Academic literature on the topic 'Encrypted data in QR code'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encrypted data in QR code.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Encrypted data in QR code"

1

Alsalem, Hussain, Faisal Alotaibi, Mohsen Bamardouf, et al. "Laboratory Access Implementing QR Code Authentication Using OTP." International Journal on Cybernetics & Informatics 12, no. 5 (2023): 121–41. http://dx.doi.org/10.5121/ijci.2023.120511.

Full text
Abstract:
Laboratories in colleges are used to give lectures to students, but what about after working hours? Students can get many benefits from these labs after working hours. For example, students can study and do their homework after working hours. In this project, we have proposed a new technique to control the access of these laboratories. Our idea is to use an encrypted QR code with an TOTP authentication that will be connected to LAN network to guarantee that each student enter can only use a single PC. Each student will have his own encrypted QR code that differs from other students. The TOTP c
APA, Harvard, Vancouver, ISO, and other styles
2

Vikas H. "Optimizing Passport Verification Processes with Secure QR Code Technology." Communications on Applied Nonlinear Analysis 32, no. 5s (2024): 179–91. https://doi.org/10.52783/cana.v32.3003.

Full text
Abstract:
The main concern of today can be the quality and the security of the data. One of the new methods of the security system to resolve this can be the utilization of the QR codes, which can reduce the larger misinterpretation of the data and enhance the security, considering this research article promotes a method to encrypt the data to a QR code, which can avoid the manipulation of the data. The preferred QR code is encrypted using a secret key and will not be shared to the unauthorized personals, the usual and finest method of encryption is incorporated, which is TTJSA algorithm. The quick resp
APA, Harvard, Vancouver, ISO, and other styles
3

Tsai, Chwei-Shyong, Hsin-Liang Chen, Hsien-Chu Wu, and Josh Jia-Ching Ying. "A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code." Symmetry 13, no. 10 (2021): 1896. http://dx.doi.org/10.3390/sym13101896.

Full text
Abstract:
The information technique has developed rapidly. The technique of QR codes is widely applied in our daily life, and the mechanism is suitable to share data. A QR code uses symmetric encryption to store and retrieve data efficiently. However, the security issues of QR codes are seldom discussed by the wider community. Moreover, if the sender wishes only the authorized participant to attain the private data which are shared, the data must be encrypted. Furthermore, we do not know who should be censured when problems arise. In view of this, to maintain the integrity and the confidentiality of inf
APA, Harvard, Vancouver, ISO, and other styles
4

Chaudhary, Yash. "Encryption and Decryption of Messages using QR and Steganography." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 285–89. http://dx.doi.org/10.22214/ijraset.2024.65010.

Full text
Abstract:
The main motive of this project is to prevent data leak in chat applications. So, to cover a protection for it we are introducing a chat application in which you can share your important details in encrypt and receive in decrypt form which are QR and Image Steganography. For preventing of data leak, we have created an application based on QR code and Image Steganography encryption and decryption where you can chat with a specified person. Whom you want to send the encrypted message through hiding the data inside a verified signature QR code created by my team so that no other QR code app can e
APA, Harvard, Vancouver, ISO, and other styles
5

Noman Abed, Hazim. "Robust and Secured Image Steganography using LSB and Encryption with QR Code." Journal of Al-Qadisiyah for computer science and mathematics 9, no. 2 (2017): 1–9. http://dx.doi.org/10.29304/jqcm.2017.9.2.144.

Full text
Abstract:
The great development obtained with digital communication system depends on the improvement of the amount and security of transmitting information, the secrecy of data transmitted becomes a main subject for the researcher. Cryptography and Steganography play a major role for secured data transfer. In this research, the cryptography and steganography method was proposed for information security. In cryptography, the encrypted message was obtained by XOR the secret message with QR code. While, in Steganography the encrypted message was embedded inside cover image using LSB technique. The new app
APA, Harvard, Vancouver, ISO, and other styles
6

Ms. J Seetha, Dr. G Manikandan, Ms. S. Hemalatha, and Ms. Vilma Veronica. "QR Code Recognition Based on Image Processing." International Journal of Scientific Research in Science and Technology 11, no. 2 (2024): 160–68. http://dx.doi.org/10.32628/ijsrst52411227.

