SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
DOI:10.5121/acij.2016.7201 1
DATA SECURITY THROUGH QR CODE
ENCRYPTION AND STEGANOGRAPHY
M. Mary Shanthi Rani1
, K.Rosemary Euphrasia2
1
Dept. of Comp. Sci. and Applications, Gandhigram Rural Institute, Deemed
University Gandhigram, TamilNadu. India.
2
Department of computer Sci., Fatima College, Madurai, TamilNadu. India.
Abstract
The art of information hiding has become an important issue in the recent years as security of information
has become a big concern in this internet era. Cryptography and Steganography play major role for
secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover
medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are
2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and
horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for
secret communication by combining the concepts of Steganography and QR codes. The suggested method
includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii)
Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it
will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate
(BER). Experimental result shows that the proposed method has high imperceptibility, integrity and
security..
Keywords
Steganography, QR code, BER
1. INTRODUCTION
Cryptography, Steganography and Watermarking techniques can be used to obtain security,
secrecy, privacy and authenticity of data. Cryptography encrypts the message and makes it
unreadable and unintelligent form called cipher. Steganography hides the data in a medium such
as text file, image, audio, video etc., and conceals the very existence of the message in the
medium. QR code is a two dimensional bar code capable of encoding different types of data like
binary, numeric, alphanumeric, Kanji and control code. A piece of long multilingual text, a linked
URL, an automated SMS message, a business card or just about any information can be
embedded into the QR code.
QR codes (Quick Response codes) were introduced in 1994 by Denso-Wave, a Japanese company
subsidiary of Toyota. Initially, these codes where conceived as a quick way to keep track of
vehicle parts, being nowadays extremely popular in Asian countries like Japan, South Korea,
China or Taiwan and becoming more and more popular in western countries by the day. [1] QR
codes are capable of encoding the data both in horizontal and vertical direction, thus able to
encode several times more data than the bar codes. The following table shows the maximum
number of characters encoded in a QR code (version 40) with and minimum error correcting level
L:
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
2
Table 1. Capacity of QR codes
Fig.1 shows a QR code and Error Correction (EC) levels. [2] The technology of QR codes has
proved out to be successful even if the code is partially damaged. This is feasible due to the error
correction in QR codes, which is based on the Reed-Salomon Codes .There are four levels of
error correction; Low (L) which can tolerate up to 7% damage, Medium (M) can tolerate up to
15% damage, Quartile (Q) can tolerate up to 25% damage and High (H) can tolerate up to 30%
damage . The reason why the Low (L) error correction level is preferred is that the High error
correction levels raise the percentage of code word used in error correction thereby decreasing the
amount of data that can be stored in the code [3]. The black and white modules of the QR codes
comprise of the encoded data. This information isn’t present in human readable form hence an
individual cannot anticipate the information. Any smart phone with built-in camera can capture
the image of the encoded QR Code and then decode the data present in it.
Figure 1: QR code and EC levels
The advantages of steganography and QR codes are taken into consideration for this proposed
algorithm to enhance data security.
This paper is organized as follows. Section 2 reviews the works related to applications and
security of QR codes, Section 3 presents the proposed scheme and Section 4 reports the
experimental results and discussions. Finally, conclusions appear in Section 5.
2. RELATED WORK
Apart from Steganography, Cryptography and Visual Cryptography techniques QR codes could
also be used for secured data communication. QR codes are generated by the combining visual
cryptography and steganography. These QR codes are used for variety of applications like Secret
communication, Copyright protection, Marketing, Business, and Education etc. Ching-yin Law
& Simon So illustrate the usage of QR codes in education. They carried out some experiments
and elucidate the potential of QR codes in education. Since any smart phone with built-in camera
can capture the image of the QR Code and decode the information, security and secrecy become
an important issue [4]. Shruti Ahuja did a literature survey regarding QR codes and security
concerns and suggested few ideas. Since it is easy to modify the content stored in the 2-D code,
the author advised the users to verify authenticity of the QR codes [5]. Akshara Gaikwad et al
proposed a method to embed QR codes into colour images based on the luminance of the QR
codes[6]. In this method the luminance of the colour image is decreased after embedding the QR
codes. Dipika Sonawane et. al. suggest a method for authentication by creating OTP using QR
codes instead of using conventional methods such as ID/Password[7].
S.No. Data Type Characters
1 Numeric data 7,089
