everyone. Dr. B Srinivasa Rao | Ch. Sphoorthi | K. TejaSree | G. Sai Snigdha | V. S R Harika"Pay-Cloak:Biometric" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11430.pdf http://www.ijtsrd.com/computer-science/other/11430/pay-cloakbiometric/dr-b-srinivasa-rao
IRJET- Guarded Remittance System Employing WANET for Catastrophe RegionIRJET Journal
This document proposes an offline mobile payment system for catastrophe regions using Wireless Ad-hoc Networks (WANETs). The system aims to enable payments when fixed infrastructure like cellular towers are unavailable after disasters. It introduces a mobile payment app that allows customers to make payments offline by communicating through an infrastructure-less wireless network established via WANET. The system uses multilevel endorsement and digital signatures to guarantee payments and prevent double spending. It also provides an interface for users to view and upload information about regional conditions like roadblocks or flooding to help others in the disaster area.
Creation of automatic identification and data capture infrastructure via data...IAEME Publication
This document discusses automatic identification and data capture (AIDC) technologies for supply chain management and enterprise information systems. It provides a history and overview of barcode technology, including its advantages of being low-cost and easy to print, but also its disadvantages like needing line-of-sight scanning and inability to read items in containers. The document introduces 2D datamatrix as an advanced AIDC technology with benefits like non line-of-sight reading and high-speed scanning. It suggests datamatrix can provide more real-time visibility of enterprise operations compared to traditional barcoding approaches.
This document discusses automatic identification and data capture (AIDC) infrastructure using two-dimensional (2D) Data Matrix compared to other technologies like barcodes. It provides background on how AIDC technologies help improve supply chain and enterprise system visibility. Barcodes are currently the most widely used AIDC technology but have limitations like needing line-of-sight scanning and low scanning speeds. 2D Data Matrix addresses some of these limitations by allowing non-line-of-sight reading and higher scanning speeds. The document compares the characteristics of barcode and 2D Data Matrix technologies for use in automatic identification.
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET Journal
This document describes a proposed system called EasyKey that uses a single RFID card to perform the functions of multiple cards for authentication and payment. The system would use two-factor authentication via a mobile device to securely approve transactions initiated by scanning the RFID card. When a user scans their EasyKey card at a vendor, the vendor device would send an authentication request to the EasyKey server, which would then notify the user's mobile device. The user could approve or deny the transaction from their phone. The system aims to reduce the number of cards users need to carry by consolidating authentication and payment onto a single multipurpose RFID card.
The document proposes a standardized system called the Digital Locker Technology Specification (DLTS) to issue government documents electronically to Aadhaar holders. This would allow documents to be stored digitally and shared with agencies in real-time, eliminating the need for physical documents. The system would use Aadhaar numbers to authenticate document owners and prevent fraud. It describes key aspects of electronic documents like being machine-readable, printable, shareable, tamper-evident, and verifiable. The proposed architecture involves multiple digital repositories storing documents in a federated manner, with documents being issued, stored, and accessible online through a digital locker portal.
IRJET- Smart Shopping Application using NFCIRJET Journal
This paper proposes a smart shopping application that uses near field communication (NFC) technology to allow customers to scan product tags with their mobile phones to view product details, add items to a cart, and make contactless payments using an e-wallet. The goal is to streamline the shopping experience by eliminating long lines and allowing customers to purchase and pay for items directly from their phone. The proposed system would integrate an Android application, NFC tags on products, a product database accessed via web services, and payment processing to enable a more convenient and secure mobile shopping solution.
CloudPass – a passport system based on Cloud Computing and Near Field Communi...cscpconf
Wireless communication has penetrated into all fields of technology, especially in mobility,
where wireless transactions are gaining importance with improvements in standards like 3G
and 4G. There are many technologies that support the wireless forms of interactions between devices. One among them is NFC – Near Field Communication. In addition to NFC, other external technologies like Quick Response (QR) Codes assist in establishing interactions among participating devices. In this paper, we examine an approach that will involve standards and technologies like NFC, QR Codes and Cloud Infrastructure to design a mobile application which will perform desired functionalities. Cloud Storage is used as a reservoir to store the artifacts used by the application. Development and testing of the application is initially carried out on emulators or simulators followed by testing on real handsets/devices.
Abstract: Contactless smart card technology work on a secure microcontroller or embedded in a device that communicates with a reader with use of a contactless radio frequency (RF) interface. Smart Cards are secure portable storage devices used for many applications especially security related which involving access to system’s database. For the future of smart card to be bright, it is important to look into several aspects and factors especially those resulted due to the rapid advancement in communication technology. This paper looks into current trends in smart card technology and highlights what is likely to happen in the future. Moreover, the paper addresses other aspects in order to identify the core concepts that are of interest to smart card developers and researchers. Keywords: contactless, security
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Gagner Technologies offers M.E projects based on IEEE 2013 . Final Year Projects, M.E projects 2013-2014, mini projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2013 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE 2013 - 2014 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering
For more details contact below Address
No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17
IRJET- 3 - Tier Cross Platform Application for Digital Visiting Card with...IRJET Journal
This document proposes developing a 3-tier cross-platform application for digital visiting cards with a graphical user interface. The application would allow users to create, edit, delete, share and connect digital business cards through a web or mobile application. A cloud database would store the data and create RESTful APIs to allow access from different platforms. The digital cards could be graphically designed and shared across various social media and messaging platforms. The goal is to eliminate physical business cards and make the process of creating and sharing cards more user-friendly and accessible across different devices.
Maxartists Technologies was founded in 2005 in Trivandrum, Kerala, India to become a leader in emerging technologies. As a multi-disciplinary IT solutions company, it provides high quality, cost-effective software solutions ranging from mobile and web applications to server-side development and consulting. The company has expertise in technologies such as mobile applications, server-side development, NFC solutions, web applications, barcodes, medical compliance systems, and consulting.
Manless Advanced Shopping with Smart CartYogeshIJTSRD
The system is popularity of QR code grows swiftly with the growth of smart phone. A smart trolley used for shopping at the supermarkets remedying the difficulties like waiting in large queues at the payment counter. The system is developed for smart shopping to avoid traffic congestion, long queues with the help of QR technique. Also by using this system, time will be saved. The users has a gift card with QR code mounted on it which will be scanned through the mobile after detecting QR code and verifying the credentials of the user, balance from the customer’s account will get deducted. The customer or the user if enable to pay amount, the determine gate will not open. At the same time, the customer or the user can only enter the store for shopping if they scan their individual QR code. The stock about the particular product will get notified to the owner in order to refill it. The sensor in the trolley will sum the price of all products. The amount is displayed in the trolley as well as in the cart of the app. It focuses on the concepts of quick service and advanced consumer technology. It is a most man less advanced shopping with smart technology. M. Narasimman | M. Lavanya | M. Nandhini | S. Nandhini "Manless Advanced Shopping with Smart Cart" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39958.pdf Paper URL: https://www.ijtsrd.com/computer-science/embedded-system/39958/manless-advanced-shopping-with-smart-cart/m-narasimman
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET Journal
The document proposes a smart shopping trolley system using RFID technology and a microcontroller to automatically calculate the total bill of items placed in the trolley. This system would help reduce the time customers spend in long queues at billing counters in shopping malls by detecting RFID tags on products as they are added to the trolley and instantly displaying the running total cost. The proposed design and its components like RFID tags, reader, microcontroller, and LCD display are described along with how the system would work to speed up the shopping checkout process.
DPA BIMS – Biometrical Identity Multi-modal Solutions: innovative biometrical multi-modal data collection, processing and comparison solutions, which aim to provide efficient person identification and verification to law enforcement and governmental organizations.