Full text
Abstract:
To solve the QR code recognition problem caused by ordinary camera collection, the recognition algorithm based on image processing is put forward in this paper. The whole process including image binarization, image tilt correction, image orientation, image geometric correction and image normalization allows images collected on different illumination conditions. Experiments show that the improved method can enhance the recognition speed of two-dimensional code and accuracy. QR i.e. “Quick Response” code is a 2D matrix code that is designed by keeping two points under consideration, i.e. it must
APA, Harvard, Vancouver, ISO, and other styles
7

Priya Pankaj Kumar, Om Prakash, Sudhir Kumar. "A Study of E-Authentication Systems Based on QR Codes Through Analysis." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (2023): 4631–35. http://dx.doi.org/10.52783/tjjpt.v44.i3.2616.

Full text
Abstract:
In order to improve security and user experience, this article suggests an authentication system that combines Quick Response (QR) code technology with One-Time Password (OTP) technology. Each time an authentication attempt is made, the system generates a unique QR code and an OTP that must be scanned with a mobile device in order to complete the authentication process. Encrypted data, validated by the server, including the user's identity and the OTP included in the QR code. An effective, user-friendly, and secure way of user identification is provided by the suggested system, which is essent
APA, Harvard, Vancouver, ISO, and other styles
8

Hassan, Khalil Silman, and Ezaldeen Ali Akbas. "Survey of Web of Things and Quick Response Code." Recent Trends in Computer Graphics and Multimedia Technology 2, no. 1 (2020): 1–15. https://doi.org/10.5281/zenodo.3843235.

Full text
Abstract:
<em>The current internet of things (IoT) architecture is generally accepted to be extremely fractured. The web of things (WoT) aims at counteracting fragmentation using Internet concepts, QR code is code for a tow dimension matrix constructed with Two things in mind It Should Wide Store Quantities Data versus one dimension barcodes, and decode them at High speed for any computer, including phones. QR code offers high data storage capacity, quick searching, omnidirectional legibility, among several other benefits, error correction and various models. Also available are encrypted QR code, QR cod
APA, Harvard, Vancouver, ISO, and other styles
9

Nikam, Sakshi Santosh. "Smart ATM Using QR." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36026.

Full text
Abstract:
Nowadays, dependency on banking in the virtual world has been increased to the peak position. To make it consistent advanced technologies should be used. As OTP is currently used worldwide for security purposes, it can be overruled by QR code. Main advantage of QR code over OTP data storage.OTP can only confirm that the user is authorised user and not some third party is involved in this transaction while QR code not only confirms the authorised user but QR code itself can store information such as transaction id, transaction date, time and also amount of transaction. So, there is no need of e
APA, Harvard, Vancouver, ISO, and other styles
10

Lwiantoro, Gerardo Axel, Farhan Putra Salsabil, Gregorius A. N. Aditantyo, and Derwin Suhartono. "Utilization of QR Code for Tracking Digital Expenses." Engineering, MAthematics and Computer Science (EMACS) Journal 3, no. 2 (2021): 59–63. http://dx.doi.org/10.21512/emacsjournal.v3i2.6533.

Full text
Abstract:
Today, a lot of us have a lot of digital wallet services that we use. Because of that tracking our spending has become significantly harder because most people use more than one digital wallet. This study aims to find out how can we utilize QR code in the payment receipt at out digital transaction, to keep track on our transaction on various digital wallet. To help keep track of the expenses from the various digital wallet, we use QR code that is generated from the receipt of the transaction that contain the encrypted data of the transaction that occurs. This data can be scanned so it can be a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Encrypted data in QR code"

1

Сокол, Ярослав Володимирович. "Метод розпізнавання двовимірних кодів на зображеннях". Master's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/45939.

Full text
Abstract:
В наш час широкого розповсюдження набули двомірні штрих коди, які застосовуються для зашифрування та автоматичного зчитування різного роду інформації. Існує ряд типів найпоширеніших двомірних штрих кодів, у зв’язку з чим універсальні пристрої декодування для розшифрування коду мають його пропускати через підсистеми декодування кожного окремого типу коду. Оскільки процедура декодування не є простою, час на спробу обробити всі варіанти кодів може виявитись досить великим. Щоб подолати зазначену проблему запропоновано використати нейронну мережу для первинного розпізнавання типу коду із подальшим
APA, Harvard, Vancouver, ISO, and other styles
2

McCaughey, John Paul Jr. "Smarter Than We Are Wise." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339644686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, De-Chi, and 劉得祺. "Study on Data Hiding Scheme for QR Code." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/g5v29t.