2 Alphanumeric data 4,296
3 8-bit byte data 2,953
4 Kanji data 1,817
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
3
All the above said suggestions and methods are reviewed and a new method is proposed in this
paper for secret data communication by integrating the QR code encryption with steganography
technique.
3. PROPOSED WORK
A QR code generator encrypts the given message into QR codes which could not be read or
understood by human beings. But the message hidden in these QR codes can be easily decoded
by any smart phone with built in camera. In order keep the message secret and to protect it from
unauthorised access a new method is suggested by merging QR codes with Steganography
technique. The proposed method encompasses an encoding process at the sender and a decoding
process at the receiver.
3.1 Encoding Process:
The encoding process involves encryption of the secret message into QR codes followed by
embedding the QR codes in a colour image as shown in Fig. 2. The steps involved in this process
are
1. Select the secret message.
2. Encode it into a QR code using any QR code generator ([8]www.the-qrcode-
generator.com)
3. Read a colour image and embed the quantised bits of the QR codes in the pixels of the
colour image using LSB substitution method.
4. Save the stego image.
Figure 2 : Encoding Process Figure 3: Decoding Process
A steganography technique must give guarantee for visual imperceptibility. In order to obtain
this and to minimize the amount of changes in the luminance of the colour image, the QR code is
quantised and the quantised QR code is embedded in the colour image. A QR code consists of
matrix of black and white patterns. In this proposed method these patterns are represented by
single bits 0 and 1which in turn reduce the number bits to be embedded at large extent. Thus the
embedding of a QR code in an image will create very minimum visible distortion which is not
visible through naked eye.
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
4
3.2 Decoding Process :
The decoding process involves exraction of QR code form the stego image and reading the secret
message from the QR code as shown in Fig.3. The steps involved in this process are
1. Select the stego image.
2. Extract the quantised bits of the QR code from the stego image.
3. Dequantise the bits into QR code.
4. Using any QR code scanner scan the secret message from the QR code. ( [9]
Zxing”online coder/Decoder”)
The proposed method has been tested with various QR codes with messages of different sizes.
The secret message extracted is exactly same as the original hidden message. The results of these
tests are discussed in the following section.
4.RESULTS AND ANALYSIS
The proposed system makes use of the advantages of QR codes and Steganography to enhance
data security. In this algorithm the secret message is encoded into QR codes using QR code
generator (www.the-qrcode-generator.com). An algorithm is written in Java to embed the QR
code in a colour image. This algorithm is tested with sample secret message of different sizes
(100 bytes to 800 bytes) and the result is shown in Figure 4. The diagram shows that the pattern
and the complexity of the QR code differ according to the size of the message encrypted. The
complexity of the QR pattern will increase when huge amount of data is encrypted.
Figure 4: Results of Encoding Process
Some of the salient features of this work is analysed and listed below.
4.1 Imperceptibility
The most important criteria which must be met by any data embedding algorithm is
imperceptibility. [9] It is evaluated by MSE (Mean Square Error) and PSNR (Peak Signal to
Noise Ratio) values. High value of PSNR indicates high degree of imperceptibility.
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
5
Mean Square Error (MSE)
The MSE represents the average of the squares of the "errors" between our actual image and our
stego image. The error is the amount by which the values of the original image differ from the
degraded image.
Where
f represents the matrix data of our original image
g represents the matrix data of our stego image
m represents the numbers of rows of pixels of the images and i represents the index of that row
n represents the number of columns of pixels of the image and j represents the index of that
column
Peak Signal to Noise Ratio (PSNR)
The PSNR in decibels is computed between the cover image and the stego image. This ratio is
often used as a quality measurement between the original and the stego image. The higher the
PSNR, lesser is the difference between the cover image and the stego image.
MAXf is the maximum signal value that exists in the cover image. The PSNR and MSE are
calculated for the proposed algorithm after hiding the QR codes generated with secret messages
of different sizes in the same image 9baboon) and are tabulated in Table 2. The value of PSNR is
almost same and is equal to 52.6 which signposts high degree of imperceptibility. This shows the
closeness of original and the stego images.
Table 2. PSNR and BER
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
6
4.2 Bit Error Rate
The Bit Error Rate is the ratio of number of bits affected due to hiding of secret message to the
total number of bits in the cover image. Table 2 shows the BER calculated after hiding the QR
codes with different sized messages in an image (baboon) using the proposed algorithm and one
