EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions1

2020 ◽  
Vol 28 (5) ◽  
pp. 577-605
Author(s):  
Rui Liu ◽  
Jun Song ◽  
Zhiming Huang ◽  
Jianping Pan

In recent years, with the rapid development and popularization of e-commerce, the applications of e-coupons have become a market trend. As a typical bar code technique, QR codes can be well adopted in e-coupon-based payment services. However, there are many security threats to QR codes, including the QR code tempering, forgery, privacy information leakage and so on. To address these security problems for real situations, in this paper, we introduce a novel fragment coding-based approach for QR codes using the idea of visual cryptography. Then, we propose a QR code scheme with high security by combining the fragment coding with the commitment technique. Finally, an enhanced QR code-based secure e-coupon transaction framework is presented, which has a triple-verification feature and supports both online and offline scenarios. The following properties are provided: high information confidentiality, difficult to tamper with and forge, and the ability to resist against collusion attacks. Furthermore, the performance evaluation of computing and communication overhead is given to show the efficiency of the proposed framework.

Symmetry ◽  
2019 ◽  
Vol 11 (3) ◽  
pp. 361
Author(s):  
Jaeseung Lee ◽  
Jungho Kang ◽  
Moon-seog Jun ◽  
Jaekyung Han

The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in the sense that all things are connected to the Internet, and network attacks that have thus far been exploited in the existing PC environment are now also occurring frequently in the IoT environment. In fact, there have been many security incidents such as DDoS attacks involving the hacking of IP cameras, which are typical IoT devices, leakages of personal information and the monitoring of numerous persons without their consent. While attacks in the existing Internet environment were PC-based, we have confirmed that various smart devices used in the IoT environment—such as IP cameras and tablets—can be utilized and exploited for attacks on the network. Even though it is necessary to apply security solutions to IoT devices in order to prevent potential problems in the IoT environment, it is difficult to install and execute security solutions due to the inherent features of small devices with limited memory space and computational power in this aforementioned IoT environment, and it is also difficult to protect certificates and encryption keys due to easy physical access. Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security framework designed to prevent them. The results of the performance evaluation of this study confirm that the proposed protocol is able to cope with various security threats in the network. Furthermore, from the perspective of energy efficiency, it was also possible to confirm that the proposed protocol is superior to other cryptographic protocols. Thus, it is expected to be effective if applied to the IoT environment.


2019 ◽  
Vol 1 (2) ◽  
pp. 164-169
Author(s):  
Ferry Sudarto ◽  
Dedi Martono ◽  
Rika Ayu Desi Hartatik

Wall or magazine magazines are a means of delivering information on Raharja College campus. In the delivery of information, the magazine has been widely spread in several applications of Raharja College, iRan and GreenDoc. However, this is still not optimal because the method used is still using paper. And also the lack of awareness of students will read the information on the magazine. QR codes are a type of two-dimensional matrix code or bar code developed by Denso Wave in 1994. With that, the form of information is reduced to a QR code that can store detailed information displayed on a monitor screen available at several strategic corners of the campus and scan the code on the main page of the online magazine website. The method used is the waterfall method, observation, and literature study and journal references as supporting in writing. This research was designed to make it easier to access information and attract reading interest to students of Raharja College.


2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Jianfeng Lu ◽  
Zaorang Yang ◽  
Lina Li ◽  
Wenqiang Yuan ◽  
Li Li ◽  
...  

QR code (quick response code) is used due to its beneficial properties, especially in the mobile payment field. However, there exists an inevitable risk in the transaction process. It is not easily perceived that the attacker tampers with or replaces the QR code that contains merchant’s beneficiary account. Thus, it is of great urgency to conduct authentication of QR code. In this study, we propose a novel mechanism based on visual cryptography scheme (VCS) and aesthetic QR code, which contains three primary schemes for different concealment levels. The main steps of these schemes are as follows. Firstly, one original QR code is split into two shadows using VC multiple rules; secondly, the two shadows are embedded into the same background image, respectively, and the embedded results are fused with the same carrier QR code, respectively, using XOR mechanism of RS and QR code error correction mechanism. Finally, the two aesthetic QR codes can be stacked precisely and the original QR code is restored according to the defined VCS. Experiments corresponding to three proposed schemes are conducted and demonstrate the feasibility and security of the mobile payment authentication, the significant improvement of the concealment for the shadows in QR code, and the diversity of mobile payment authentication.


