To see the other types of publications on this topic, follow the link: Encrypted data in QR code.

Journal articles on the topic 'Encrypted data in QR code'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Encrypted data in QR code.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Alsalem, Hussain, Faisal Alotaibi, Mohsen Bamardouf, et al. "Laboratory Access Implementing QR Code Authentication Using OTP." International Journal on Cybernetics & Informatics 12, no. 5 (2023): 121–41. http://dx.doi.org/10.5121/ijci.2023.120511.

Full text
Abstract:
Laboratories in colleges are used to give lectures to students, but what about after working hours? Students can get many benefits from these labs after working hours. For example, students can study and do their homework after working hours. In this project, we have proposed a new technique to control the access of these laboratories. Our idea is to use an encrypted QR code with an TOTP authentication that will be connected to LAN network to guarantee that each student enter can only use a single PC. Each student will have his own encrypted QR code that differs from other students. The TOTP c
APA, Harvard, Vancouver, ISO, and other styles
2

Vikas H. "Optimizing Passport Verification Processes with Secure QR Code Technology." Communications on Applied Nonlinear Analysis 32, no. 5s (2024): 179–91. https://doi.org/10.52783/cana.v32.3003.

Full text
Abstract:
The main concern of today can be the quality and the security of the data. One of the new methods of the security system to resolve this can be the utilization of the QR codes, which can reduce the larger misinterpretation of the data and enhance the security, considering this research article promotes a method to encrypt the data to a QR code, which can avoid the manipulation of the data. The preferred QR code is encrypted using a secret key and will not be shared to the unauthorized personals, the usual and finest method of encryption is incorporated, which is TTJSA algorithm. The quick resp
APA, Harvard, Vancouver, ISO, and other styles
3

Tsai, Chwei-Shyong, Hsin-Liang Chen, Hsien-Chu Wu, and Josh Jia-Ching Ying. "A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code." Symmetry 13, no. 10 (2021): 1896. http://dx.doi.org/10.3390/sym13101896.

Full text
Abstract:
The information technique has developed rapidly. The technique of QR codes is widely applied in our daily life, and the mechanism is suitable to share data. A QR code uses symmetric encryption to store and retrieve data efficiently. However, the security issues of QR codes are seldom discussed by the wider community. Moreover, if the sender wishes only the authorized participant to attain the private data which are shared, the data must be encrypted. Furthermore, we do not know who should be censured when problems arise. In view of this, to maintain the integrity and the confidentiality of inf
APA, Harvard, Vancouver, ISO, and other styles
4

Chaudhary, Yash. "Encryption and Decryption of Messages using QR and Steganography." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 285–89. http://dx.doi.org/10.22214/ijraset.2024.65010.

Full text
Abstract:
The main motive of this project is to prevent data leak in chat applications. So, to cover a protection for it we are introducing a chat application in which you can share your important details in encrypt and receive in decrypt form which are QR and Image Steganography. For preventing of data leak, we have created an application based on QR code and Image Steganography encryption and decryption where you can chat with a specified person. Whom you want to send the encrypted message through hiding the data inside a verified signature QR code created by my team so that no other QR code app can e
APA, Harvard, Vancouver, ISO, and other styles
5

Noman Abed, Hazim. "Robust and Secured Image Steganography using LSB and Encryption with QR Code." Journal of Al-Qadisiyah for computer science and mathematics 9, no. 2 (2017): 1–9. http://dx.doi.org/10.29304/jqcm.2017.9.2.144.

Full text
Abstract:
The great development obtained with digital communication system depends on the improvement of the amount and security of transmitting information, the secrecy of data transmitted becomes a main subject for the researcher. Cryptography and Steganography play a major role for secured data transfer. In this research, the cryptography and steganography method was proposed for information security. In cryptography, the encrypted message was obtained by XOR the secret message with QR code. While, in Steganography the encrypted message was embedded inside cover image using LSB technique. The new app
APA, Harvard, Vancouver, ISO, and other styles
6

Ms. J Seetha, Dr. G Manikandan, Ms. S. Hemalatha, and Ms. Vilma Veronica. "QR Code Recognition Based on Image Processing." International Journal of Scientific Research in Science and Technology 11, no. 2 (2024): 160–68. http://dx.doi.org/10.32628/ijsrst52411227.

Full text
Abstract:
To solve the QR code recognition problem caused by ordinary camera collection, the recognition algorithm based on image processing is put forward in this paper. The whole process including image binarization, image tilt correction, image orientation, image geometric correction and image normalization allows images collected on different illumination conditions. Experiments show that the improved method can enhance the recognition speed of two-dimensional code and accuracy. QR i.e. “Quick Response” code is a 2D matrix code that is designed by keeping two points under consideration, i.e. it must
APA, Harvard, Vancouver, ISO, and other styles
7

Priya Pankaj Kumar, Om Prakash, Sudhir Kumar. "A Study of E-Authentication Systems Based on QR Codes Through Analysis." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (2023): 4631–35. http://dx.doi.org/10.52783/tjjpt.v44.i3.2616.

