Suche senden
Hochladen
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
âą
0 gefÀllt mir
âą
738 views
IAEME Publication
Folgen
Technologie
Melden
Teilen
Melden
Teilen
1 von 9
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
Â
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
Â
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
Â
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Â
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
Editor IJMTER
Â
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
Â
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
Â
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
Â
Empfohlen
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
Â
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
Â
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
Â
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Â
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
Editor IJMTER
Â
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
Â
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
Â
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
Â
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
Â
www.ijerd.com
www.ijerd.com
IJERD Editor
Â
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
Â
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
Â
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
IAEME Publication
Â
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
Â
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Iaetsd Iaetsd
Â
Internet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
ijtsrd
Â
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
Â
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
Conference Papers
Â
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
Â
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
Association of Scientists, Developers and Faculties
Â
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
IJECEIAES
Â
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
Â
IRJET- Secure Data Access Control with Cipher Text and Itâs Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and Itâs Outsourcing in Fo...
IRJET Journal
Â
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
IJECEIAES
Â
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
ijtsrd
Â
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
Â
Text Embedded System using LSB Method
Text Embedded System using LSB Method
ijtsrd
Â
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
CSCJournals
Â
Comparative analysis of sine triangle and space vector pwm for cascaded multi...
Comparative analysis of sine triangle and space vector pwm for cascaded multi...
IAEME Publication
Â
Assessing the applicability of ground penetrating radar gpr techniques for ...
Assessing the applicability of ground penetrating radar gpr techniques for ...
IAEME Publication
Â
Weitere Àhnliche Inhalte
Was ist angesagt?
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
Â
www.ijerd.com
www.ijerd.com
IJERD Editor
Â
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
Â
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
Â
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
IAEME Publication
Â
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
Â
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Iaetsd Iaetsd
Â
Internet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
ijtsrd
Â
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
Â
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
Conference Papers
Â
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
Â
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
Association of Scientists, Developers and Faculties
Â
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
IJECEIAES
Â
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
Â
IRJET- Secure Data Access Control with Cipher Text and Itâs Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and Itâs Outsourcing in Fo...
IRJET Journal
Â
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
IJECEIAES
Â
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
ijtsrd
Â
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
Â
Text Embedded System using LSB Method
Text Embedded System using LSB Method
ijtsrd
Â
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
CSCJournals
Â
Was ist angesagt?
(20)
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
Â
www.ijerd.com
www.ijerd.com
Â
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
Â
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
Â
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
Â
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
Â
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Â
Internet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
Â
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
Â
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
Â
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
Â
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
Â
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Â
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
Â
IRJET- Secure Data Access Control with Cipher Text and Itâs Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and Itâs Outsourcing in Fo...
Â
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
Â
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
Â
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
Â
Text Embedded System using LSB Method
Text Embedded System using LSB Method
Â
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Â
Andere mochten auch
Comparative analysis of sine triangle and space vector pwm for cascaded multi...
Comparative analysis of sine triangle and space vector pwm for cascaded multi...
IAEME Publication
Â
Assessing the applicability of ground penetrating radar gpr techniques for ...
Assessing the applicability of ground penetrating radar gpr techniques for ...
IAEME Publication
Â
A seven level cascaded multilevel dstatcom for compensation of reactive power...
A seven level cascaded multilevel dstatcom for compensation of reactive power...
IAEME Publication
Â
Pll based shunt active harmonic filter to compensate multiple non linear loads
Pll based shunt active harmonic filter to compensate multiple non linear loads
IAEME Publication
Â
Heat transfer characteristics and exergy study of r744 r1270 in a smooth hor
Heat transfer characteristics and exergy study of r744 r1270 in a smooth hor
IAEME Publication
Â
Measuring entrepreneurial orientation & business performance relationship
Measuring entrepreneurial orientation & business performance relationship
IAEME Publication
Â
Prediction of friction factor and non dimensions numbers in force convection
Prediction of friction factor and non dimensions numbers in force convection
IAEME Publication
Â
Approaches for obtaining design flood peak discharges in sarada river
Approaches for obtaining design flood peak discharges in sarada river
IAEME Publication
Â
Shape memory alloy as retrofitting application in historical buildings and mo...
Shape memory alloy as retrofitting application in historical buildings and mo...
