Journal articles on the topic 'Encrypted data in QR code'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Encrypted data in QR code.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alsalem, Hussain, Faisal Alotaibi, Mohsen Bamardouf, et al. "Laboratory Access Implementing QR Code Authentication Using OTP." International Journal on Cybernetics & Informatics 12, no. 5 (2023): 121–41. http://dx.doi.org/10.5121/ijci.2023.120511.
Full textVikas H. "Optimizing Passport Verification Processes with Secure QR Code Technology." Communications on Applied Nonlinear Analysis 32, no. 5s (2024): 179–91. https://doi.org/10.52783/cana.v32.3003.
Full textTsai, Chwei-Shyong, Hsin-Liang Chen, Hsien-Chu Wu, and Josh Jia-Ching Ying. "A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code." Symmetry 13, no. 10 (2021): 1896. http://dx.doi.org/10.3390/sym13101896.
Full textChaudhary, Yash. "Encryption and Decryption of Messages using QR and Steganography." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 285–89. http://dx.doi.org/10.22214/ijraset.2024.65010.
Full textNoman Abed, Hazim. "Robust and Secured Image Steganography using LSB and Encryption with QR Code." Journal of Al-Qadisiyah for computer science and mathematics 9, no. 2 (2017): 1–9. http://dx.doi.org/10.29304/jqcm.2017.9.2.144.
Full textMs. J Seetha, Dr. G Manikandan, Ms. S. Hemalatha, and Ms. Vilma Veronica. "QR Code Recognition Based on Image Processing." International Journal of Scientific Research in Science and Technology 11, no. 2 (2024): 160–68. http://dx.doi.org/10.32628/ijsrst52411227.
Full textPriya Pankaj Kumar, Om Prakash, Sudhir Kumar. "A Study of E-Authentication Systems Based on QR Codes Through Analysis." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (2023): 4631–35. http://dx.doi.org/10.52783/tjjpt.v44.i3.2616.
Full textHassan, Khalil Silman, and Ezaldeen Ali Akbas. "Survey of Web of Things and Quick Response Code." Recent Trends in Computer Graphics and Multimedia Technology 2, no. 1 (2020): 1–15. https://doi.org/10.5281/zenodo.3843235.
Full textNikam, Sakshi Santosh. "Smart ATM Using QR." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36026.
Full textLwiantoro, Gerardo Axel, Farhan Putra Salsabil, Gregorius A. N. Aditantyo, and Derwin Suhartono. "Utilization of QR Code for Tracking Digital Expenses." Engineering, MAthematics and Computer Science (EMACS) Journal 3, no. 2 (2021): 59–63. http://dx.doi.org/10.21512/emacsjournal.v3i2.6533.
Full textSuhartana, I. Ketut Gede, I. Nyoman Budhiarta Suputra, and Anak Agung Ngurah Gunawan. "Securing OTP-based Access in Film-sharing Platforms Using RSA Encryption and QR Codes." Asian Journal of Research in Computer Science 17, no. 9 (2024): 112–25. http://dx.doi.org/10.9734/ajrcos/2024/v17i9503.
Full textFathul Hadi, Charis, Ratna Mustika Yasi, and Cici Agustin. "Aplikasi Teknologi QR Code Pada Identifikasi Tumbuhan Di Wisata De-Djawatan." TEKIBA : Jurnal Teknologi dan Pengabdian Masyarakat 2, no. 1 (2022): 7–12. http://dx.doi.org/10.36526/tekiba.v2i1.1583.
Full textVakulenko, S. P., N. K. Volosova, and D. F. Pastukhov. "METHODS OF QR CODE TRANSMISSION IN COMPUTER STEGANOGRAPHY." World of Transport and Transportation 16, no. 5 (2018): 14–25. http://dx.doi.org/10.30932/1992-3252-2018-16-5-2.
Full textLalu Prasad Jamana, Swapna Annapareddy, Lakshmi Narayana Kolipakula, Ganesh Dasu, and Sadhik Shaik. "Blockchain-based two-level QR Code: A new era of secure data sharing." International Journal of Science and Research Archive 15, no. 1 (2025): 147–54. https://doi.org/10.30574/ijsra.2025.15.1.0933.
Full textHakimpour, F., and A. Zare Zardiny. "LOCATION BASED SERVICE IN INDOOR ENVIRONMENT USING QUICK RESPONSE CODE TECHNOLOGY." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-2/W3 (October 22, 2014): 137–40. http://dx.doi.org/10.5194/isprsarchives-xl-2-w3-137-2014.
Full textLucia Nugraheni Harnaningrum and Kristoforus Nanda Mahardhian. "Comparison of Mobile Transaction Security Using NFC and QR Codes." Jurnal Nasional Teknik Elektro dan Teknologi Informasi 13, no. 4 (2024): 265–71. https://doi.org/10.22146/jnteti.v13i4.12867.
