A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Two-Level QR Code for Secured Message Sharing and Document Authentication
2017
IJARCCE
Thus the private level is invisible to standard QR code readers. It can also be used for document authentication. ...
A new rich QR code is proposed that has two storage levels: a public level and a private level. ...
Two application scenarios for 2LQR code can be suggested: a private message sharing scenario and an authentication scenario. ...
doi:10.17148/ijarcce.2017.6689
fatcat:zdmif6ux3nanxpdygy4xrhde5u
Implementation of QR Code for Sharing Files
2019
International journal of recent technology and engineering
Secret message can be generated only when enough number of shares are combined. This provides security for private message using visual secret sharing scheme. ...
Private data is not safe in such scenario. This paper presents a visual secret sharing scheme to encode a secret QR code into distinct shares. ...
The two-level QR code includes two public and private storage levels and they can be used for document authentication [5] . In public level documents are shared using classical QR code. ...
doi:10.35940/ijrte.b2715.078219
fatcat:qeripdl46nafjokqrr6qhsipw4
Implementation of Two Level QR Code (2LQR)
2014
IJARCCE
QR codes have many applications especially in the field of message sharing and document authentication. ...
Our 2-level design is capable enough to supply ample security and privacy as way as personal message sharing and document authentication are involved. ...
PROPOSED SYSTEM The two level QR code which is the proposed technique provides a two-level security to the QR code which is mainly focusing on message sharing and document authentication [6] . ...
doi:10.17148/ijarcce.2017.64168
fatcat:fxzriinrfrhbnkbnarphyqrbee
Private Information Sharing using Two Level QR Code
2018
International Journal of Computer Applications
In this paper, we present a new rich QR code that has two storage levels. Public level and Private level, The level one named a public level ,and level two named as private level. ...
The public level is the same as the standard QR code storage level; therefore it is readable by any classical QR code application. ...
For improving the security of QR code as well as well as storage capacity we are going to design a new system, two level QR code, which having two storage levels public and private level can be used for ...
doi:10.5120/ijca2018916576
fatcat:d322dspckbg63cdtibestutzs4
A Survey on Secrete Communication through QR Code Steganography for Military Application
2022
International Journal for Research in Applied Science and Engineering Technology
Contribution work is, working on optimal partitioning methods and compare original message with shared message using hashing techniques. ...
Abstract: The quick response code (QR) has become most popular barcode because of its larger data capacity and increased damage resistance. ...
QR technique requires reducing the modifications. The two-level QR code (2LQR), has two public and private storage levels and can be used for document authentication [7] . ...
doi:10.22214/ijraset.2022.39907
fatcat:wp7apgi4dzdwxhcnleidex2fty
QR code based two-factor authentication to verify paper-based documents
2020
TELKOMNIKA (Telecommunication Computing Electronics and Control)
The study aims at developing an electronic verification system for official and issued books (documents, endorsements, and other official books) to/from different sections of the Institute using QR technology ...
Important paper-based documents exposed to forgery such as: official certificates, birth, marriage, death certificates, selling and buying documents and other legal documents is more and more serious and ...
The new QR code, called two-level QR code, has public and private storage levels. The public level is the standard QR code storage level. ...
doi:10.12928/telkomnika.v18i4.14339
fatcat:x4pb26avifbophhz36oa52mrzm
Authentication of Bi–Level QR Code with Dynamic Pattern Generation
2019
International Journal of Engineering and Advanced Technology
The Bi-Level QR code add new abilities to standard QR Code which comprise of strengthening contemplating degree, which doesn't upset a similar old QR code examining procedure and development in privateers ...
This paper illustrates about a new Quick Response (QR) code to enhance data security with importance given to its wide use in information storage and authentication. ...
[1] With the advent of Bi-level QR code the Authentication and message sharing capacity has been enhanced when compared to standard QR codes. ...
doi:10.35940/ijeat.f1094.0886s219
fatcat:g4dotkpxprapvpjb5atfyr34qy
SVQR : A Novel Secure Visual Quick Response Code and Its Anti-counterfeiting Solution
2017
Journal of Information Hiding and Multimedia Signal Processing
This paper presents an authentication solution to realize the anti-counterfeiting for message which is encoded following QR code standard. ...
The solution includes a proposed secure and visual improved QR code involving digital signature and watermarking techniques, and a delicate authentication scheme. ...