can see that BER is very minimum (.32% only). This minimum value shows that due to
embedding of QR codes only a small number of bits have been changed from the original value.
4.3. Bi-level Security
It provides two levels of security to the information being transmitted as shown in Fig. 5.
• The secret message is encrypted using QR code generator. The QR code consists of
matrix of Black and White Pixels which is not readable by human beings.
• But the hidden message inside the QR codes can be scanned by any smart phone with
built-in camera. In order to prevent this QR code is hidden inside a colour image.
Because of this the intruders cannot easily break the system and read the message. Thus it
provides two level of security for the secret message.
Figure 5: Bi-level Security
4.4 Message Integrity
A security algorithm is considered as an efficient one if the receiver is able to extract the exact
message that was hidden and sent. In this suggested algorithm the secret message is encoded
using a standard QR code generator (Zxing Encoder) and the QR code is hidden in the spatial
domain of the image and no transformations are applied and so the message retrieved in the
extraction process is exactly the same as the hidden message. Thus this method assures data
integrity.
4.5 Histogram
Histogram is a display of statistical information to show the frequency of data items in successive
numerical intervals of equal size. The following histograms are drawn between pixel value
verses number of pixels. The histograms generated before and after hiding the QR codes of size
(200 × 200) 6.13 KB in a 512 × 512 colour image and are shown in Fig. 6. It reveals that only
very few pixel values are changed by hiding the QR codes in the cover image.
Figure 6: Comparison of histograms of
cover and stego images
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
7
5.CONCLUSION
QR codes can be used for various applications such as business, marketing, education, data
security, authentication etc. In this paper a novel method is suggested for data security using QR
codes and steganography. Message encrypted in a QR code can be read easily by any QR code
scanner. But since the proposed method incorporates steganography, it enhances the
confidentiality and security. Similar work could be done in future using colour QR codes so that
more information can be encrypted and sent secretly.
REFERENCES
[1] Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June 2013, Norwegian
University of Science and Technology
[2] Kinjal H. Pandyaand Hiren J. Galiyawala, 2014.” A Survey on QR Codes: in context of Research and
Application”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4 Issue
3.,pp. 258-262Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June
2013, Norwegian University of Science and Technology
[3] QRStuff. QR Code Error Correction, 2011. QRStuff blog:http://www.qrstuff.Com
/blog/2011/12/14/QR-code-error-correction.
[4] Law, C. & So, S., 2010. “QR codes in education. Journal of Educational Technology Development
and Exchange”, Vol. 3 Issue 1, pp. 85-100
[5] Shruti Ahuja, 2014. ” QR Codes and Security Concerns”, International Journal of International
Journal of Computer Science and Information Technologies, Vol. 5 Issue 3 pp. 3878-3879
[6] Akshara Gaikwad et al, 2015. “Information Hiding using Image Embedding in QRCodes for Colour
Images: A Review”, International Journal of Computer Science and Information Technologies, Vol. 6
Issue 1,pp. 278-283
[7] Dipika Sonawane et al., 2014. “QR based Advanced authentication for all hardware platforms
“International Journal of Scientific and Research Publications, Vol. 4(1) pp.1-4
[8] www. The-qrcode-generator.com
[9] ZXing, “Decoder Online,” 2011, http://zxing.org/w/decode.jspx
[10] M. Mary Shanthi Rani and K.Rosemary Euphrasia, 2015. “Dynamic Hiding of Message in RGB
Domain based on Random Channel Indicator”, International Journal of Applied Engineering
Research, Vol.10 No.76., pp. 478-483
Authors
Dr.M. Mary Shanthi Rani, a NET qualified Assistant Professor in the Department of
Computer Science and Applications, Gandhigram Rural Institute (Deemed
University),Gandhigram has twelve years of teaching and eight years of research
experience as well. She has nearly twenty publications in International Journals and
Conferences. Her research areas of interest are Image Compression, Information
Security, Ontology, Biometrics and Computational Biology. She has authored a book
titled “Novel Image Compression Methods Based on Vector Quantization” and is one of
the editors of Conference Proceedings “Recent Advances in Computer Science and Applications”. She has
served in various academic committees in designing the curriculum for B.Sc. and M.C.A courses as well.
She has also served as reviewer of Peer-reviewed International Journals and Conferences and is a Life
member of Indian Society for Technical Education. She has the credit of being the Associate Project
Director of UGC Indo-US 21st
Knowledge Initiative Project.
Ms. K.Rosemary Euphrasia Associate Professor in Computer Science, Fatima College,
Madurai. She received B.Sc., and M.Sc., degrees in Physics and M.Phil. degree in
Computer science. She has 20 years of teaching experience in computer science. She is
now studying towards her Ph.D. degree in Computer science at Gandhigram Rural
Institute – Deemed University, Gandhigram, Tamilnadu, India. Her area of research is
information security through video steganography.