Preventing forged and fabricated academic credentials using cryptography and ...IJCSEA Journal
The objective of this paper is to present a method of detecting forgery and fabrication in educational certificates and academic transcripts based on cryptography and QR codes. Discussed in detail are the requirements that need to be met by educational institutes issuing academic certificates or transcripts. The
cryptographic steps of converting certificate details into a cipher text, encoding it in a QR code and printing the same on the certificate or transcript to be issued are elaborated. This paper also explains in detail how the certificate owners, other institutes, employers and third-party verifiers can verify certificates for forgery and fabrication using the scanning app of the issuing institute. The encryption and decryption
formulae that should be used in computations to be performed before creating and after scanning a QR
code are documented. Educational institutes and universities can implement this method in their certificate issuing process just by obtaining a cryptographic key pair and publishing their QR code scanning app for download by verifiers.
This document summarizes a research paper on an E-rationing management system proposed to digitize India's public distribution system for food rationing. Some key points:
1. The proposed system uses QR codes on smart cards linked to a user database to authenticate users at ration shops, replacing the existing manual system.
2. User details and purchase histories would be stored digitally and updated automatically during transactions.
3. Sensors would measure and deduct quantities of goods provided to control diversion and ensure transparency between government and users.
4. The goals are to enhance visibility, transparency, accessibility and efficiency over the current system. Data flow diagrams and entity relationship diagrams are presented to explain how the system would function
Improving System Security and User Privacy in Secure Electronic Transaction (...IJERA Editor
With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET as an open encryption and security specification designed to protect credit card transaction on the internet. This paper proposes a new approach for increasing security by avoiding privacy violation using Public Key Infrastructure, X.509 certificate and Format Preservation encryption method, the credit card number is encrypted using public key algorithm and re-encrypted using Format preservation Encryption algorithm and finally stored in the X.509 version 3 certificate private extensions. This technique can be used to improve the security of the user credit card information against card fraud or the compromise of data associated with the account.
QR code based authentication method for IoT applications using three security...TELKOMNIKA JOURNAL
This document proposes a QR code-based authentication method (QRAM) for internet of things (IoT) applications. QRAM uses three layers of security to authenticate QR codes:
1. User image authentication verifies a user's frequently updated profile image encoded in the QR code.
2. User activity number authentication encrypts values related to a user's recent activities to generate a number included in the QR code.
3. User ID authentication looks up and verifies a user's ID against neighboring IDs stored in a database.
The document evaluates QRAM in terms of security and computation time. It finds that QRAM authenticates QR codes faster than other methods while providing multiple layers of encryption to enhance security.
Randomized QR-code scanning for a low-cost secured attendance systemIJECEIAES
Human resource management requires good documentation and good data processing. In workspaces such as offices and factories, employee salaries are determined by calculating attendance at each hour of work. Tracking and collecting attendance data for a large number of employees is a difficult thing to do. We need a secure system to facilitate the process of collecting and tracking presence data. We propose an attendance system that uses random quick response code (QR-codes) as one time password (OTP) to improve security. Employees are required to scan the QR-code within ten seconds before it is changed and randomized each time. The proposed attendance system facilitates data collection using employees’ smartphones and Mac-Address as unique identification numbers. The system is able to track employees’ arrival and departure times. We have implemented the system at the local university to collect lecturer attendance data then analyze its security and statistic in all scanning activities. The average time needed by a user to authenticate their presence in the system is 25.8877 seconds. The steps needed to sign in and out from the system are fewer than other previous researches. Those findings tell us that the approach is straightforward and more uncomplicated than other proposed methods. We conclude that randomized QR-code scanning is a relevant scheme to be applied in a secure attendance system.
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...IRJET Journal
This document proposes a system called the "Multi Bank Family Card" which allows multiple users to access their bank accounts from different banks using a single ATM card. The system uses RFID technology, integrates user accounts onto a single card along with unique PIN numbers for each account. It also monitors user behavior during cash withdrawals using a Hidden Markov Model and implements a formula-based authentication for security. The system aims to make ATM transactions more convenient by allowing users to withdraw cash from any linked account with different banks using only one card.
Continuous improvements in technology and quality of life have had a strong impact on the development of payment techniques. With the evolution of near-field communication (NFC) technology, contactless payment has received recent attention because of its short-range, conducive nature. As mobile computing made great leaps due to enormous development in the smart phone platform, companies like Google, Samsung, and Apple embedded NFC in smart phones to provide on-the-go payment capabilities, eliminating the need for payment cards. But due to interoperability and high cost, these technologies are not available to everyone. Dr. B Srinivasa Rao | Ch. Sphoorthi | K. TejaSree | G. Sai Snigdha | V. S R Harika"Pay-Cloak:Biometric" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11430.pdf http://www.ijtsrd.com/computer-science/other/11430/pay-cloakbiometric/dr-b-srinivasa-rao
IRJET- Guarded Remittance System Employing WANET for Catastrophe RegionIRJET Journal
This document proposes an offline mobile payment system for catastrophe regions using Wireless Ad-hoc Networks (WANETs). The system aims to enable payments when fixed infrastructure like cellular towers are unavailable after disasters. It introduces a mobile payment app that allows customers to make payments offline by communicating through an infrastructure-less wireless network established via WANET. The system uses multilevel endorsement and digital signatures to guarantee payments and prevent double spending. It also provides an interface for users to view and upload information about regional conditions like roadblocks or flooding to help others in the disaster area.
Creation of automatic identification and data capture infrastructure via data...IAEME Publication
This document discusses automatic identification and data capture (AIDC) technologies for supply chain management and enterprise information systems. It provides a history and overview of barcode technology, including its advantages of being low-cost and easy to print, but also its disadvantages like needing line-of-sight scanning and inability to read items in containers. The document introduces 2D datamatrix as an advanced AIDC technology with benefits like non line-of-sight reading and high-speed scanning. It suggests datamatrix can provide more real-time visibility of enterprise operations compared to traditional barcoding approaches.
This document discusses automatic identification and data capture (AIDC) infrastructure using two-dimensional (2D) Data Matrix compared to other technologies like barcodes. It provides background on how AIDC technologies help improve supply chain and enterprise system visibility. Barcodes are currently the most widely used AIDC technology but have limitations like needing line-of-sight scanning and low scanning speeds. 2D Data Matrix addresses some of these limitations by allowing non-line-of-sight reading and higher scanning speeds. The document compares the characteristics of barcode and 2D Data Matrix technologies for use in automatic identification.
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET Journal
This document describes a proposed system called EasyKey that uses a single RFID card to perform the functions of multiple cards for authentication and payment. The system would use two-factor authentication via a mobile device to securely approve transactions initiated by scanning the RFID card. When a user scans their EasyKey card at a vendor, the vendor device would send an authentication request to the EasyKey server, which would then notify the user's mobile device. The user could approve or deny the transaction from their phone. The system aims to reduce the number of cards users need to carry by consolidating authentication and payment onto a single multipurpose RFID card.
The document proposes a standardized system called the Digital Locker Technology Specification (DLTS) to issue government documents electronically to Aadhaar holders. This would allow documents to be stored digitally and shared with agencies in real-time, eliminating the need for physical documents. The system would use Aadhaar numbers to authenticate document owners and prevent fraud. It describes key aspects of electronic documents like being machine-readable, printable, shareable, tamper-evident, and verifiable. The proposed architecture involves multiple digital repositories storing documents in a federated manner, with documents being issued, stored, and accessible online through a digital locker portal.