2019 ◽  
Vol 1 (2) ◽  
pp. 164-169
Author(s):  
Ferry Sudarto ◽  
Dedi Martono ◽  
Rika Ayu Desi Hartatik

 Abstract Wall or magazine magazines are a means of delivering information on Raharja College campus. In the delivery of information, the magazine has been widely spread in several applications of Raharja College, iRan and GreenDoc. However, this is still not optimal because the method used is still using paper. And also the lack of awareness of students will read the information on the magazine. QR codes are a type of two-dimensional matrix code or bar code developed by Denso Wave in 1994. With that, the form of information is reduced to a QR code that can store detailed information displayed on a monitor screen available at several strategic corners of the campus and scan the code on the main page of the online magazine website. The method used is the waterfall method, observation, and literature study and journal references as supporting in writing. This research was designed to make it easier to access information and attract reading interest to students of Raharja College.


2019 ◽  
Vol 11 (1) ◽  
pp. 1-17
Author(s):  
Yuqiao Cheng ◽  
Zhengxin Fu ◽  
Bin Yu ◽  
Gang Shen

This article describes how a visual cryptography scheme, with one prominent feature—decrypting simply, has attracted much research attention since it was first proposed. However, meaningless shares remain a continuing challenge in the development of VCS. In this article, an extended visual cryptography scheme (EVCS) based on XOR operation is proposed, in which QR codes are utilized as the cover images of shares. By designation, all the shares generated in the scheme can be decoded by standard QR code readers with specific meaning. In addition, to achieve high sharing efficiency, a method of simultaneously sharing a secret QR code among multiple subsets is presented. Also, sufficient and necessary conditions of the method are analyzed with an integer programming model, providing a general construction approach for EVCS under arbitrary access structures.


Author(s):  
Widyasari Widyasari ◽  
Hadi Sutopo ◽  
Murniati Agustian

Mathematics in elementary school is difficult to understand, boring, formal, theoretical, and book-based learning, which makes students tired of listening and paying attention. The purpose of this study is to create a learning prototype based on QR codes, especially mathematics learning in elementary schools. Using the QR code, students can access math games related to the course. This learning model could encourage students to learn mathematics. The research included seven steps in research and development named after Borg & Gall, such as need assessment, plan, early product development, first test, revise early product, field test and revise product. The object of the research is QR code-based learning, and the respondents are elementary school students and teachers. After analyzing data in the first and field test, researchers found the result. QR code-based learning could support children for learning mathematics.


Author(s):  
Mingliang Xu ◽  
Qingfeng Li ◽  
Jianwei Niu ◽  
Hao Su ◽  
Xiting Liu ◽  
...  

Quick response (QR) codes are usually scanned in different environments, so they must be robust to variations in illumination, scale, coverage, and camera angles. Aesthetic QR codes improve the visual quality, but subtle changes in their appearance may cause scanning failure. In this article, a new method to generate scanning-robust aesthetic QR codes is proposed, which is based on a module-based scanning probability estimation model that can effectively balance the tradeoff between visual quality and scanning robustness. Our method locally adjusts the luminance of each module by estimating the probability of successful sampling. The approach adopts the hierarchical, coarse-to-fine strategy to enhance the visual quality of aesthetic QR codes, which sequentially generate the following three codes: a binary aesthetic QR code, a grayscale aesthetic QR code, and the final color aesthetic QR code. Our approach also can be used to create QR codes with different visual styles by adjusting some initialization parameters. User surveys and decoding experiments were adopted for evaluating our method compared with state-of-the-art algorithms, which indicates that the proposed approach has excellent performance in terms of both visual quality and scanning robustness.


2016 ◽  
Vol 2 (1) ◽  
pp. 355-358
Author(s):  
Manuel Katanacho ◽  
Wladimir De la Cadena ◽  
Sebastian Engel

AbstractThe presented work is an alternative to established measurement systems in surgical navigation. The system is based on camera based tracking of QR code markers. The application uses a single video camera, integrated in a surgical lamp, that captures the QR markers attached to surgical instruments and to the patient.


2021 ◽  
Vol 12 (1) ◽  
pp. 1-11
Author(s):  
Cheman Shaik

In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant. The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it for download on their website or Google Play Store and iPhone App Store. Any individual or immigration uthority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication. Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery and fabrication


Sign in / Sign up

Export Citation Format

Share Document