SlideShare a Scribd company logo
1 of 8
SBVLC: Secure Barcode-based Visible Light
Communication for Smart phones
ABSTRACT:
As an alternative to NFC technology, 2D barcodes have been increasingly used for
security-sensitive applications including payments and personal identification.
However, the security of barcode-based communication in mobile applications has
not been systematically studied. In this paper, we propose SBVLC - a secure
system for barcode-based visible light communication (VLC) between smart
phones. We formally analyze the security of SBVLC based on geometric models
and propose physical security enhancement mechanisms for barcode
communication by manipulating screen view angles and leveraging user-induced
motions. We then develop two secure data exchange schemes. These schemes are
useful in many security-sensitive mobile applications including private information
sharing, secure device pairing, and mobile payment. SBVLC is evaluated through
extensive experiments on both Android and I OS smart phones.
In our application we have implemented the idea of QR code as password
verification to overcome all the hacking issues. We have two modules as banker
and the user. In the user module there will be two categories they are shopping and
paying bill. In the shopping section user will shop the product and enter the card
and bank details and send request to the banker regarding the transaction purpose.
And in turn the banker module there are two categories they are the create OTP
and the send OTP details. The banker will check the details of the user request
regarding the purchase and all the card and balance details and prepare a password
in the form of QR code. The password will be I the form of QR code and will be
sent to the user through the mail service to the user personal mail id. In turn the
user will pay the bill by loading the QR from the mail and scanning. On scanning
the password will generate if the password matches with the banker details the
transaction will become successful. Thus password hacking, key logging and
eavesdropping issues will be overcome.
EXISTING SYSTEM:
Short-range communication technologies including near field communication
(NFC) and 2D barcodes have enabled many popular smart phone applications such
as contactless payments, mobile advertisements, and device pairing. Evolved from
the RFID technology, NFC can enable reliable low-power communication between
RF tags and readers. However, NFC requires additional hardware and has been
supported by only a few smart phone platforms on the market. Recent studies have
shown that NFC is subject to security vulnerabilities such as eavesdropping and
jamming. Moreover, most existing barcode applications are based on a single
barcode exchange, which is insufficient for establishing a secure communication
channel. Whenever a user types in her password in a bank’s sign in box, the key
logger intercepts the password. The threat of such key loggers is pervasive and can
be present both in personal computers and public kiosks; there are always cases
where it is necessary to perform financial transactions using a public computer
although the biggest concern is that a user’s password is likely to be stolen in these
computers. Even worse, key loggers, often root kitted, are hard to detect since they
will not show up in the task manager process list.
DISADVANTAGE:
 NFC requires additional hardware and has been supported by only a few
smart phone platforms on the market.
 NFC is subject to security vulnerabilities such as eavesdropping and
jamming.
 The threat of such key loggers is pervasive and can be present both in
personal computers and public kiosks.
 Even worse, key loggers, often root kitted, are hard to detect since they will
not show up in the task manager process list.
 Lack of accuracy. It is very burden to Users.
PROPOSED SYSTEM:
Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration
rate in mobile applications. This is largely due to the extremely low barrier to
adoption – almost every camera-enabled smart phone can read and process 2D
barcodes. As an alternative to NFC, 2D barcodes have been increasingly used for
security-sensitive applications including mobile payments and personal
identification. For instance, PayPal recently rolled out a barcode-based payment
service for retail customers. As one of the most anticipated new features of I Phone
5, the Passbook App stores tickets, coupons, and gift/loyalty cards using barcodes.
Proposes an iterative Increment Constrained Least Squares filter method for certain
2D matrix bar codes within a Gaussian blurring ersatz. In particular, they use the
L-shaped finder pattern of their codes to estimate the standard deviation of the
Gaussian PSF, and then restore the image by successively implementing a bi-level
constraint, our approach to solving the problem is to introduce an intermediate
device that bridges a human user and a terminal. Then, instead of the user directly
invoking the regular authentication protocol, she invokes a more sophisticated but
user-friendly protocol via the intermediate helping device. Every interaction
between the user and an intermediate helping device is visualized using a Quick
Response (QR) code. The goal is to keep user-experience the same as in legacy
authentication methods as much as possible, while preventing key logging attacks.
ADVANTAGE:
 Compared with NFC, 2D barcodes have enjoyed a significantly higher
penetration rate in mobile applications.
 As an alternative to NFC, 2D barcodes have been increasingly used for
security-sensitive applications including mobile payments and personal
identification.
 Every interaction between the user and an intermediate helping device is
visualized using a Quick Response (QR) code.
 Preventing key logging attacks.
ARCHITECHTURAL DIAGRAM:
MODULES:
The SBVLC application consists of two modules .They are:
 User.
 Banker.
USER:
The User module consists of two categories. They are
 Go for shopping.
 Pay bill.
Go for shopping:
In the go for shopping, user can choose the product and to get the
password he/she has to enter the bank and card details. And has to send
the details to the banker the banker verify all the details and prepare
password for the user and send it to him through mail.
Pay bill:
In the pay bill, the user will scan the QR code sent by the banker and
gets the password and use that password to claim his purchase, if the
details matches with the banker details, the purchase will be successful.
BANKER:
The Banker module consists of two categories. They are
 Create QR.
 Send password as QR.
Create QR:
In the create QR code category the banker will check for purchase
request from the user and verify the user details and prepare a password
in the form of QR code to him through mail service.
Send password as QR:
In this send password category, the banker will send the QR code to the
user through mail service, where the QR code can get from the gallery
which is stored in the SD card by the create password category .The
banker will send the QR code as a attachment to the user. From where
the user can download and can scan it to get the password.
ALGORITHM AND TECHNIQUES:
SYSTEM SPECIFICATION:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 14’ Colour Monitor.
 Mouse : Optical Mouse.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7 Ultimate.
 Coding Language : Java.
 Front-End : Eclipse.
 Data Base : SQLite Manger.
CONCLUSION:
As an alternative to NFC, 2D barcodes have been increasingly used for security-
sensitive applications including mobile payments and personal identification.
Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration
rate in mobile applications. As an alternative to NFC, 2D barcodes have been
increasingly used for security-sensitive applications including mobile payments
and personal identification. Every interaction between the user and an intermediate
helping device is visualized using a Quick Response (QR) code. Preventing key
logging attacks. Thus in our project password hacking, key logging and
eavesdropping issues will be overcome.