Contenu connexe

Tendances

Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Rohan Sawant
 
Qr code ppt 23 sep 11
Qr code  ppt 23 sep 11Qr code  ppt 23 sep 11
Qr code ppt 23 sep 11tedchee
 
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Jishnu Mandal
 
QR Codes: A Point of View
QR Codes: A Point of ViewQR Codes: A Point of View
QR Codes: A Point of ViewBBDO
 
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.RobbySahoo
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingSnehith
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Likan Patra
 
QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing Hasini Weerathunge
 
QR Code Mini Workshop
QR Code Mini WorkshopQR Code Mini Workshop
QR Code Mini WorkshopGSW
 

Tendances (20)

QR code
QR codeQR code
QR code
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
Qr code ppt 23 sep 11
Qr code  ppt 23 sep 11Qr code  ppt 23 sep 11
Qr code ppt 23 sep 11
 
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
 
QR Codes: A Point of View
QR Codes: A Point of ViewQR Codes: A Point of View
QR Codes: A Point of View
 
Qr codes
Qr codesQr codes
Qr codes
 
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.
 
Qr codes
Qr codesQr codes
Qr codes
 
15 Cool QR Code Things
15 Cool QR Code Things15 Cool QR Code Things
15 Cool QR Code Things
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
QR-CODE presentation slide
QR-CODE presentation slideQR-CODE presentation slide
QR-CODE presentation slide
 
What is a QR Code?
What is a QR Code?What is a QR Code?
What is a QR Code?
 
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online banking
 
Qr code power point
Qr code power pointQr code power point
Qr code power point
 
QR codes
QR codesQR codes
QR codes
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing
 
QR Code Mini Workshop
QR Code Mini WorkshopQR Code Mini Workshop
QR Code Mini Workshop
 
&^^&
&^^&&^^&
&^^&
 

En vedette

QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationZachary Moore
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Steve Werby
 
Features for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing EnvironmentsFeatures for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing EnvironmentsIJEACS
 
Signature verification
Signature verificationSignature verification
Signature verificationNAVEEN TOKAS
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystemsdmc5abdulla
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
QR Codes for Fun & Profit
QR Codes for Fun & ProfitQR Codes for Fun & Profit
QR Codes for Fun & ProfitRun2LIVE, Inc.
 
