0% found this document useful (0 votes)
132 views

A Desktop Application of QR Code For Data Security and Authentication

This document discusses using QR codes for secure data transfer and authentication. It proposes encrypting question paper data using AES encryption before generating a QR code. The encrypted data in the QR code can then be scanned and decrypted. The document also discusses using QR codes to privately or publicly exchange information by encrypting private information for security. It examines different current applications of QR codes like transportation ticketing, education, libraries, and advertising. Human: Thank you for the summary. Here is another document for you to summarize: [DOCUMENT] Title: Using Machine Learning to Detect Fraudulent Transactions Fraud detection is a major challenge for companies conducting online transactions. Criminals are constantly developing new techniques to bypass traditional

Uploaded by

Andrey Andri
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views

A Desktop Application of QR Code For Data Security and Authentication

This document discusses using QR codes for secure data transfer and authentication. It proposes encrypting question paper data using AES encryption before generating a QR code. The encrypted data in the QR code can then be scanned and decrypted. The document also discusses using QR codes to privately or publicly exchange information by encrypting private information for security. It examines different current applications of QR codes like transportation ticketing, education, libraries, and advertising. Human: Thank you for the summary. Here is another document for you to summarize: [DOCUMENT] Title: Using Machine Learning to Detect Fraudulent Transactions Fraud detection is a major challenge for companies conducting online transactions. Criminals are constantly developing new techniques to bypass traditional

Uploaded by

Andrey Andri
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

A Desktop Application of QR Code for Data Security

and Authentication
Partiksha Mittra Nitin Rakesh
Department of Computer Science and Engineering Department of Computer Science and Engineering
Amity University Uttar Pradesh Amity University Uttar Pradesh
Noida, India Noida, India
[email protected] [email protected]