IRJET- Smart Shopping Application using NFCIRJET Journal
This paper proposes a smart shopping application that uses near field communication (NFC) technology to allow customers to scan product tags with their mobile phones to view product details, add items to a cart, and make contactless payments using an e-wallet. The goal is to streamline the shopping experience by eliminating long lines and allowing customers to purchase and pay for items directly from their phone. The proposed system would integrate an Android application, NFC tags on products, a product database accessed via web services, and payment processing to enable a more convenient and secure mobile shopping solution.
CloudPass – a passport system based on Cloud Computing and Near Field Communi...cscpconf
Wireless communication has penetrated into all fields of technology, especially in mobility,
where wireless transactions are gaining importance with improvements in standards like 3G
and 4G. There are many technologies that support the wireless forms of interactions between devices. One among them is NFC – Near Field Communication. In addition to NFC, other external technologies like Quick Response (QR) Codes assist in establishing interactions among participating devices. In this paper, we examine an approach that will involve standards and technologies like NFC, QR Codes and Cloud Infrastructure to design a mobile application which will perform desired functionalities. Cloud Storage is used as a reservoir to store the artifacts used by the application. Development and testing of the application is initially carried out on emulators or simulators followed by testing on real handsets/devices.
Abstract: Contactless smart card technology work on a secure microcontroller or embedded in a device that communicates with a reader with use of a contactless radio frequency (RF) interface. Smart Cards are secure portable storage devices used for many applications especially security related which involving access to system’s database. For the future of smart card to be bright, it is important to look into several aspects and factors especially those resulted due to the rapid advancement in communication technology. This paper looks into current trends in smart card technology and highlights what is likely to happen in the future. Moreover, the paper addresses other aspects in order to identify the core concepts that are of interest to smart card developers and researchers. Keywords: contactless, security
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Gagner Technologies offers M.E projects based on IEEE 2013 . Final Year Projects, M.E projects 2013-2014, mini projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2013 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE 2013 - 2014 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering
For more details contact below Address
No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17
IRJET- 3 - Tier Cross Platform Application for Digital Visiting Card with...IRJET Journal
This document proposes developing a 3-tier cross-platform application for digital visiting cards with a graphical user interface. The application would allow users to create, edit, delete, share and connect digital business cards through a web or mobile application. A cloud database would store the data and create RESTful APIs to allow access from different platforms. The digital cards could be graphically designed and shared across various social media and messaging platforms. The goal is to eliminate physical business cards and make the process of creating and sharing cards more user-friendly and accessible across different devices.
Maxartists Technologies was founded in 2005 in Trivandrum, Kerala, India to become a leader in emerging technologies. As a multi-disciplinary IT solutions company, it provides high quality, cost-effective software solutions ranging from mobile and web applications to server-side development and consulting. The company has expertise in technologies such as mobile applications, server-side development, NFC solutions, web applications, barcodes, medical compliance systems, and consulting.
Manless Advanced Shopping with Smart CartYogeshIJTSRD
The system is popularity of QR code grows swiftly with the growth of smart phone. A smart trolley used for shopping at the supermarkets remedying the difficulties like waiting in large queues at the payment counter. The system is developed for smart shopping to avoid traffic congestion, long queues with the help of QR technique. Also by using this system, time will be saved. The users has a gift card with QR code mounted on it which will be scanned through the mobile after detecting QR code and verifying the credentials of the user, balance from the customer’s account will get deducted. The customer or the user if enable to pay amount, the determine gate will not open. At the same time, the customer or the user can only enter the store for shopping if they scan their individual QR code. The stock about the particular product will get notified to the owner in order to refill it. The sensor in the trolley will sum the price of all products. The amount is displayed in the trolley as well as in the cart of the app. It focuses on the concepts of quick service and advanced consumer technology. It is a most man less advanced shopping with smart technology. M. Narasimman | M. Lavanya | M. Nandhini | S. Nandhini "Manless Advanced Shopping with Smart Cart" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39958.pdf Paper URL: https://www.ijtsrd.com/computer-science/embedded-system/39958/manless-advanced-shopping-with-smart-cart/m-narasimman
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET Journal
The document proposes a smart shopping trolley system using RFID technology and a microcontroller to automatically calculate the total bill of items placed in the trolley. This system would help reduce the time customers spend in long queues at billing counters in shopping malls by detecting RFID tags on products as they are added to the trolley and instantly displaying the running total cost. The proposed design and its components like RFID tags, reader, microcontroller, and LCD display are described along with how the system would work to speed up the shopping checkout process.
DPA BIMS – Biometrical Identity Multi-modal Solutions: innovative biometrical multi-modal data collection, processing and comparison solutions, which aim to provide efficient person identification and verification to law enforcement and governmental organizations.
Preventing forged and fabricated academic credentials using cryptography and ...IJCSEA Journal
The objective of this paper is to present a method of detecting forgery and fabrication in educational certificates and academic transcripts based on cryptography and QR codes. Discussed in detail are the requirements that need to be met by educational institutes issuing academic certificates or transcripts. The
cryptographic steps of converting certificate details into a cipher text, encoding it in a QR code and printing the same on the certificate or transcript to be issued are elaborated. This paper also explains in detail how the certificate owners, other institutes, employers and third-party verifiers can verify certificates for forgery and fabrication using the scanning app of the issuing institute. The encryption and decryption
formulae that should be used in computations to be performed before creating and after scanning a QR
code are documented. Educational institutes and universities can implement this method in their certificate issuing process just by obtaining a cryptographic key pair and publishing their QR code scanning app for download by verifiers.
This document summarizes a research paper on an E-rationing management system proposed to digitize India's public distribution system for food rationing. Some key points:
1. The proposed system uses QR codes on smart cards linked to a user database to authenticate users at ration shops, replacing the existing manual system.
2. User details and purchase histories would be stored digitally and updated automatically during transactions.
3. Sensors would measure and deduct quantities of goods provided to control diversion and ensure transparency between government and users.
4. The goals are to enhance visibility, transparency, accessibility and efficiency over the current system. Data flow diagrams and entity relationship diagrams are presented to explain how the system would function
Improving System Security and User Privacy in Secure Electronic Transaction (...IJERA Editor
With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET as an open encryption and security specification designed to protect credit card transaction on the internet. This paper proposes a new approach for increasing security by avoiding privacy violation using Public Key Infrastructure, X.509 certificate and Format Preservation encryption method, the credit card number is encrypted using public key algorithm and re-encrypted using Format preservation Encryption algorithm and finally stored in the X.509 version 3 certificate private extensions. This technique can be used to improve the security of the user credit card information against card fraud or the compromise of data associated with the account.
QR code based authentication method for IoT applications using three security...TELKOMNIKA JOURNAL
This document proposes a QR code-based authentication method (QRAM) for internet of things (IoT) applications. QRAM uses three layers of security to authenticate QR codes:
1. User image authentication verifies a user's frequently updated profile image encoded in the QR code.
2. User activity number authentication encrypts values related to a user's recent activities to generate a number included in the QR code.
3. User ID authentication looks up and verifies a user's ID against neighboring IDs stored in a database.
The document evaluates QRAM in terms of security and computation time. It finds that QRAM authenticates QR codes faster than other methods while providing multiple layers of encryption to enhance security.
