QR Code Based Secret Sharing Approach in a Distributed Way

Abstract

QR barcodes are mainly used for its security protection. There are more benefits in using QR code. Users can gain reliability and high speed scanning solution. In our proposed system we implemented secret QR approach to protect the data. The feature of this algorithm is splitting the QR tags and pass through distribution method to maintain the secrecy of the data under the code. The other end can retrieve the data shared by grasping this secret tags with authorization. In our experiments implementation, the proposed approach is feasible and provides content readability, cheater detectability, and an adjustable secret payload of the QR barcode. The main advantage of the system is the maintain of  secret application with a password.  The password will be split into 5 parts and stored in a QR code. If someone is in need of data they should be aware of credentials. The password can be getting by scanning those QR codes. The admin will share the QR to the cloud. On the file requirement the user will send a query to the admin the admin will send the file name to the user the user has to use the file name and has to get the five qr codes which contains the key and getting the key he or she has to form the password for the file and can download the details.

Country : India

1 Ambadi Vijetha

  1. Assistant Professor, Department of Computer Science And Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India

IRJIET, Volume 3, Issue 10, October 2019 pp. 51-55

.

References

  1. Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code Pei-Yu Lin, Member, IEEE
  2. J. C. Chuang, Y. C. Hu, and H. J. Ko, “A novel secret sharing technique using QR code,” Int. J. Image Process., vol. 4, pp. 468– 475, 2010.
  3. H. C. Huang, F. C. Chang, and W. C. Fang, “Reversible data hiding with histogram-based difference expansion for QR code applications,” IEEE Trans. Consum. Electron., vol. 57, no. 2, pp. 779–787, May 2011.
  4. S. Dey, K. Mondal, J. Nath, and A. Nath, “Advanced steganography algorithm using randomized intermediate QR host embedded with any encrypted secret message: ASA_QR algorithm,” Int. J. Mod. Educ. Comput. Sci., vol. 6, pp. 59–67, 2012.
  5. C. H. Chung, W. Y. Chen, and C. M. Tu, “Image hidden technique using QR-Barcode,” in Proc. 5th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process, 2009, pp. 522–525.
  6. W. Y. Chen and J. W. Wang, “Nested image steganography scheme using QR-barcode technique.