Haroon Rashid Hammood Al Dallal, Wijdan Noaman Marzoog Al Mukhtar
{"title":"A QR Code Used for Personal Information Based On Multi-Layer Encryption System","authors":"Haroon Rashid Hammood Al Dallal, Wijdan Noaman Marzoog Al Mukhtar","doi":"10.3991/ijim.v17i09.38777","DOIUrl":null,"url":null,"abstract":"Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection and privacy, it is feasible for critical information to be fabricated. This led to a significant financial loss for someone. The intended recipient must be trusted with sensitive information and be able to independently authenticate the accuracy of the information by independently checking the specifics. There are several driving the rise in QR codes used for information transmission. Due to their enormous capacity for storing information, QR codes are vital for dissemination. However, most currently deployed QR code solutions employ insecure data formats and never employ encryption. Secure QR Code is data protection and data concealing available technology. The Quick Response (QR) code is widely used and accessible without extensive technical training. Now, the user data stored in a QR code is effectively public knowledge and occasionally even illegally used. To address the abovementioned issues, this study's authors propose a novel QR code encryption system. Using the image's mathematical processing method, we may apply the equivalence class principle to the ordered equations of the two-dimensional code, producing the desired cryptographic result. This method exploits the unique visual properties of the QR code. Only a QR code reader can decode the code's useful information, which is too complex for standard reading methods. It will be utilised to address issues in speedy business client data protection Security, commodity anticounterfeiting, and bicycle sharing QR codes.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Interact. Mob. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3991/ijim.v17i09.38777","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection and privacy, it is feasible for critical information to be fabricated. This led to a significant financial loss for someone. The intended recipient must be trusted with sensitive information and be able to independently authenticate the accuracy of the information by independently checking the specifics. There are several driving the rise in QR codes used for information transmission. Due to their enormous capacity for storing information, QR codes are vital for dissemination. However, most currently deployed QR code solutions employ insecure data formats and never employ encryption. Secure QR Code is data protection and data concealing available technology. The Quick Response (QR) code is widely used and accessible without extensive technical training. Now, the user data stored in a QR code is effectively public knowledge and occasionally even illegally used. To address the abovementioned issues, this study's authors propose a novel QR code encryption system. Using the image's mathematical processing method, we may apply the equivalence class principle to the ordered equations of the two-dimensional code, producing the desired cryptographic result. This method exploits the unique visual properties of the QR code. Only a QR code reader can decode the code's useful information, which is too complex for standard reading methods. It will be utilised to address issues in speedy business client data protection Security, commodity anticounterfeiting, and bicycle sharing QR codes.