More Related Content

What's hot

All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative CompaniesMEDICI admin
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
NFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer ExperienceNFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer ExperienceNFC Forum
 
Near Field Communication in m-Commerce
Near Field Communication in m-CommerceNear Field Communication in m-Commerce
Near Field Communication in m-CommerceThejasK8
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
 
Near field communication
Near field communicationNear field communication
Near field communicationNishank Magoo
 
Paper id 252014116
Paper id 252014116Paper id 252014116
Paper id 252014116IJRAT
 
MasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFCMasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFCNFC Forum
 
The User Experience of Near Field Communication
The User Experience of Near Field CommunicationThe User Experience of Near Field Communication
The User Experience of Near Field CommunicationMemi Beltrame
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)spy007s
 
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive
 
SmartWorld Portfolio
SmartWorld PortfolioSmartWorld Portfolio
SmartWorld PortfolioSmart World
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminarUmsh23
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometricijtsrd
 
NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]Khaled Hasan
 
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...NFC Forum
 

What's hot (20)

Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
NFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer ExperienceNFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer Experience
 
Near Field Communication in m-Commerce
Near Field Communication in m-CommerceNear Field Communication in m-Commerce
Near Field Communication in m-Commerce
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
Mobile payment
Mobile paymentMobile payment
Mobile payment
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Paper id 252014116
Paper id 252014116Paper id 252014116
Paper id 252014116
 
MasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFCMasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFC
 
The User Experience of Near Field Communication
The User Experience of Near Field CommunicationThe User Experience of Near Field Communication
The User Experience of Near Field Communication
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Co Je A Bude Nfc Jan Nemec Gemalto
Co Je A Bude Nfc Jan Nemec GemaltoCo Je A Bude Nfc Jan Nemec Gemalto
Co Je A Bude Nfc Jan Nemec Gemalto
 
