Downloads: 135 | Views: 277
Informative Article | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017 | Popularity: 6.2 / 10
A Secured Quick Response (QR) Code Method with Fuzzy Encoding of Secret Message
Dr. Siddhartha Choubey, Nidhi Chandel
Abstract: Now a day everywhere Digital formation is involved. all people are use to technology in daily life but the excess use of technology safety is also more important. Quick response code is the process that high quality features such as stored high capacity information in small coded from and embed the secret information. The cryptography technique is used for hiding secret message, the process at the sender side to encode the original message in to any coded from and at receiver side the decoded the original message. Hiding original message is based on bit technique so it is chance to modification attack. if attacker change any bit such as adding a new bit or change the bit then it is some problem arise to recover the original message. In this paper, we propose the a scheme based on Cyclic Redundancy Check and list the decoding to overcome this problem we also conduct our solution by analyzing the complexity, security, experiment.
Keywords: QR code, Cyclic Redundancy Check, cryptography, encryption, decryption, encode, decode, error correction code,
Edition: Volume 6 Issue 4, April 2017
Pages: 321 - 324
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 91 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 11 Issue 9, September 2022
Pages: 837 - 842An Optimized IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing Using Deep Learning
Bharathi K.