IAEME Publication
Â
Comparative study of printability analysis on pvc cast and pet g films
Comparative study of printability analysis on pvc cast and pet g films
IAEME Publication
Â
Andere mochten auch
(10)
Comparative analysis of sine triangle and space vector pwm for cascaded multi...
Comparative analysis of sine triangle and space vector pwm for cascaded multi...
Â
Assessing the applicability of ground penetrating radar gpr techniques for ...
Assessing the applicability of ground penetrating radar gpr techniques for ...
Â
A seven level cascaded multilevel dstatcom for compensation of reactive power...
A seven level cascaded multilevel dstatcom for compensation of reactive power...
Â
Pll based shunt active harmonic filter to compensate multiple non linear loads
Pll based shunt active harmonic filter to compensate multiple non linear loads
Â
Heat transfer characteristics and exergy study of r744 r1270 in a smooth hor
Heat transfer characteristics and exergy study of r744 r1270 in a smooth hor
Â
Measuring entrepreneurial orientation & business performance relationship
Measuring entrepreneurial orientation & business performance relationship
Â
Prediction of friction factor and non dimensions numbers in force convection
Prediction of friction factor and non dimensions numbers in force convection
Â
Approaches for obtaining design flood peak discharges in sarada river
Approaches for obtaining design flood peak discharges in sarada river
Â
Shape memory alloy as retrofitting application in historical buildings and mo...
Shape memory alloy as retrofitting application in historical buildings and mo...
Â
Comparative study of printability analysis on pvc cast and pet g films
Comparative study of printability analysis on pvc cast and pet g films
Â
Ăhnlich wie Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IJCNCJournal
Â
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IJCNCJournal
Â
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
Â
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET Journal
Â
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Â
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Â
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
IJECEIAES
Â
CryptoQR System based on RSA
CryptoQR System based on RSA
IJCSIS Research Publications
Â
9. 23765.pdf
9. 23765.pdf
TELKOMNIKA JOURNAL
Â
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET Journal
Â
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in using triple d...
IJECEIAES
Â
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
csandit
Â
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
AM Publications
Â
18. 23367.pdf
18. 23367.pdf
TELKOMNIKA JOURNAL
Â
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish Cipher
BRNSSPublicationHubI
Â
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
Â
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
Â
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
Â
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL
Â
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
Â
Ăhnlich wie Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
(20)
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Â
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Â
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
Â
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
Â
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Â
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Â
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
Â
CryptoQR System based on RSA
CryptoQR System based on RSA
Â
9. 23765.pdf
9. 23765.pdf
Â
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
Â
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in using triple d...
Â
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
Â
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
Â
18. 23367.pdf
18. 23367.pdf
Â
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish Cipher
Â
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Â
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
Â
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
Â
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
Â
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
Â
Mehr von IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
Â
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
Â
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
Â
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
Â
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
Â
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
Â
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
Â
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
Â
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
Â
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
Â
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
Â
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
Â
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
Â
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
Â
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
Â
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
Â
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
Â
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
Â
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
Â
A MULTIPLE â CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE â CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Â
Mehr von IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
Â
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
Â
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
Â
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
Â
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
Â
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
Â
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
Â
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
Â
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
Â
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
Â
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
Â
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
Â
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
Â
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
Â
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
Â
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
Â
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
Â
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
Â
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
Â
A MULTIPLE â CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE â CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Â
KĂŒrzlich hochgeladen
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Â
