scholarly journals WhatsApp Web QR code: Auto-change Frequency Analysis

2021 ◽  
Vol 2021 (2) ◽  
Author(s):  
Lalatendu Bidyadhara Kumar Barik ◽  
Nikita Barik

Purpose: The purpose of the study is to investigate the behavioral aspects of WhatsApp Web QR code and its impact on privacy of users. Background: WhatsApp is the fastest growing private online chat network for encrypted messaging. The role of QR code encryption in WhatsApp Web interface provide users with the ability to secure communication. It remains uncertain if the same trends occur in the encryption protocol. To strengthen user’s security and privacy, the cryptographic algorithm has been modified to protect from the attackers. Methodology: The research was performed over a span of four months (July-October 2020) on experimental basis in India. All the observations and measurements were carried out using Mozilla Firefox web browser and the open source screen recording tool i.e. CamStudio. QR code decoding was performed in the ZXing decoder environment. Findings: This research examined the auto-change scale factor of the QR code in WhatsApp Web (A browser-based application of WhatsApp). The findings revealed that the QR code auto-change factor is 20 seconds while the QR code reload factor is 120 seconds. Evaluations showed that six consecutive QR code variations take place over each QR code reload period. Upon decoding the QR code of each set of QR code reload period, we observed that the parsed result of all QR codes were different. Each set of QR code reload period has six unique QR codes; even that doesn’t match the QR codes of the subsequent sets. Randomly changing QR codes are due to cryptographic algorithm that provides users for secure authentication and end-to-end-encryption.

Internet of Things (IoT) becomes part of our daily life. IoT has greatly uplifted the human life and has touched many aspect in our life style. IoT devices are sophisticated lowend device having limited computational and energy resources. Most of the cryptographic algorithms are based on complex mathematical calculation which is not feasible to be computed on IoT devices. Hence presently IoT devices lack strong security features. Security and privacy are becoming the real concern for IoT devices. In this paper we are exploring the various cryptographic algorithm which can be used for IoT device authentication and secure communication. The overall system is designed considering the light weight factor, scalability, time complexity and ease of implementation


2016 ◽  
Vol 10 (1) ◽  
Author(s):  
Novan Adi Musthofa, Siti Mutrofin, Mohamad Ali Murtadho

Dengan berkembangnya teknologi informasi, sering sekali terjadi penyelewengan dokumen terutama pada dokumen-dokumen cetak. Dokumen merupakan salah satu data yang sangat penting, karena dokumen merupakan sumber informasi yang diperlukan oleh suatu instansi, organisasi, negara, maupun individu. Tanpa dokumen, maka seseorang akan kehilangan data-data yang diperlukan untuk kegiatan di masa yang akan datang. Pemalsuan dokumen sangat mudah dilakukan dengan cara meniru bentuk serta isi dari suatu dokumen. Penelitian sebelumnya pernah dilakukan, namun dalam objek yang berbeda. Pemalsuan dokumen dapat diatasi dengan menggunakan Quick Response (QR) Code. QR Code mampu menyimpan semua jenis data, seperti data angka/numerik, alphanumeric, biner, kanji/kana. Selain itu QR Code memiliki tampilan yang lebih kecil daripada barcode. Untuk dapat membuat QR Code suatu dokumen maka dibuatlah sebuah aplikasi yaitu aplikasi Validasi Dokumen. Aplikasi Validasi Dokumen dirancang dengan menggunakan metode waterfall serta menggunakan perancangan Unified Modelling Language (UML). Bahasa pemrograman yang digunakan yaitu bahasa pemrograman PHP: Hypertext Preprocessor (PHP) dengan database MySQL. Sebelum QR Code dibuat, terlebih dahulu data dokumen dienkripsi dan kemudian dijadikan QR Code. Hasil pemindaian QR Code berupa Uniform Resource Locator (URL) yang mengarah pada data dokumen. Ketika URL dijalankan pada web browser, sistem melakukan deskripsi pada URL, kemudian dicocokkan dengan database, dan selanjutnya ditampilkan ke web browser. Hasil akhir aplikasi Validasi Dokumen berupa QR Code yang digunakan untuk menyimpan URL yang  menunjukkan bahwa dokumen memang benar-banar dokumen yang resmi (bukan ilegal) dari suatu instansi. Pada uji coba penelitian ini juga dilakukan perbandingan kinerja dengan 3 aplikasi yang sejenis, 3 aplikasi pembanding tersebut dipilih karena memiliki hasil visual QR Code yang hampir mirip, namun jika dilakukan scanning memiliki hasil yang berbeda, karena fiturnya juga berbeda. Berdasarkan hasil pengujian dengan 3 pembanding aplikasi yang sejenis, dengan menggunakan aplikasi yang diusulkan dalam penelitian ini, pemalsuan dokumen dapat dihindari dengan menggunakan aplikasi Validasi Dokumen selama tidak ada ikut campur orang dalam (superadmin/admin) dalam melakukan praktik pemalsuan dokumen. Pada penelitian selanjutnya dapat dilakukan perbaikan kelemahan aplikasi ini, yaitu agar tidak menampilkan URL, namun hasil pemindai QR Code, langsung dapat menampilkan detail isi dokumen.


