Security: An Effective Technique to Protecting Sensitive Information using Quick Response Code

被引:0
|
作者
Khedekar, Lokesh S. [1 ]
机构
[1] Govt Coll Engn, Aurangabad, Maharashtra, India
关键词
Barcode; Data Hiding; Quick Response code (QR Code); Unique Identification (UUID); Network;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Today it is very necessary to protecting Sensitive information from external world. To protecting sensitive information now a day's barcode technique is used. In the real world many industries are using the technique to protect sensitive information form external parties. This paper contains the algorithm which helps to protect the sensitive information. This proposed algorithm is useful to hiding information and to store big amount of data with high percentage of error correction of information. In this paper i will introduce you about the smart credential cum unique identification and reorganization system which help us to identify product uniquely without any interrupt.
引用
收藏
页码:1185 / 1188
页数:4
相关论文
共 50 条
  • [41] Using prior information in privacy-protecting survey designs for categorical sensitive variables
    Groenitz, Heiko
    STATISTICAL PAPERS, 2015, 56 (01) : 167 - 189
  • [42] New Multimedia Archiving Technique Using Multiple Quick-Response Codes
    Sarkar, Sayani
    Pu, Limeng
    Wu, Hsiao-Chun
    Huang, Scott C. -H.
    Wu, Yiyan
    2017 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2017, : 490 - 495
  • [43] Optical encryption of digital data in form of quick response code using spatially incoherent illumination
    Cheremkhin, Pavel A.
    Krasnov, Vitaly V.
    Rodin, Vladislav G.
    Starikov, Rostislav S.
    ASIA-PACIFIC CONFERENCE ON FUNDAMENTAL PROBLEMS OF OPTO- AND MICROELECTRONICS, 2017, 10176
  • [44] Use of a Randomized Response Technique to obtain sensitive information on animal disease prevalence
    Cross, Paul
    Edwards-Jones, Gareth
    Omed, Hussain
    Williams, A. Prysor
    PREVENTIVE VETERINARY MEDICINE, 2010, 96 (3-4) : 252 - 262
  • [46] Information Security using Visual Cryptographic Technique for Resource Constrained Devices
    Singh, Rahul Kumar
    Singh, Brijendra Pratap
    Gore, M. M.
    2017 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [47] Data hiding technique in steganography for information security using number theory
    Rehman, Amjad
    Saba, Tanzila
    Mahmood, Toqeer
    Mehmood, Zahid
    Shah, Mohsin
    Anjum, Adeel
    JOURNAL OF INFORMATION SCIENCE, 2019, 45 (06) : 767 - 778
  • [48] Security enhancement in optical code division multiplexed system using anti jamming technique
    Singh, Simranjit
    Kaur, Kawalpreet
    OPTOELECTRONICS AND ADVANCED MATERIALS-RAPID COMMUNICATIONS, 2016, 10 (9-10): : 680 - 684
  • [49] Estimation for sensitive characteristics using optional randomized response technique
    Kuo-Chung Huang
    Quality & Quantity, 2008, 42 : 679 - 686
  • [50] Estimation for sensitive characteristics using optional randomized response technique
    Huang, Kuo-Chung
    QUALITY & QUANTITY, 2008, 42 (05) : 679 - 686