Full text
Abstract:
碩士<br>國立虎尾科技大學<br>資訊工程研究所<br>102<br>Quick Response (QR) Code is a monochrome and widely used matrix barcode with the increasing population of smart phones. In recent years, the QR Code steganography methods have been proposed that encoding the text or change the QR Code’s structure to hide the secret message. In order to store more information the High Capacity Color Barcode (HCCB) have been proposed by Microsoft which the HCCB can use an eight-, four-, or two-color (black-and-white) palette to store more and more data. Similarly, the case does not interfere with the general QR Code Reader to
APA, Harvard, Vancouver, ISO, and other styles
4

Fu, Yao-Der, and 傅耀德. "Reversible Data Hiding in Color Image for QR code Applications." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/37081144936538077649.

Full text
Abstract:
碩士<br>國立高雄師範大學<br>光電與通訊工程學系<br>103<br>Abstract The Quick Response code (the QR code) is a two-dimensional matrix barcode which was invented by Denso Wave Japanese corporation. People utilize the smart phone to obtain information such as the URL, the text data, the image from the QR code. Reversible data hiding is a branch of steganography. The main characteristic of reversible data hiding is that the media (e.g., the pictures or the images) can be recovered to initial state after information is taken out. Reversible data hiding for QR code is a newly developed application in watermarking resea
APA, Harvard, Vancouver, ISO, and other styles
5

Hsieh, Chi-Che, and 謝其哲. "A Dual-Biometric Finger Vein Verification System Using Data Compressions and QR Code Techniques." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/26888910214381096390.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊工程系<br>105<br>With the development of current technologies, information security has gotten much attention. Personal identity verification systems are also widely used in our daily life. The mobile payment systems are generated gradually; especially, the various biometric authentication systems. In this thesis, we proposed a finger vein verification system based on QR code techniques without internet. We used Surf and Thinning techniques to extract the features from a finger vein. As for storing a huge number of features in QR code, we only extracted the features from the M
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Encrypted data in QR code"

1

Choudhury, Ziaul Haque, and M. Munir Ahamed Rabbani. "Biometric Passport Security by Applying Encrypted Biometric Data Embedded in the QR Code." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1097-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sabri, Puteri Nurul'Ain Adil Md, Azizi Abas, and Fazli Azzali. "Enhancing data capacity of a QR code." In The Future of Human-Computer Integration. CRC Press, 2024. http://dx.doi.org/10.1201/9781003479727-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Avanish, Akhilesh Singh, Anurag Tripathi, and Swati Sharma. "Two-Factor Authentication Using QR Code and OTP." In Advances in Data and Information Sciences. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-6906-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ainul, Rafina Destiarti, Susilo Wibowo, and Irzal Zaini. "An Encrypted QR Code Using Layered Numeral Calculation for Low Powered Devices." In Atlantis Highlights in Engineering. Atlantis Press International BV, 2023. http://dx.doi.org/10.2991/978-94-6463-288-0_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Pei-Yu, Yi-Hui Chen, Wen-Chuan Wu, Yu-Tzu Huang, and Ya-Fen Chang. "Comments on the Visual Binary QR Code." In 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05491-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Wen-Chuan, Zi-Wei Lin, and Wei-Teng Wong. "Application of QR-Code Steganography Using Data Embedding Technique." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6996-0_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cai, Huili, Xiaofeng Liu, and Bin Yan. "Beautified QR Code with Security Based on Data Hiding." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29933-0_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shashikiran, B. S., K. Shaila, and K. R. Venugopal. "Hybrid Domain Steganography for Embedding DES Encrypted QR Code Using Random Bit Binary Search." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67101-3_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pal, Kunal, and C. R. S. Kumar. "QR Code Based Smart Document Implementation Using Blockchain and Digital Signature." In Data Management, Analytics and Innovation. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5616-6_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vidas, Timothy, Emmanuel Owusu, Shuai Wang, Cheng Zeng, Lorrie Faith Cranor, and Nicolas Christin. "QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41320-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Encrypted data in QR code"

