A Survey on Data Security and Confidentiality Using 2D Color Barcodes
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 121 , Downloads: 114 | CTR: 94 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016

A Survey on Data Security and Confidentiality Using 2D Color Barcodes

Anjaly Raj, Vidya N.

2D color barcodes have been introduced to obtain larger storage capabilities than traditional black and white barcodes. There is increased interest in the use of color barcodes to encode more information per area unit than regular, black-and-white barcodes. Here a secret message is encrypted with combined cryptographic method and then hide the encrypted data in a color QR Code (Quick Respond Codes). The embedded QR code may be sent to destination or may be saved for future use. Color QR Codes are mainly used to convey or store messages because they have higher or large storage capacity than any other normal conventional barcodes. The data is encrypted using a symmetric key, then inserted in color QR code, so that data can not be easily retrievable without adequate authorization / permission.This paper studies two dimensional color barcodes for data confidentiality and security.

Keywords: QR Codes, 2d Color barcode, Encryption, Hiding, Security

Edition: Volume 5 Issue 8, August 2016

Pages: 1171 - 1174

Share this Article

How to Cite this Article?

Anjaly Raj, Vidya N., "A Survey on Data Security and Confidentiality Using 2D Color Barcodes", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20161092, Volume 5 Issue 8, August 2016, 1171 - 1174

121 PDF Views | 114 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'QR Codes'

Views: 121 , Downloads: 114 | CTR: 94 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1171 - 1174

A Survey on Data Security and Confidentiality Using 2D Color Barcodes

Anjaly Raj, Vidya N.

Share this Article

Views: 155 , Downloads: 117 | CTR: 75 % | Weekly Popularity: ⮙2

Case Studies, Computer Science & Engineering, Kenya, Volume 2 Issue 7, July 2013

Pages: 194 - 201

A GIS Based Parking Management and Dissemination System

George Watene, Douglas Musiega, Charles Ndegwa

Share this Article

Views: 124 , Downloads: 118 | CTR: 95 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 923 - 926

QR Code Based Indoor Navigation with Voice Response

Josymol Joseph

Share this Article

Views: 167 , Downloads: 148 | CTR: 89 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 320 - 324

Vicode: 3D Barcode with Embedded Video Using Histogram Shifting Based Reversible Data Hiding

Haritha H, Anish Kumar B

Share this Article

Similar Articles with Keyword '2d Color barcode'

Views: 121 , Downloads: 114 | CTR: 94 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1171 - 1174

A Survey on Data Security and Confidentiality Using 2D Color Barcodes

Anjaly Raj, Vidya N.

Share this Article

Views: 148 , Downloads: 116 | CTR: 78 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 2100 - 2103

SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones

Anjaly Raj, Vidya N

Share this Article

Similar Articles with Keyword 'Encryption'

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 165 , Downloads: 91 | CTR: 55 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Similar Articles with Keyword 'Hiding'

Views: 166 , Downloads: 88 | CTR: 53 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Views: 135 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Views: 136 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Views: 124 , Downloads: 99 | CTR: 80 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Views: 129 , Downloads: 102 | CTR: 79 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Similar Articles with Keyword 'Security'

Views: 30 , Downloads: 25 | CTR: 83 % | Weekly Popularity: ⮙18

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 47 , Downloads: 40 | CTR: 85 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 163 , Downloads: 40 | CTR: 25 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 63 , Downloads: 45 | CTR: 71 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article
Top