Full textJabade, Vaishali, Mehal Pawar, and Sneha Powar. "Blockchain based Application for Fake Product Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 11 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem27187.
Full textFaiz, Darsanto, Rio Andriyat Krisdiawan, and Dias Eka Prayuda. "IMPLEMENTATION OF THE RSA CRYPTOGRAPHIC ALGORITHM IN THE QR-CODE ANDROID-BASED BUILDING PERMIT CHECKING APPLICATION." NUANSA INFORMATIKA 15, no. 1 (2021): 74. http://dx.doi.org/10.25134/nuansa.v15i1.3895.
Full textOkfalisa, Novi Yanti, Wahyu Aidil Dita Surya, Amany Akhyar, and A. Ambarwati Frica. "Implementation of Advanced Encryption Standard (AES) and QR Code Algorithm on Digital Legalization System." E3S Web of Conferences 73 (2018): 13009. http://dx.doi.org/10.1051/e3sconf/20187313009.
Full textKadirkulov, K., А. Ismailova, A. Beissegul, and A. Satybaldiyeva. "QR VERIFICATION OF LABORATORY STUDIES RESULTS." PHYSICO-MATHEMATICAL SERIES 2, no. 336 (2021): 96–101. http://dx.doi.org/10.32014/2021.2518-1726.26.
Full textD E, Vedananda. "EntryXpert - Simplifying Event Registration with QR Tickets." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41363.
Full textAgawane, Pratik. "Accident/RTO/Abandoned Vehicle Investigation Using QR Code on Vehicle." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 542–44. http://dx.doi.org/10.22214/ijraset.2023.51995.
Full textRamakrishnan, Mr R. "Authcloudfile: Encrypted File Storage with QR-Based Access and Expiration Control." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50051.
Full textHamad, Noor Jaber, Abbas Abdulazeez Abdulhameed, and Mudhafar Hussein Ali. "Implementing a Secure Mobile Application for Cardless Transactions using QR Code and Hybrid AES-ECC Encryption." Arab Journal for Scientific Publishing 7, no. 69 (2024): 1–21. http://dx.doi.org/10.36571/ajsp691.
Full textYounis, Afraa Zidane, and Ahmed Sami Nori. "Review ―The Digital Revolution for the Security of Hiding Information inside the Quick Response Code‖." International Research Journal of Innovations in Engineering and Technology 08, no. 08 (2024): 37–48. http://dx.doi.org/10.47001/irjiet/2024.808005.
Full textKalinina, Yu Yu, and Yu A. Smirnova. "Using Cryptographic Algorithms to Create a Temporary Pass Using QR Code Generation Technology." Proceedings of Telecommunication Universities 11, no. 3 (2025): 119–28. https://doi.org/10.31854/1813-324x-2025-11-3-119-128.
Full textChoudhury, Ziaul Haque, and M. Munir Ahamed Rabbani. "Biometric Passport for National Security Using Multibiometrics and Encrypted Biometric Data Encoded in the QR Code." Journal of Applied Security Research 15, no. 2 (2019): 199–229. http://dx.doi.org/10.1080/19361610.2019.1630226.
Full textNaik, Neeraj, Niraj Kadam, and Manish Bhalekar. "Technique to Hide Encrypted Data in QR Codes using EK-EQR Algorithm." International Journal of Computer Applications 161, no. 12 (2017): 25–28. http://dx.doi.org/10.5120/ijca2017913397.
Full textArif Indra Irawan, Iman Hedi Santoso, Istikmal, and Maya Rahayu. "Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms." Jurnal Nasional Teknik Elektro dan Teknologi Informasi 13, no. 1 (2024): 53–59. http://dx.doi.org/10.22146/jnteti.v13i1.4395.
Full textWitriyono, Harry, and Sandhy Fernandez. "Enkripsi Base 64, Hashing SHA1 dan MD5 pada QR Code Presensi Kuliah." JSAI (Journal Scientific and Applied Informatics) 4, no. 2 (2021): 263–72. http://dx.doi.org/10.36085/jsai.v4i2.1680.
Full textHutagalung, Juniar, Puji Sari Ramadhan, and Sarah Juliana Sihombing. "Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 6 (2023): 1213–22. http://dx.doi.org/10.25126/jtiik.1067319.
Full textHutagalung, Juniar, Puji Sari Ramadhan, and Sarah Juliana Sihombing. "Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 6 (2023): 1213–22. https://doi.org/10.25126/jtiik.2023107319.
Full textM, Manimekalai, and Bakkiyalakshmi R. "Hide and Seek: A New Way to Hide Encrypted Data in QR Code Using the Concepts Steganography and Cryptography." IJARCCE 6, no. 6 (2017): 538–40. http://dx.doi.org/10.17148/ijarcce.2017.6697.
Full textYusuf, Dani, Joni Warta, and Sri Rejeki. "Sistem Pengelolaan Kegiatan Perusahaan Menggunakan Identifikasi QR Code." Journal of Informatic and Information Security 2, no. 1 (2021): 123–36. http://dx.doi.org/10.31599/jiforty.v2i1.670.