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Â
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Â
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Â
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Boston Institute of Analytics
Â
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Â
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Â
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Â
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Â
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
Â
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Â
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Â
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Â
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Â
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Â
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Â
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Â
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(âïž+971_581248768%)**%*]'#abortion pills for sale in dubai@
Â
KĂŒrzlich hochgeladen
(20)
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Â
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Â
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Â
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Â
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Â
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Â
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Â
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Â
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Â
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Â
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Â
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Â
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Â
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Â
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Â
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Â
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Â
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Â
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 â 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 341 TRANSMITTING BULK AMOUNT OF DATA IN THE FORM OF QR CODE WITH CBFSC AND CHUNKING TECHNIQUES- FIGHTING AGAINST CRYPTANALYTIC ATTACKS Praveen.T Muthaiah.RM Asst.Professor ,Dept of CSE UG Student, Dept of CSE Veltech Hightech Engg College Veltech Hightech Engg College Krishnamoorthy.N UG Student, Dept of CSE Veltech Hightech Engg College ABSTRACT A technique to transmit bulk amount of data in the form of QR code (Quick Response Code) and to make secure transmission of QRC containing the information is proposed. Since last few years, two-dimensional (2D) codes have gained the attention of the people from the industrial backgrounds and gradually replaced one-dimensional bar codes in many applications due to their higher information storage capacity. Quick response (QR) codes, defined by the ISO/IEC18004 standard, are one of the most popular types of 2D codes. So,initially, the bulk information to be transmitted is put into a QR container. Considering the very dark side of the unsecure QR codes, we enhance security by chunking the actual QR to be transmitted and then encrypt individual chunk using the CHAOS BASED FEEDBACK STREAM CIPHER (CBFSC) mechanism. Using this technique, the chunked QR code is encrypted pixel by pixel considering the values of previously encrypted pixels, in each iteration. After this, each encrypted chunk is transmitted over the network as packets At the receiving end, the chunks are decrypted individually. Finally, they are clustered to get the original QR code that can be read using secure QR reader, thus fighting against cryptanalytic attacks. Thus a QR code containing the information to be transmitted is encrypted using the above said The advantage is that any changes in the plain image are cascaded forward throughout the cipher image, which means that two almost identical plain images will encrypt to completely different cipher images. Notably, all the QR images are almost identical and so is the reason we use the said technique. As the QR codes stand as data containers that provide more security when encrypted, from the viewpoint of data hiding researches, they shall then be regarded as the visible watermarks helping us to transmit bulk data. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 â 6367(Print) ISSN 0976 â 6375(Online) Volume 4, Issue 4, July-August (2013), pp. 341-349 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 â 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 342 1. INTRODUCTION In recent times, the computer networks and its use has grown enormously and hence there is a concern for the security of the information be it text or image or audio or any other multimedia and hence protecting the transmitted data stands unabated. When the information is transmitted over a network it is necessary to fight against cryptanalytic attacks. Most times we transmit bulk amount of data and for security we may use private key encryption algorithms such as triple DES or blowfish [9] .But the drawback is that the transmission is costly because of the size as well as the complexity of the encryption algorithms and so we use the QR code (expanded as Quick Response Code) [1][2] to store the bulk amount of data limiting the size than the usual. In order to make the transmission of QR containing the information secure [8][9], we propose a technique. Initially the QR containing the information is broken into chunks and encrypted individually using the CHAOS BASED FEEDBACK STREAM CIPHER [10] mechanism where the chunked QR code[1] is encrypted pixel by pixel[10] considering the values of previously encrypted pixels, in each iteration. After this each encrypted chunk is transmitted over the network as packets and at the receiving end the chunk is decrypted and clustered to get a original QR code that can be read using secure QR reader. The rest of the paper is organized as below: Section 2 surveys the conventional network transmission techniques and its pros and cons. Section 3 discusses the characteristics and advantages of the Quick Response Code. Section 4 deals with the issues with the use of QR code. Section 5 presents the need for encryption of QR code using Chaos Based Feedback Stream Cipher technique and furthermore explores the benefits of the CBFSC technique and its robustness against cryptanalytic attacks. Section 6 brings to light the efficiency of the well built QR code that contains large amount of data. Section 7 paves way to enhance further more security by chunking the actual QR to be transmitted and then applying the encryption algorithm used above. Section8 describes decryption of chunked QR code and clustering of the chunks to get the original QR and exploring the information in QR using the reader. The practical applicability and the pre-eminence of the proposed technique than the conventional one is dealt in section 9. Section 10 concludes the paper. 