Randomized QR-code scanning for a low-cost secured attendance systemIJECEIAES
Human resource management requires good documentation and good data processing. In workspaces such as offices and factories, employee salaries are determined by calculating attendance at each hour of work. Tracking and collecting attendance data for a large number of employees is a difficult thing to do. We need a secure system to facilitate the process of collecting and tracking presence data. We propose an attendance system that uses random quick response code (QR-codes) as one time password (OTP) to improve security. Employees are required to scan the QR-code within ten seconds before it is changed and randomized each time. The proposed attendance system facilitates data collection using employees’ smartphones and Mac-Address as unique identification numbers. The system is able to track employees’ arrival and departure times. We have implemented the system at the local university to collect lecturer attendance data then analyze its security and statistic in all scanning activities. The average time needed by a user to authenticate their presence in the system is 25.8877 seconds. The steps needed to sign in and out from the system are fewer than other previous researches. Those findings tell us that the approach is straightforward and more uncomplicated than other proposed methods. We conclude that randomized QR-code scanning is a relevant scheme to be applied in a secure attendance system.
MULTI-LAYER DIGITAL VALIDATION OF CANDIDATE SERVICE APPOINTMENT WITH DIGITAL ...IJCNCJournal
Proposed work promotes a unique data security protocol for validating candidate’s service appointment. Process initiated with concealment of private share within the first segment of each region of the e-letter at commission’s server. This is governed by hash operations determining circular orientation of private share fragments and their hosted matrix intervals. Signed e-letter downloaded at the posted place is validated through same hash operations and public share. Candidate’s on spot taken fingerprint are concealed in two segments for each region of the eletter adopting similar hiding strategies. The copyright signature of posting place is similarly shielded on fourth segment of each region using hash operations. The certified e-letter is thoroughly validated at commission’s server and signatures stored justify authenticity of appointment and proper candidature at the posting place. The superior test results from wider angles establishes the efficacy of the proposed protocol over the existing approaches.
Multi-Layer Digital Validation of Candidate Service Appointment with Digital ...IJCNCJournal
Proposed work promotes a unique data security protocol for validating candidate’s service appointment. Process initiated with concealment of private share within the first segment of each region of the e-letter at commission’s server. This is governed by hash operations determining circular orientation of private share fragments and their hosted matrix intervals. Signed e-letter downloaded at the posted place is validated through same hash operations and public share. Candidate’s on spot taken fingerprint are concealed in two segments for each region of the eletter adopting similar hiding strategies. The copyright signature of posting place is similarly shielded on fourth segment of each region using hash operations. The certified e-letter is thoroughly validated at commission’s server and signatures stored justify authenticity of appointment and proper candidature at the posting place. The superior test results from wider angles establishes the efficacy of the proposed protocol over the existing approaches.
This document summarizes a QR code-based digitized marksheet system that encrypts student academic data and embeds it in a QR code printed on the marksheet. The encrypted data in the QR code includes student name, registration number, semester, year, marks obtained, and grades. Only authorized users can scan the QR code and decrypt the data using a mobile app. This digitization saves storage space for academic records while preventing unauthorized access to student data. The system implementation focuses on generating encrypted QR codes from the academic data and validating scanned codes through the mobile app and server.
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used C# language in visual studio environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...IRJET Journal
This document summarizes a research paper that analyzes the types and security of two-dimensional barcodes, specifically QR codes, in logistics and e-commerce. It begins by introducing QR codes and their increasing usage in these industries. It then discusses the different types of 2D barcodes, including QR, Aztec, MaxiCode, PDF417, and Semacode. It analyzes the usability, attacks on QR code security like phishing and malware propagation, and proposed methods to enhance QR code security including digital signatures and dynamic QR codes. The document concludes that as QR code usage grows in important industries like payments, their security must be improved to prevent attacks and data leaks.
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...AnthonyOtuonye
The document discusses developing an electronic bank deposit and withdrawal system using Quick Response (QR) code technology. It aims to reduce transaction times at bank tellers by having customers generate a QR code on their mobile device containing their account information. The teller can then quickly scan this code to validate the customer within seconds. This system is intended to reduce withdrawal/deposit transactions from 5-10 minutes currently to under 3 minutes. It will also allow customers to conduct multiple transactions with a single QR code, further speeding up the process. The system was developed using a prototyping methodology involving user surveys to gather requirements and ensure the system meets customer expectations for efficient banking services. Results showed the new QR code system provides improved operational efficiency and more
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
This document discusses securing e-medical documents using QR codes. It proposes a system where hospitals can upload medical records to the cloud with a patient ID. This ID is then converted to a QR code using the QRDroid function. Patients can then scan the QR code to download their medical document. The system aims to securely transmit medical data between hospitals and patients in a paperless manner using encrypted QR codes. It describes modules for user registration, database creation, QR code generation, scanning and file uploading/downloading. The goal is to provide a more secure, flexible and easy way for patients to access medical records electronically.
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
This document summarizes several research papers on providing security for digital payment systems. It discusses using digital tokens along with blockchain technology to protect personal and account details. It also reviews using RFID technology and mobile phones for authentication instead of security tokens. Blind signatures with blockchain are proposed to build a private reputation system. Overall, the literature survey analyzes different approaches for building secure transaction applications.
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
This document presents a proposed two-factor authentication system for banking using QR codes and mobile phones. The system aims to improve security over traditional username and password authentication. It would generate a unique QR code for each login attempt, encoding a random string along with user details like their IMEI number. Users would scan the QR code with their registered mobile phone, with the phone number and IMEI number validating their identity. If the network is available, the encoded string would automatically login the user. Otherwise, a one-time password would be displayed to manually enter. The system seeks to establish a secure authentication method using mobile phones as trusted devices to both display login QR codes and verify user identities.
The document is a seminar report on QR codes presented by Umesh Chandra Mandal. It discusses the history of QR codes, their uses including in mobile apps, payments and website logins. It describes the design of QR codes including how data is stored and encoded with error correction. It covers variants of QR codes and their advantages and disadvantages. Finally, it discusses generating QR codes and their present use.
The document describes a user documentation verification portal that uses computer vision techniques to verify the authenticity of identity documents uploaded by users. It discusses:
1) The need for document verification in industries like banking, insurance, etc. and issues with current manual verification processes.
2) The system architecture of the proposed portal, which allows users to register, upload documents, and gets results of verification through email.
3) The verification process, which involves converting documents to grayscale, comparing them using Structural Similarity Index (SSIM) and notifying the user of the accuracy percentage.
4) Testing results like confusion matrix to evaluate the model's performance in predicting actual and modified documents.
The portal
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...IRJET Journal
The document proposes a fast detection method for QR codes based on run-length coding to reduce computational complexity. It compares the proposed method to an existing system using elliptic curve cryptography. The proposed method detects the minimum region containing position detection patterns in QR codes using run-length coding to then calculate the central pattern coordinates faster. This allows for improved real-time QR code decoding by reducing the time-consuming detection process.
Design and develop authentication in electronic payment systems based on IoT ...TELKOMNIKA JOURNAL
The document describes a proposed electronic payment system that uses both Internet of Things (IoT) devices and biometric authentication via fingerprint scanning. The system is designed with three levels of authentication - using an RFID card, a PIN entered on a keypad, and fingerprint scanning. Fingerprint authentication involves capturing a fingerprint image, extracting features, and comparing the fingerprint to stored templates. The system is implemented using an Arduino microcontroller connected to a fingerprint sensor. Software is programmed to enroll and authenticate fingerprints. Sensitive user information is encrypted for security. The system aims to provide secure authentication for electronic payments by combining IoT devices and biometric fingerprint identification.
A Review On QR-Code Based Ticket Booking SystemJoe Andelija
This document reviews a proposed QR-code based ticket booking system for metro travel. It discusses the issues with current paper-based ticket systems, including long wait times and inefficiency. The proposed system would allow passengers to book tickets through a mobile app using their phone, generating a QR-code for the ticket. This QR-code could then be scanned by ticket checkers on the metro to validate tickets. The system aims to reduce wait times for passengers and make the ticketing process more convenient, efficient and secure through use of the mobile app and QR-codes.
