Proteksi Keamanan Data pada Quick Response (QR) Code

2021 ◽  
Vol 3 (2) ◽  
pp. 99-110
Author(s):  
Abdur Rahman Harits Martawireja ◽  
Ridwan Ridwan ◽  
Angga Putra Hafidzin ◽  
Muhammad Taufik

Penggunaan Quick Response (QR) Code untuk berbagi ataupun menyimpan data semakin marak digunakan. Kode QR dapat dengan cepat memberikan informasi baik kontak, plain text, URL ataupun data lainnya hanya dengan memindai QR menggunakan kamera smartphone. Meningkatnya penggunaan kode QR harus diiringi juga dengan tingkat keamanan dalam proteksi data. Jurnal ini membahas beberapa metode yang dapat digunakan untuk meningkatkan keamanan data pada kode QR. Dalam ilmu komputer dan matematika dikenal beberapa istilah terkait proteksi pesan/data yaitu Kriptografi dan Steganografi. Kriptografi akan mengubah pesan menjadi sebuah ciphertext menggunakan algoritma enkripsi dan secret key. Sedangkan pada Steganografi, pesan akan disembunyikan pada sebuah objek. Dengan kedua proses tersebut baik kriptografi dan steganografi ataupun kombinasi dari keduanya maka pesan/data yang disematkan pada kode QR tidak akan mudah untuk diterjemahkan. Metode yang akan dibahas yaitu enkripsi Algoritma Speck dan Advance Encryption Standard (AES) dengan kombinasi Steganografi. Kedua metode tersebut berhasil mengubah informasi rahasia menjadi data yang tidak mudah dikenali. Informasi rahasia yang mengalami proses steganografi menjadi sulit dideteksi dan memberikan pesan yang salah kepada peretas.

2020 ◽  
Vol 17 (2) ◽  
pp. 1090-1098
Author(s):  
Md Gapar Md Johar ◽  
Zairina Ibrahim ◽  
Nur Farhana Mohd Hamidi

This paper aims to explain the nature of quick response (QR) codes and their possible applications in attendance monitoring system at several universities. The aim of this research was to avoid QR code scanning for students who do not attend classes. A QR Code is a two dimensional barcode that is capable of storing a lots of information and various types of information. QR codes have a wide range of uses, including easy storage and transmission of data including web link URLs (Uniform Resource Locators), plain text, email addresses, contact information, SMS or MMS, calendar entries, Wireless network login and more. Based on research and observation, there are many students who like to take a picture of the code and send it to their friends who do not attend the class. There will be an injustice between students attending classes and not attending classes with this problem. Therefore, this research has developed an application of QR code scanner that can scan the QR code whether it is original or copy. In addition, the research has also developed a system of QR code generator and the system will generate the code to become Dynamic QR Code.


Quick Response (QR) Codes are tiny compatible printed pattern on solid surface to transfer a data from a printed medium to a digital medium. The coding information cannot be viewed by the naked eye thus the manipulation of printed pattern is very difficult. In general, QR code is printed in the two-dimension using white and block named QR code modules or data pixels. Static and Dynamic QR codes are available now a days. More than 3000 characters can be encoded over a very tiny space using QR graphics. The data are encoded by QR generator using ISO/IEC 18004:2006. Various types of data can be restored using QR codes and every QR Code contains segment devoted to informing the reader what sort of data it holds and used for coding and decoding the data easily. The most common data types of QR codes are SMS, Email address, phone number, plain text, geo location etc. Nowadays the QR codes are used in various fields. For example, it is used in the marketing and industries to provide the information about the products. In education it is used to register the information about the students in their certificates and to access the information in a website.


2016 ◽  
Vol 10 (1) ◽  
Author(s):  
Novan Adi Musthofa, Siti Mutrofin, Mohamad Ali Murtadho

Dengan berkembangnya teknologi informasi, sering sekali terjadi penyelewengan dokumen terutama pada dokumen-dokumen cetak. Dokumen merupakan salah satu data yang sangat penting, karena dokumen merupakan sumber informasi yang diperlukan oleh suatu instansi, organisasi, negara, maupun individu. Tanpa dokumen, maka seseorang akan kehilangan data-data yang diperlukan untuk kegiatan di masa yang akan datang. Pemalsuan dokumen sangat mudah dilakukan dengan cara meniru bentuk serta isi dari suatu dokumen. Penelitian sebelumnya pernah dilakukan, namun dalam objek yang berbeda. Pemalsuan dokumen dapat diatasi dengan menggunakan Quick Response (QR) Code. QR Code mampu menyimpan semua jenis data, seperti data angka/numerik, alphanumeric, biner, kanji/kana. Selain itu QR Code memiliki tampilan yang lebih kecil daripada barcode. Untuk dapat membuat QR Code suatu dokumen maka dibuatlah sebuah aplikasi yaitu aplikasi Validasi Dokumen. Aplikasi Validasi Dokumen dirancang dengan menggunakan metode waterfall serta menggunakan perancangan Unified Modelling Language (UML). Bahasa pemrograman yang digunakan yaitu bahasa pemrograman PHP: Hypertext Preprocessor (PHP) dengan database MySQL. Sebelum QR Code dibuat, terlebih dahulu data dokumen dienkripsi dan kemudian dijadikan QR Code. Hasil pemindaian QR Code berupa Uniform Resource Locator (URL) yang mengarah pada data dokumen. Ketika URL dijalankan pada web browser, sistem melakukan deskripsi pada URL, kemudian dicocokkan dengan database, dan selanjutnya ditampilkan ke web browser. Hasil akhir aplikasi Validasi Dokumen berupa QR Code yang digunakan untuk menyimpan URL yang  menunjukkan bahwa dokumen memang benar-banar dokumen yang resmi (bukan ilegal) dari suatu instansi. Pada uji coba penelitian ini juga dilakukan perbandingan kinerja dengan 3 aplikasi yang sejenis, 3 aplikasi pembanding tersebut dipilih karena memiliki hasil visual QR Code yang hampir mirip, namun jika dilakukan scanning memiliki hasil yang berbeda, karena fiturnya juga berbeda. Berdasarkan hasil pengujian dengan 3 pembanding aplikasi yang sejenis, dengan menggunakan aplikasi yang diusulkan dalam penelitian ini, pemalsuan dokumen dapat dihindari dengan menggunakan aplikasi Validasi Dokumen selama tidak ada ikut campur orang dalam (superadmin/admin) dalam melakukan praktik pemalsuan dokumen. Pada penelitian selanjutnya dapat dilakukan perbaikan kelemahan aplikasi ini, yaitu agar tidak menampilkan URL, namun hasil pemindai QR Code, langsung dapat menampilkan detail isi dokumen.