2. CONVENTIONAL TRANSMISSION TECHNIQUES 2.1 Network Security The global information technology infrastructure has become network centric, well allied and highly distributed. Network security is a concept to protect network and to make secure transmissions over the network. This clearly shows that by network security, we mean the data security which is a exigent aspect today. Clearly, information in electronic form as well as the technology for creating, transmitting, processing and storing information are increasingly important assets that can be targeted by criminals and it is demanding that it must be protected. In the distant past, operating systems and the computers on which they resided were afforded a degree of protection simply by virtue of their relative inaccessibility. This was because that they were used by relatively few staff in an organization, tended to be found in access controlled computer rooms, and were not connected to networks. But nowadays, they are often networked together within a company and increasingly connected to the World Wide Internet. The computing infrastructure is now global in scope and it is feasible to remotely access computers from almost everywhere in the world. Today, the principles of protection are still similar to those of the past, but the consequences of failure are more significant since computers are widely depended on for daily business operations. In addition, the frequency of incidents is on the increasing scale and the bad guys do not even have to be experts given the large set of tools available on the Internet that are capable of breaching system security. The purpose of computer and network security is to provide an umbrella of protection for the
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 â 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 343 organization in the form of policies and procedures as well as the technological implementation of measures to secure and protect a network. Doing this is not an easy matter. In fact, implementing strong electronic security is very difficult. It is fair to say that no system that is available today or that can even be imagined is 100% secure. There are simply too many ways to either break or circumvent security measures no matter how well it is constructed. To protect the data transmission over the network, We may have to concentrate on wide areas such as the cryptography [8][9], Data hiding, cipher technology[8], secure communication channel etc., 2.2 Encryption techniques There are many encryption techniques that are not capable of providing sufficient security to the network transmission. Many encryption methods have been proposed, and the most common way to protect large multimedia files is by using conventional encryption techniques. Implementations of popular public key encryption methods, such as RSA [8] cannot provide suitable encryption rates, while security of these algorithms relies on the difficulty of quickly factorizing large numbers or solving the discrete logarithm problem, that are seriously challenged by recent advances in number theory and distributed computing. Caesar cipher encryption technique and multiple encryptions are few of the Conventional encryption techniques that survived during the previous decade or even before. But now, there is a necessity for more efficient technique due to the proliferation of the Internet usage. 2.3 Data Containers At this juncture, we should also consider a point that it would not definitely be fair to use such a costly technique to transmit data even on a larger scale. On the other hand, compressing the data would also not be a solution. So, here we bring in the concepts of Data Containers (1D or 2D) into picture.[1][7] 3. CHARACTERISTICS AND ADVANTAGE OF QR CODES 3.1 Quick Response Codes Since last few years, two-dimensional (2D) codes have gained the attention of the people from the industrial backgrounds and gradually replaced one-dimensional bar codes in many applications due to their higher information storage capacity. QR code is hence as an information container which can be captured and decoded by smart phones directly[3][4]. Quick response (QR) codes, defined by the ISO/IEC18004 standard [1][7], are one of the most popular types of 2D codes. Thus, Quick response codes (QR Codes) are two-dimensional barcodes designed to share encoded information in a variety of formats. QR code is just a matrix bar code containing much more amount of information than its 1D counterpart A typical QR code is a square black and white pixelated box [2]. Encoded information may contain simple text, graphics, or direct users to a website or landing page for additional information. Furthermore Barcode technology is superior in speed, steadfastness, information capacity, universality, and cost. The two dimensional code can encode in 2-D directions, represent thousands of characters, and bear a certain automatic error correction capability. The information in the code can be encrypted, which needs special software to decipher and decode [8][9], which ensure better security. Quick Response codes, QR code for short, is a two-dimensional barcode with high information density, error correction ability and convenient encryption mechanism. 3.2 Applications Because of the wide-spreading of smart phones and extended wireless networks, people are getting familiar with acquiring information via mobile phones nowadays [3]. QR code has the error
