Skip to main content

A Survey On Secrete Communication Through QR Code Steganography For Military Application

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 09 Issue: 05 | May 2022

p-ISSN: 2395-0072

www.irjet.net

A Survey On Secrete Communication Through QR Code Steganography For Military Application Nikita Bhoskar1, Pradnya Ithape2, Bhagyashree Gavali3, Prof. Pradnya Kasture4 Department Of Computer Engineering, RMD Sinhgad School Of Engineering, Warje , Pune. ---------------------------------------------------------------------***------------------------------------------------------------------Abstract: The quick response code (QR) has become These attributes are mostly responsible for the popularity of most popular barcode because of its larger data capacity QR codes: and increased damage resistance. Barcode scanners can 1. QR code-resistant duplication technique easily extract information hidden in the QR code when scanning data forms. However, some confidential data 2. Any computer or person can be easily read. stored directly in QR codes are not secure in real world QR apps. To proposed approach to visual secret sharing 3. Bug fixes have improved its wide encoding capability. scheme to encode a secret QR code into distinct shares. In assessment with other techniques, the shares in proposed Another milestone in visual cryptography sharing. It scheme are valid QR codes that may be decoded with improves hidden image sharing to reproduce the secret's some unique that means of a trendy QR code reader, so complexity using human eye decoding. In contrast to that escaping increases suspicious attackers. An existing traditional cryptography, it has the advantages of sharing technique is subjected to loss of security. On this camouflage, secrecy, and simplicity of covert retrieval. The premise, consider the strategy for (k, n) get to structures visual encryption solution met the consumers' high security by using the (k, k) sharing occurrence on each k-member needs and protected them from a variety of security threats. subset dependent on specific relationship. In addition, the Making a motive for business applications is not difficult. secret message is recovered with the aid of XOR-ing the qualified shares .this operation which can effortlessly be II. LITERATURE SURVEY achieved the use of smartphones or different QR scanning gadgets. The paper [1] gives complete analysis of OR based and XOR based Visual Cryptography System and proves how XVCS Keywords: Partitioning Algorithm, Quick Response code, performs better than OVCS. The contrast obtained using visual secret sharing scheme, high security, error XVCS is higher than OVCS .The contrast of XVCS is 2ˆ ((k-1)) correction capacity. times greater than OVCS. The monotone property of OR operation degrades the visual quality of reconstructed image I. INTRODUCTION for OR-based VCS (OVCS). Advantages are: Easily decode the secret image by stacking operation. XVCS has better Quick Response code is still widely utilised. QR codes are reconstructed image than OVCS. Contrast obtained of the utilised on a regular basis in a variety of situations involving decrypted image is more and so the quality of decrypted data collecting, network connections, traceability, image. verification, and authentication. To begin with, the QR code makes it simple to detect computer equipment, such as In paper [2], author proposed that, to accurately recognize smart phones and scanning guns. Second, QR codes have a the information present in QR code it is necessary to correct large storage capacity and are inexpensive. the QR code image and do corrections in it if required. So to correct the QR distortion algorithm is proposed based on The QR code features a geometrical revamp and a geometric traditional geometric correction. the process framework for quicker disengagement. Three location labels involves following steps, first to find the exact coordinates of are used for QR code recognition and direction changing. At four vertices of the QR code image distortion preprocessing least one building style must be used in a twisting scheme. of QR image is done. In second step based on coordinates The module is intended to handle the business. obtained geometric correction is carried out .In Third step Furthermore, the corporate data fields have varying degrees after correction the black and white data blocks of the QR of modification and coverage. The code type and error code are recognized and stored, and the QR code binary correction bits are employed in the adaption data areas.

© 2022, IRJET

|

Impact Factor value: 7.529

|

ISO 9001:2008 Certified Journal

|

Page 1606


Turn static files into dynamic content formats.

Create a flipbook
A Survey On Secrete Communication Through QR Code Steganography For Military Application by IRJET Journal - Issuu