Security of Quick Response Code

Authors

  • Ravikumar k Department of Computer Science, Tamil University, Thanjavur, Tamil Nadu, India
  • Geetha R Department of Computer Science, Tamil University, Thanjavur, Tamil Nadu, India

DOI:

https://doi.org/10.26438/ijcse/v8i1.9092

Keywords:

Security, QR Code, DES Algorithm, Protocols

Abstract

QR (Quick Response) Codes and the way they will be wont to attack each human interaction and automatic systems. Because the encoded data is meant to be code solely, some individuals cannot distinguish between a legitimate and a maliciously manipulated QR code. Whereas humans may fall for phishing attacks, automatic readers square measure possibly susceptible to SQL injections and command injections. Our contribution consists of Associate in Nursing Associate in Nursing lysis of the QR Code as an attack vector, showing totally different attack methods from the attackers purpose of read and exploring their potential consequences.

References

[1] A. Lewko, A. Sahai, B. Waters, ”Revocation Systems with Very Small Private Keys” , Proc. IEEE Symposium on Security and Privacy 2010, pp. 273–285, 2017.

[2] A. Boldyreva, V.Goyal, V. Kumar, ”Identity-Based Encryption with Efficient Revocation” Proc. ACM Conference on Computer and Communications Security 2008, pp. 417–426, 2017.

[3] International standard ISO/IEC 18004, “Information technology Automatic identification and data capture techniques Bar code symbology QR Code‖”, Reference number - ISO/IEC 18004:2000(E), First edition 2000-06-15.

[4] HenrykBlasinski, “Per-colorant- channel color barcodes for mobile applications an interference cancellation framework”, IEEE Transactions on Image Processing, vol. 22, no. 4, April 2013.

[5] A. Sankara Narayanan, “QR codes and security solutions‖, International Journal of Computer Science and Telecommunication” , Volume 3, Issue 7, July 2012.

[6] KamonHomkajorn, MahasakKetcham, and SartidVongpradhip, “A technique to remove scratches from QR code images” , International Conference on Computer and Communication Technologies (ICCCT`2012), May 26-27, 2012.

[7] Kuan-Chieh Liao, “A novel user authentication scheme based on QR-code” , Journal of networks, vol. 5, no. 8, August 2010.

Downloads

Published

2020-01-31
CITATION
DOI: 10.26438/ijcse/v8i1.9092
Published: 2020-01-31

How to Cite

[1]
K. Ravikumar and R. Geetha, “Security of Quick Response Code”, Int. J. Comp. Sci. Eng., vol. 8, no. 1, pp. 90–92, Jan. 2020.