Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography

Author(s):  
Li Li ◽  
Jier Yu ◽  
Bing Wang ◽  
Qili Zhou ◽  
Shanqing Zhang ◽  
...  
Author(s):  
Dr. Sheshang D. Degadwala ◽  
Sanjay Chaudhary ◽  
Sanjay Gaur ◽  
Dhairya Vyas

Watermarking is raised to apparatus for the Privacy of Intellectual Property Rights (IPR) of combination dates. In this paper, in the starting we have to fill the user name field and password field which will be secure afterwards that it will be make QR-code using zxing library and it is transformed into binary patterns for share-1 that is called Visual cryptography algorithm. Now share-2 is store into server database and it will be furthered use in future situation at receiver way. Now share-1 is hiding into the LL-Band with the help of DWT-SVD into block manner with Pseudo Zernike moment. Then it is sent to the network or internet. As in network there are many unlike attackers whose apply any Rotation, Scaling or Translation attacks on the hiding image. Attack image is expected at the end side or receiver side. To get prevent against attacks here at the starting stage use Pseudo Zernike moment then after Surf based feature extraction and it will recover the attacks pixel and scaling parameters value and using affine transformation recover the rotational parameters value. So then scale value and angle value is apply on attack image recovered watermark image. Now using DWT+SVD block method extract the water mark share-1. So on system with share-1 and another share-2 will be in server side so now by using EX-OR process for getting QR-Code. At the last stage QR-code is translated and fill field user name and password vale to login the system successfully.


Symmetry ◽  
2021 ◽  
Vol 13 (12) ◽  
pp. 2446
Author(s):  
Shang-Kuan Chen ◽  
Yen-Wu Ti

A multi-purpose image-based QR code is designed in this paper. There are four purposes for the generated image-based QR code. In the first purpose, the basic image-based QR code with the look of a host image is with an ingenious layout to be identified easier. In the second one, a saliency region detection method is adopted for enhancing the quality of the image-based QR code. In the third one, the host image is embedded into the image-based QR code for further access to the host image; Finally, the visual cryptography-based watermarking method is applied to the host image embedded image-based QR code. In the case that the specific users need verification from the image-based QR code, the binary verified image can be retrieved when the public share is available. The experimental results demonstrate that the generated image-based QR code not only looked better than some previous works but also had high quality host image embedded and identification ability.


2015 ◽  
Vol 115 (12) ◽  
pp. 13-16 ◽  
Author(s):  
Dhanashree Moholkar ◽  
Namrata Kadam ◽  
Damini Deokar ◽  
Ashwini Kute ◽  
Sonali Kadam

Sign in / Sign up

Export Citation Format

Share Document