A Barcode-Based Prototype Authentication System Using Python Programming and ...IRJET Journal
This document summarizes a prototype authentication system using Python programming and database applications. The system uses barcodes and QR codes to authenticate physical entities. It generates unique QR codes for registered entities from their data stored in a database. It then sends the QR codes to the corresponding entities via email. For authentication, the system scans QR codes using a camera and checks if the data extracted from the QR code matches the stored database data. If it matches, authentication is approved. This allows for a contactless, automated authentication process using commonly available hardware like cameras instead of specialized barcode scanners.
Key frame extraction is an essential technique in the computer vision field. The extracted key frames should brief the salient events with an excellent feasibility, great efficiency, and with a high-level of robustness. Thus, it is not an easy problem to solve because it is attributed to many visual features.
This paper intends to solve this problem by investigating the relationship between these features detection and the accuracy of key frames extraction techniques using TRIZ. An improved algorithm for key frame extraction was then proposed based on an accumulative optical flow with a self-adaptive threshold (AOF_ST) as recommended in TRIZ inventive principles. Several video shots including original and forgery videos with complex conditions are used to verify the experimental results. The comparison of our results with the-state-of-the-art algorithms results showed that the proposed extraction algorithm can accurately brief the videos and generated a meaningful compact count number of key frames. On top of that, our proposed algorithm achieves 124.4 and 31.4 for best and worst case in KTH dataset extracted key frames in terms of compression rate, while the-state-of-the-art algorithms achieved 8.90 in the best case.
The adoption of cloud environment for various application uses has led to security and privacy concern of user’s data. To protect user data and privacy on such platform is an area of concern. Many cryptography strategy has been presented to provide secure sharing of resource on cloud platform. These methods tries to achieve a secure authentication strategy to realize feature such as self-blindable access tickets, group signatures, anonymous access tickets, minimal disclosure of tickets and revocation but each one varies in realization of these features. Each feature requires different cryptography mechanism for realization. Due to this it induces computation complexity which affects the deployment of these models in practical application. Most of these techniques are designed for a particular application environment and adopt public key cryptography which incurs high cost due to computation complexity. To address these issues this work present an secure and efficient privacy preserving of mining data on public cloud platform by adopting party and key based authentication strategy. The proposed SCPPDM (Secure Cloud Privacy Preserving Data Mining) is deployed on Microsoft azure cloud platform. Experiment is conducted to evaluate computation complexity. The outcome shows the proposed model achieves significant performance interm of computation overhead and cost.
E AUTHENICATION SYSTEM USING QR CODE AND OTPIRJET Journal
This document proposes an e-authentication system using QR codes and OTP (one-time passwords) for secure login. It discusses how QR codes containing login information and OTPs sent via SMS could provide multiple layers of security. The system aims to prevent hacking of login credentials, shoulder surfing attacks, and accidental logins. The document provides background on QR codes and OTPs, describes the proposed system and authentication process, reviews related work, and concludes the system allows for a simple yet secure login experience for users.
Similar to QR code based two-factor authentication to verify paper-based documents (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)GiselleginaGloria
3rd International Conference on Artificial Intelligence Advances (AIAD 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Flow Through Pipe: the analysis of fluid flow within pipesIndrajeet sahu
Flow Through Pipe: This topic covers the analysis of fluid flow within pipes, focusing on laminar and turbulent flow regimes, continuity equation, Bernoulli's equation, Darcy-Weisbach equation, head loss due to friction, and minor losses from fittings and bends. Understanding these principles is crucial for efficient pipe system design and analysis.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
QR code based two-factor authentication to verify paper-based documents
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 4, August 2020, pp. 1834~1842
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i4.14339 1834
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
QR code based two-factor authentication to verify
paper-based documents
Maysaa Abd Ulkareem Naser, Eman Talib Jasim, Haider M. Al-Mashhadi
Department of Computer Information System College of Computer Science and Information Technology,
University of Basrah, Iraq
Article Info ABSTRACT
Article history:
Received Oct 17, 2019
Revised Feb 19, 2020
Accepted Mar 27, 2020
Important paper-based documents exposed to forgery such as: official
certificates, birth, marriage, death certificates, selling and buying documents
and other legal documents is more and more serious and sophisticated.
With the purposes of fraud, appropriation of property, job application
and assignment in order to swindle public authorities, this forgery has led to
material loss, belief deterioration as well as social instability. There are many
techniques has been proposed to overcome this issue such as: ink stamps,
live signatures, documented the transaction in third party like the court
or notary. In this paper, it’s proposed a feasible solution for forgery
prevention for paper-based documents using cloud computing application.
With the application of quick response bidirectional barcode and the usage of
hash algorithm. The study aims at developing an electronic verification system
for official and issued books (documents, endorsements, and other official
books) to/from different sections of the Institute using QR technology.
Keywords:
Authentication methods
Cloud computing
e-Government
Hash algorithm
QR code
This is an open access article under the CC BY-SA license.
Corresponding Author:
Haider M. Al-Mashhadi,
Department of Computer Information System College of Computer Science and Information Technology,
University of Basrah, Iraq
Email: mashhad01@gmail.com
1. INTRODUCTION
There are many usages and applications where quick response (QR) codes are significantly involved
such as commercial products, tracking and monitoring labeled goods, marketing and advertising, identification
of business cards, sale of goods, bank accounts, post mailing, virtual store, immigration stamps and
entertainment, as a result, in many other circumstances, where sharing data is needed any object is
wanted. [1, 2]. With the arise of e-Government and the new view of the automated office that make the office
work without papers as possible, despite of this there are some specific types of work that are needed to
accomplished by using paper documents. For example, official document-issued and many other legal
documents, like a driving license, insurance document, birth certificate, passport, or contract these documents
need to some form of authentication to verify the documents. This situations need to specialist to ensure
the verification process from this type of documents. The governments established many foundations that can
be responsible on work in the field of forensic science. This type of enterprise may use some special tools like
a magnifying glass, a UV lamp or an infrared checker [3, 4].
Practically, it is so hard to control considerable quantity of documents quickly using traditional ways
for this turn. Tax specialists as a sample, audit various applications, forms, receipt receipts, account statements,
documents and other official papers are to be under checking through other agencies and bodies in which
professionals are found to validate the legality of such these instruments and documents. [5].
2. TELKOMNIKA Telecommun Comput El Control
QR code based two-factor authentication to verify paper-based documents (Maysaa Abd Ulkareem Naser)
1835
In this study, it is suggested a new cloud computing framework technique that can applyed on
traditional way to validate the issuance of document by applying encoding and print the unique QR code
on paper to prove the validity of the paper document. This Code of unique symbols are decoded giving same
information QR Code include which are able to be read by smart phone and it could have retrieved information
its genuine form [6, 7]. The project is consisted of sequenced stages by which it can be validated the legality
of document or certified as shown in Figure 1. The summarization of the technique stages is shown
in Figure 2.
Figure 1. A proposed system for QR code generation and validation using mobile device
Figure 2. The stages of proposed technique
QR code is very interested code that can be used in authentication and verification operations, because
it has the ability to hold many information that can authenticate the official documents. There are many
researches that using QR code in authentication fields. In [8] the aim of this work is to examine and analyze
the best type of QR code image by calculating the PSNR and MSE values. Using QR Code images with various
image file format (PNG and JPG). In [9] the paper proposed new QR code using two storage levels to use it in
document authentication. The new QR code, called two-level QR code, has public and private storage levels.