Key Project of Fujian Education Department Funds (JZ160461) and Project in Fujian Provincial Education Bureau (JAT160328). ...
dblp:journals/jihmsp/Liu00W17
fatcat:ahmuhsyrazbj3bbbkjrwznr2sq
Survey Paper on Secret Sharing Schema for Digital Quick Response Code Applications
2021
International Journal for Research in Applied Science and Engineering Technology
To solve this Problem , Many Approaches are proposed to provide security to Original Message. ...
Due to data loss rate during communication may be high and vary from time to time. Now a days, there is the possibility to hack and change your data while you are sending from one place to another. ...
For private message share and document protection permission, two levels of QUICK RESPONSE code are used. ...
doi:10.22214/ijraset.2021.37023
fatcat:47mgkridijgjhlccyfnlstqhn4
Digital Document Sharing Securely Using Enhance QR Code
2019
International Journal for Research in Applied Science and Engineering Technology
AES for encoding the information, DSA to digitally sign the documents and Encoded QR-code for sharing the documents within the system. ...
Therefore the user is going to be able to share the necessary documents to third-party organizations (school, college, hospital, etc.) simply by sharing associated encoded QR code. ...
A user just needs to share system made encoded QR code and third-party organization scan that QR code for accessing the user documents. ...
doi:10.22214/ijraset.2019.4243
fatcat:3uo3paizenfwtm4mysphbhdbny
Upgraded Optical Secret Sharing Strategy for QR Code Approach
2019
International Journal for Research in Applied Science and Engineering Technology
For Application such as data storage and high speed machine reading Quick Response (QR) code have been widely used. ...
By XOR-ing the qualified shares the secret message is recovered, this operation can be easily performed with the android smartphones or other QR code scanning devices. ...
For two-level message sharing and document authentication a novel QR code was designed, in this the hash function is performed to decrypt the secret [5] . ...
doi:10.22214/ijraset.2019.3079
fatcat:bpj5dohrvbdtnc4oewscrkghca
Data Hiding under QR Code using Visual Secret Sharing and Advanced Partitioning Based on Specific Relationship
2020
International Journal of Engineering and Advanced Technology
Proposed approach to visual secret sharing scheme divides a secret QR code into different shares. In addition, the secret message is recovered by using XOR operation of the shares. ...
QR code is 2D representation of the barcode which has capability to store information and can be easily read by machine. ...
This way it increases the application area of QR code. In paper [3] , two levels of storage namely public and private are used which are useful authentication of documents. ...
doi:10.35940/ijeat.c5799.029320
fatcat:mzre3dhz7vdl7kro36debvc2ji
Printed Document Integrity Verification Using Barcode
2014
Jurnal Teknologi
This paper discuss several techniques for printed document security such as watermarking and barcode as well as the usability of two dimensional barcode in document authentication and data compression ...
A conceptual solution that are simple and efficient to secure the integrity and document sender's authenticity is proposed that uses two dimensional barcode to carry integrity and authenticity information ...
The secret binary image encrypted into two shares and one of the shares is encoded into QR Code which has been printed on the ID card. ...
doi:10.11113/jt.v70.2857
fatcat:qrsco74fxbba7l7zuu2focdbum
Visual Secret Sharing Scheme for Digital Image Watermarking
2020
International Journal of Engineering Research and
In comparison to using an existing cover image to hide messages, our algorithm hides the source texture image and embeds secret messages through the process of watermarking. ...
To address this issue, proposed a advanced technique for advanced digital watermarking using a texture and also a natural-imagebased VSS scheme (VSS scheme) that shares secret images via various carrier ...
QR technique requires reducing the modifications. In [8] paper, The two-level QR code (2LQR), has two public and private storage levels and can be used for document authentication. ...
doi:10.17577/ijertv9is080011
fatcat:3ijgnvft7ravth23ff2bh6x54i
Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document
2020
IEEE Access
The QR code is updated through the addition of levels that help to share secure messages of various sizes and to authenticate documents for verification and validation. ...
The proposed algorithm incorporates a clear and simple plan for overcoming this difficulty by inserting confidential information into a QR code message. ...
From the introduction above, it can be noted that the QR code is an important concept in the study of document authentication through the use of two-dimensional barcodes (QR codes) for document protection ...
doi:10.1109/access.2020.2971779
fatcat:ngiyn5abr5a6ti4ohofzmhkxra
« Previous
Showing results 1 — 15 out of 1,811 results