International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 135 | Views: 277

Informative Article | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017 | Popularity: 6.2 / 10


     

A Secured Quick Response (QR) Code Method with Fuzzy Encoding of Secret Message

Dr. Siddhartha Choubey, Nidhi Chandel


Abstract: Now a day everywhere Digital formation is involved. all people are use to technology in daily life but the excess use of technology safety is also more important. Quick response code is the process that high quality features such as stored high capacity information in small coded from and embed the secret information. The cryptography technique is used for hiding secret message, the process at the sender side to encode the original message in to any coded from and at receiver side the decoded the original message. Hiding original message is based on bit technique so it is chance to modification attack. if attacker change any bit such as adding a new bit or change the bit then it is some problem arise to recover the original message. In this paper, we propose the a scheme based on Cyclic Redundancy Check and list the decoding to overcome this problem we also conduct our solution by analyzing the complexity, security, experiment.


Keywords: QR code, Cyclic Redundancy Check, cryptography, encryption, decryption, encode, decode, error correction code,


Edition: Volume 6 Issue 4, April 2017


Pages: 321 - 324



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Dr. Siddhartha Choubey, Nidhi Chandel, "A Secured Quick Response (QR) Code Method with Fuzzy Encoding of Secret Message", International Journal of Science and Research (IJSR), Volume 6 Issue 4, April 2017, pp. 321-324, https://www.ijsr.net/getabstract.php?paperid=ART20172129, DOI: https://www.doi.org/10.21275/ART20172129



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 91 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 11 Issue 9, September 2022

Pages: 837 - 842

An Optimized IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing Using Deep Learning

Bharathi K.

Share this Article
Top