Full text
Abstract:
In order to improve security and user experience, this article suggests an authentication system that combines Quick Response (QR) code technology with One-Time Password (OTP) technology. Each time an authentication attempt is made, the system generates a unique QR code and an OTP that must be scanned with a mobile device in order to complete the authentication process. Encrypted data, validated by the server, including the user's identity and the OTP included in the QR code. An effective, user-friendly, and secure way of user identification is provided by the suggested system, which is essent
APA, Harvard, Vancouver, ISO, and other styles
8

Hassan, Khalil Silman, and Ezaldeen Ali Akbas. "Survey of Web of Things and Quick Response Code." Recent Trends in Computer Graphics and Multimedia Technology 2, no. 1 (2020): 1–15. https://doi.org/10.5281/zenodo.3843235.

Full text
Abstract:
<em>The current internet of things (IoT) architecture is generally accepted to be extremely fractured. The web of things (WoT) aims at counteracting fragmentation using Internet concepts, QR code is code for a tow dimension matrix constructed with Two things in mind It Should Wide Store Quantities Data versus one dimension barcodes, and decode them at High speed for any computer, including phones. QR code offers high data storage capacity, quick searching, omnidirectional legibility, among several other benefits, error correction and various models. Also available are encrypted QR code, QR cod
APA, Harvard, Vancouver, ISO, and other styles
9

Nikam, Sakshi Santosh. "Smart ATM Using QR." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36026.

Full text
Abstract:
Nowadays, dependency on banking in the virtual world has been increased to the peak position. To make it consistent advanced technologies should be used. As OTP is currently used worldwide for security purposes, it can be overruled by QR code. Main advantage of QR code over OTP data storage.OTP can only confirm that the user is authorised user and not some third party is involved in this transaction while QR code not only confirms the authorised user but QR code itself can store information such as transaction id, transaction date, time and also amount of transaction. So, there is no need of e
APA, Harvard, Vancouver, ISO, and other styles
10

Lwiantoro, Gerardo Axel, Farhan Putra Salsabil, Gregorius A. N. Aditantyo, and Derwin Suhartono. "Utilization of QR Code for Tracking Digital Expenses." Engineering, MAthematics and Computer Science (EMACS) Journal 3, no. 2 (2021): 59–63. http://dx.doi.org/10.21512/emacsjournal.v3i2.6533.

Full text
Abstract:
Today, a lot of us have a lot of digital wallet services that we use. Because of that tracking our spending has become significantly harder because most people use more than one digital wallet. This study aims to find out how can we utilize QR code in the payment receipt at out digital transaction, to keep track on our transaction on various digital wallet. To help keep track of the expenses from the various digital wallet, we use QR code that is generated from the receipt of the transaction that contain the encrypted data of the transaction that occurs. This data can be scanned so it can be a
APA, Harvard, Vancouver, ISO, and other styles
11

Suhartana, I. Ketut Gede, I. Nyoman Budhiarta Suputra, and Anak Agung Ngurah Gunawan. "Securing OTP-based Access in Film-sharing Platforms Using RSA Encryption and QR Codes." Asian Journal of Research in Computer Science 17, no. 9 (2024): 112–25. http://dx.doi.org/10.9734/ajrcos/2024/v17i9503.

Full text
Abstract:
Login data refers to information used by individuals who have purchased or subscribed to a specific membership. Typically, this data includes an OTP code. In this research, the OTP code is utilized to grant users access to view the list of movies associated with the account that added them as a member. OTPs are particularly vulnerable to attacks, as they are often transmitted via phone numbers or email. To mitigate risks such as eavesdropping or interception, implementing robust data security systems is essential. Cryptography, the science of data security and authenticity, plays a crucial rol
APA, Harvard, Vancouver, ISO, and other styles
12

Fathul Hadi, Charis, Ratna Mustika Yasi, and Cici Agustin. "Aplikasi Teknologi QR Code Pada Identifikasi Tumbuhan Di Wisata De-Djawatan." TEKIBA : Jurnal Teknologi dan Pengabdian Masyarakat 2, no. 1 (2022): 7–12. http://dx.doi.org/10.36526/tekiba.v2i1.1583.

Full text
Abstract:
De-Djawatan Tourism Destinations are known by various tourists both local and non-local with their natural beauty in the form of large and lush trees that are still beautiful or natural. De-Djawatan tourism does not yet have detailed information either manually or digitally related to the biological and general classification of plants in that location. As smartphone technology develops, the information needed to be very easy to obtain. QR Code is one method to obtain complete information. QR Code is a type of two-dimensional image that displays data in the form of text. This community partner
APA, Harvard, Vancouver, ISO, and other styles
13

Vakulenko, S. P., N. K. Volosova, and D. F. Pastukhov. "METHODS OF QR CODE TRANSMISSION IN COMPUTER STEGANOGRAPHY." World of Transport and Transportation 16, no. 5 (2018): 14–25. http://dx.doi.org/10.30932/1992-3252-2018-16-5-2.

