QR Code and its Security Issues
Keywords:
QR code, Error Correction, Reed Solomon, Malicious Code, Alteration, PhishingAbstract
With the wireless media becoming the most accessible commodity of the time to the people, barcodes are used as the message carriers with significant information transferred through at both ends. This paper aims to provide details about the most commonly 2D barcode, QR code in respect to its structure, symbology. Also it gives overview of different schemes that the attacker can use to deceive the people by directing them to malicious websites almost similar in domain name to the source.
References
. Damon Gura, Kevin O’Shea, Arjuna Reddy ,Micheline (Mich) Sabatté, "QR Codes",Kellogg School of Management, Friday ,March 11, 2011
. A. Sankara Narayanan, "QR Codes and Security Solutions", International Journal of Computer Science and Telecommunications,Volume 3, Issue 7, July 2012
. Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar Weippl, "QR Code Security", SBA Research, Favoritenstrasse 16 AT-1040,Vienna
. Ioannis Kapsalis, "Security of QR Codes", Norwegian University of Science andTechnology, June 2013
. Sona Kaushik, "Strength of Quick Response Barcodes and Design of Secure Data Sharing System ", (IJACSA) International Journal of Advanced Computer Science and Applications, Volume 2, Issue 11, 2011
. Denso Wave. To two-dimensional code from the barcode, http://www.qrcode.com/aboutqr.html, November 5,2014
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