Abstract—Initially the barcodes have been widely used for the This document examines the QR codes and realizes the
unique identification of the products. Quick Response i.e. QR significance of data, information and distributes it in such an
codes are 2D representation of barcodes that can embed text, obscured or non–obscured way so that authorized people
audio, video, web URL, phone contacts, credentials and much should be able to view it. At the same time, the data should
more. This paper primarily deals with the generation of QR remain publicly accessible but it should either be accessible to
codes for Question Paper. We have proposed encryption of the authorized personnel or the ones who have the appropriate
Question Paper data using AES Encryption algorithm. The tools to view it. In order to improve the security of the
working of the QR codes is based on encrypting it to QR code
information stored in QR code, a 2-D code encryption and
and scanning to decrypt it. Furthermore, we have reduced the
decryption method based on cryptic data is proposed in this
memory storage by redirecting to a webpage through the
transmission and online acceptance of data.
paper .An interesting use of QR code is to exchange
information. Information exchanged can be private information
Keywords— QR Codes; AES algorithm; Encryption; exchange or public information exchange. The public
Decryption; Scanning information exchange using QR codes can take place with the
help of existing tools and application, wherein no encryption is
required. As far as the private information exchange is
I. INTRODUCTION concerned encryption is required for the secured transactions.
“QR” is abbreviated as “quick response,” is a reference to
the speed at which the huge amount of information it contains, This paper is further divided into five sections. Section first
can be decoded with scanners. QR Code shown in figure 1 is a we have introduced QR code and its applications. Second
two-dimensional or matrix bar code developed in Japan by section shows recent application area of QR codes. In third
Denso Wave. They are sometimes referred to as 2D codes, 2D section we have proposed the application of QR code which is
barcodes, or mobile codes. These are machine readable codes a developed application that helps in secure transfer of question
and comprise of black modules on white modules. It holds papers via websites and interfaced among various universities.
thousands of alphanumeric characters while the barcode
comprises of only 20 characters. This two-dimensional symbol II. CURRENT APPLICATION OF QR CODES
was invented for tracking of automotive parts, but these codes With the increase development in technology, the uses of
are increasingly found in other fields as well like linking to electronic devices are also increasing and so as the various
websites, product labels, advertising campaigns, SMS, contact applications of QR codes. QR Code has been approved as an
details, email messages and much more. The information AIM (Automatic Identification and Mobility) Standard, a JIS
stored in codes varies from tracking information of the (Japanese Industrial Standard) Standard and an ISO standard.
products produced in various industries to information of the So QR Code is being used in a wide variety of applications,
business on a business card that redirects to the specific such as manufacturing, logistics, and sales applications. QR
website. These small sized codes can also be hidden inside the codes are being used as ticket checker for various
image. transportation systems to avoid manual works and queues. It
helps in providing station level security by acting as a ticket
and validating the users whether he enters or leaves the station
[1].
With constant evolving technologies, there comes new
methods for learning and QR codes are one of those being used
in present days. As for the university, students can send his/her
queries through MMS in form of or codes to the university
server, which are further decoded and students are provided
with their respective solutions [3]. QR codes are being used in
Fig. 1. QR Code some of the libraries for various purposes. One of the purposes
is to find the exact location of the books kept in the library by
scanning the QR codes containing the location of those books No another 3rd party QR code scanning application can
stored in the database. QR codes are also being for blind scan it, if it does, junk characters will be displayed. But if
navigation, it provides automatic navigation after scanning of scanning is done through our application, the password will be
the QR codes and provides the user with the shortest path. If asked first and only upon its correct entry, the hidden text or
during navigation users deviates from its path then it URL will be displayed. If the URL is displayed after scanning
automatically guides the user back to the right path [2]. a QR code, there should be an option to visit that URL. There
will be “QR Customization” options present in our application
QR codes are also giving their best in the field of namely, Apply Color, Add Logo, Add Label. If the user selects
advertisements. By scanning QR codes it becomes easier for
“Apply Color”, he would be able to change the color of the QR
people to get to know about the deals and location of vendors
code using a multicolor palette. This feature will not make any
for their preferred products [4]. In addition to, QR Code has changes to the data hidden inside the QR code. The user could
many advanced features like QR Code has high capacity
still scan the QR code perfectly after this customization. If the
encoding of data, its maximum symbol can encode 7089 user selects “Apply Logo”, he would browse an image that
characters; while PDF417 only encode 2710 characters. QR
needs to be embedded inside the QR code so that it is visible as
Code is a matrix two-dimensional barcode; it can be readable
a tiny image in the QR code. This feature too will not make any
from any direction from 360 degree. But the stack two- changes to the data hidden inside the QR code. The user could
dimensional barcode, for example PDF417, is very difficult to
still scan the QR code perfectly after this customization. If the
realize the readable from 360 degree.
user selects “Apply Label”, he would be able to input a text
As the mobile phone with camera device is getting more data in a text-field that will become visible below the generated
popular, recognition barcode based on embedded system is QR code. This text data will be visible below and outside the
getting more important and practical. We proposed a new high- boundaries of QR code, not inside the QR code. This feature
speed, high-accuracy automatic recognition method for too will not make any changes to the data hidden inside the QR
recognizing QR Code in various illumination conditions. And code. The user could still scan the QR code perfectly after this
there is no need the special scanner for barcode recognition in customization.
the proposed method. From the experiment, the proposed
The encryption process makes use of the AES algorithm
method produced better results than other method. The
and the text gets encrypted with a password which the user
recognition test also showed the proposed method is effective uses to decode the text while scanning. In the second module
for the QR Code image recognition based on embedded
the QR code is scanned which takes the help of the camera of
system. the desktop or laptop. Once it is scanned the data hidden in the
QR code is displayed directly if it is not secured by a password
III. QR FOR SECURED QUESTION PAPER GENERATION and if it is secured by a password then the application asks for
the particular password and once the password gets entered the
A. Primer data get displayed.
The application is divided into two modules i.e. QR code This application can have many uses but here this
generator and QR code reader. Using this application, the user application is used to securely transmit the set of question
will be able to generate a QR code using 2 options namely, text papers prepared in an university to different universities which
and image. will be uploaded by various faculties on a website and the URL
Under “Text” option, the user will input some text (in a of that website will be circulated to different faculties of
text-field) that needs to be hidden inside the QR code. Under different universities in the form of QR codes so that they can
“Image” option, the user will input web URL of the image view the question papers by scanning the received QR code.
location. After that the user will be asked whether to encrypt
the QR code or not. If the user selects “Yes”, we shall ask for a B. Methodology
password in a text-field in order to encrypt the QR code. Once The algorithm used for encrypting and decrypting the data
the password is inputted, the encrypted QR code shall be stored in QR codes in our paper is Advanced Encryption
generated. If the user selects “No”, the QR code will be Standard (AES). There are many algorithms proposed like Data
generated without a password and displayed on the screen. Encryption Standard, Triple Data Encryption Standard (Triple
Once a QR code is generated, it will be displayed on the screen DES), Blowfish etc. but the best suited algorithm for this paper
as well as saved as an image file at a specific destination is AES algorithm [8]. Although this paper uses AES algorithm
folder/directory within the hard drive of the user PC. but a modified AES algorithm has been incorporated in this
After the QR code is generated, the user will be able to scan application which makes it a little different from the present
it through the “Scan” option present in our application. Under AES algorithm. The following steps depict it all:
the "Scan" option, the integrated camera of the laptop shall turn 1) Initially an ASCII matrix of the value inputted for
ON. The user will put a printed out image of the stored QR
creation of the QR code is built.
codes before the camera for capturing. If the QR code is
encrypted, it will ask for a password for decryption on the PC
screen. Once the correct password is inputted, it will show the 2) Then an instance of the AES algorithm is created using
text or URL that is hidden inside the QR code. But if the QR Java package.
code is not encrypted, it won’t ask for a password and upon
“Scan”, it will directly show the text or URL hidden inside it.
3) Thirdly a cipher instance involving CBC/PKC5 padding E. Pseudo Code for Reading of QR code
is built. Step 1: Integrate the webcam using webcam packages provided
by java.
4) Then the cipher is merged with the created instance of
the AES algorithm. Step 2: Create panel using panel.setPreferredSize(size) and set
layout for webcam using its resolution.
5) Then the ASCII matrix is mixed with the
multidimensional-bit matrix of the QR code. Step 3: Create text area using textarea.setPreferredSize (size) to
display the hidden data after scanning.
6) Then the (modified) cipher is applied to the resultant
Step 4: If webcam is open, get image using webcam.getimage().
matrix in order to generate and output the resultant, encrypted
QR code. Step 5: Read the image using the library function of zxing i.e.
C. Pseudo Code for AES algorithm multiformatreader.
The algorithm used for encrypting and decrypting the data Step 6: If the data is encrypted then decrypt using AES decryption
stored in QR codes in our paper is Advanced Encryption algorithm.
Standard (AES). There are many algorithms proposed like Data
Encryption Standard, Triple Data Encryption Standard (Triple Step 7: Display the hidden data in the text area.
DES), Blowfish etc. but the best suited algorithm for this paper
is AES algorithm [8]. Although this paper uses AES algorithm
but a modified AES algorithm has been incorporated in this After research, the comparative study of different
application which makes it a little different from the present encryption algorithms on the basis of different parameters is
AES algorithm. The following steps depict it all: tabulated in Table 1.
Step 1: A raw array of the ASCII matrix of the value inputted
for creation of the QR code using Charset.forName ("US- IV. ANALYSIS OF QR FOR SECURED QUESTION PAPER
ASCII") function is built. GENERATION