Full text
Abstract:
For the English full text of the article please see the attached PDF-File (English version follows Russian version).ABSTRACT The article deals with the problems of using steganography methods for transmitting data. The authors justify their approach by arguing that the importance of cryptography in terms of transfer of hidden data i s obvious, however, being cryptographic, coded information maintains potential threat with the mere existence of an encrypted message, that is, an indication that it is necessary to apply cryptanalysis. With the help of steganography, mathematical methods are const
APA, Harvard, Vancouver, ISO, and other styles
14

Lalu Prasad Jamana, Swapna Annapareddy, Lakshmi Narayana Kolipakula, Ganesh Dasu, and Sadhik Shaik. "Blockchain-based two-level QR Code: A new era of secure data sharing." International Journal of Science and Research Archive 15, no. 1 (2025): 147–54. https://doi.org/10.30574/ijsra.2025.15.1.0933.

Full text
Abstract:
In today’s digital world, secure data sharing is of paramount importance. This research introduces a blockchain-based two-level QR code system, which provides an innovative solution for secure and efficient data management. The system is structured with two key modules: a user module, allowing controlled access to data, and an admin module, ensuring encrypted data storage and oversight. Each data entry is uniquely linked to a QR code, enabling seamless and secure information retrieval. By leveraging blockchain technology, the system establishes a decentralized and tamper-proof framework that e
APA, Harvard, Vancouver, ISO, and other styles
15

Hakimpour, F., and A. Zare Zardiny. "LOCATION BASED SERVICE IN INDOOR ENVIRONMENT USING QUICK RESPONSE CODE TECHNOLOGY." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-2/W3 (October 22, 2014): 137–40. http://dx.doi.org/10.5194/isprsarchives-xl-2-w3-137-2014.

Full text
Abstract:
Today by extensive use of intelligent mobile phones, increased size of screens and enriching the mobile phones by Global Positioning System (GPS) technology use of location based services have been considered by public users more than ever.. Based on the position of users, they can receive the desired information from different LBS providers. Any LBS system generally includes five main parts: mobile devices, communication network, positioning system, service provider and data provider. By now many advances have been gained in relation to any of these parts; however the users positioning especi
APA, Harvard, Vancouver, ISO, and other styles
16

Lucia Nugraheni Harnaningrum and Kristoforus Nanda Mahardhian. "Comparison of Mobile Transaction Security Using NFC and QR Codes." Jurnal Nasional Teknik Elektro dan Teknologi Informasi 13, no. 4 (2024): 265–71. https://doi.org/10.22146/jnteti.v13i4.12867.

Full text
Abstract:
Mobile device transactions have become commonplace today. Quick-response (QR) codes and near-field communication (NFC) are popular cashless and contactless payment methods. These two payments have their characteristics. NFC payments use secure elements that encrypt credential data to ensure safe transactions. In contrast, QR code payments transmit data in its original form without encryption. Existing data are sent between devices in the form of original data. Given the extensive adoption of these methods, it is imperative to secure transaction data to prevent theft and misuse. It is necessary
APA, Harvard, Vancouver, ISO, and other styles
17

Jabade, Vaishali, Mehal Pawar, and Sneha Powar. "Blockchain based Application for Fake Product Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 11 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem27187.

Full text
Abstract:
This paper aims to study and introduce an innovative solution that combines cryptography and an immutable blockchain system to address the pressing issue of counterfeit products. The application's primary objective is to identify fake products within supply chains by ensuring data integrity, traceability, and transparency throughout the product's journey. By employing advanced cryptographic techniques, the application secures sensitive information and verifies product authenticity while preserving confidential details. Integrating an immutable blockchain ensures an unchangeable and decentraliz
APA, Harvard, Vancouver, ISO, and other styles
18

Faiz, Darsanto, Rio Andriyat Krisdiawan, and Dias Eka Prayuda. "IMPLEMENTATION OF THE RSA CRYPTOGRAPHIC ALGORITHM IN THE QR-CODE ANDROID-BASED BUILDING PERMIT CHECKING APPLICATION." NUANSA INFORMATIKA 15, no. 1 (2021): 74. http://dx.doi.org/10.25134/nuansa.v15i1.3895.

