Visual Cryptography using QR Code

Authors

  • Dr. M Sandhya Rani  Associate Professor, Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • M. Akhila  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • H. Eshika  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India

Keywords:

Cryptography, Encrypt, Confidential, Secure, QR Code

Abstract

The QR code cryptography with a password and sends it to the required hiding the information QR code. Securing and hiding personal confidential information has become a challenge in these modern days. Due to the lack of security and confidentiality, there are chances that forgery of the confidential information or unauthorized access of a system can cause a big margin loss to a person or a system. At present, confidentiality is maintained in old ways and for that reason, there are possibilities that the confidential information might get forged or hacked. Personal confidential information can be securely shared with the expected person and the person can verify the information by checking its authenticity. Similarly, confidential information can also be kept securely hidden and used to meet a specific purpose like getting access privilege of a secured system and the system can validate the confidential information by checking whether the person is authorized or the information is valid. QR codes are being used increasingly to share data for different purposes. Information communication, QR code is important because of its high data capacity. However, most existing QR code systems use insecure data format and encryption is rarely used. A user can use secure QR code technology to keep information secured and hidden.

References

  1. Francisco Liébana-Cabanillas “User behaviour in QR mobile payment system: the QR Payment Acceptance Model” University of Granada, Granada, Spain, https://www.tandfonline.com/doi/abs/10.1080/09537325.2015.1047757?cookieSet=1
  2. SUEBTIMRAT, Panupong “User behaviour in QR mobile payment system” Graduation School of Business, Assumption University https://koreascience.kr/article/JAKO202100569464364.page
  3. Nishant Goel; Ajay Sharma; Sudhir Goswami” A way to secure a QR code:”, publisher: IEEE: https://ieeexplore.ieee.org/abstract/document/8229850
  4. I.J. Information Engineering and Electronic Business, 2022, 3, 10-18 “QR: Approaches for Beautified, Fast Decoding, and Secured QR Codes” Published Online June 2022 in MECS
  5. Li-Ya Yan.Kampar, Malaysia “QR code and mobile payment”, Universiti Tunku Abdul Rahman, Kampar, Malaysia: https://www.sciencedirect.com/science/article/abs/pii/S0969698920313084#!

Downloads

Published

2023-02-28

Issue

Section

Research Articles

How to Cite

[1]
Dr. M Sandhya Rani, M. Akhila, H. Eshika "Visual Cryptography using QR Code" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 10, Issue 1, pp.392-395, January-February-2023.