A. Functional Analysis
Step 2: An instance of the AES algorithm skeySpec using Java
package named SecretKeySpec found in javax.crypto.spec This application can be used for various purposes such as
package is created. secured transmission of question papers that is shown in this
paper, crime department investigators can use this application
Step 3: A cipher instance of AES/CBC/PKCS5Padding using secured communication and transmission of important data
Cipher class located at javax.crypto package is created. such as criminal details, this application can also be used for
secured transmission of credentials within an organization.
Step 4: Cipher with created instance of the AES algorithm is With advancement of technologies this application can also run
merged. on mobile phones thus increasing its applications. Several other
applications exist to which this QR code may be a
Step 5: ASCII matrix with the multidimensional bit–matrix of the revolutionary replacement to existing solutions [12-14].
QR code which is done using java.awt.Color,
java.awt.Graphics2D, com.google.zxing. BarcodeFormat, B. Risk Analysis
com.google.zxing. BinaryBitmap packages is mixed. Since risk is a part of every paper so there is a need to
analyze the risks that can occur in various parameters. Risk has
Step 6: Modified cipher is mixed to the resultant matrix in order two parts: one is the probability that risk will occur and second
to generate and output the resultant, encrypted QR code. is if risk occurs what can be the consequences. Risks are hard
D. Pseudo Code for QR code generation to spot so it increases the use of risk analysis so that a person
can work properly on his/her plans. For analyzing the risks first
Step 1: Input data to be stored in QR code. it is necessary to identify the possible risks and then think of
the possible mitigation strategies. Risk analysis helps in
Step 2: Input the size of the data. managing the paper very well. Table 2 shows the risk analysis
and mitigation strategy of this application.
Step 3: Store data in form of bitmatrix (data, size).