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...n|u - The Open Security Community
 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsSri Madhur
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesArshadRaja786
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Mohamed Loey
 
20 Interesting Things: QR Codes
20 Interesting Things: QR Codes20 Interesting Things: QR Codes
20 Interesting Things: QR CodesDavid Stutts
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transformpiyush_11
 

En vedette (20)

QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint Presentation
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
 
Qrcodes
QrcodesQrcodes
Qrcodes
 
Decoding QR codes
Decoding QR codesDecoding QR codes
Decoding QR codes
 
Features for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing EnvironmentsFeatures for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing Environments
 
Signature verification
Signature verificationSignature verification
Signature verification
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
QR Codes for Fun & Profit
QR Codes for Fun & ProfitQR Codes for Fun & Profit
QR Codes for Fun & Profit
 
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning Techniques
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
QR Codes: What, Why, How & Where
QR Codes: What, Why, How & WhereQR Codes: What, Why, How & Where
QR Codes: What, Why, How & Where
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
20 Interesting Things: QR Codes
20 Interesting Things: QR Codes20 Interesting Things: QR Codes
20 Interesting Things: QR Codes
 
Steganography
Steganography Steganography
Steganography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
 

Similaire à DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY

Iris images encryption based on QR code and chaotic map
Iris images encryption based on QR code and chaotic mapIris images encryption based on QR code and chaotic map
Iris images encryption based on QR code and chaotic mapTELKOMNIKA JOURNAL
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodecsandit
 
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET Journal
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharingijcisjournal
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...IRJET Journal
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationIRJET Journal
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET Journal
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr CodeIRJET Journal
 
IRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data HidingIRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data HidingIRJET Journal
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...IRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
Increasing data storage of coloured QR code using compress, multiplexing and ...
Increasing data storage of coloured QR code using compress, multiplexing and ...Increasing data storage of coloured QR code using compress, multiplexing and ...
Increasing data storage of coloured QR code using compress, multiplexing and ...journalBEEI
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesEditor IJCATR
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtIAEME Publication
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaIRJET Journal
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...IRJET Journal
 

Similaire à DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY (20)

Iris images encryption based on QR code and chaotic map
Iris images encryption based on QR code and chaotic mapIris images encryption based on QR code and chaotic map
Iris images encryption based on QR code and chaotic map
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
 
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharing
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
 
CryptoQR System based on RSA
CryptoQR System based on RSACryptoQR System based on RSA
CryptoQR System based on RSA
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
IRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data HidingIRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data Hiding
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
Increasing data storage of coloured QR code using compress, multiplexing and ...
Increasing data storage of coloured QR code using compress, multiplexing and ...Increasing data storage of coloured QR code using compress, multiplexing and ...
Increasing data storage of coloured QR code using compress, multiplexing and ...
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwt
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in India
 
Qr codes web
Qr codes webQr codes web
Qr codes web
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
 