Full text
Abstract:
The investment office and one-stop integrated service (DPMPTSP) of Kuningan regency issues various kinds of permits, one of which is a building permit (IMB) issued by the investment office and one-stop integrated service on the applicant's side. Research is motivated by the vulnerability of counterfeiting permits that have been granted by the investment service and one-stop integrated services. The purpose of this research is to create a system or information technology that can help to make it easier to check building permits, one of which is by using QR-Code technology. This system can scan
APA, Harvard, Vancouver, ISO, and other styles
19

Okfalisa, Novi Yanti, Wahyu Aidil Dita Surya, Amany Akhyar, and A. Ambarwati Frica. "Implementation of Advanced Encryption Standard (AES) and QR Code Algorithm on Digital Legalization System." E3S Web of Conferences 73 (2018): 13009. http://dx.doi.org/10.1051/e3sconf/20187313009.

Full text
Abstract:
A certificate is an important document that its validity must be ascertained. Fraud over the originality of this document demands a high level of security to ensure that this document is genuine. The Digital Certificate Legalization system (DCL) can regulate and guarantee the mechanism of document validity procedure. By implementing AES and QR Code algorithm, the information contained in the photo-scan of the certificate can be authenticated. The results of the scan are encrypted by using the legalized code in AES Algorithm. The code will be translated using the QR Code and matched to the data
APA, Harvard, Vancouver, ISO, and other styles
20

Kadirkulov, K., А. Ismailova, A. Beissegul, and A. Satybaldiyeva. "QR VERIFICATION OF LABORATORY STUDIES RESULTS." PHYSICO-MATHEMATICAL SERIES 2, no. 336 (2021): 96–101. http://dx.doi.org/10.32014/2021.2518-1726.26.

Full text
Abstract:
This article describes the practical using of QR codes [1] verification of laboratory studies results. QR codes have become widely used in all industries as quick identification of information and the implementation of transactional actions, where encrypted URL allows to quickly scanning by using a smartphone camera. Digitalization contributes to the transition to the online environment of healthcare, office workers, education and to receive more data on the spread of diseases, exchange information and quickly receive laboratory results without distortion. The presented solution is a component
APA, Harvard, Vancouver, ISO, and other styles
21

D E, Vedananda. "EntryXpert - Simplifying Event Registration with QR Tickets." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41363.

Full text
Abstract:
- EntryXpert is a cutting-edge event management platform designed to simplify and revolutionize traditional event registration and ticketing processes. Leveraging QR-based digital tickets, the system provides seamless registration, secure payment integration, and real-time data synchronization for event organizers and attendees. Built on a robust backend using Django and Supabase, and paired with a Flutter-based mobile application, EntryXpert offers a comprehensive solution for creating events, managing registrations, and validating tickets. The platform ensures enhanced security through encry
APA, Harvard, Vancouver, ISO, and other styles
22

Agawane, Pratik. "Accident/RTO/Abandoned Vehicle Investigation Using QR Code on Vehicle." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 542–44. http://dx.doi.org/10.22214/ijraset.2023.51995.

Full text
Abstract:
Abstract: In India fatal road traffic accidents constitute a significant public health problem in many countries around the world. In Saudi Arabia, road accidents are one of the leading causes of death. The delay in detecting and caring for people who have been exposed to traffic accidents increases the risk of injuries. Injury care after the accident is severely affected by time; a few minutes may separate life from death. Several solutions have been proposed to reduce the incidence of accidents or to reduce the mortality rate at a high financial cost. Recent approaches are using built-in veh
APA, Harvard, Vancouver, ISO, and other styles
23

Ramakrishnan, Mr R. "Authcloudfile: Encrypted File Storage with QR-Based Access and Expiration Control." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50051.

Full text
Abstract:
Abstract: File sharing is a fundamental aspect of digital communication, enabling users to exchange data efficiently across networks. However, traditional file-sharing methods, such as email attachments, cloud storage links, and peer-to-peer transfers, often face security vulnerabilities, including unauthorized access, data interception, and weak encryption mechanisms. Many existing systems lack robust authentication or rely on manual key exchange, making them susceptible to attacks such as man-in- the-middle (MITM), phishing, and unauthorized data breaches. To overcome these challenges, the p
APA, Harvard, Vancouver, ISO, and other styles
24

Hamad, Noor Jaber, Abbas Abdulazeez Abdulhameed, and Mudhafar Hussein Ali. "Implementing a Secure Mobile Application for Cardless Transactions using QR Code and Hybrid AES-ECC Encryption." Arab Journal for Scientific Publishing 7, no. 69 (2024): 1–21. http://dx.doi.org/10.36571/ajsp691.

Full text
Abstract:
The use of mobile banking has gained wide acceptance, due to the convenience and ease of access via mobile phone. However, the increasing reliance on it by users has been accompanied by security challenges such as phishing and data breaches. Ensuring the security and integrity of data transmission is crucial to building user trust. Data encryption during transactions is the ideal solution for data security and integrity. To achieve this, we propose a system that uses mobile applications to transmit and secure cardless transactions, using QR code fusion with a hybrid AES-ECC algorithm. This alg
APA, Harvard, Vancouver, ISO, and other styles
25

Younis, Afraa Zidane, and Ahmed Sami Nori. "Review ―The Digital Revolution for the Security of Hiding Information inside the Quick Response Code‖." International Research Journal of Innovations in Engineering and Technology 08, no. 08 (2024): 37–48. http://dx.doi.org/10.47001/irjiet/2024.808005.