Step 4: Encrypt the data stored in matrix using AES algorithm. V. CONCLUSION
We may hereby conclude that with the use of this
Step 5: Generate the encoded QR code using the bitmatrix (data, application the organization would be able to save significant
size) and library function (Zxing) of QR code generation. costs on paper, printing, labor, etc. through hiding a lot of vital
content and information to be communicated with the use of
Step 6: Display the result. QR code. This application/tool would help the company bring
advancement in its processes by the use of latest technology
which is considered as superior that its closest substitute. As double purpose of secure and obscure data exchange. The
the QR codes could be customized or formatted as per the organization will not be able to use it on products but in any
company’s wish by applying color, embedding logo image or objective like posting of jobs, display of images, etc. This will
label, it shall help the organization to communicate the help the company implement a one stop solution for a
information in a more emphasized and differentiating manner compressed, cost–effective, secure and hidden information
than others. The secured QR codes will help the company to exchange.
securely communicate the information thereby serving the

TABLE I. COMPARATIVE STUDY OF [6, 10 AND 11]

Algorithm Key Length Key Searched (per Block Size Cipher Text Security Complexity
(bits) second) (bits)

DES 56 1 billion 64 Symmetric Low Complex


23
Triple DES 168 1x10 64 Symmetric Low Complex

AES 128-256 1x1023 128 Symmetric High Complex

RSA Variable Variable Less than or equal Asymmetric High Simple


to log2(n)

TABLE II. RISK ANALYSIS

RISK LEVEL LIKELIHOOD OF


RISK MITIGATION STRATEGY
(L/M/H) EVENT

We moderate this risk through keeping the scope of the paper


Paper Size Medium Less
constrained so that we can develop it on schedule.
We mitigate this risk through attaining a clear understanding of the
Complexity High More application objectives, its complete functional workflow, the logical
framework and final outcome that we aim to achieve.
We alleviate this risk by learning the technological fundamentals and
Technology High More concepts thoroughly which are used directly in the implementation of
its modules.
We diminish this risk by formulating milestones clearly indicating the
Scheduling Medium Less
completion of specific executable modules involved within our paper.
In order to mitigate this risk and save any hidden costs, we aim to attain
Cost / External a clear technical and functionality visibility so that the actualization of
Low Less
Dependencies any low level or intensity of risks does not cause maltreatment to the
paper and we are able to suppress them conveniently.