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 â 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 344 correcting capability since Reed-Solomon (RS) codes have already been integrated into the standard QR codes[1][2][7]. With the aid of QR codes, users can avoid tedious typing. Since the cost of information transfer using QR code is extremely low as compared with many other technologies, the QR code is the most widely used as information container which has already been applied to numerous stuffs like posters, books or magazines) on the small size screen of smart phones[3]. They are extensively used in many commercial applications due to their high-speed decoding. Furthermore, since modern handheld devices can show a barcode on their screen with enough resolution to decode it, a broad range of emerging applications may use QR codes in a variety of scenarios such as boarding passes, event tickets, retailer cards identification systems, etc., 3.3 Transformation in QRâs applications The QR code shall easily be seen in web pages or on posters nowadays. It is a two- dimensional code in square shape, mostly represented by binary form (black and white pixels). It is easily recognizable because it looks like a random pattern[6]. Colorized QR codes too are in existence. The beautifications of QR codes have also been proposed recently. During the origination of the QR codes, the purpose was to utilize the quick connection to the specific web page with the URL information converted to the QR code pattern. But these days they stand as data containers that provide more security when encrypted since from the viewpoint of data hiding researches, QR code shall then be regarded as the visible watermarks. 3.4 Ease of QR scanning A few years ago, specific scanners were designed to capture QR code images and decode them. Nowadays, however, given the increasing computational capability of cell phones, as well as the quality and resolution of the latest embedded cameras[4][5], they have emerged as suitable devices to perform this kind of image processing tasks. 3.5 Proposed Application And now we propose the concept of the Quick Response code in network transmission and here raises the question of security which is being dealt in forth coming sections of this paper. We perform the following in the proposed technique. Initially, the bulk information to be transmitted is put into a QR container. Considering the very dark side of the unsecure QR codes, we enhance security by chunking the actual QR to be transmitted We now encrypt individual chunk using the CHAOS BASED FEEDBACK STREAM CIPHER (CBFSC) mechanism. Using this technique, the chunked QR code is encrypted pixel by pixel considering the values of previously encrypted pixels, in each iteration. After this, each encrypted chunk is transmitted over the network as packets At the receiving end, the chunks are decrypted individually. Finally, they are clustered to get the original QR code that can be read using secure QR reader, thus fighting against cryptanalytic attacks. 4. THE DARK SIDE OF QR CODES 4.1 The un-secure QR code Hidden in those lines are embedded codes which only our smart phones can read and point it to a new location on the Web. Online marketing gurus are singing the digital praises for the inexpensive cost with maximum return on investment. The online marketing industry is one example. Agents are able to market their hottest products by embedding QR codes into their signs
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 â 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 345 and brochures. This does not limit only to the marketing sector, but certainly from many petty small scale industries to pretty big corporate. The QR design companies say they're viewing exponential growth in their business over the past two years. But security experts say no so fast[1]. 4.2 After math of reading an un-secure QR Taking your smart phone to a new site certainly can seem cool if you trust the source. But experts believe it's just a matter of time before hackers are able to hijack this clever code, taking you someplace you didn't plan on going. The results could be a nasty virus, botnet, or malicious code that records your personal information, your location, even your bank account numbers. As with any new technology that allows and encourages sharing data, there is always the chance that identification and financial information may be at risk. QR codes that are scanned to gain instant access to a text message are less likely to place a userâs identity and personal information at risk than near field communication used for the so called contactless payments. Hence, it places the personal information at risk from fraudulent sites and malicious programs thus putting the QR codes onto its dark side. 5. NEED FOR THE ENCRYPTION OF QR CODES Encrypting data in Quick Response Codes eliminates the dangers associated with loss or theft. The process makes data worthless to unauthorized users. Typically, by processing data through a mathematical formula called an algorithm, encryption software converts data into "cipher text."[8] Following this conversion, that data requires users to input their unique credentials to gain access to it. Provided those credentials stay private, they make it virtually impossible for others to access the data. It is broadly agreed that we are in an information and knowledge economy. In the short term 4G, the next generation of smart phone connectivity, will give download speeds of up to 100Mbps as standard. That means entire databases can be downloaded in seconds, to any device and in any location across the globe. Smart phones and tablets will eclipse the traditional PC as the devices of choice for business users. In current scenario, 70% of business users have one smart phone for both business and personal use. This will increase the mobility of data and blur the home-work boundaries even more. When this is the case for a huge database, it is indescribable for a QR code. 5.1 Encryption of QRC using Chaos Based Feedback Stream Cipher algorithm 5.1.1 Robustness of an Encryption technique against Cryptanalytic attacks A good information security system should not only protect confidential messages in the text form, but also in image form. In general, there are three basic characteristics in the information security field privacy, integrity, and availability. By Privacy, we mean that an unauthorized user cannot disclose a message and by integrity we connote that an unauthorized user cannot modify or corrupt a message. Finally by availability we signify that messages are made available to authorized users faithfully. The encryption system should be computationally secure[8]. It must require an extremely long computation time to break, for example. Unauthorized users should not be able to read privileged images. Encryption and decryption should be fast enough not to degrade the system performance. The algorithms for encryption and decryption must be simple enough to be done by users with a personal computer. The security mechanism should be as widespread as possible[8][9]. It must be widely acceptable to design a cryptosystem like a commercial product. The security mechanism should be flexible. There should not be a large expansion of the encrypted image data. The chosen Chaos Based Feedback Stream Cipher technique abides by all the above requirements.
