Implementing Security of QR codes in Ecommerce application

Authors

  • Nidhi Research Scholar, Department of CSE, CBS Group Of Institutions Jhajjar, Haryana
  • Nishika Assistant Professor, Department of CSE, CBS Group Of Institutions Jhajjar, Haryana

Keywords:

embedded, steganography, dimensional, efficiently

Abstract

This research take account of QR codes security mechanism in ecommerce application, its real time application in day to day life & research areas associated. With the technology of mobile phones constantly emerging, especially in the area of mobile internet access, QR codes seem to be an adequate tool to quickly & efficiently converse URLs to users. It also allows offline media such as magazines, newspapers, business cards, public transport vehicles, signs, t-shirts & any other medium that may embrace print of a QR code to be used as carriers for advertisements for online products. QR code being so versatile because of its structural flexibility that it leads to so many diverse field for research such as increasing data capacity, security applications such as different kinds of watermarking & steganography as well. Several experiments have also been done for better recognition of QR code image which consists of scratch removal techniques. QR codes have capability to symbolize same amount of data within approximately one tenth space of a traditional barcode statistically. Information like URL, SMS, contact information & plain text may be embedded into two dimensional matrix. Moreover, with explosive increment of trend to utilize smartphones has played a significant role within popularity of QR codes.

References

Symmetric Key Cryptography using Random Key generator: AsokeNath, SaimaGhosh, MeheboobAlamMallik: “Proceedings of International conference on security &management(SAM‟10” held at Las Vegas, USA Jull 12-15, 2010), P-Vol-2, 239-244(2010).

A new Symmetric key Cryptography Algorithm using extended MSA method : DJSA symmetric key algorithm, DriptoChatterjee, JoyshreeNath, SuvadeepDasgupta&AsokeNath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 3-5 June,2011, Page-89-94.

New Symmetric key Cryptographic algorithm using combined bit manipulation & MSA encryption algorithm: NJJSAA symmetric key algorithm: NeerajKhanna,JoelJames,JoyshreeNath, SayantanChakraborty, AmlanChakrabarti&AsokeNath : Proceedings of

IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130.

Advanced Symmetric key Cryptography using extended MSA method: DJSSA symmetric key algorithm: DriptoChatterjee, JoyshreeNath, SoumitraMondal, SuvadeepDasgupta&AsokeNath, Jounal of Computing, Vol3, issue-2, Page 66-71,Feb(2011).

Advanced Steganography Algorithm using encrypted secret message :JoyshreeNath&AsokeNath, International Journal of Advanced Computer Science & Applications, Vol-2, No-3, Page-19-24, March(2011).

Symmetric key Cryptography using modified DJSSA symmetric key algorithm, DriptoChatterjee, JoyshreeNath, Sankar Das, ShalabhAgarwal.

Cryptography & Network, Willian Stallings, Prentice Hall of India.

Cryptography & Network Security, B.A.Forouzan, Tata Mcgraw Hill Book Company.

Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method & NJJSAA method: TTJSA algorithm “ Proceedings of Information & Communication Technologies (WICT), 2011 “ held at Mumbai, 11th – 14th Dec, 2011, Pages:1175-1180.

H. S. Al-Khalifa. Utilizing qr code & mobile phones for blinds & visually impaired people. In ICCHP, pages 1065–1069, 2008.

Downloads

Published

30-09-2016

How to Cite

Nidhi, & Nishika. (2016). Implementing Security of QR codes in Ecommerce application. International Journal for Research Publication and Seminar, 7(4). Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/854

Issue

Section

Original Research Article