Author(s):  
Widyasari Widyasari ◽  
Hadi Sutopo ◽  
Murniati Agustian

Mathematics in elementary school is difficult to understand, boring, formal, theoretical, and book-based learning, which makes students tired of listening and paying attention. The purpose of this study is to create a learning prototype based on QR codes, especially mathematics learning in elementary schools. Using the QR code, students can access math games related to the course. This learning model could encourage students to learn mathematics. The research included seven steps in research and development named after Borg & Gall, such as need assessment, plan, early product development, first test, revise early product, field test and revise product. The object of the research is QR code-based learning, and the respondents are elementary school students and teachers. After analyzing data in the first and field test, researchers found the result. QR code-based learning could support children for learning mathematics.


Author(s):  
Mingliang Xu ◽  
Qingfeng Li ◽  
Jianwei Niu ◽  
Hao Su ◽  
Xiting Liu ◽  
...  

Quick response (QR) codes are usually scanned in different environments, so they must be robust to variations in illumination, scale, coverage, and camera angles. Aesthetic QR codes improve the visual quality, but subtle changes in their appearance may cause scanning failure. In this article, a new method to generate scanning-robust aesthetic QR codes is proposed, which is based on a module-based scanning probability estimation model that can effectively balance the tradeoff between visual quality and scanning robustness. Our method locally adjusts the luminance of each module by estimating the probability of successful sampling. The approach adopts the hierarchical, coarse-to-fine strategy to enhance the visual quality of aesthetic QR codes, which sequentially generate the following three codes: a binary aesthetic QR code, a grayscale aesthetic QR code, and the final color aesthetic QR code. Our approach also can be used to create QR codes with different visual styles by adjusting some initialization parameters. User surveys and decoding experiments were adopted for evaluating our method compared with state-of-the-art algorithms, which indicates that the proposed approach has excellent performance in terms of both visual quality and scanning robustness.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 404
Author(s):  
Yasmeen Al-Saeed ◽  
Eman Eldaydamony ◽  
Ahmed Atwan ◽  
Mohammed Elmogy ◽  
Osama Ouda

Wireless Body Area Networks (WBANs) are increasingly employed in different medical applications, such as remote health monitoring, early detection of medical conditions, and computer-assisted rehabilitation. A WBAN connects a number of sensor nodes implanted in and/or fixed on the human body for monitoring his/her physiological characteristics. Although medical healthcare systems could significantly benefit from the advancement of WBAN technology, collecting and transmitting private physiological data in such an open environment raises serious security and privacy concerns. In this paper, we propose a novel key-agreement protocol to secure communications among sensor nodes of WBANs. The proposed protocol is based on measuring and verifying common physiological features at both sender and recipient sensors prior to communicating. Unlike existing protocols, the proposed protocol enables communicating sensors to use their previous session pre-knowledge for secure communication within a specific period of time. This will reduce the time required for establishing the shared key as well as avoid retransmitting extracted features in the medium and hence thwarting eavesdropping attacks while maintaining randomness of the key. Experimental results illustrate the superiority of the proposed key agreement protocol in terms of both feature extraction and key agreement phases with an accuracy of 99.50% and an error rate of 0.005%. The efficacy of the proposed protocol with respect to energy and memory utilization is demonstrated compared with existing key agreement protocols.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 122362-122372 ◽  
Author(s):  
Yukun Zhou ◽  
Baidong Hu ◽  
Yitao Zhang ◽  
Weiming Cai

Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


2016 ◽  
Vol 2 (1) ◽  
pp. 355-358
Author(s):  
Manuel Katanacho ◽  
Wladimir De la Cadena ◽  
Sebastian Engel

AbstractThe presented work is an alternative to established measurement systems in surgical navigation. The system is based on camera based tracking of QR code markers. The application uses a single video camera, integrated in a surgical lamp, that captures the QR markers attached to surgical instruments and to the patient.


2021 ◽  
Vol 12 (1) ◽  
pp. 1-11
Author(s):  
Cheman Shaik

In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant. The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it for download on their website or Google Play Store and iPhone App Store. Any individual or immigration uthority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication. Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery and fabrication


Author(s):  
K. Ravikumar ◽  
R. Geetha

Quick Response (QR) codes are versatile. a chunk of long trilingual text, a connected URL, an automatic SMS message, an identity card or simply regarding any data is embedded into the two-dimensional barcode. as well as moderate equipped mobile devices, QR Codes will connect the users to the data quickly and simply. The operations to retrieve or store QR codes are unbelievably easy and fast, and with mobile devices, build them the best academic tools for teaching and learning. QR codes are all over and most of the people have mobile phones equipped with QR code readers. though QR codes existed for over fifteen years, there arent such a lot of analysis applications during this space.


Sign in / Sign up

Export Citation Format

Share Document