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 â 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 346 5.1.2 Chaos Based Feedback Stream Cipher technique The close association between chaos and cryptography makes chaos based cryptographic algorithms as a natural preference for secure communication and cryptography. The chaos based encryption techniques are considered superior for practical use as these techniques provide a good combination of speed, high security, complexity, reasonable computational overheads and computational power etc.[10] An overview of CBFSC encryption module is depicted here. This is a simple block cipher with block size of 8-bit and 256-bit secret key. The key is used to generate a pad that is then merged with the plaintext a byte at a time. 1. For the encryption or decryption ,we divide the plain text or the cipher text into blocks of 8 bits. Plain text and the cipher text of i blocks are represented as P ï P1P2P3P4 ..........Pi C ï C1C2C3C4 ..........Ci 2. The proposed image encryption process utilizes an external secret key of 256-bit long. Further, the secret key is divided into blocks of 8-bit each, referred as session keys. K ï K1K2K3K4 .........K64 (in hexadecimal) Here, Ki 's are the alphanumeric characters (0â9 and AâF) and each group of two alphanumeric characters represents a session key. Alternatively, the secret key can be represented in ASCII mode as K ï K1K2K3K4 .........K32 (in ASCII) Here, each Ki represents one 8-bit block of the secret key i.e. session key. 3. The initial condition for the chaotic map and the initial codes are generated from the session keys 4. Read a byte from the image file (that represent a block of 8-bits) and load it as plain image pixel Pi . 5. Encryption of each plain image pixel Pi to produce its corresponding cipher image pixel Ci . The entire image is encrypted pixel by pixel considering the values of previously encrypted pixels, in each iteration 6. Repeat steps 4-5 until the entire image file is exhausted. 5.2 Why CBFSC for QR Code? Thus a QR code containing the information to be transmitted is encrypted using the above said algorithm. The use of feedback mechanism has two desirable benefits. The first benefit is that there can be no simple periodicity in the encrypted image because the encryption of each plain image pixel depends not only on the encryption key, but also on the previous cipher image pixel. The next is that any changes in the plain image are cascaded forward throughout the cipher image, which means that two almost identical plain images will encrypt to completely different cipher images[10]. Notably, all the QR images are almost identical and so is the reason we use the said technique 6. WELL- BUILT QRC AFTER ENCRYPTION The sensitivity to the plain image is also a plus to the security of the used CBFSC. High key sensitivity is required by secure image cryptosystems, which means that the cipher image (QRC) cannot be decrypted correctly although there is only a slight difference between encryption or decryption keys. This guarantees the security of the QRC against brute-force attacks [8][9] to some extent. An ideal image encryption procedure should be sensitive with respect to both the secret key and plain image. The change of a single bit in either the secret key or plain image should produce a
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 â 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 347 completely different encrypted image [10]. The basic concept is that the encryption of each part of the plain image depends not only on the key, but also on the previous cipher image. a)Quick Response Code with information b) The encrypted image of the QR Code c) The decrypted image of the QR code 7. ENHANCED SECURITY BY CHUNKING THE QRC The Quick Response Code is chunked before the encryption is applied. The above is included in the proposed technique in order to enhance further security to the data in the QR container thus preventing the data against the cryptanalytic attacks during its transmission over an interconnected network. The robustness of the technique used has further reinforcement of a feedback mechanism, which leads the cipher to a cyclic behavior so that the encryption of each plain pixel depends on the key, the value of the previous cipher pixel and the output of the logistic map. On top of this, our idea is to chunk the QR code into pieces using any chunking algorithm which shall then be used in clustering the QR code chunks at the reception end. Once the actual Quick Response Code is chunked, we apply the CBFSC technique and then transmit it as packets over the network. When this is done, each chunk that is subjected to encryption will have separate and distinct secret keys and thus the chance for the cryptanalytic attack is very negligible. 8. RECEPTION OF THE QR SENT OVER NETWORK At the receiving end, we shall decrypt each and every packet that we call as the encrypted QR chunk using the reverse of CBFSC technique. In the decryption module, the same pad is generated but it is un-merged with the cipher text to retrieve the plaintext. The decryption module receives an encrypted image (cipher image) as input and the 256-bit secret key and returns the original image (QR chunk). In particular, the decryption module works in the same way as the encryption module[10] but now the output of the logistic map is subtracted from the corresponding cipherimage
