Untitled Document
You are from : ( )  
Untitled Document
Untitled Document

International Journal of Information Technology & Computer Science ( IJITCS )

Abstract :

In this paper the author present a new  technique of using QR Codes (commonly known as ‘Quick Respond Codes’) in the field of Cryptography. QR Codes  are mainly used to convey or store messages because they have higher or large storage capacity than any other  normal conventional ‘barcodes’. In this paper the primary  focus will be on storing messages in encrypted format with  a password and send it to the required destination hiding  in a QR Code, without being tracked or decrypted  properly by any hacker or spyware. Since QR Codes have  fast response time and have large storage capacity, QR  Codes can be used perfectly to send encrypted data (messages) to the receiver. This method will be suitable in any business house, government sectors, communication  network to send their encrypted messages faster to the  destination. Or a person can even use this method to keep  his important documents, like passport number, pan-card  id, social security number, perfectly secured with him all  the time, without the information getting leaked to outside  world. The new method is achieved by entering the  message along with a password. This password will  generate a secret code, which will be added to each digit or  alphabet in the numbers or text entered in the message  (which is needed to be encrypted) and generate the first  phase of encryption. That newly generated encrypted  message will again be encrypted using various other  methods to generate the final encrypted message.  QR Code; Crytography; Data Hiding; encryption;  decryption; code generation (key words).

Keywords :

: Not available ...

References :

  1. H. S. Al-Khalifa. Utilizing qr code and mobile phones for blinds and  visually impaired people. In ICCHP, pages 1065–1069, 2008.
  2. A. Alapetite. Dynamic 2d-barcodes for multi-device web session  migration including mobile phones. Personal and Ubiquitous   Computing, 14(1):45–52, 2010.
  3. R. Bose and D. Ray-Chaudhuri. On a class of error correcting binary  group codes*. Information and control, 3(1):68–79, 1960.
  4. M. Canadi, W. Ho ̈pken, and M. Fuchs. Application of qr codes in online  travel distribution. In ENTER, pages 137–148, 2010.
  5. J. Z. Gao, H. Veeraragavathatham, S. Savanur, and J. Xia. A 2d-barcode  based mobile advertising solution.  In SEKE, pages 466–472, 2009.
  6. Hocquenghem. Codes correcteurs daˆA ̆Z ́erreurs. Chiffres, 2(147-  156):4, 1959.
  7. Y.-P. Huang, Y.-T. Chang, and F. E. Sandnes. Ubiquitous information  transfer across different platforms by qr codes. J. Mobile Multimed   6(1):3–14, 2010.
  8. ISO 16022:2006. Data Matrix bar code symbology specification. ISO,  Geneva, Switzerland.
  9. ISO 18004:2006. QR Code bar code symbology specification. ISO,  Geneva, Switzerland.
  10. ISO 24778:2008. Aztec Code bar code symbology specification. ISO,  Geneva, Switzerland.
  11. S. Lisa and G. Piersantelli. Use of 2d barcode to access multimedia  content and the web from a mobile handset. In GLOBECOM, pages  5594–5596, 2008.
  12. Reed and G. Solomon. Polynomial codes over certain finite fields.  Journal of the Society for Industrial and Applied Mathematics,  8(2):300–304, 1960.
  13. "QR Code, Wikipedia", http://en.wikipedia.org/wiki/QR_code  [Retrieved 2012-02-09]
  14. "ZXING- QR Code Library ", http://code.google.com/p/zxing/  [Retrieved 2012-02- 09]
  15. "2D Code", http://www.denso- wave.com/qrcode/index-e.html  [Retrieved 2012-02- 09]
  16. "Malicious QR Code", http://www.abc.net.au/technology/articles/2011/06/08/ 3238443.htm  [Retrieved 2012-02-09]
  17. "QR Code", http://www.tecit.com/en/support/knowbase/symbologies/qrcode/Defa ult.aspx [Retrieved 2012-02-09]
  18. "Reed-Solomon and Bose - Chaudhuri- Hocquenghem  Code ",http://www.berndfriedrichs.de/downloads_ecc/ ecc2010_ch08.pdf  [Retrieved 2012-02-09]

Untitled Document
Untitled Document
  Copyright © 2013 IJITCS.  All rights reserved. IISRC® is a registered trademark of IJITCS Properties.