1

Şeker, Özlem, Cemal Uyüklü, and Gökhan Dalkılıç. "QR Code-Based Authentication in IoT Mesh Network." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Lina, Miao Liu, Limei Fu, and Junhan Yang. "Secure Data Exchange and Information Hiding through Color QR Code Technology." In 2024 6th International Conference on Intelligent Control, Measurement and Signal Processing (ICMSP). IEEE, 2024. https://doi.org/10.1109/icmsp64464.2024.10866408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

P, Deepa, Jennifer D, Jackuelin T, Madhumitha V, Leela B, and Iswariya M. "Blockchain Based Expiry Date Verification For Medical Product With QR Code." In 2025 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI). IEEE, 2025. https://doi.org/10.1109/icdsaai65575.2025.11011617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

He, Dan. "Application of Data Hiding Method Based on Triplet Difference in QR Code Images." In 2025 5th International Conference on Consumer Electronics and Computer Engineering (ICCECE). IEEE, 2025. https://doi.org/10.1109/iccece65250.2025.10985268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Zhijun, Yingjian Gao, Weiping Zhu, and Kai Lu. "Privacy-Preserving QR Code Schemes for Data Access and Aggregation in Smart Distribution Grid Systems." In 2024 9th International Conference on Intelligent Computing and Signal Processing (ICSP). IEEE, 2024. http://dx.doi.org/10.1109/icsp62122.2024.10743758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kanakia, Harshil, Sakina Shaikh, Yash Koyande, and Harsh Jain. "Secure Authentication via Encrypted QR Code." In 2024 IEEE 9th International Conference for Convergence in Technology (I2CT). IEEE, 2024. http://dx.doi.org/10.1109/i2ct61223.2024.10544035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dey, S. "New generation of digital academic-transcripts using encrypted QR code™: Use of encrypted QR code™ in mark-sheets (academic transcripts)." In 2013 International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s). IEEE, 2013. http://dx.doi.org/10.1109/imac4s.2013.6526429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qi, Han, Du Chenjie, Yao Yingbiao, and Lei Lei. "A New Express Management System Based on Encrypted QR Code." In 2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA). IEEE, 2015. http://dx.doi.org/10.1109/icicta.2015.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Xinwen, Huakang Li, Yitao Yang, Guozi Sun, and Guangxuan Chen. "LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code." In 2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chatterjee, Suhrid Krishna, Sudipta Saha, Zubayr Khalid, Himadri Nath Saha, Pritam Paul, and Robin Karlose. "Space effective and encrypted QR code with sender authorized security levels." In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2018. http://dx.doi.org/10.1109/ccwc.2018.8301640.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Encrypted data in QR code"

1

de Abreu, Jonas, and Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/9qu6ex.

Full text
Abstract:
The Pix Dynamic QR Code URI can be extended to allow for offline QR Code generation. The proposed solution involves generating URIs that can be used as a vehicle to transmit information from the client to the server, allowing the payee to generate their own URIs. The document also goes into detail about URI properties, encoding, and cryptography. The proposed design balances tradeoffs between the amount of data that can be transmitted and cryptographic guarantees, and uses commonly available cryptographic primitives to reduce implementation costs.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhylenko, Tetyana I. Auto Checker of Higher Mathematics - an element of mobile cloud education. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3895.

Full text
Abstract:
We analyzed the main cloud services in the article. We also described the main contribution of mobile cloud technology to education. The article presents the author’s development from the field of mobile cloud education in higher mathematics. The design architecture of this application is described in detail: QR generator and scanner, authorization, sending tasks. Block diagrams and images are presented that clearly demonstrate the operation of the application. We showed an example of solving the integral from the section of integral calculus for higher mathematics and showed how to download t
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Suwailem, Sami. Can We Trust the “Trust Machine”? Islamic Development Bank Institute, 2020. http://dx.doi.org/10.55780/re24015.

Full text
Abstract:
Blockchain technology is famously considered a “trust machine”. It is a machine (a set of code and procedures) that will make transactions reliable without the need to trust any particular person. In other words, the blockchain replaces trust of persons with trust of computational systems. But there is a little problem. What makes the machine trustworthy? The members of the blockchain network must agree on the validity of the transactions to be registered in the network. Once they agree, then the transaction is encrypted in a “block” of data, that is chained to previous blocks. This is done in
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!