8.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 â 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 348 pixel Ci providing the plainimage pixel Pi as we used the iterative procedure . The output of the decryption module is the original image (QR chunk).Decryption of each cipherimage pixel Ci to produce its corresponding plainimage pixel Pi [10] a)Decrypted QR chunks Finally we cluster all the decrypted QR chunks [11] using the clustering (reverse of the one used for chunking).Finally we get the entire QR code as output that contains the large amount of information. b)The entire QRC after clustering This actual QR code contains the original information that was intended for transmission. If there is an error in decryption of any of the QR chunks may be with a slightly wrong secret key, then we surely will fail to extract the actual information in the QR. Thus we increase the complexity for the bad attackers to attack the transmission. 9. PRACTICAL APPLICABILITY AND PRE-EMINENCE OF THE PROPOSAL The technique that we have proposed has got an immense applicability practically and hence this technique shall be used widely. We enlighten this because we use a very strong technique that stands against loss of information with an intention to disallow the cryptanalytic attacks any further. Another exclusive benefit of our proposed technique is that the transmission cost is comparatively less since we transfer a large amount of data into a single QR container and then apply the encryption algorithm rather than apply the encryption algorithm to the data itself. Yet again we can say that our proposed technique is efficient because we suggest to chunk the QR code before the encryption and cluster [11] the chunks after the decryption. Our chunking and clustering idea adds further security to the already secure and efficient encrypted transmission of the entire QR code over the network. 10. CONCLUSION In this paper we propose a technique for extremely safest and secure transmission of large amount of information using a efficient QR code and our use of the Chaos Based Feedback Stream Cipher technique adds further security to the transmission. Using this proposed technique, we shall put a large amount of information that is intended for the transmission into the data container called Quick Response Code and hence achieve the maximum effectiveness and security for transmission of large amount of data. Furthermore, we have also discussed the characteristics of image cryptosystems, chaos and cryptography and issues related to network transmission and the need for security is also brought to light.
9.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 â 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 349 11. REFERENCES [1] www.qrcode.com [2] QR-Code Generator, http://qrcode.kaywa.com/, 2010. [3] International Standard. ISO/IEC 18004. Information technology --Automatic identification and data capture techniques -- QR Code 2005 bar code symbology specification. Second Edition. 2006-09-01. [4] E Ohbuchi, H Hanaizumi, LA Hock, âBarcode readers using the camera device in mobile phonesâ Cyber worlds, 2004 International Conference on (2004), pp. 260-265. [5] C.-H. Chu, D.-N. Yang and M.-S Chen, âImage stabilization for 2D barcode in handheld devices,â Proc. of the 15th ACM Int. Conf. on Multimedia, Augsburg, Germany, pp.697-706, Sep. 2007 [6] K. Fujita, M. Kuribayashi, and M. Morii, âA study of image displayable design qr code,â IEICE Tech Report (in Japanese), vol. 110, no. 374, pp. 39â44, 2011. [7] GB/T 18284-2000 "Quick Response Code",Beijing, National Standards Press,2000 [8] W. Stallings., "Cryptography and Network Security: Principles and Practice," Prentice-Hall, New Jersey, 1999. [9] Bruce Schneier, "Applied Cryptography âProtocols, algorithms, and source code in C,"John Wiley & Sons, Inc., New York, second edition, 1996 [10] An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption, Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah Menoufia University, [11] Kuo, S. P., Wu, B. J., Peng, W. C., and Tseng, Y. C. Cluster enhanced Techniques for Pattern Matching Localization Systems, in IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2007. [12] Ahmad Salameh Abusukhon, âBlock Cipher Encryption for Text-To-Image Algorithmâ, International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 50 - 59, ISSN Print: 0976 â 6367, ISSN Online: 0976 â 6375. [13] Santosh Abaji Kharat and Dr.B.M.Pange, âQr (Quick Response) Codes and Academic Libraries: Reaching to Mobile Users a Best Practicesâ, International Journal of Library and Information Science (IJLIS), Volume 2, Issue 1, 2013, pp. 1 - 18, ISSN Print: 2277 â 3533, ISSN Online: 2277 â 3584.
Jetzt herunterladen