Plus de acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

Plus de acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY

  • 1. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 DOI:10.5121/acij.2016.7201 1 DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY M. Mary Shanthi Rani1 , K.Rosemary Euphrasia2 1 Dept. of Comp. Sci. and Applications, Gandhigram Rural Institute, Deemed University Gandhigram, TamilNadu. India. 2 Department of computer Sci., Fatima College, Madurai, TamilNadu. India. Abstract The art of information hiding has become an important issue in the recent years as security of information has become a big concern in this internet era. Cryptography and Steganography play major role for secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are 2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for secret communication by combining the concepts of Steganography and QR codes. The suggested method includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii) Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate (BER). Experimental result shows that the proposed method has high imperceptibility, integrity and security.. Keywords Steganography, QR code, BER 1. INTRODUCTION Cryptography, Steganography and Watermarking techniques can be used to obtain security, secrecy, privacy and authenticity of data. Cryptography encrypts the message and makes it unreadable and unintelligent form called cipher. Steganography hides the data in a medium such as text file, image, audio, video etc., and conceals the very existence of the message in the medium. QR code is a two dimensional bar code capable of encoding different types of data like binary, numeric, alphanumeric, Kanji and control code. A piece of long multilingual text, a linked URL, an automated SMS message, a business card or just about any information can be embedded into the QR code. QR codes (Quick Response codes) were introduced in 1994 by Denso-Wave, a Japanese company subsidiary of Toyota. Initially, these codes where conceived as a quick way to keep track of vehicle parts, being nowadays extremely popular in Asian countries like Japan, South Korea, China or Taiwan and becoming more and more popular in western countries by the day. [1] QR codes are capable of encoding the data both in horizontal and vertical direction, thus able to encode several times more data than the bar codes. The following table shows the maximum number of characters encoded in a QR code (version 40) with and minimum error correcting level L:
  • 2. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 2 Table 1. Capacity of QR codes Fig.1 shows a QR code and Error Correction (EC) levels. [2] The technology of QR codes has proved out to be successful even if the code is partially damaged. This is feasible due to the error correction in QR codes, which is based on the Reed-Salomon Codes .There are four levels of error correction; Low (L) which can tolerate up to 7% damage, Medium (M) can tolerate up to 15% damage, Quartile (Q) can tolerate up to 25% damage and High (H) can tolerate up to 30% damage . The reason why the Low (L) error correction level is preferred is that the High error correction levels raise the percentage of code word used in error correction thereby decreasing the amount of data that can be stored in the code [3]. The black and white modules of the QR codes comprise of the encoded data. This information isn’t present in human readable form hence an individual cannot anticipate the information. Any smart phone with built-in camera can capture the image of the encoded QR Code and then decode the data present in it. Figure 1: QR code and EC levels The advantages of steganography and QR codes are taken into consideration for this proposed algorithm to enhance data security. This paper is organized as follows. Section 2 reviews the works related to applications and security of QR codes, Section 3 presents the proposed scheme and Section 4 reports the experimental results and discussions. Finally, conclusions appear in Section 5. 2. RELATED WORK Apart from Steganography, Cryptography and Visual Cryptography techniques QR codes could also be used for secured data communication. QR codes are generated by the combining visual cryptography and steganography. These QR codes are used for variety of applications like Secret communication, Copyright protection, Marketing, Business, and Education etc. Ching-yin Law & Simon So illustrate the usage of QR codes in education. They carried out some experiments and elucidate the potential of QR codes in education. Since any smart phone with built-in camera can capture the image of the QR Code and decode the information, security and secrecy become an important issue [4]. Shruti Ahuja did a literature survey regarding QR codes and security concerns and suggested few ideas. Since it is easy to modify the content stored in the 2-D code, the author advised the users to verify authenticity of the QR codes [5]. Akshara Gaikwad et al proposed a method to embed QR codes into colour images based on the luminance of the QR codes[6]. In this method the luminance of the colour image is decreased after embedding the QR codes. Dipika Sonawane et. al. suggest a method for authentication by creating OTP using QR codes instead of using conventional methods such as ID/Password[7]. S.No. Data Type Characters 1 Numeric data 7,089 2 Alphanumeric data 4,296 3 8-bit byte data 2,953 4 Kanji data 1,817