Full text
Abstract:
The Digital Revolution has significantly transformed secure and transmitted information, with QR codes emerging as a powerful tool in this landscape. QR codes that stands for Quick Response codes are 2D barcodes that can contain a vast amount of information; they have great opportunities to encrypt information, so they provide reliable solutions in terms of data hiding and data transfer. The described confrontation of the Digital Revolution insists on enhancing and changing ways to ensure information security, and the application of QR codes is a good example of how technological advancements
APA, Harvard, Vancouver, ISO, and other styles
26

Kalinina, Yu Yu, and Yu A. Smirnova. "Using Cryptographic Algorithms to Create a Temporary Pass Using QR Code Generation Technology." Proceedings of Telecommunication Universities 11, no. 3 (2025): 119–28. https://doi.org/10.31854/1813-324x-2025-11-3-119-128.

Full text
Abstract:
In modern conditions, the security of higher education institutions requires an integrated approach, including both physical protection and cybersecurity. With the growing number of students, faculty, and visitors, as well as increasing threats such as terrorism, vandalism, and cyberattacks, the implementation of effective access control systems is becoming an urgent task. One of the promising solutions is a system for monitoring temporary passes based on QR codes, which ensures not only the restriction of unauthorized access, but also the collection of data on the movement of persons on the t
APA, Harvard, Vancouver, ISO, and other styles
27

Choudhury, Ziaul Haque, and M. Munir Ahamed Rabbani. "Biometric Passport for National Security Using Multibiometrics and Encrypted Biometric Data Encoded in the QR Code." Journal of Applied Security Research 15, no. 2 (2019): 199–229. http://dx.doi.org/10.1080/19361610.2019.1630226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Naik, Neeraj, Niraj Kadam, and Manish Bhalekar. "Technique to Hide Encrypted Data in QR Codes using EK-EQR Algorithm." International Journal of Computer Applications 161, no. 12 (2017): 25–28. http://dx.doi.org/10.5120/ijca2017913397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Arif Indra Irawan, Iman Hedi Santoso, Istikmal, and Maya Rahayu. "Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms." Jurnal Nasional Teknik Elektro dan Teknologi Informasi 13, no. 1 (2024): 53–59. http://dx.doi.org/10.22146/jnteti.v13i1.4395.

Full text
Abstract:
The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses. Absent students can fake their attendance for themselves or friends. This type of attack is known as fake QR code generation. This research proposes a security authentication system using the Rivest–Shamir–Adleman (RSA) encryption algorithm and the secure hash algorithm 1 (SHA-1) to secure QR code-based attendance applications from fake QR code generation attac
APA, Harvard, Vancouver, ISO, and other styles
30

Witriyono, Harry, and Sandhy Fernandez. "Enkripsi Base 64, Hashing SHA1 dan MD5 pada QR Code Presensi Kuliah." JSAI (Journal Scientific and Applied Informatics) 4, no. 2 (2021): 263–72. http://dx.doi.org/10.36085/jsai.v4i2.1680.

Full text
Abstract:
The lecture attendance application at the University of Muhammadiyah Bengkulu needs to be developed so that it is easier in the implementation process. One way to simplify the process is to use the presence of a Quick Response Code which can be done in online or offline lectures. The method used is in the form of encrypted and hashed Uniform Resource Locator storage combined with internet protocol address filtering so that the information stored in the Quick Response Code becomes more secure than in plain text. The data collection method uses observation and interview techniques to previous ap
APA, Harvard, Vancouver, ISO, and other styles
31

Hutagalung, Juniar, Puji Sari Ramadhan, and Sarah Juliana Sihombing. "Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 6 (2023): 1213–22. http://dx.doi.org/10.25126/jtiik.1067319.

Full text
Abstract:
Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web. Salah satu fungsi utama SHA-256 adalah menerima input data M dalam bentuk apa pun dan menghasilkan nilai hash h(M). RSA, algoritma yang memiliki asimetri, kunci publik dan kunci privat. Ini adalah sistem kriptografi terpopuler yang digunakan untuk memberikan tanda tangan digital, kerahasiaan, dan kunci. Salah satu fitur utama sistem otentikasi dokumen adalah m
APA, Harvard, Vancouver, ISO, and other styles
32

Hutagalung, Juniar, Puji Sari Ramadhan, and Sarah Juliana Sihombing. "Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 6 (2023): 1213–22. https://doi.org/10.25126/jtiik.2023107319.