Mobile payments: A history of [in]security
Mobile payments: A history of [in]securityMobile payments: A history of [in]security
Mobile payments: A history of [in]security
 
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
 
SmartWorld Portfolio
SmartWorld PortfolioSmartWorld Portfolio
SmartWorld Portfolio
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminar
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]
 
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
 

Similar to SBVLC: Secure Barcode-based Visible Light Communication for Smart phones

Navin ashokan qr_code
Navin ashokan qr_codeNavin ashokan qr_code
Navin ashokan qr_codeNavin Ashokan
 
2 d mobile barcodes final
2 d mobile barcodes final2 d mobile barcodes final
2 d mobile barcodes finalDeloitte
 
New Technology Trends Presentation: QR Codes
New Technology Trends Presentation: QR CodesNew Technology Trends Presentation: QR Codes
New Technology Trends Presentation: QR Codesmurrayhembruch
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPijtsrd
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...IRJET Journal
 
An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...Hussain Shah
 
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)Tejas Lalwani
 
CREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptxCREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptxELECTRONICSCOMMUNICA6
 
Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)Krishna Kumar
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)Aditya Singh
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryErfan Moradian
 
Research paper on nfc based shopping
Research paper on nfc based shoppingResearch paper on nfc based shopping
Research paper on nfc based shoppingPriyanka bisht
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Cracking the Code: How To Think About QR
Cracking the Code: How To Think About QRCracking the Code: How To Think About QR
Cracking the Code: How To Think About QRLeo Burnett
 
Cracking the Code: How to Think about QR Codes
Cracking the Code: How to Think about QR CodesCracking the Code: How to Think about QR Codes
Cracking the Code: How to Think about QR CodesMolly Garris
 

Similar to SBVLC: Secure Barcode-based Visible Light Communication for Smart phones (20)

Navin ashokan qr_code
Navin ashokan qr_codeNavin ashokan qr_code
Navin ashokan qr_code
 
2 d mobile barcodes final
2 d mobile barcodes final2 d mobile barcodes final
2 d mobile barcodes final
 
New Technology Trends Presentation: QR Codes
New Technology Trends Presentation: QR CodesNew Technology Trends Presentation: QR Codes
New Technology Trends Presentation: QR Codes
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTP
 
DETECTION OF QR CODE.pptx
 DETECTION OF QR CODE.pptx DETECTION OF QR CODE.pptx
DETECTION OF QR CODE.pptx
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
 
An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...
 
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)
 
CREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptxCREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptx
 
Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
 
2D barcode publishing a guide to best practices
2D barcode publishing a guide to best practices2D barcode publishing a guide to best practices
2D barcode publishing a guide to best practices
 
Research paper on nfc based shopping
Research paper on nfc based shoppingResearch paper on nfc based shopping
Research paper on nfc based shopping
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Cracking the Code: How To Think About QR
Cracking the Code: How To Think About QRCracking the Code: How To Think About QR
Cracking the Code: How To Think About QR
 
Cracking the Code: How to Think about QR Codes
Cracking the Code: How to Think about QR CodesCracking the Code: How to Think about QR Codes
Cracking the Code: How to Think about QR Codes
 
Passwordless Mobile Banking.pdf
Passwordless Mobile Banking.pdfPasswordless Mobile Banking.pdf
Passwordless Mobile Banking.pdf
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