  • 3. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 3 All the above said suggestions and methods are reviewed and a new method is proposed in this paper for secret data communication by integrating the QR code encryption with steganography technique. 3. PROPOSED WORK A QR code generator encrypts the given message into QR codes which could not be read or understood by human beings. But the message hidden in these QR codes can be easily decoded by any smart phone with built in camera. In order keep the message secret and to protect it from unauthorised access a new method is suggested by merging QR codes with Steganography technique. The proposed method encompasses an encoding process at the sender and a decoding process at the receiver. 3.1 Encoding Process: The encoding process involves encryption of the secret message into QR codes followed by embedding the QR codes in a colour image as shown in Fig. 2. The steps involved in this process are 1. Select the secret message. 2. Encode it into a QR code using any QR code generator ([8]www.the-qrcode- generator.com) 3. Read a colour image and embed the quantised bits of the QR codes in the pixels of the colour image using LSB substitution method. 4. Save the stego image. Figure 2 : Encoding Process Figure 3: Decoding Process A steganography technique must give guarantee for visual imperceptibility. In order to obtain this and to minimize the amount of changes in the luminance of the colour image, the QR code is quantised and the quantised QR code is embedded in the colour image. A QR code consists of matrix of black and white patterns. In this proposed method these patterns are represented by single bits 0 and 1which in turn reduce the number bits to be embedded at large extent. Thus the embedding of a QR code in an image will create very minimum visible distortion which is not visible through naked eye.
  • 4. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 4 3.2 Decoding Process : The decoding process involves exraction of QR code form the stego image and reading the secret message from the QR code as shown in Fig.3. The steps involved in this process are 1. Select the stego image. 2. Extract the quantised bits of the QR code from the stego image. 3. Dequantise the bits into QR code. 4. Using any QR code scanner scan the secret message from the QR code. ( [9] Zxing”online coder/Decoder”) The proposed method has been tested with various QR codes with messages of different sizes. The secret message extracted is exactly same as the original hidden message. The results of these tests are discussed in the following section. 4.RESULTS AND ANALYSIS The proposed system makes use of the advantages of QR codes and Steganography to enhance data security. In this algorithm the secret message is encoded into QR codes using QR code generator (www.the-qrcode-generator.com). An algorithm is written in Java to embed the QR code in a colour image. This algorithm is tested with sample secret message of different sizes (100 bytes to 800 bytes) and the result is shown in Figure 4. The diagram shows that the pattern and the complexity of the QR code differ according to the size of the message encrypted. The complexity of the QR pattern will increase when huge amount of data is encrypted. Figure 4: Results of Encoding Process Some of the salient features of this work is analysed and listed below. 4.1 Imperceptibility The most important criteria which must be met by any data embedding algorithm is imperceptibility. [9] It is evaluated by MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio) values. High value of PSNR indicates high degree of imperceptibility.
  • 5. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 5 Mean Square Error (MSE) The MSE represents the average of the squares of the "errors" between our actual image and our stego image. The error is the amount by which the values of the original image differ from the degraded image. Where f represents the matrix data of our original image g represents the matrix data of our stego image m represents the numbers of rows of pixels of the images and i represents the index of that row n represents the number of columns of pixels of the image and j represents the index of that column Peak Signal to Noise Ratio (PSNR) The PSNR in decibels is computed between the cover image and the stego image. This ratio is often used as a quality measurement between the original and the stego image. The higher the PSNR, lesser is the difference between the cover image and the stego image. MAXf is the maximum signal value that exists in the cover image. The PSNR and MSE are calculated for the proposed algorithm after hiding the QR codes generated with secret messages of different sizes in the same image 9baboon) and are tabulated in Table 2. The value of PSNR is almost same and is equal to 52.6 which signposts high degree of imperceptibility. This shows the closeness of original and the stego images. Table 2. PSNR and BER