The public level is the standard QR code storage level. The private level is arranged by substituting the black
squares by some special textured types. It includes information encoded utilizing q-array code with an error
correction capability.
In [10] the authors suggested QR code with ECDSA (elliptic curve digital signature algorithm).
The propose method using two levels; public level or the standard QR and private level in which adding
ECDSA to increase the security of the QR. Furthermore, in [11] the suggest a systematic QR code
beautification framework that permit an individual user to personalize the QR code they create (for instant
3. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 1834 - 1842
1836
a QR code containing contact details meant to be printed on a business card) by selecting visually meaningful
models. In [12] the original use of QR codes in the automobile industry, QR codes can be used in a number of
areas as a means to support interaction in controlled status such as in education. Examples include marking
assessment. In this paper, the system creates the official book and generates a QR code for each official book
based on a set of data that is read from the contents of the official book and encrypting to ensure confidentiality
through a service provider which provides a QR service on the cloud. QR is encoded and sent to the server to
be stored in a private database over the cloud framework.
The importance of research lies in:
Minimizing the fraud and impersonation that can occur as a result of the absence of a precise and precise
mechanism to identify the owner of the original book that is related to the data and content of
the official book.
Minimize the human effort in the process of electronic auditing of the book where the system can audit fast
and guaranteed and non-error to most of the official books issued and received from and to
the administrative units of the University or Institute.
The data of the book is encrypted before converting it into a QR code so that the data used in the QR coding
is not used and the binary verification technology is used for the official book to prevent fraud and
impersonation.
Therefore, the method used in this study is very safe and secure, it is also other search benefits through:
The importance of reducing the human effort in the audit and issuance of the validity of the issue currently
in place where the system verifies the validity of the issuance in electronic form and fast does not exceed
a few minutes.
Reducing material costs due to the purchase of equipment or equipment for the coding of official books
that must be purchased for each administrative unit.
Minimize the time lost in the validation process from the official books issued and received.
2. CLOUD COMPUTING
A framework that can provide a fit and demand-driven access network for computing resources
(networks, services, applications, servers and storages) that can be provided in quick and minimal configuring
efforts or interaction, there are four framworks: private, public, community and hybrid cloud [13]. Cloud
computing can be used to store a large amount of data with the ability to access these data by any smart devices
such as smart phine, Ipad, tablet and etc from any place in the word using the Internet or Intranet at any time.
Most of combanies today have tended to exploit the services provided by cloud computing because of its very
benefits such as [14, 15]:
Very high storage capacity.
Fast processing capability.
Ease of use.
Remote access from anywhere and any time.
The possibility of using the cloud services offered with low cost.
Cloud computing provide the customers and users to work with platform as a service (PaaS), i.e;
different operating systems (OSs) as user nedded, infrastructure as a service (IaaS), i.e; storages, servers and
Software as a service (SaaS), i.e.; application level programs. These services models can be provided by many
cloud vendors (e.g., amazon web services (AWS) from Amazon.com, Google App Engine from Google.com,
and Azure from Microsoft.com) based on payment as much use [16]. The cloud computing service models can
be shown in Figure 3.
Figure 3. Cloud computing models
4. TELKOMNIKA Telecommun Comput El Control
QR code based two-factor authentication to verify paper-based documents (Maysaa Abd Ulkareem Naser)
1837
2.1. Cloud computing security
Cloud security can be reach by appling different types of security techniques to avoid the breachs and
hacking of the cloud data or services this solution can be achieved using cryptography [17]. Cryptography is
the science that study the information security and present the information protection techniques against
unauthorized access. The cryptography can be applied by converting the critical data into a form that cannot
read by attckers if the attackers can get this data. There are many goals of cryptography, the main goal is to
maintain data in a secure way to keep it from unauthorized users. By using cryptography, the data such as text,
voice, video and image can be stored or transferred on the network from side to side in a secure maner that can
not be read from the attackers who may evesdroping of this data. Cryptography provides many security goals
such as [18]:
Authentication: The purpose of the authentication is to ensure user identity. The goal is to prevent
unauthorized users from accessing computing resources.
Confidentiality: The purpose of confidentiality is to grant the access to the data by the authorized persons
only to protect data from unauthorized persons.
Data Integrity: The goal of data integrity is to ensure there are no modification, fabrication, deletion from
anauthorized persons.
Non-Repudiation: the goal is to ensure and prove the person who send or receive the data.
Access Control: The goal is to grant the permission to access the data to the authorized user only.
3. BASICS OF QR CODE
QR Code is a barcode of two vectors. i.e., it is scanned by two vectors. Vertically and horizontally.
It can be kept date more than one vector barcode. Thence, it is suggested QR code needs more developed
technology of reading. QR coded is defined by ISO/IEC 18804 Industrial specification. However, it is created
and protected by Denso Wave Japanese Corporation 1994. The main aim is to develop this technology is to
support users to encode and read their own information easily [19]. As shown in Figure 4.
Figure 4. Structure and components of QR code
3.1. Technology
QR code changed the probable usage and purpose of the coded sign [20]. It contains bi-vectors
information while the traditional barcode was consisted of tone vector of data; that is, the vertical one.
The process to recognize barcode are [21]:
Detecting outer point
Recognize shape.
Identify control bar of barcode.
Discover barcode aim.
Vectors and bit intensity to use barcode.
Computing value of barcode.
The following points are included within QR code;
Configuration Pattern is used to rectify misstatement in QR code may occur by input codes on
curved plans.
Timing pattern is used to appoint main coordinate of each cell within QR code by black and white units are
ordered alternatively for this turn.
Noiseless Zone: it is a verge space makes detection of QR code most ease. Four cells are to be found for
this zone.
Data area: Within QR code, there is area contains data are encoded by Binary numbers (such as URL)
and also include reed-solomon code to correct errors. [22, 23].
5. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 1834 - 1842
1838
3.2. QR code characteristics
(2D) bar codes usually have high-density data storage capacity for a large volume of data within
a tiny volume. QR code,” is robust since it is application, the application is work on any device and work with
any data, and with proceeding characteristics in terms of security, error detection, and correction capability,
as well as the ability to encode different languages”. [24] QR code is a 2D bar code that was developed by
Denso Wave in 1994 for tracking parts in vehicle manufacturing. The decoding is executed automatically
and easily: some free add-on software (e.g., Quick Mark and Enigma Readers) can test, read, and decode QR
code easily by putting the device before code. [25]. QR is consisted of 360 degree legible black and white
quadrangles. The quick response code can be saved in several modes such as communication data, image
and video links, plain text, etc. It is also recognized as URL. The storage level of QR codes can be sorted up
to 7,089 characters of information, which is very large in comparison with 1D (one vector) barcode. Encoding
process able to treat string set of QR code, and Numbers (0-9), Alphabets (uppercase A-Z), Nine Special
characters (% * + - / _ $) and Kanji characters [26, 27].
3.3. Advantages of applying QR Code
Open source techniques
Free applications.
Simple running procedure.
User easy process.
It needs no complex nor special acquaintance of users to apply QR code, like smart phones are need
to activate QR code. In addition to QR code scanner, it is also being used to make delivery services that
available by informatics libraries. Further, it is also worthy to distribute information and last technology
knowledge for all users. It can be used to link instantly with all necessary resources like (institutional digital
repository, Web-OPAC, e-Resources, library website, library guide). New access ways and rest of valuable
properties of the library quickly and the time of users does not waste, it provides also small space that can be
store a huge data size.