SBVLC: Secure Barcode-based Visible Light Communication for Smart phones

  • 1. SBVLC: Secure Barcode-based Visible Light Communication for Smart phones ABSTRACT: As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones. In our application we have implemented the idea of QR code as password verification to overcome all the hacking issues. We have two modules as banker and the user. In the user module there will be two categories they are shopping and paying bill. In the shopping section user will shop the product and enter the card and bank details and send request to the banker regarding the transaction purpose. And in turn the banker module there are two categories they are the create OTP and the send OTP details. The banker will check the details of the user request regarding the purchase and all the card and balance details and prepare a password in the form of QR code. The password will be I the form of QR code and will be sent to the user through the mail service to the user personal mail id. In turn the user will pay the bill by loading the QR from the mail and scanning. On scanning
  • 2. the password will generate if the password matches with the banker details the transaction will become successful. Thus password hacking, key logging and eavesdropping issues will be overcome. EXISTING SYSTEM: Short-range communication technologies including near field communication (NFC) and 2D barcodes have enabled many popular smart phone applications such as contactless payments, mobile advertisements, and device pairing. Evolved from the RFID technology, NFC can enable reliable low-power communication between RF tags and readers. However, NFC requires additional hardware and has been supported by only a few smart phone platforms on the market. Recent studies have shown that NFC is subject to security vulnerabilities such as eavesdropping and jamming. Moreover, most existing barcode applications are based on a single barcode exchange, which is insufficient for establishing a secure communication channel. Whenever a user types in her password in a bank’s sign in box, the key logger intercepts the password. The threat of such key loggers is pervasive and can be present both in personal computers and public kiosks; there are always cases where it is necessary to perform financial transactions using a public computer although the biggest concern is that a user’s password is likely to be stolen in these computers. Even worse, key loggers, often root kitted, are hard to detect since they will not show up in the task manager process list. DISADVANTAGE:  NFC requires additional hardware and has been supported by only a few smart phone platforms on the market.
  • 3.  NFC is subject to security vulnerabilities such as eavesdropping and jamming.  The threat of such key loggers is pervasive and can be present both in personal computers and public kiosks.  Even worse, key loggers, often root kitted, are hard to detect since they will not show up in the task manager process list.  Lack of accuracy. It is very burden to Users. PROPOSED SYSTEM: Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption – almost every camera-enabled smart phone can read and process 2D barcodes. As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification. For instance, PayPal recently rolled out a barcode-based payment service for retail customers. As one of the most anticipated new features of I Phone 5, the Passbook App stores tickets, coupons, and gift/loyalty cards using barcodes. Proposes an iterative Increment Constrained Least Squares filter method for certain 2D matrix bar codes within a Gaussian blurring ersatz. In particular, they use the L-shaped finder pattern of their codes to estimate the standard deviation of the Gaussian PSF, and then restore the image by successively implementing a bi-level constraint, our approach to solving the problem is to introduce an intermediate device that bridges a human user and a terminal. Then, instead of the user directly invoking the regular authentication protocol, she invokes a more sophisticated but user-friendly protocol via the intermediate helping device. Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code. The goal is to keep user-experience the same as in legacy authentication methods as much as possible, while preventing key logging attacks.
  • 4. ADVANTAGE:  Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications.  As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification.  Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code.  Preventing key logging attacks. ARCHITECHTURAL DIAGRAM:
  • 5. MODULES: The SBVLC application consists of two modules .They are:  User.  Banker. USER: The User module consists of two categories. They are  Go for shopping.  Pay bill. Go for shopping: In the go for shopping, user can choose the product and to get the password he/she has to enter the bank and card details. And has to send the details to the banker the banker verify all the details and prepare password for the user and send it to him through mail. Pay bill: In the pay bill, the user will scan the QR code sent by the banker and gets the password and use that password to claim his purchase, if the details matches with the banker details, the purchase will be successful. BANKER: The Banker module consists of two categories. They are  Create QR.
  • 6.  Send password as QR. Create QR: In the create QR code category the banker will check for purchase request from the user and verify the user details and prepare a password in the form of QR code to him through mail service. Send password as QR: In this send password category, the banker will send the QR code to the user through mail service, where the QR code can get from the gallery which is stored in the SD card by the create password category .The banker will send the QR code as a attachment to the user. From where the user can download and can scan it to get the password. ALGORITHM AND TECHNIQUES:
  • 7. SYSTEM SPECIFICATION: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 14’ Colour Monitor.  Mouse : Optical Mouse.  Ram : 512 Mb.
  • 8. SOFTWARE REQUIREMENTS:  Operating system : Windows 7 Ultimate.  Coding Language : Java.  Front-End : Eclipse.  Data Base : SQLite Manger. CONCLUSION: As an alternative to NFC, 2D barcodes have been increasingly used for security- sensitive applications including mobile payments and personal identification. Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications. As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification. Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code. Preventing key logging attacks. Thus in our project password hacking, key logging and eavesdropping issues will be overcome.