  • 6. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 6 4.2 Bit Error Rate The Bit Error Rate is the ratio of number of bits affected due to hiding of secret message to the total number of bits in the cover image. Table 2 shows the BER calculated after hiding the QR codes with different sized messages in an image (baboon) using the proposed algorithm and one can see that BER is very minimum (.32% only). This minimum value shows that due to embedding of QR codes only a small number of bits have been changed from the original value. 4.3. Bi-level Security It provides two levels of security to the information being transmitted as shown in Fig. 5. • The secret message is encrypted using QR code generator. The QR code consists of matrix of Black and White Pixels which is not readable by human beings. • But the hidden message inside the QR codes can be scanned by any smart phone with built-in camera. In order to prevent this QR code is hidden inside a colour image. Because of this the intruders cannot easily break the system and read the message. Thus it provides two level of security for the secret message. Figure 5: Bi-level Security 4.4 Message Integrity A security algorithm is considered as an efficient one if the receiver is able to extract the exact message that was hidden and sent. In this suggested algorithm the secret message is encoded using a standard QR code generator (Zxing Encoder) and the QR code is hidden in the spatial domain of the image and no transformations are applied and so the message retrieved in the extraction process is exactly the same as the hidden message. Thus this method assures data integrity. 4.5 Histogram Histogram is a display of statistical information to show the frequency of data items in successive numerical intervals of equal size. The following histograms are drawn between pixel value verses number of pixels. The histograms generated before and after hiding the QR codes of size (200 × 200) 6.13 KB in a 512 × 512 colour image and are shown in Fig. 6. It reveals that only very few pixel values are changed by hiding the QR codes in the cover image. Figure 6: Comparison of histograms of cover and stego images
  • 7. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 7 5.CONCLUSION QR codes can be used for various applications such as business, marketing, education, data security, authentication etc. In this paper a novel method is suggested for data security using QR codes and steganography. Message encrypted in a QR code can be read easily by any QR code scanner. But since the proposed method incorporates steganography, it enhances the confidentiality and security. Similar work could be done in future using colour QR codes so that more information can be encrypted and sent secretly. REFERENCES [1] Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June 2013, Norwegian University of Science and Technology [2] Kinjal H. Pandyaand Hiren J. Galiyawala, 2014.” A Survey on QR Codes: in context of Research and Application”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4 Issue 3.,pp. 258-262Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June 2013, Norwegian University of Science and Technology [3] QRStuff. QR Code Error Correction, 2011. QRStuff blog:http://www.qrstuff.Com /blog/2011/12/14/QR-code-error-correction. [4] Law, C. & So, S., 2010. “QR codes in education. Journal of Educational Technology Development and Exchange”, Vol. 3 Issue 1, pp. 85-100 [5] Shruti Ahuja, 2014. ” QR Codes and Security Concerns”, International Journal of International Journal of Computer Science and Information Technologies, Vol. 5 Issue 3 pp. 3878-3879 [6] Akshara Gaikwad et al, 2015. “Information Hiding using Image Embedding in QRCodes for Colour Images: A Review”, International Journal of Computer Science and Information Technologies, Vol. 6 Issue 1,pp. 278-283 [7] Dipika Sonawane et al., 2014. “QR based Advanced authentication for all hardware platforms “International Journal of Scientific and Research Publications, Vol. 4(1) pp.1-4 [8] www. The-qrcode-generator.com [9] ZXing, “Decoder Online,” 2011, http://zxing.org/w/decode.jspx [10] M. Mary Shanthi Rani and K.Rosemary Euphrasia, 2015. “Dynamic Hiding of Message in RGB Domain based on Random Channel Indicator”, International Journal of Applied Engineering Research, Vol.10 No.76., pp. 478-483 Authors Dr.M. Mary Shanthi Rani, a NET qualified Assistant Professor in the Department of Computer Science and Applications, Gandhigram Rural Institute (Deemed University),Gandhigram has twelve years of teaching and eight years of research experience as well. She has nearly twenty publications in International Journals and Conferences. Her research areas of interest are Image Compression, Information Security, Ontology, Biometrics and Computational Biology. She has authored a book titled “Novel Image Compression Methods Based on Vector Quantization” and is one of the editors of Conference Proceedings “Recent Advances in Computer Science and Applications”. She has served in various academic committees in designing the curriculum for B.Sc. and M.C.A courses as well. She has also served as reviewer of Peer-reviewed International Journals and Conferences and is a Life member of Indian Society for Technical Education. She has the credit of being the Associate Project Director of UGC Indo-US 21st Knowledge Initiative Project. Ms. K.Rosemary Euphrasia Associate Professor in Computer Science, Fatima College, Madurai. She received B.Sc., and M.Sc., degrees in Physics and M.Phil. degree in Computer science. She has 20 years of teaching experience in computer science. She is now studying towards her Ph.D. degree in Computer science at Gandhigram Rural Institute – Deemed University, Gandhigram, Tamilnadu, India. Her area of research is information security through video steganography.