Full text
Abstract:
Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web. Salah satu fungsi utama SHA-256 adalah menerima input data M dalam bentuk apa pun dan menghasilkan nilai hash h(M). RSA, algoritma yang memiliki asimetri, kunci publik dan kunci privat. Ini adalah sistem kriptografi terpopuler yang digunakan untuk memberikan tanda tangan digital, kerahasiaan, dan kunci. Salah satu fitur utama sistem otentikasi dokumen adalah m
APA, Harvard, Vancouver, ISO, and other styles
33

M, Manimekalai, and Bakkiyalakshmi R. "Hide and Seek: A New Way to Hide Encrypted Data in QR Code Using the Concepts Steganography and Cryptography." IJARCCE 6, no. 6 (2017): 538–40. http://dx.doi.org/10.17148/ijarcce.2017.6697.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yusuf, Dani, Joni Warta, and Sri Rejeki. "Sistem Pengelolaan Kegiatan Perusahaan Menggunakan Identifikasi QR Code." Journal of Informatic and Information Security 2, no. 1 (2021): 123–36. http://dx.doi.org/10.31599/jiforty.v2i1.670.

Full text
Abstract:
Activities in a company or institution are something that is usually done, the forms of these activities are generally training, socialization of new regulations, inauguration, and so on. These activities need to be recorded and the data managed as documentation or reference and consideration in subsequent activities. This activity requires planning starting from preparation, scheduling, distributing invitations via email, to implementing and recording the attendance of invited participants. The case study was conducted at PT Pelni Indonesia as an Indonesian National Shipping company that ofte
APA, Harvard, Vancouver, ISO, and other styles
35

Gričar, Sergej, Christian Stipanović, and Tea Baldigara. "Sustainable Daily Mobility and Bike Security." Sustainability 17, no. 14 (2025): 6262. https://doi.org/10.3390/su17146262.

Full text
Abstract:
As climate change concerns, urban congestion, and environmental degradation intensify, cities prioritise cycling as a sustainable transport option to reduce CO2 emissions and improve quality of life. However, rampant bicycle theft and poor security infrastructure often deter daily commuters and tourists from cycling. This study explores how advanced security measures can bolster sustainable urban mobility and tourism by addressing these challenges. A mixed-methods approach is utilised, incorporating primary survey data from Slovenia and secondary data on bicycle sales, imports and thefts from
APA, Harvard, Vancouver, ISO, and other styles
36

Pramusinto, Wahyu, Bruri Trya Sartana, Sri Mulyati, and Safrina Amini. "Implementation of AES-192 Cryptography and QR Code to Verify The Authenticity of Budi Luhur University Student Certificate." JURNAL PENDIDIKAN TEKNOLOGI KEJURUAN 3, no. 4 (2021): 209–15. http://dx.doi.org/10.24036/jptk.v3i4.14823.

Full text
Abstract:
Nowadays a letter can easily be falsified and used for things that are not appropriate. Budi Luhur University has a work unit that serves student requests for certificate of active students and certificate of graduation. Students need that certificate for apply a job or get a scholarship. To prevent the falsification of letters, a system using PHP programming language and MariaDB database was used to verify the letters. The certificate released by this system will be equipped with a QR Code containing the URL with parameters that have been encrypted with the cryptographic method AES-192. If ac
APA, Harvard, Vancouver, ISO, and other styles
37

Sharma, Hemant, Aditi Pandey, and Ms Varsha. "Product Validation through Blockchain." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 926–30. https://doi.org/10.22214/ijraset.2025.70270.

Full text
Abstract:
Abstract: The smuggling of counterfeit goods into the global supply chain remains a formidable challenge, not only undermining economic stability but also threatening the welfare of end users. From RFID tags to QR code systems, traditional systems have stumbled in providing robust protection against this growing threat. This study advocates the integration of blockchain technology as a revolutionary shield against fraudulent attacks on counterfeit products and begins a pioneering journey.The study highlights various applications of blockchain, extending traceability, decentralized anti-counter
APA, Harvard, Vancouver, ISO, and other styles
38

Turhadi, Turhadi, I. Made Dhena Radya Padmana, and Rodiyati Azrianingsih. "DNA QR Code Using Internal Transcribed Spacer 1 (ITS1) Region of Commercial Cucumber Varieties (Cucumis sativus L.)." Jurnal Riset Biologi dan Aplikasinya 7, no. 1 (2025): 1–7. https://doi.org/10.26740/jrba.v7n1.p1-7.

Full text
Abstract:
DNA Quick Response (DQR) is an accurate, efficient, fast, and cost-effective alternative to PCR-based or other sequencing methods. DQR is the method integrated seamlessly with digital systems. The DQR could be apply as effective approach to preventing seed counterfeiting, for example in cucumber. This study aimed to identify DNA barcodes based on the ITS1 region and develop DQR for commercial cucumber varieties in Indonesia. Two cucumber varieties, namely cv. Mars and cv. Makka were used. The genomic DNA was extracted using commercial DNA purification kit. The DQR for these two cucumber variet
APA, Harvard, Vancouver, ISO, and other styles
39

Qasim, Sara Salman. "IoT of Healthcare Innovation Solutions for Predictable Virus Detection." Babylonian Journal of Internet of Things 2024 (November 15, 2024): 126–36. http://dx.doi.org/10.58496/bjiot/2024/015.

