A Secured Quick Response (QR) Code Method with Fuzzy Encoding of Secret Message
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Informative Article | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017

A Secured Quick Response (QR) Code Method with Fuzzy Encoding of Secret Message

Dr. Siddhartha Choubey, Nidhi Chandel

Now a day everywhere Digital formation is involved. all people are use to technology in daily life but the excess use of technology safety is also more important. Quick response code is the process that high quality features such as stored high capacity information in small coded from and embed the secret information. The cryptography technique is used for hiding secret message, the process at the sender side to encode the original message in to any coded from and at receiver side the decoded the original message. Hiding original message is based on bit technique so it is chance to modification attack.if attacker change any bit such as adding a new bit or change the bit then it is some problem arise to recover the original message. In this paper, we propose the a scheme based on Cyclic Redundancy Check and list the decoding to overcome this problem we also conduct our solution by analyzing the complexity, security, experiment.

Keywords: QR code, Cyclic Redundancy Check, cryptography, encryption, decryption, encode, decode, error correction code,

Edition: Volume 6 Issue 4, April 2017

Pages: 321 - 324

Share this Article

How to Cite this Article?

Dr. Siddhartha Choubey, Nidhi Chandel, "A Secured Quick Response (QR) Code Method with Fuzzy Encoding of Secret Message", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20172129, Volume 6 Issue 4, April 2017, 321 - 324

155 PDF Views | 118 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'QR code'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2234 - 2237

A Secure Mobile Bill Payment (MOBILL) Service for M-Commerce

Pavuluri Gnana Ramakrishna, M. Chandra Naik

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1171 - 1174

A Survey on Data Security and Confidentiality Using 2D Color Barcodes

Anjaly Raj, Vidya N.

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 923 - 926

QR Code Based Indoor Navigation with Voice Response

Josymol Joseph

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 2100 - 2103

SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones

Anjaly Raj, Vidya N

Share this Article

Case Studies, Computer Science & Engineering, Kenya, Volume 2 Issue 7, July 2013

Pages: 194 - 201

A GIS Based Parking Management and Dissemination System

George Watene, Douglas Musiega, Charles Ndegwa

Share this Article

Similar Articles with Keyword 'Cyclic Redundancy Check'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1164 - 1168

Network Coding Based Cloud Storage Security for Enhancing Reliability

Pooja P. Patel, Brona A. Shah

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 321 - 324

A Secured Quick Response (QR) Code Method with Fuzzy Encoding of Secret Message

Dr. Siddhartha Choubey, Nidhi Chandel

Share this Article

Similar Articles with Keyword 'cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Similar Articles with Keyword 'decryption'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Similar Articles with Keyword 'encode'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2369 - 2374

Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage

Ghilby Varghese Jaison

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1695 - 1698

Trusted Framework for Secured Information Storage over Cloud Environment

P. Pothuraju, Dasari Rajesh

Share this Article

Similar Articles with Keyword 'decode'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2002 - 2005

A Survey on Barcode Generation and Modulation Techniques

Vidyashree Kokane, Shyam Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1999 - 2003

A Framework for Secure Cloud Computing Based on Homomorphic Encryption

Ravneet Kaur, Harmandeep Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1720 - 1723

Text Steganography using Helping Verbs

Rahul Sanwal, Rishabh Jain

Share this Article
Top