Informative Article | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017
A Secured Quick Response (QR) Code Method with Fuzzy Encoding of Secret Message
Dr. Siddhartha Choubey, Nidhi Chandel
Now a day everywhere Digital formation is involved. all people are use to technology in daily life but the excess use of technology safety is also more important. Quick response code is the process that high quality features such as stored high capacity information in small coded from and embed the secret information. The cryptography technique is used for hiding secret message, the process at the sender side to encode the original message in to any coded from and at receiver side the decoded the original message. Hiding original message is based on bit technique so it is chance to modification attack.if attacker change any bit such as adding a new bit or change the bit then it is some problem arise to recover the original message. In this paper, we propose the a scheme based on Cyclic Redundancy Check and list the decoding to overcome this problem we also conduct our solution by analyzing the complexity, security, experiment.
Keywords: QR code, Cyclic Redundancy Check, cryptography, encryption, decryption, encode, decode, error correction code,
Edition: Volume 6 Issue 4, April 2017
Pages: 321 - 324
How to Cite this Article?
Dr. Siddhartha Choubey, Nidhi Chandel, "A Secured Quick Response (QR) Code Method with Fuzzy Encoding of Secret Message", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20172129, Volume 6 Issue 4, April 2017, 321 - 324
155 PDF Views | 118 PDF Downloads
Similar Articles with Keyword 'QR code'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2234 - 2237A Secure Mobile Bill Payment (MOBILL) Service for M-Commerce
Pavuluri Gnana Ramakrishna, M. Chandra Naik
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1171 - 1174A Survey on Data Security and Confidentiality Using 2D Color Barcodes
Anjaly Raj, Vidya N.
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 923 - 926QR Code Based Indoor Navigation with Voice Response
Josymol Joseph
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 2100 - 2103SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones
Anjaly Raj, Vidya N
Case Studies, Computer Science & Engineering, Kenya, Volume 2 Issue 7, July 2013
Pages: 194 - 201A GIS Based Parking Management and Dissemination System
George Watene, Douglas Musiega, Charles Ndegwa
Similar Articles with Keyword 'Cyclic Redundancy Check'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 1164 - 1168Network Coding Based Cloud Storage Security for Enhancing Reliability
Pooja P. Patel, Brona A. Shah
Informative Article, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 321 - 324A Secured Quick Response (QR) Code Method with Fuzzy Encoding of Secret Message
Dr. Siddhartha Choubey, Nidhi Chandel
Similar Articles with Keyword 'cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Similar Articles with Keyword 'decryption'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Similar Articles with Keyword 'encode'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1130 - 1132Survey On: Reversible Data Hiding in Encrypted JPEG Images
N. B. Pokale, Sanjivani S. Koli
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2369 - 2374Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage
Ghilby Varghese Jaison
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1695 - 1698Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju, Dasari Rajesh
Similar Articles with Keyword 'decode'
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2002 - 2005A Survey on Barcode Generation and Modulation Techniques
Vidyashree Kokane, Shyam Gupta
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1999 - 2003A Framework for Secure Cloud Computing Based on Homomorphic Encryption
Ravneet Kaur, Harmandeep Singh
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1687 - 1689Enhancing Security and Effectiveness in Characteristic Based Information Offering
Ashwini Ahire, Prashant Jawalkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1720 - 1723Text Steganography using Helping Verbs
Rahul Sanwal, Rishabh Jain