Full text
Abstract:
The evolution of health care systems from old models to more personalized frameworks facilitates easier diagnosis, treatment, and monitoring of patients, benefiting numerous individuals. Individuals receive remote treatment and care, which is essential for some during the global crisis exemplified by Predictable Virus Detection. This manuscript, A medical platform features an architecture reliant on middleware and database support for individuals with Coronavirus, primarily serving three user categories. The administrator is categorized into two user groups: doctors and patients. The doctor ha
APA, Harvard, Vancouver, ISO, and other styles
40

S, Manu, Bhagappa ., and Suhas G K. "Secure Digital Signature Using Block Chain Technology." Journal of Cyber Security in Computer System 3, no. 1 (2024): 1–8. http://dx.doi.org/10.46610/jcscs.2024.v03i01.001.

Full text
Abstract:
The lack of authentication and ant forge mechanisms severely compromises the security details of the authorizations issuing the certification. We employ blockchain technology to verify people in a way that is akin to a digital signature with their identity and access authorization, so resolving the issue of certificate forgery. Blockchain technology is an open distributed ledger that ensures that every transaction cannot be altered and holds unquestionable information in a highly secure and encrypted manner. A high standard for the procedure that may guarantee that the data in such a certifica
APA, Harvard, Vancouver, ISO, and other styles
41

S. Sawalkar, Prof Meera. "E-Health Card - A Comprehensive Web-Based Healthcare System." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49909.

Full text
Abstract:
Abstract This paper presents the design and implementation of a comprehensive Digital India E-Health Card system using the Django web framework. The proposed system addresses the critical need for digi- tized healthcare records management in India by providing a unified platform for storing, managing, and accessing patient health information. Unlike traditional paper-based systems, our Django-powered solution offers secure patient registration, real-time health data management, disease tracking, medi- cal report generation, and predictive analytics for disease diagnosis and mental health asses
APA, Harvard, Vancouver, ISO, and other styles
42

Isong, Bassey, Tshipuke Vhahangwele, and Adnan M. Abu-Mahfouz. "Blockchain-Enabled Vaccination Registration and Verification System in Healthcare Management." Journal of Information Systems and Informatics 5, no. 2 (2023): 719–41. http://dx.doi.org/10.51519/journalisi.v5i2.497.

Full text
Abstract:
Client-server-based healthcare systems are unable to manipulate a high data volume, prone to a single failure point, limited scalability, and data integrity. Particularly, several measures introduced to help curb the spread of Covid-19 were not effective and patient records were not adequately managed and maintained. Most vaccination-proof certificates were forged by unauthorized parties and no standard verification medium exists. Therefore, this paper proposes a blockchain-enabled vaccination management system (VMS). VMS utilizes smart contracts to store encrypted patients record, generate va
APA, Harvard, Vancouver, ISO, and other styles
43

Kallapu, Bhavya, Avinash Nanda Janardhan, Rama Moorthy Hejamadi, et al. "Multi-Layered Security Framework Combining Steganography and DNA Coding." Systems 13, no. 5 (2025): 341. https://doi.org/10.3390/systems13050341.

Full text
Abstract:
With the rapid expansion of digital communication and data sharing, ensuring robust security for sensitive information has become increasingly critical, particularly when data are transmitted over public networks. Traditional encryption techniques are increasingly vulnerable to evolving cyber threats, making single-layer security mechanisms less effective. This study proposes a multi-layered security approach that integrates cryptographic and steganographic techniques to enhance data protection. The framework leverages advanced methods such as encrypted data embedding in images, DNA sequence c
APA, Harvard, Vancouver, ISO, and other styles
44

Harjito, Bambang, Tri Setyawati, and Ardhi Wijayanto. "Comparative Analysis between Elgamal and NTRU Algorithms and their implementation of Digital Signature for Electronic Certificat." International journal of electrical and computer engineering systems 13, no. 9 (2022): 729–39. http://dx.doi.org/10.32985/ijeces.13.9.1.

Full text
Abstract:
The emergence of electronic certificates, which are official documents in the form of digital files transmitted via the internet, facilitates the exchange of information. However, internet use has risks, such as data theft for fabricating and modifying information. This problem can be solved by applying a digital signature. This problem can be solved by applying a digital signature. The main concern in this research is how to perform a comparative analysis between asymmetric cryptographic Elgamal and NTRU (Nth-Degree Truncated Polynomial Ring) algorithms and their implementation of a digital s
APA, Harvard, Vancouver, ISO, and other styles
45

Daoui, Achraf, Mohamed Yamni, Hicham Karmouni, et al. "Efficient Biomedical Signal Security Algorithm for Smart Internet of Medical Things (IoMTs) Applications." Electronics 11, no. 23 (2022): 3867. http://dx.doi.org/10.3390/electronics11233867.