Information and Communication Technology, Electronics and


REFERENCES Microelectronics, MIPRO, Opatija, 2015, pp. 8333-835.
[1] Karthic.S and Velmurugan.A, “Android Subuurnban Raliway Ticketing [6] Somdip Dey and Asoke Nath, “Confedential Encrypted Data hiding and
with GPS as Ticket Checker”, in 2012 IEEE International Conference on Retrieval Using QR Authentication System”, in 2013 International
Advanced Communication Control and Computing Technologies, Conference on Communication Systems and Network Technologies,
Ramanathapuram, 2012, pp. 63-66. Gwalior, 2013, pp. 512-517.
[2] Affan Idrees, Zahid Iqbal and Maria Ishfaq, “An Efficient Indoor [7] Katharina Krombholz, Peter Friihwirt, Thomas Rieder, Ioannis Kapsalis,
Navigation Technique to find Optimal Routes for Blinds Using QR Johanna Ullrich and Edgar Weippl, “QR code Security-How Secure and
codes”, in 2015 IEEE 10th conference on Industrial Electronics and Usable Apps Can Protect Users Against Malicious QR Codes”, in 2015
Applications, ICIEA,Auckland, 2015, pp. 690-695. 10th international Conference on Availability, Reliability and Security,
ARES, Toulouse, 2015, pp.230-237.
[3] Vasileios Y fantis, Panagiotis Kalagiakos, Chrysanthi Kouloumperi and
Panagiotis Karampelas, “Quick Response Code in E-Learning”, in 2012 [8] Akshay Desai, Krishna Ankalgi, Harish Yamanur and Siddalingesh S.
International Conference on Education and e-learning Innovations, Navalgund, “Parallelization of AES algorithm for Disk Utilization Using
U.S.A, 2012, pp. 1-5. CBC and ICBC modes”, in 2013 Fourth International Conference on
Computing, Communications and Network Technologies, ICCCNT,
[4] Pankaj Virulkar and Avinash Bhute, “Application Based Advertisement Tiruchengode, 2013, pp.1-7.
publishing by using Wi-Fi and QR codes”, 2015 International
Conference on Green Computing and Internet of Things, ICGCIot, [9] Fei Shao, Zinan Chang and Yi Zhang, “AES Encryption Algorithm
Noida, 2015, pp. 1316-1321. based on the High Performance Computing of GPU”, in Second
International Conference on Communication Software and Networks,
[5] M.Filipovic Tretinjak, “The Implementation of QR codes in the ICCSN’10, Singapore, 2010, pp. 588-590.
Educational Process”, in 2015 38th International Convention on
[10] Mohammed A. Saleh, Nooritawati Md. Tahir, Ezril Hisham & Habibah environment”, 2010 3rd International Conference on Emerging Trends
Hashim, “ An Analysis and Comparison for Popular Video Encryption in Engineering and Technology (ICETET), pp. 569-572, 2010.
Algorithm”, in 2015 IEEE Symposium on Computer Applications and [13] Nitin Rakesh, Vipin Tyagi, “Failure recovery in XOR'ed networks”,
Industrial Electronics, ISCAIE, Langkawi, 2015, pp.90-94. 2012 IEEE International Conference on Signal Processing, Computing
[11] Sangita A.jaju and Santosh S. Chauhan, “A Modified RSA Algorithm to and Control (ISPCC), pp. 1-6, 2012.
Enhance Security for Digital Signatures”, in 2015 International [14] Kinjal Shah, Gagan Dua, Dharmendar Sharma, Priyanka Mishra, Nitin
Conference and Workshop on Computing and Communication, Rakesh, “Transmission of Successful Route Error Message (RERR) in
IEMCON, Vancouver, 2015, pp. 1-5. Routing Aware Multiple Description Video Coding over Mobile Ad-
[12] Praveen K Gupta, Nitin Rakesh, “Different job scheduling Hoc Network”, International Journal of Multimedia & Its Applications
methodologies for web application and web server in a cloud computing (IJMA), Vol.3, No.3, 51-59, August 2011.

You might also like