Security: An Effective Technique to Protecting Sensitive Information using Quick Response Code

被引:0
|
作者
Khedekar, Lokesh S. [1 ]
机构
[1] Govt Coll Engn, Aurangabad, Maharashtra, India
关键词
Barcode; Data Hiding; Quick Response code (QR Code); Unique Identification (UUID); Network;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Today it is very necessary to protecting Sensitive information from external world. To protecting sensitive information now a day's barcode technique is used. In the real world many industries are using the technique to protect sensitive information form external parties. This paper contains the algorithm which helps to protect the sensitive information. This proposed algorithm is useful to hiding information and to store big amount of data with high percentage of error correction of information. In this paper i will introduce you about the smart credential cum unique identification and reorganization system which help us to identify product uniquely without any interrupt.
引用
收藏
页码:1185 / 1188
页数:4
相关论文
共 50 条
  • [1] Enhanced Security in Steganography using Encryption and Quick Response Code
    Karthikeyan, B.
    Kosaraju, Abhilash Choudary
    Gupta, Sudeep S.
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 2308 - 2312
  • [2] Retrieve Information From Articles By Using Quick Response Code
    Abualsha'ar, Najeeb
    Al-Jararwah, Mohammad
    Al-refai, Ghaith
    Amer, Anwar Bani
    Tashtoush, Yahya
    Al-refai, Mohammed
    2020 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2020, : 1 - 6
  • [3] An effective mechanism for medical images authentication using quick response code
    Kavitha, C.
    Sakthivel, S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S4375 - S4382
  • [4] An effective mechanism for medical images authentication using quick response code
    C. Kavitha
    S. Sakthivel
    Cluster Computing, 2019, 22 : 4375 - 4382
  • [5] Reversible Hiding with Quick Response Code - A Responsible Security
    Anudeep, B. D. J.
    Sai, Mohan N.
    Bhanuj, Sai T.
    Devi, R. Santhiya
    Kumar, Vaishnavi
    Thenmozhi, K.
    Rengarajan, Amirtharajan
    Praveenkumar, Padmapriya
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 501 - 505
  • [6] Identification Recovery Scheme using Quick Response (QR) Code and Watermarking Technique
    Chen, Ji-Hong
    Chen, Wen-Yuan
    Chen, Chin-Hsing
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (02): : 585 - 596
  • [7] A Code of Practice for Effective Information Security Risk Management Using COBIT 5
    Al-Ahmad, Walid
    Mohammed, Basil
    2015 SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYBER FORENSICS (INFOSEC), 2015, : 145 - 151
  • [8] Temple Information Retrieval System using Quick Response Code via Mobile Application
    Vichivanives, Rujijan
    Ralangarm, Sakolphak
    7TH WORLD CONFERENCE ON EDUCATIONAL SCIENCES, 2015, 197 : 998 - 1005
  • [9] Storage and Transmission of Information using Grey level QR (Quick-Response) Code structure
    Tank, Aaditya Harish
    Patel, Bhavika Jayantilal
    Unde, Mitali Mahadev
    Raskar, Punam
    2016 CONFERENCE ON ADVANCES IN SIGNAL PROCESSING (CASP), 2016, : 402 - 405
  • [10] Review On Quick Response Codes In The Field Of Information Security (Analysis Of Various Imperceptibility Characteristics On Grayscale And Binary QR code)
    Ramya, V.
    Gopinath, G.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY (ICAET), 2014,