Forged Marksheet detection System Using QR code
Keywords:
Digital Code, QR code, Digital Marksheet, Authentication, Encryption, DecryptionAbstract
Digital world requires digital data, so it is important to optimize the data accordingly. Therefore it is important to preserve the digital space for saving digital data. This paper presents an Alternative way to optimize the digital data by utilising the technique of QR code. This QR code is obtained by encrypting the normal digital data. Here in this paper, we are utilising this technique to design Digital Marksheet system. Here the digital data would be the students record which would be saved using QR code because this optimize technique is secure and quite useful. We would be using .NET platform to design the system. This paper provides a new dimension for storing, accessing and authenticating the digital data.
References
Somdip Dey, Asoke Nath, Shalabh Agarwal
” Confidential Encrypted Data Hiding and
Retrieval Using QR Authentication System”International Conference on Communication Systems and Network Technologies 2013
QR Code, Wikipedia", http://en.wikipedia.org/wiki/QR_code [Online] [Retrieved 2012-02-09]
Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: “Symmetric Key Cryptography using Random Key generator:” Proceedings of International conference on security and management(SAM’10” held at Las Vegas, USA Jull 12-15, 2010), P-Vol-2, 239-244(2010).
Neeraj Khanna,Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath : “ New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm” Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130(2011).
Somdip Dey, Joyshree Nath, Asoke Nath, "An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm,Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm", IJMECS, vol.4, no.5, pp.1-9, 2012.
Somdip Dey, Joyshree Nath and Asoke Nath. Article: An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm. International Journal of Computer Applications46(20): 46-53, May 2012. Published by Foundation of Computer Science, New York, USA.
Somdip Dey, ”SD-EQR: A New Technique To Use QR CodesTM in Cryptography”, Proceedings of “1st International Conference on Emerging Trends in Computer and Information Technology (ICETCIT 2012)”, Coimbatore, India, pp. 11-21.
Behrouz A. Forouzan,” Cryptography & Network Security”, TataMcGraw Hill Book Company.
Reed and G. Solomon, “Polynomial codes over certain finite fields”, Journal of the Society for Industrial and Applied Mathematics, 8(2):300–304, 1960.
"ZXING- QR Code Library ",http://code.google.com/p/zxing/
N. Johnson and S. Jajodia, “Steganaly- sis: The investigation of hidden information”, Proc. Of the 1998 IEEE Information Technology Conference, 1998.
Somdip Dey, Kalyan Mondal, Joyshree Nath, Asoke Nath,"Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm", IJMECS, vol.4, no.6, pp. 59-67, 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