4. CRYPTOGRAPHIC HASH FUNCTION
A hash function can be accepting variable-length message and produces constant length hash message
digest, it does not need any key in its work [28]. The hash function necessary for security implementations is
mentioned to as a Role of Encoding Hash function, that hash function is computationally infeasible to discover
a message or the hash value that is identical for two [29]. At most times the hash value is secured by using
encryption techniques. The term role of encoding that has been used in computer application from reasonably
long time is referred to a role uses string of arbitrary input to a string of fixed length. However, should it meet
some extra needs (as detailed further), then it can be applied for encoding applications which is known as role
of encoding hash. Roles of encoding hash are one of the most important tools in the field of encoding and are
applied to realize group of confidence secure purposes such as authenticity, digital monograms, quasi number
generation, digital hiding secret data in sorting mode, and real time stamping, Figure 5 shows the structure of
MD5 role of hash function; i.e., it is applied form in the proposed research [30]. The encryption techniques can
be adding to encrypt the Hash function; any methods can be used to encrypt the hash function.
Figure 5. Structure of MD5 hash function
6. TELKOMNIKA Telecommun Comput El Control
QR code based two-factor authentication to verify paper-based documents (Maysaa Abd Ulkareem Naser)
1839
Definition: A hash function is a function h: D → R, where the domain,
D = {0,1} * and R = {0,1} n for some n >= 1 (1)
role of hash function are approximately divided into two kinds; i.e., Maine Roles of hash function; the one that
use secret key, and hash without key. The first type is known as message of authentication code. Generally,
the term hash functions refer to hash that does not used keys. In this paper, we will focus on hash only not
MAC. Hash function (some time also known as MDC-Message Decoding Code) can divided into OWHF (one
direction hash function), CRHF (collision resistant hodgepodge) and UOWHF (universal one direction hash
function) [31, 32].
5. AUTHENTICATION TECHNIQUE
In this work the data base has been create to hold the data of all documents, the database is stored over
the cloud to execute the security processes online. The table of data contains the following fields:
User name
Title of the document
Issue date
ID Number for document
The name of the side it may consider
Random number
QR Code
5.1. Authentication phase
The system using cloud computing to save the data of official documents and processing the operations
for producing the QR, to verification the official documents. By using the QR in the administrative units in
the university will provide the ability to save authenticated data in the server on the cloud with secure access to
user documents. The Internet conjointly facilitates the exchange of documents with registered external aspect
through encrypted QR sharing Code. Table 1 shows the notations used throughout our proposed technique.
The steps procedure of the proposed system is as follows:
Input Phase (Create QR)
Step 1: At this stage, information about the document (N, D, AD, AT, X), as Shown in Table 1 are encrypted
using Hash algorithm
Step 2: compute 𝐶 = (𝑁 ∥ 𝐷 ∥ 𝐴𝐷 ∥ 𝐴𝑇 )
Step 3: In this step, XOR Operation between the name of the person and the random number and the process
output is encrypted using the Hash Algorithm Thus ensuring confidentiality of information in the server.
Compute 𝑁𝑃 = ℎ(𝑁⨁𝑥)
Step 4: After completing the previous step, the document information is encrypted by hash algorithm
and the random number is merged in order to store it in QR. because we need it later to encrypted name in
the next steps.
Compute 𝐻𝐶 = (ℎ(𝐶)) ∥ 𝑥)
Step 5: Generate 𝑄𝑅 with 𝐻𝐶 information
Step 6: Print 𝑄𝑅on the document
Step 7: Save 𝑄𝑅 & 𝑁𝑃 to cloud server.
The hash value h is can be stored in a QR code
Save QR in document's
Table 1. The notations used throughout our proposed technique
Notation Description Notation Description
𝑄𝑅 Quick esponse code 𝑄𝑅' QR current
𝑁 ID Number of Document 𝑄𝑅 s QR in cloud server
𝐷 Date of Document 𝑁𝑃 Name of user
𝐴𝐷 Title of Document 𝑁𝑃' Name of user current
𝐴𝑇 Address To =
? Comparison between two side
∥ Concatenation operation 𝑥 Random number
⨁ XOR operation
7. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 1834 - 1842
1840
5.2. Verification phase
Authentication cloud server offers strong authentication and validation of data, the data authenticated
is using QR code that allows for the elevated user suitability while maintaining the elevated security. Here
concealment secret information based on bit technique cannot change by the attacks. If an attacker obtains
the hidden data in the server, it is impossible to recover the secret information.
Step 1: Before verification process the original document is hashed and stored in QR and save it in
the cloud server.
Step 2: After Step 1 the verification process needs to scan the QR from the produced documents from step 1
(using scanner or smart phone QR code scan application) and check the result of the scanning QR of
the document with the stored QR in the cloud server and then verify that the sending QR corresponds to
the document stored in the cloud server.
Scan 𝑄𝑅': m={(HC)}
Step 3: Compute 𝑁𝑃′ =ℎ(𝑁′ ⨁ 𝑥)
Step 4: In case the two documents (the sender and the stored QR) match, it will be tested if the hash in
the document is the same hash in Server.
Step 5: To support the security and to add more security level, the method using the name of the original
owner of document to check on the authentication of the document. The name of original owner is stored in
server and if any management unit want to verification of the document it using QR beside the name of person.
If the two-Name person match, then NP's Document =NP' Server, the document and user are valid. Figure 6
shows the proposed schema.
Figure 6. The proposed scheme
6. CRYPTANALYSIS OF THE TECHNIQUE
User anonymity
In this technique which is based on QR, where all critical information sent to save in cloud server as
encryption by hash function after concatenate operation e.g. 𝐶 = (𝑁 ∥ 𝐷 ∥ 𝐴𝐷 ∥ 𝐴𝑇 ). The compute
𝐻𝐶 = (ℎ(𝐶)) ∥ 𝑥) from these operations, so sever is difficult to know any information about any
the authorization document.
8. TELKOMNIKA Telecommun Comput El Control
QR code based two-factor authentication to verify paper-based documents (Maysaa Abd Ulkareem Naser)
1841
Forward session
In this situation, If the attacker could reveal the server's secret key 𝑥, but it’s difficult getting another
information after it have been achieved user anonymity, so this attack cannot run with just know 𝑥.
Orgery attacks
An attacker tries to change sensitive data to impersonate as the legal user or server to access
the resource on the remote system. As to compute the dynamic NPN its not only used XOR operation but also
concatenate operation e.g. 𝐶 = (𝑁 ∥ 𝐷 ∥ 𝐴𝐷 ∥ 𝐴𝑇 ), and 𝐻𝐶 = (ℎ(𝐶)) ∥ 𝑥).
Password guessing attack
It is difficult to guess the sensitive data of document, because this proposal scheme based on QR,
hidden 𝐷, 𝐴𝐷, 𝐴𝑇 by 𝐻𝐶 and 𝑁 by 𝑁𝑃𝑁.
Mutual authentication
To save reliance between 𝑈𝑖 and 𝑆, the proposed technique based on QR is performed mutual
authentication of together communication parties. Where the server 𝑆 send {HC, NPN} to 𝑈𝑖 and 𝑈𝑖 calculated
the value of NPN by N, x which is only know to 𝑈𝑖 and 𝑆.
7. CONCLUSION
Authenticity of paper-based documents aims to develop an electronic verification system. Using QR
technology. The system creates the official book and generates a QR code for each official book based on a set
of data that is read from the content of the official book and encrypted to ensure confidentiality through
a service provider working to provide a QR service. The QR is encoded and sent to the server for retention
in a private database. In this paper, Book data is encrypted before being converted to a QR code in order not to
know the data used in the encoding of the QR and the use of dual verification technology of the official book
to prevent fraud and impersonation. Therefore, the method used in this study is very safe and secure.
