A QR Code Used for Personal Information Based On Multi-Layer Encryption System
نویسندگان
چکیده
Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection privacy, it feasible for critical information be fabricated. This led a significant financial loss someone. The intended recipient must trusted with able independently authenticate accuracy of by checking specifics. There are several driving rise QR codes used transmission. their enormous capacity storing information, vital dissemination. However, most currently deployed code solutions employ insecure formats never encryption. Secure Code available technology. Quick Response (QR) widely accessible without extensive technical training. Now, user stored effectively public knowledge occasionally even illegally used. To address abovementioned issues, this study's authors propose novel encryption system. Using image's mathematical processing method, we may apply equivalence class principle ordered equations two-dimensional code, producing desired cryptographic result. method exploits unique visual properties code. Only reader can decode code's useful which too complex standard reading methods. It will utilised issues speedy business client Security, commodity anticounterfeiting, bicycle sharing codes.
منابع مشابه
A Kind of Encryption Method of QR Code based on ECA State Ring
In view of the simple keys, time-consuming in encryption and decryption process and the loss of original function characteristics in encrypted image QR two-dimensional code, we adobe a kind of encryption method of QR code based on ECA state ring. In this method, the simple structure, highly parallel of elementary cellular automaton is being used. Operating each pixel point on the quick response...
متن کاملData Security through Qr Code Encryption and Steganography
The art of information hiding has become an important issue in the recent years as security of information has become a big concern in this internet era. Cryptography and Steganography play major role for secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover medium. Cryptography conceals the content of a message by encryption. QR (Quick Response)...
متن کاملA Novel User Authentication Scheme Based on QR-Code
User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel. Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access....
متن کاملA Multi-Physics Simulation Model Based on Finite Element Method for the Multi-Layer Switched Reluctance Motor
Using ANSYS finite element (FE) package, a multi-physics simulation model based on finite element method (FEM) is introduced for the multi-layer switched reluctance motor (SRM) in the present paper. The simulation model is created totally in ANSYS parametric design language (APDL) as a parametric model usable for various conventional types of this motor and it is included electromagnetic, therm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of interactive mobile technologies
سال: 2023
ISSN: ['1865-7923']
DOI: https://doi.org/10.3991/ijim.v17i09.38777