Full textGričar, Sergej, Christian Stipanović, and Tea Baldigara. "Sustainable Daily Mobility and Bike Security." Sustainability 17, no. 14 (2025): 6262. https://doi.org/10.3390/su17146262.
Full textPramusinto, Wahyu, Bruri Trya Sartana, Sri Mulyati, and Safrina Amini. "Implementation of AES-192 Cryptography and QR Code to Verify The Authenticity of Budi Luhur University Student Certificate." JURNAL PENDIDIKAN TEKNOLOGI KEJURUAN 3, no. 4 (2021): 209–15. http://dx.doi.org/10.24036/jptk.v3i4.14823.
Full textSharma, Hemant, Aditi Pandey, and Ms Varsha. "Product Validation through Blockchain." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 926–30. https://doi.org/10.22214/ijraset.2025.70270.
Full textTurhadi, Turhadi, I. Made Dhena Radya Padmana, and Rodiyati Azrianingsih. "DNA QR Code Using Internal Transcribed Spacer 1 (ITS1) Region of Commercial Cucumber Varieties (Cucumis sativus L.)." Jurnal Riset Biologi dan Aplikasinya 7, no. 1 (2025): 1–7. https://doi.org/10.26740/jrba.v7n1.p1-7.
Full textQasim, Sara Salman. "IoT of Healthcare Innovation Solutions for Predictable Virus Detection." Babylonian Journal of Internet of Things 2024 (November 15, 2024): 126–36. http://dx.doi.org/10.58496/bjiot/2024/015.
Full textS, Manu, Bhagappa ., and Suhas G K. "Secure Digital Signature Using Block Chain Technology." Journal of Cyber Security in Computer System 3, no. 1 (2024): 1–8. http://dx.doi.org/10.46610/jcscs.2024.v03i01.001.
Full textS. Sawalkar, Prof Meera. "E-Health Card - A Comprehensive Web-Based Healthcare System." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49909.
Full textIsong, Bassey, Tshipuke Vhahangwele, and Adnan M. Abu-Mahfouz. "Blockchain-Enabled Vaccination Registration and Verification System in Healthcare Management." Journal of Information Systems and Informatics 5, no. 2 (2023): 719–41. http://dx.doi.org/10.51519/journalisi.v5i2.497.
Full textKallapu, Bhavya, Avinash Nanda Janardhan, Rama Moorthy Hejamadi, et al. "Multi-Layered Security Framework Combining Steganography and DNA Coding." Systems 13, no. 5 (2025): 341. https://doi.org/10.3390/systems13050341.
Full textHarjito, Bambang, Tri Setyawati, and Ardhi Wijayanto. "Comparative Analysis between Elgamal and NTRU Algorithms and their implementation of Digital Signature for Electronic Certificat." International journal of electrical and computer engineering systems 13, no. 9 (2022): 729–39. http://dx.doi.org/10.32985/ijeces.13.9.1.
Full textDaoui, Achraf, Mohamed Yamni, Hicham Karmouni, et al. "Efficient Biomedical Signal Security Algorithm for Smart Internet of Medical Things (IoMTs) Applications." Electronics 11, no. 23 (2022): 3867. http://dx.doi.org/10.3390/electronics11233867.
Full textRajapandian, P. "FaceChainVote: A Unified Blockchain-Driven AI Electoral System." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1108–12. https://doi.org/10.22214/ijraset.2025.72143.
Full textRaniah, Ali Mustafa, Abdulbaqi Maryoosh Amal, Nadir George Dena, and Rasheed Humood Waleed. "Iris images encryption based on QR code and chaotic map." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 289–300. https://doi.org/10.12928/TELKOMNIKA.v18i1.13293.
Full textE, Tejaswini, and Anupama A. "A REWARD MECHANISM FOR MEDICINE SUPPLY CHAIN THROUGH BLOCK CHAIN TECHNOLOGY." International Journal of Engineering Applied Sciences and Technology 7, no. 2 (2022): 247–51. http://dx.doi.org/10.33564/ijeast.2022.v07i02.038.
Full textE, Tejaswini, and Anupama TA. "A REWARD MECHANISM FOR MEDICINE SUPPLY CHAIN THROUGH BLOCK CHAIN TECHNOLOGY." International Journal of Engineering Applied Sciences and Technology 7, no. 4 (2022): 217–21. http://dx.doi.org/10.33564/ijeast.2022.v07i04.034.
Full textHorasan, Fahrettin, Muhammed Ali Pala, Ali Durdu, Akif Akgül, Ömer Faruk Akmeşe, and Mustafa Zahid Yıldız. "DWT-SVD Based Watermarking for High-Resolution Medical Holographic Images." Complexity 2022 (August 29, 2022): 1–21. http://dx.doi.org/10.1155/2022/3154650.
Full text