A QR Code Used for Personal Information Based On Multi-Layer Encryption System

نویسندگان

چکیده

Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection privacy, it feasible for critical information be fabricated. This led a significant financial loss someone. The intended recipient must trusted with able independently authenticate accuracy of by checking specifics. There are several driving rise QR codes used transmission. their enormous capacity storing information, vital dissemination. However, most currently deployed code solutions employ insecure formats never encryption. Secure Code available technology. Quick Response (QR) widely accessible without extensive technical training. Now, user stored effectively public knowledge occasionally even illegally used. To address abovementioned issues, this study's authors propose novel encryption system. Using image's mathematical processing method, we may apply equivalence class principle ordered equations two-dimensional code, producing desired cryptographic result. method exploits unique visual properties code. Only reader can decode code's useful which too complex standard reading methods. It will utilised issues speedy business client Security, commodity anticounterfeiting, bicycle sharing codes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Kind of Encryption Method of QR Code based on ECA State Ring

In view of the simple keys, time-consuming in encryption and decryption process and the loss of original function characteristics in encrypted image QR two-dimensional code, we adobe a kind of encryption method of QR code based on ECA state ring. In this method, the simple structure, highly parallel of elementary cellular automaton is being used. Operating each pixel point on the quick response...

متن کامل

Data Security through Qr Code Encryption and Steganography

The art of information hiding has become an important issue in the recent years as security of information has become a big concern in this internet era. Cryptography and Steganography play major role for secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover medium. Cryptography conceals the content of a message by encryption. QR (Quick Response)...

متن کامل

A Novel User Authentication Scheme Based on QR-Code

User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel. Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access....

متن کامل

A Multi-Physics Simulation Model Based on Finite Element Method for the Multi-Layer Switched Reluctance Motor

Using ANSYS finite element (FE) package, a multi-physics simulation model based on finite element method (FEM) is introduced for the multi-layer switched reluctance motor (SRM) in the present paper. The simulation model is created totally in ANSYS parametric design language (APDL) as a parametric model usable for various conventional types of this motor and it is included electromagnetic, therm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of interactive mobile technologies

سال: 2023

ISSN: ['1865-7923']

DOI: https://doi.org/10.3991/ijim.v17i09.38777