A Review on QR Code for Hiding Private Information

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 04 Issue: 07 | July -2017

p-ISSN: 2395-0072

www.irjet.net

A Review On QR Code For Hiding Private Information Mr.V.V.Panchal1, Mr.H.B.Torvi2 Department of Computer science and Engineering, V.V.P. Institute of Engineering and Technology, Solapur-413004. 2 Assistant Professor, Department of Computer Science and Engineering, V.V.P. Institute of Engineering and Technology, Solapur-413004. ---------------------------------------------------------------------***--------------------------------------------------------------------1

Abstract - The Quick Response (QR) a high speed reading application designed for storage of information. In this paper, we present a new rich QR code that has two storage levels. level one and level two The level one named a public level ,and level two named as private level. The public level is the same as the standard QR code storage level, therefore it is readable by any classical QR code application. The private level is constructed by replacing the black modules by specific textured patterns. It consists of information encoded using qary code with an error correction capacity. This allows us not only to improve the security of the QR code, but also increase the storage capacity of QR code and distinguish the original document from a copy.

DataMatrix [2], PDF417, are frequently used in our daily lives. These codes have a huge number of applications including: storage of information (advertising, museum art description), redirection to web link, phone number track and trace (for transportation tickets or brands), identification (flight passenger information, supermarket products) etc. Due to improving the reading speed of 2Dbarcodes get the name Quick Response (QR) Code.it is extension of 2D-barcode.it contains data for both horizontal and vertical dimension. The decoding speed of QR code can be 20 times faster than that of other 2D symbols.

Key Words: QR code, two storage levels, private message, data hiding, Watermark, Discrete Cosine Transform, Steganography and Image Fusion

[4] Robust Message Hiding for QR Code

1.INTRODUCTION The definition of information security given by National Institute of standard and Technology (NIST) says that,” The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.” integrity, which means guarding against improper information modification or destruction, and includes ensuring information non repudiation and authenticity ;confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and availability, which means ensuring timely and reliable access to and use of information. The term information forensics relating to the application of scientific methods and technique to the investigation of crime. For providing security to information, hiding the information in cryptographic from in an image [9]. Quick response Code (QR code) is widely used in daily life in recent years because it has high capacity encoding of data, damage resistance, fast decoding and other good characteristics. [5] QR code (quick response code) is a type of two dimensional barcode developed by Denso-Wave corporation in 1994 [1]. Todays, graphical codes, such as EAN-13 barcode [1], Quick Response (QR) code [3], © 2017, IRJET

|

Impact Factor value: 5.181

|

2. LITERATURE SURVEY

In [4], QR code is popular for exchange of secret information. The authors analyzed the properties of each QR code before embedding it in to this one. If they want to embed secret message into QR code, they will encode it first. After that, they exploit the structure of QR code which code they want to use. It takes time, risks and cannot get the secrete message directly from this QR code. The Lin et al proposed to hide secret message in to QR code is to use the error correction capability. First of all, they encode the secret message sm by using a shared key K and get EK(sm). After that, they embed each bit of EK(sm) into QR code. Their first drawback is that if any bit of EK(sm) is damaged, it is impossible to recover sm from QR code. The second drawback is that if an attacker does not change any bit of EK(sm) but adds some extra error values into QR code, they cannot recover their secret message. Their main contributions are to propose algorithms that hide a secret message into QR code. The secret message is invisible to attackers and secure against modification or damage attack. [5] Secret Hiding Mechanism Using QR Barcode In [5] this Paper, a new secret hiding mechanism for QR tag based on the property of QR code. The new scheme exploits the error correction capability to conceal the secret into a cover QR code. Along with the QR version and the error correction level, the designed algorithm can convey larger secret into a cover QR code directly. Besides, the content of the marked QR code is readable. That is, general browsers ISO 9001:2008 Certified Journal

|

Page 2357


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
A Review on QR Code for Hiding Private Information by IRJET Journal - Issuu