Electronics ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 320
Author(s):  
Shundao Xie ◽  
Hong-Zhou Tan

Traceability is considered a promising solution for product safety. However, the data in the traceability system is only a claim rather than a fact. Therefore, the quality and safety of the product cannot be guaranteed since we cannot ensure the authenticity of products (aka counterfeit detection) in the real world. In this paper, we focus on counterfeit detection for the traceability system. The risk of counterfeiting throughout a typical product life cycle in the supply chain is analyzed, and the corresponding requirements for the tags, packages, and traceability system are given to eliminate these risks. Based on the analysis, an anti-counterfeiting architecture for traceability system based on two-level quick response codes (2LQR codes) is proposed, where the problem of counterfeit detection for a product is transformed into the problem of copy detection for the 2LQR code tag. According to the characteristics of the traceability system, the generation progress of the 2LQR code is modified, and there is a corresponding improved algorithm to estimate the actual location of patterns in the scanned image of the modified 2LQR code tag to improve the performance of copy detection. A prototype system based on the proposed architecture is implemented, where the consumers can perform traceability information queries by scanning the 2LQR code on the product package with any QR code reader. They can also scan the 2LQR code with a home-scanner or office-scanner, and send the scanned image to the system to perform counterfeit detection. Compared with other anti-counterfeiting solutions, the proposed architecture has advantages of low cost, generality, and good performance. Therefore, it is a promising solution to replace the existing anti-counterfeiting system.


Author(s):  
Mingliang Xu ◽  
Qingfeng Li ◽  
Jianwei Niu ◽  
Hao Su ◽  
Xiting Liu ◽  
...  

Quick response (QR) codes are usually scanned in different environments, so they must be robust to variations in illumination, scale, coverage, and camera angles. Aesthetic QR codes improve the visual quality, but subtle changes in their appearance may cause scanning failure. In this article, a new method to generate scanning-robust aesthetic QR codes is proposed, which is based on a module-based scanning probability estimation model that can effectively balance the tradeoff between visual quality and scanning robustness. Our method locally adjusts the luminance of each module by estimating the probability of successful sampling. The approach adopts the hierarchical, coarse-to-fine strategy to enhance the visual quality of aesthetic QR codes, which sequentially generate the following three codes: a binary aesthetic QR code, a grayscale aesthetic QR code, and the final color aesthetic QR code. Our approach also can be used to create QR codes with different visual styles by adjusting some initialization parameters. User surveys and decoding experiments were adopted for evaluating our method compared with state-of-the-art algorithms, which indicates that the proposed approach has excellent performance in terms of both visual quality and scanning robustness.


2021 ◽  
Author(s):  
Mircea-Adrian Digulescu

It has long been known that cryptographic schemes offering provably unbreakable security exist, namely the One Time Pad (OTP). The OTP, however, comes at the cost of a very long secret key - as long as the plain-text itself. In this paper we propose an encryption scheme which we (boldly) claim offers the same level of security as the OTP, while allowing for much shorter keys, of size polylogarithmic in the computing power available to the adversary. The Scheme requires a large sequence of truly random words, of length polynomial in the both plain-text size and the logarithm of the computing power the adversary has. We claim that it ensures such an attacker cannot discern the cipher output from random data, except with small probability. We also show how it can be adapted to allow for several plain-texts to be encrypted in the same cipher output, with almost independent keys. Also, we describe how it can be used in lieu of a One Way Function.


2018 ◽  
Vol 2018 ◽  
pp. 1-16
Author(s):  
Octavio Flores Siordia ◽  
Juan Carlos Estrada Gutiérrez ◽  
Carlos Eduardo Padilla Leyferman ◽  
Jorge Aguilar Santiago ◽  
Maricela Jiménez Rodríguez

Safeguarding the identity of people in photographs or videos published through social networks or television is of great importance to those who do not wish to be recognized. In this paper, a face detecting and coding system is designed with the goal of solving this problem. Mathematical models to generate chaotic orbits are deployed. One of them applies the diffusion technique to scramble the pixels of each face while another implements the confusion technique to alter the relation between plain text and ciphered text. Afterward, another two orbits are utilized for the steganography technique to modify the least significant bit (LSB) to conceal data that would allow authorized users to decipher the faces. To verify the robustness of the proposed encryption algorithm, different tests are performed with the Lena standard image, such as correlation diagrams, histograms, and entropy. In addition, occlusion, noise, and plain image attacks are performed. The results are compared with those of other works, and the proposed system provided high sensitivity at secret key and a large space for the encryption keys, good speed for ciphering, disorder in the cryptogram, security, data integrity, and robustness against different attacks.


Sign in / Sign up

Export Citation Format

Share Document