ACKNOWLEDGMENT
This project is submitted as a study to the Oil Training Institute in the province of Basra in the State
of Iraq. It was approved in principle.
REFERENCES
[1] Omar Lopez-Rincon, Oleg Starostenko, “Binary Large Object-Based Approach for QR Code Detection in
Uncontrolled Environments,” Hindawi Journal of Electrical and Computer Engineering, vol. 2017, pp. 1-15, 2017.
[2] ISO/IEC, “Automatic identification and data capture techniques-QR Code bar code semiology specification,” ICS >
01 > 01.080 > 01.080.50, 2015. [Online]. Available: https://webstore.ansi.org/Previews/PREVIEW.
[3] Robin Ashford, “QR codes and academic libraries reaching mobile users,” College & Research Libraries News,
vol. 71, no. 10, pp. 526-30, 2010.
[4] Mohammad Zainuddin, D. Baswaraj, S. M. Riyazoddin, “Generating SMS (Short Message Service) in the form of
Quick Response Code (QR-code),” International Journal of Computer Science and Mobile Computing, vol. 1, no. 1,
pp.10-14, 2012.
[5] Md. Sanaul Haque, Richard Dybowski, “Advanced QR Code Based Identity Card: A New Era for Generating Student
ID Card in Developing Countries,” IEEE First International Conference on Systems Informatics, Modelling and
Simulation, pp. 97-103, 2014.
[6] Maykin Warasart, Pramote Kuacharoen, “Paper-based Document Authentication using Digital Signature and QR
Code,” 4TH International Conference on Computer Engineering and Technology, 2012.
[7] J. Z. Gao, “Understanding 2D-barcode technology and applications in M-commerce-design and implementation of a
2D barcode processing solution,” Proc. Int. Conf. on Compute. Software and Applicate, pp. 49-56, 2007.
[8] Saroj Goyal, Surendra Yadav, Manish Mathuria, “Exploring concept of QR code and its benefits in digital education
system,” IEEE International Conference on Advances in Computing, Communications and Informatics, 2016.
[9] Iuliia Tkachenko, William Puech, Christophe Destruel, Olivier Strauss, Jean-Marc Gaudin, Christian Guichard,
“Two-Level QR Code for Private Message Sharing and Document Authentication,” IEEE Transactions on
Information Forensics and Security, vol. 11, no. 3, pp. 571-583, 2016.
[10] Neha Malik, Bharti Joshi, “ECDSA Approach for Reliable Data Sharing and Document Verification using Two level
QR code,” 2nd International Conference on I-SMAC, 2018.
[11] Lin Y.-H., Chang Y.-P. & Wu J.-L., “Appearancebased QR code beautifier. Multimedia,” IEEE Transactions on
Multimedia, vol. 15, no. 8, pp. 2198-2207, 2013.
[12] Bhaturkar K. P. & Bagde K. G., “QR code based digitized marksheet,” International Journal of Management, IT and
Engineering, vol. 4, no. 57, 2014.
[13] Peter Mell, Timothy Grance, “The NIST definition of cloud computing,” Special Puplication 800-145, 2011.
[14] Haider M. Al-Mashhadi, Ala'a A. Khalaf, “Hybrid Homomorphic Cryptosystem for Secure Transfer of Color Image
on Public Cloud, Journal of Theoretical and Applied Information Technology” vol. 96, no 19, pp. 6474-6486, 2018.
9. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 1834 - 1842
1842
[15] S. Kamboj and M.N. S. Ghumman, “A Survey on Cloud Computing and 1st
Types,” IEEE International Conference
on Computing for Sustainable Global Development, vol. 15, pp. 7435-7443, 2016.
[16] N. M. Gonzalez, C. Miers, F. F. Redigolo, M. A. Simplicio Jr, T. C. M. Carvalho, M. Naslund, et al., “A Taxonomy
Model for Cloud Computing Services,” Proceedings of the 1st International Conference on Cloud Computing and
Services Science, pp. 56-65, 2011.
[17] Haider M. Al-Mashhadi, Iman Q. Abduljaleel, “Color Image Encryption using Chaotic Maps, Triangular Scrambling,
with DNA Sequences,” IEEE International Conference on Current Research in Computer Science and Information
Technology (ICCIT), pp: 93-98, 2017.
[18] Passent M. El-Kafrawy, Azza A. Abdo, Amr. F. Shawish, "Security Issues Over Some Cloud Models,” International
Conference on Communication, Management and Information Technology (ICCMIT), 2015.
[19] Shanthi`Kumaraguru, Prof.Dr.D.S. Bormane, “Identification of QR Code based on Pattern Recognition with Mobile
Phones,” International Journal of Modern Engineering Research (IJMER), vol. 2, no. 5, pp. 3544-3547, 2012.
[20] José Rouillard, “Contextual QR Codes,” 2008 The Third International Multi-Conference on Computing in the Global
Information Technology (iccgi 2008), 2008.
[21] Reilly, D., Smolyn, G. and Chen, H., “Toward fluid, mobile, and ubiquitous interaction with paper using recursive
2D barcodes,” Pervasive Mobile Interaction Devices 2007 (PerMID 2007), workshop at Pervasive, 2007.
[22] Ivan Jelić, Dina Vrkić, “QR codes in library - does anyone use them?” Conference: Information & Communication
Technology Electronics & Microelectronics (MIPRO), 2013.
[23] A. Wilson, “QR codes in the library: are they worth the effort? Analysis of a QR code pilot project accesed,” Journal
of Access Services, vol. 9, no. 3, pp. 101-110, 2012.
[24] Kinjal H. Pandya, Hiren J. Galiyawala, “A Survey on QR Codes: in context of Research and Application,”
International Journal of Emerging Technology and Advanced Engineering Certified Journal, vol. 4, no. 3, 2014.
[25] Shintaro Okazaki, “Cross-Media Integration of QR Code: A Preliminary Exploration,” Journal of Electronic
Commerce Research, vol. 14, no. 2, pp. 137-148, 2013.
[26] Hiren R. Kadam, Niketan R. Sutar, Bhumil S. Ugle, Mrs. Kishori Shekokar, “Genuine Automobile Parts Scanner
Using QR-Code,” International Journal of Advance Engineering and Research Development, vol. SIEICON,
pp. 1-6, 2017.
[27] Sangeeta Singh, “QR Code Analysis,” International Journal of Advanced Research in Computer Science and
Software Engineering, vol. 6, no. 5, 2016.
[28] Haider M. Al-Mashhadi, H. B. Abdul-Wahab, R. F. Hassan, “Secure and time efficient hash-based message
authentication algorithm for wireless sensor networks,” Conferences: Global Summit on Computer & Information
Technology (GSCIT), pp. 1-7, 2014.
[29] Goh Khai Hong and Sharad Sinha, “Tracking Vulnerable People Using Body Worn QR Code,” A Final Student
Application Paper Presented to IEEE Standards Association in Partial Fulfilment of the Requirements for the IEEE
Standards University Student Grant Application, 2018. [Online]. Available: https://www.standardsuniversity.org
[30] B. V. Rompay, “Analysis and Design of Cryptographic Hash functions,” MAC algorithms and Block Ciphers, Ph.D.
Thesis, Electrical Engineering Department, Katholieke Universities, Leuven, Belgium, 2004.
[31] Rajeev Sobti, Geetha Ganesan, “Cryptographic Hash Functions: A Review,” International Journal of Computer
Science, vol. 9, no. 2, pp. 461-79, 2012.
[32] Eman T. Jasim, Hameed A. Younis, “Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme,” IOSR
Journal of Computer Engineering, vol. 17, no. 2, pp. 08-16, 2015.