Open Access   Article Go Back

Security of Quick Response Code

K. Ravikumar1 , R. Geetha2

Section:Survey Paper, Product Type: Journal Paper
Volume-8 , Issue-1 , Page no. 90-92, Jan-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i1.9092

Online published on Jan 31, 2020

Copyright © K. Ravikumar, R. Geetha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Ravikumar, R. Geetha, “Security of Quick Response Code,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.90-92, 2020.

MLA Style Citation: K. Ravikumar, R. Geetha "Security of Quick Response Code." International Journal of Computer Sciences and Engineering 8.1 (2020): 90-92.

APA Style Citation: K. Ravikumar, R. Geetha, (2020). Security of Quick Response Code. International Journal of Computer Sciences and Engineering, 8(1), 90-92.

BibTex Style Citation:
@article{Ravikumar_2020,
author = {K. Ravikumar, R. Geetha},
title = {Security of Quick Response Code},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2020},
volume = {8},
Issue = {1},
month = {1},
year = {2020},
issn = {2347-2693},
pages = {90-92},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5002},
doi = {https://doi.org/10.26438/ijcse/v8i1.9092}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i1.9092}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5002
TI - Security of Quick Response Code
T2 - International Journal of Computer Sciences and Engineering
AU - K. Ravikumar, R. Geetha
PY - 2020
DA - 2020/01/31
PB - IJCSE, Indore, INDIA
SP - 90-92
IS - 1
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
255 189 downloads 135 downloads
  
  
           

Abstract

QR (Quick Response) Codes and the way they will be wont to attack each human interaction and automatic systems. Because the encoded data is meant to be code solely, some individuals cannot distinguish between a legitimate and a maliciously manipulated QR code. Whereas humans may fall for phishing attacks, automatic readers square measure possibly susceptible to SQL injections and command injections. Our contribution consists of Associate in Nursing Associate in Nursing lysis of the QR Code as an attack vector, showing totally different attack methods from the attackers purpose of read and exploring their potential consequences.

Key-Words / Index Term

Security, QR Code, DES Algorithm, Protocols

References

[1] A. Lewko, A. Sahai, B. Waters, ”Revocation Systems with Very Small Private Keys” , Proc. IEEE Symposium on Security and Privacy 2010, pp. 273–285, 2017.
[2] A. Boldyreva, V.Goyal, V. Kumar, ”Identity-Based Encryption with Efficient Revocation” Proc. ACM Conference on Computer and Communications Security 2008, pp. 417–426, 2017.
[3] International standard ISO/IEC 18004, “Information technology Automatic identification and data capture techniques Bar code symbology QR Code‖”, Reference number - ISO/IEC 18004:2000(E), First edition 2000-06-15.
[4] HenrykBlasinski, “Per-colorant- channel color barcodes for mobile applications an interference cancellation framework”, IEEE Transactions on Image Processing, vol. 22, no. 4, April 2013.
[5] A. Sankara Narayanan, “QR codes and security solutions‖, International Journal of Computer Science and Telecommunication” , Volume 3, Issue 7, July 2012.
[6] KamonHomkajorn, MahasakKetcham, and SartidVongpradhip, “A technique to remove scratches from QR code images” , International Conference on Computer and Communication Technologies (ICCCT`2012), May 26-27, 2012.
[7] Kuan-Chieh Liao, “A novel user authentication scheme based on QR-code” , Journal of networks, vol. 5, no. 8, August 2010.