12/18/2023 0 Comments Qr journal![]() The designed triple module grouping approach conceals two confidential bits by changing only one QR module. The Proposed Confidential QR Approach Based on the Triple Module Group Finally, we perform a theoretical analysis to prove the proposed method and discuss its implications. Moreover, the embeddable secret payload is superior to related studies. This proposed method can effectively preserve the original readability of QR codes, significantly reduce the modification of QR modules, and increase the embeddable capacity of secrets in QR codes. In this article, we aim to design a system to embed secrets into QR codes and to address the following issues: the confidentiality of QR codes and the payload of the confidential information that can be embedded. Traditional image hiding or watermarking techniques require additional image processing processes/computers that are not suitable for real-time scanning and direct retrieval of QR codes by barcode readers. Anyone can easily scan and retrieve QR data content through barcode readers therefore, the protection of private data is critical. īased on the above observations, there is a considerable lack of research on protecting the confidential information of QR codes. Accordingly, it is necessary for companies or e-ticketing systems to hide or protect sensitive QR code content, allowing only authorized users to retrieve it. The security of QR code e-tickets thus remains an unsolved question. However, although e-ticketing makes the ride smoother and more environmentally friendly, it also makes it easier for people with bad intentions to forge fake tickets. These codes replaced paper tickets for entering and exiting the train gate. For example, in 2011, Taiwan High Speed Rail (THSR) released a trial of e-ticketing, in which users could download a QR code after purchasing a ticket via smartphones. However, when the information requires privacy for the individual (e.g., e-coupons and e-tickets), current QR Code technologies cannot address the security problems. Mobile devices can scan the QR code and obtain the data content for public transmission. Quick Response (QR) codes are widely used in our daily lives since they are convenient and can accommodate a large amount of data. This designed scheme can provide secure and reliable applications for the QR system. Furthermore, only authorized users with the secret key can further extract the concealed confidential information. As a result, the ordinary data content (such as URL) can be extracted correctly from the generated QR code by any barcode decoders, which does not affect the readability of scanning. Additionally, this manner can conceal two secret bits by changing only one module, and the amount of hidden confidential information can be twice the original amount. This new scheme designs the triple module groups based on the concept of the error correction capability. ![]() In this article, we propose an algorithm to conceal confidential information by changing the modules of the QR Code. Moreover, current secret hiding techniques are unsuitable for QR code applications since QR codes are module-oriented, which is different from the pixel-oriented hiding manner. However, this convenience raises concerns about security issues when using QR codes to transmit confidential information, such as e-tickets, coupons, and other private data. In present times, barcode decoders on mobile phones can extract the data content of QR codes.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |