Review “The Digital Revolution for the Security of Hiding Information inside the Quick Response Code”

Abstract

The Digital Revolution has significantly transformed secure and transmitted information, with QR codes emerging as a powerful tool in this landscape. QR codes that stands for Quick Response codes are 2D barcodes that can contain a vast amount of information; they have great opportunities to encrypt information, so they provide reliable solutions in terms of data hiding and data transfer. The described confrontation of the Digital Revolution insists on enhancing and changing ways to ensure information security, and the application of QR codes is a good example of how technological advancements can offer efficient ideas for concealing and protecting information. As encryption and QR code technology evolve, their role in securing data will undoubtedly expand, offering new levels of security in our increasingly digital world. 

Country : Iraq

1 Afraa Zidane Younis2 Ahmed Sami Nori

  1. Computer Science Department, College of Computer and Mathematics & Mosul University, Iraq
  2. Cyber Security Department, College of Computer and Mathematics & Mosul University, Iraq

IRJIET, Volume 8, Issue 8, August 2024 pp. 37-48

doi.org/10.47001/IRJIET/2024.808005

References

  1. Mishra, A., & Mathuria, M. (2017). A review on QR code. Int. J. Comput. Appl164(9), 17-19.
  2. Galiyawala, H. J., & Pandya, K. H. (2014, December). To increase data capacity of QR code using multiplexing with color coding: An example of embedding speech signal in QR code. In 2014 Annual IEEE India Conference (INDICON) (pp. 1-6). IEEE.
  3. Taveerad, N., & Vongpradhip, S. (2015, November). Development of color QR code for increasing capacity. In 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS) (pp. 645-648). IEEE.
  4. Lim, Z. Y., & Sim, K. S. (2022). Multi-Color Code with High Data Capacity. International Journal on Robotics, Automation and Sciences4, 35-45.
  5. Ruan, C., & Huang, P. (2023, November). High capacity secret embedding strategy for QR codes based on EMD. In Third International Conference on Artificial Intelligence, Virtual Reality, and Visualization (AIVRV 2023) (Vol. 12923, pp. 569-577). SPIE.
  6. Aravindh, G., Piraisudan, R., Murali, L., Silwin, B. R., & Nithish, T. (2024, April). A Visual Cryptographic Scheme for Colour QR Codes in Defence. In 2024 International Conference on Science Technology Engineering and Management (ICSTEM) (pp. 1-6). IEEE.
  7. Arya, A., & Tiwari, S. K. (2023). A survey paper on quick response codes and its image pre-processing methods based on steganography. Int J Innovat Res Growth12, 17-24.
  8. Wan, S., Lu, Y., Yan, X., Ding, W., & Liu, H. (2018). High capacity embedding methods of qr code error correction. In Wireless Internet: 9th International Conference, WICON 2016, Haikou, China, December 19-20, 2016, Proceedings 9 (pp. 70-79). Springer International Publishing.
  9. Arora, A., Garg, H., & Shivani, S. (2023). Privacy Protection of Digital Images Using Watermarking and QR Codebased Visual Cryptography. Advances in Multimedia2023(1), 6945340.
  10. Wu, D. C., & Wu, Y. M. (2020). Covert communication via the QR code image by a data hiding technique based on module shape adjustments. IEEE Open Journal of the Computer Society1, 12-34.
  11. Ohana, D. J., & Shashidhar, N. (2013). QR code steganography. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
  12. Hajduk, V., Broda, M., Kováč, O., & Levický, D. (2016, April). Image steganography with using QR code and cryptography. In 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA) (pp. 350-353). IEEE.
  13. Pramanik, S. A. B. Y. A. S. A. C. H. I., & Raja, S. S. (2020). A secured image steganography using genetic algorithm. Advances in Mathematics: Scientific Journal9(7), 4533-4541.
  14. Andrejčík, S., Ovseník, Ľ., & Oravec, J. (2023). The Influence of Steganographic Methods and QR Code Resolutions on Data Hiding in Cover Images. Acta Electrotechnica et Informatica23(4), 10-16.
  15. Koptyra K, Ogiela MR. Steganography in QR Codes—Information Hiding with Suboptimal Segmentation. Electronics. 2024; 13(13):2658. https://doi.org/10.3390/electronics13132658
  16. Rani, M. M. S., & Euphrasia, K. R. (2016). Data security through qr code encryption and steganography. Advanced Computing: An International Journal (ACIJ)7(1/2), 1-7.
  17. Usama, M., & Yaman, U. (2022). Embedding information into or onto additively manufactured parts: a review of qr codes, steganography and watermarking methods. Materials15(7), 2596.
  18. Sahu, S. K., & Gonnade, S. K. (2013). Encryption in QR code using stegnography. International Journal of Engineering Research and Applications3(4), 1738-1741.
  19. Masoud, Alajmi., Ibrahim, F., Elashry., Hala, S., El-sayed., Osama, S., Farag, Allah. (2020). Steganography of Encrypted Messages Inside Valid QR Codes. IEEE Access,  doi: 10.1109/ACCESS.2020.2971984
  20. Soon, T. J. (2008). There are several types of 2D codes in use by the industry, one of which is QR Code. This article provides an overview of QR Code, the standardisation activities on this technology and its applications in the various sectors. Foxdesignsstudio. com.[Online]. Available: https://foxdesignsstudio. com/uploads/pdf/Three_QR_Code. pdf.[Accessed: 10-Feb-2023].
  21. Coleman, J. (2011). QR codes: What are they and why should you care?. Kansas Library Association College and University Libraries Section Proceedings1(1), 16-23.
  22. Krombholz, K., Frühwirt, P., Rieder, T., Kapsalis, I., Ullrich, J., & Weippl, E. (2015, August). QR Code Security--How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. In 2015 10th International Conference on Availability, Reliability and Security (pp. 230-237). IEEE.
  23. Mavroeidis, V., & Nicho, M. (2017). Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks. In Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings 7 (pp. 313-324). Springer International Publishing.
  24. V. Sharma, ‘‘A study of malicious QR codes,’’ Int. J. Comput. Intell. Inf. Secur., vol. 3, no. 5, pp. 1–15, 2012.
  25. Yong, K. S., Chiew, K. L., & Tan, C. L. (2019, June). A survey of the QR code phishing: the current attacks and countermeasures. In 2019 7th International Conference on Smart Computing & Communications (ICSCC) (pp. 1-5). IEEE.
  26. Averin, A., & Zyulyarkina, N. (2020, November). Malicious QR-Code threats and vulnerability of blockchain. In 2020 Global Smart Industry Conference (GloSIC) (pp. 82-86). IEEE.
  27. Venkat Krishnapur. Fab 4, 2021. What is QR code phishing and how to protect yourself from it. https://indianexpress.com/article/technology/opiniontechnology/what-is-qr-code-phishing-and-how-to-protect-yourself-from-it7174553/
  28. Julien Maury. February 21, 2022. QR Codes: A Growing Security Problem. https://www.esecurityplanet.com/threats/qr-code-security-problem/
  29. Narayanan, A. S. (2012). QR codes and security solutions. International Journal of Computer Science and Telecommunications3(7), 69-72.
  30. Song, J., Gao, K., Shen, X., Qi, X., Liu, R., & Choo, K. K. R. (2018). QRFence: A flexible and scalable QR link security detection framework for Android devices. Future Generation Computer Systems88, 663-674.
  31. Al-Zahrani, M. S., Wahsheh, H. A., & Alsaade, F. W. (2021). Secure RealTime Artificial Intelligence System against Malicious QR Code Links. Security and Communication Networks2021(1), 5540670.
  32. Pawar, A., Fatnani, C., Sonavane, R., Waghmare, R., & Saoji, S. (2022, August). Secure QR Code Scanner to Detect Malicious URL using Machine Learning. In 2022 2nd Asian Conference on Innovation in Technology (ASIANCON) (pp. 1-8). IEEE.
  33. Wahsheh, H. A., & Luccio, F. L. (2019, February). Evaluating Security, Privacy and Usability Features of QR Code Readers. In ICISSP (pp. 266-273).
  34. Rafsanjani, A. S., Kamaruddin, N., Sjariff, N. N. A., Firdaus, N., Maarop, N., & Rusli, H. M. (2022). A Evaluating Security and Privacy Features of Quick Response Code Scanners: A Comparative Study. Open International Journal of Informatics10(2), 197-207.
  35. S., D., Narayanan., Dr., S., Prabhu., E., Padma. (2024). Improving QR Code Security using Multiple Encryption Layers. 845-848. doi:10.1109/icc-robins60238.2024.10533884
  36. Agasthiya, Reni, Selvasingh. (2023). Implementing Number Theory in Visual Cryptography for Secure Online Transactions using QR Codes. International Journal for Research in Applied Science and Engineering Technology, doi: 10.22214/ijraset.2023.56117.
  37. Abed, H. N. (2017). Robust and secured image steganography using lsb and encryption with qr code. Journal of AL-Qadisiyah for computer science and mathematics9(2), 1-9.
  38. Lin, P. Y., & Chen, Y. H. (2017). High payload secret hiding technology for QR codes. EURASIP Journal on Image and Video Processing2017, 1-8.
  39. Malathi, V., Balamurugan, B., & Eshwar, S. (2017, February). Achieving privacy and security using QR code by means of encryption technique in ATM. In 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM) (pp. 281-285). IEEE.
  40. Aciobăniței, I., Buhus, I.C., & Pura, M. (2018). Using Cryptography in the Cloud for Lightweight Authentication Protocols Based on QR Codes. 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI), 000539-000542.
  41. Raja, P. S., & Baburaj, E. (2018, February). QR code based image steganography via variable step size firefly algorithm and lifting wavelet transform. In Proceedings of the 2nd International Conference on Machine Learning and Soft Computing (pp. 114-121).
  42. Luo, Z., Xie, W., Wang, B., Tang, Y., & Xing, Q. (2019). EasyStego: robust steganography based on quick-response barcodes for crossing domains. Symmetry11(2), 222.
  43. Wan, S., Yang, G., Qi, L., Li, L., Yan, X., & Lu, Y. (2019). Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Mathematical Biosciences and Engineering16(6), 6367-6385.
  44. Singh, E.H. (2019). Implementation of Image Steganography in QR Code Using Mid-Band DCT. Journal of emerging technologies and innovative research.
  45. Mathivanan, P., Edward Jero, S., & Balaji Ganesh, A. (2019). QR code-based highly secure ECG steganography. In International Conference on Intelligent Computing and Applications: Proceedings of ICICA 2018 (pp. 171-178). Springer Singapore.
  46. Yu, B., Fu, Z., & Liu, S. (2019). A Novel ThreeLayer QR Code Based on Secret Sharing Scheme and Liner Code. Security and Communication Networks2019(1), 7937816.
  47. Durafe, A. (2020). Securing criminal records using R-Pi, QR code and steganography. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 22783075(9), 6.
  48. Sun, Y., Yu, M., & Wang, J. (2020, November). Research and development of QR code steganography based on JSteg algorithm in DCT domain. In 2020 IEEE 15th International Conference on Solid-State & Integrated Circuit Technology (ICSICT) (pp. 1-4). IEEE.
  49. Rao, J., & Chavan, N. Data Hiding under QR Code using Visual Secret Sharing and Advanced Partitioning Based on Specific Relationship.
  50. Jiang, P., & Xue, Y. (2021). A Distributed Secret Sharing Method with QR Code Based on Information Hiding. Journal of Cyber Security3(4).
  51. Surendran, S., Palaniappan, R., & Nagaraj, V. (2021). Improved Security In Steganography By Amalgaming Cryptography And Quick Response Code. Int. J. of Aquatic Science12(3), 1847-1853.
  52. Sangale, A., Taru, A., Gupta, R., Gandhas, V., & Deokar, R. SECURE MESSAGING USING CRYPTOGRAPHY, STEGANOGRAPHY AND QR CODE.
  53. Bhoskar, N., Ithape, P., Gavali, B., & Kasture, P. (2022). A Survey on secrete communication through QR code steganography for military application. Int. J. Res. Appl. Sci. Eng. Technol10(1), 728-731.
  54. (2023). Secure QR-Code Based Message Sharing System Using Cryptography and Steganography. International Journal for Research in Applied Science and Engineering Technology.
  55. Fang, Y., Tu, K., Wu, K., Peng, Y., & Shi, Y. (2023). PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation. KSII Trans. Internet Inf. Syst.17(2), 471-485.
  56. Blesswin, J., Mary, S., Gobinath, T., Divate, M., A, C.E., Shahbad, A.A., Patil, D., & S., S.R. (2023). Error-induced inverse pixel visual cryptography for secure QR code communication. Journal of Autonomous Intelligence.
  57. Narayanan, S. D., & Prabhu, S. (2024, April). Strengthening QR code Anti-Counterfeit through Multi-Encryption Algorithm. In 2024 International Conference on Cognitive Robotics and Intelligent Systems (ICC-ROBINS) (pp. 864-866). IEEE.