Full text
Abstract:
Due to the rapid development of information and emerging communication technologies, developing and implementing solutions in the Internet of Medical Things (IoMTs) field have become relevant. This work developed a novel data security algorithm for deployment in emerging wireless biomedical sensor network (WBSN) and IoMTs applications while exchanging electronic patient folders (EPFs) over unsecured communication channels. These EPF data are collected using wireless biomedical sensors implemented in WBSN and IoMTs applications. Our algorithm is designed to ensure a high level of security for c
APA, Harvard, Vancouver, ISO, and other styles
46

Rajapandian, P. "FaceChainVote: A Unified Blockchain-Driven AI Electoral System." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1108–12. https://doi.org/10.22214/ijraset.2025.72143.

Full text
Abstract:
Voting plays a crucial role in a democratic society, giving citizens a direct voice in governance. However, traditional voting systems in India are often plagued by challenges such as vote tampering, delays in result announcements, and inefficiencies in vote counting. Even current electronic voting methods face concerns like inconsistent implementation across states, security loopholes, and limited accessibility. To address these pressing issues, this project introduces a blockchain powered electronic voting system that ensures traceability, transparency, and enhanced voter authentication. The
APA, Harvard, Vancouver, ISO, and other styles
47

Raniah, Ali Mustafa, Abdulbaqi Maryoosh Amal, Nadir George Dena, and Rasheed Humood Waleed. "Iris images encryption based on QR code and chaotic map." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 289–300. https://doi.org/10.12928/TELKOMNIKA.v18i1.13293.

Full text
Abstract:
In this paper an Iris image is encrypted based on QR (quick response) code and chaotic map. The main idea of the proposed system is generating a QR code depending on the input text and then extract the features from QR code by using convolution, these features are used for key generation. After that the permuted iris image is encrypted by using generated key, after that the resulting image will be encrypts using 2D logistic map. The randomness of generated key is tested using the measures of NIST, and quality of images that encrypted in this method are tested by using security analysis tests s
APA, Harvard, Vancouver, ISO, and other styles
48

E, Tejaswini, and Anupama A. "A REWARD MECHANISM FOR MEDICINE SUPPLY CHAIN THROUGH BLOCK CHAIN TECHNOLOGY." International Journal of Engineering Applied Sciences and Technology 7, no. 2 (2022): 247–51. http://dx.doi.org/10.33564/ijeast.2022.v07i02.038.

Full text
Abstract:
The main issues with drug safety in the counterfeit medicine supply chain, are to do with how the drugs are initially manufactured. The traceability of right and active pharmaceutical ingredients during actual manufacture is a difficult process, so detecting drugs that do not contain the intended active ingredients can ultimately lead to end consumer patient harm or even death. Block chain’s advanced features make it capable of providing a basis for complete traceability of drugs, from manufacturer to end consumer, and the ability to identify counterfeit-drug. This paper aims to address the is
APA, Harvard, Vancouver, ISO, and other styles
49

E, Tejaswini, and Anupama TA. "A REWARD MECHANISM FOR MEDICINE SUPPLY CHAIN THROUGH BLOCK CHAIN TECHNOLOGY." International Journal of Engineering Applied Sciences and Technology 7, no. 4 (2022): 217–21. http://dx.doi.org/10.33564/ijeast.2022.v07i04.034.

Full text
Abstract:
The main issues with drug safety in the counterfeit medicine supply chain, are to do with how the drugs are initially manufactured. The traceability of right and active pharmaceutical ingredients during actual manufacture is a difficult process, so detecting drugs that do not contain the intended active ingredients can ultimately lead to end consumer patient harm or even death. Block chain’s advanced features make it capable of providing a basis for complete traceability of drugs, from manufacturer to end consumer, and the ability to identify counterfeit-drug. This paper aims to address the is
APA, Harvard, Vancouver, ISO, and other styles
50

Horasan, Fahrettin, Muhammed Ali Pala, Ali Durdu, Akif Akgül, Ömer Faruk Akmeşe, and Mustafa Zahid Yıldız. "DWT-SVD Based Watermarking for High-Resolution Medical Holographic Images." Complexity 2022 (August 29, 2022): 1–21. http://dx.doi.org/10.1155/2022/3154650.

Full text
Abstract:
Watermarking is one of the most common techniques used to protect data’s authenticity, integrity, and security. The obfuscation in the frequency domain used in the watermarking method makes the watermarking stronger than the obfuscation in the spatial domain. It occupies an important place in watermarking works in imperceptibility, capacity, and robustness. Finding the optimal location to hide the watermarking is one of the most challenging tasks in these methods and affects the method’s performance. In this article, sample identification information is processed with the method of watermaking
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!