Security: An Effective Technique to Protecting Sensitive Information using Quick Response Code

被引:0
|
作者
Khedekar, Lokesh S. [1 ]
机构
[1] Govt Coll Engn, Aurangabad, Maharashtra, India
关键词
Barcode; Data Hiding; Quick Response code (QR Code); Unique Identification (UUID); Network;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Today it is very necessary to protecting Sensitive information from external world. To protecting sensitive information now a day's barcode technique is used. In the real world many industries are using the technique to protect sensitive information form external parties. This paper contains the algorithm which helps to protect the sensitive information. This proposed algorithm is useful to hiding information and to store big amount of data with high percentage of error correction of information. In this paper i will introduce you about the smart credential cum unique identification and reorganization system which help us to identify product uniquely without any interrupt.
引用
收藏
页码:1185 / 1188
页数:4
相关论文
共 50 条
  • [31] Building Customer Loyalty In Digital Transaction Using QR Code: Quick Response Code Indonesian Standard (QRIS)
    Chohan, Fulshah
    Aras, Muhamad
    Indra, Ricardo
    Wicaksono, Andhika
    Winardi, Freddy
    JOURNAL OF DISTRIBUTION SCIENCE, 2022, 20 (01): : 1 - 11
  • [32] Multi-Level Information Storage Using Engineered Electromechanical Resonances of Piezoelectric Wafers: A Concept Piezoelectric Quick Response (PQR) Code
    Hakoda, Christopher
    Davis, Eric S.
    Pantea, Cristian
    Chillara, Vamshi Krishna
    SENSORS, 2020, 20 (21) : 1 - 7
  • [33] Anticounterfeiting Quick Response Code with Emission Color of Invisible Metal-Organic Frameworks as Encoding Information
    Wang, Yong-Mei
    Tian, Xue-Tao
    Zhang, Hui
    Yang, Zhong-Rui
    Yin, Xue-Bo
    ACS APPLIED MATERIALS & INTERFACES, 2018, 10 (26) : 22445 - 22452
  • [34] Subsampling-Based Image Tamper Detection and Recovery Using Quick Response Code
    Wu, Wen-Chuan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 201 - 216
  • [35] A SOFTWARE FRAMEWORK FOR CODE SECURITY USING M-COT-METRICS BASED CODE OBFUSCATION TECHNIQUE
    Senthilkumar, R.
    Thangavelu, Arunkumar
    JURNAL TEKNOLOGI, 2016, 78 (02): : 73 - 81
  • [36] Using information security as a response to competitor analysis systems
    Gordon, LA
    Loeb, MP
    COMMUNICATIONS OF THE ACM, 2001, 44 (09) : 70 - 75
  • [37] A New Approach for Information Security using an Improved Steganography Technique
    Juneja, Mamta
    Sandhu, Parvinder Singh
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2013, 9 (03): : 405 - 424
  • [38] Information Security Risk Assessment by using Bayesian Learning Technique
    Foroughi, Farhad
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 91 - 95
  • [39] Achieving Privacy and Security using QR Code by means of Encryption Technique in ATM
    Malathi, V.
    Balamurugan, B.
    Eshwar, S.
    2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 281 - 285
  • [40] Using prior information in privacy-protecting survey designs for categorical sensitive variables
    Heiko Groenitz
    Statistical Papers, 2015, 56 : 167 - 189