SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE



Similar documents
Cryptography and Network Security

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

Content Teaching Academy at James Madison University

Secure Data Transmission Technique for iphone using Quick Response (QR) Code

544 Computer and Network Security

Safer data transmission using Steganography

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Message Authentication Codes

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

Information System Security

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

COSC 472 Network Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Chap. 1: Introduction

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

SFWR ENG 4C03 - Computer Networks & Computer Security

Compter Networks Chapter 9: Network Security

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Chapter 7 Transport-Level Security

Chapter 23. Database Security. Security Issues. Database Security

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones

Information Security

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Network Security. HIT Shimrit Tzur-David

Savitribai Phule Pune University

Chapter 23. Database Security. Security Issues. Database Security

Paper-based Document Authentication using Digital Signature and QR Code

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Monitoring Data Integrity while using TPA in Cloud Environment

Client Server Registration Protocol

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Wireless Network Security

Cyber Security Workshop Encryption Reference Manual

A Novel Cryptographic Key Generation Method Using Image Features

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Notes on Network Security - Introduction

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

A SOFTWARE COMPARISON OF RSA AND ECC

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

Security Goals Services

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

TELE 301 Network Management. Lecture 18: Network Security

Chapter 6 Electronic Mail Security

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

The Misuse of RC4 in Microsoft Word and Excel

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Split Based Encryption in Secure File Transfer

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME

CS 203 / NetSys 240. Network Security

(C) Global Journal of Engineering Science and Research Management

Triple Security of Information Using Stegnography and Cryptography

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

Multi-factor Authentication in Banking Sector

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, , Web, DNS, and Network Management. Maximum Points: 60

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm

Friendly Medical Image Sharing Scheme

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Single Sign-On Secure Authentication Password Mechanism

Network Security - ISA 656 Security

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Database Migration over Network

Intelligent Database Monitoring System using ARM9 with QR Code

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

More effective protection for your access control system with end-to-end security

Cryptography and Network Security Chapter 1

BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE

Chapter 10. Network Security

Data Storage Security in Cloud Computing

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Transcription:

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur, India manojrewatkar143@gmail.com saraut@cse.vnit.ac.in ABSTRACT Nowadays, the information processing system plays crucial part in the internet. Online information security has become the top priority in all sectors. Failing to provide online information security may cause loss of critical information or someone may use or distribute such information for malicious purpose. Recently QR barcodes have been used as an effective way to securely share information. This paper presents the survey on information hiding techniques which can share high security information over network using QR barcode. KEYWORDS QR Barcode, Information Hiding, Online information Security. 1. INTRODUCTION Due to tremendous growth in communication technology, sharing the information through the communication network has never been so convenient. Nowadays information is processed electronically and conveyed through public networks. Such networks are unsecured and hence sensitive information needs to be protected by some means. Cryptography is the study of techniques that allows us to do this. In order to protect information from various computer attacks as well as network attacks various cryptographic protocols and firewalls are used. But no single measure can ensure complete security. Nowadays, the use of internet and sharing information are growing increasingly across the globe, security becomes a vital issue for the society. Security attacks are classified as passive attacks and active attacks [11, 12]. In passive attacks, attacker monitors network traffic and looks for sensitive information but does not affect system resources. Passive attacks include traffic analysis, eavesdropping, Release of message contents [11, 12]. In active attack, attacker breaks protection features to gain unauthorized access to steal or modify information. Active attacks include masquerade, replay, modification of messages, and denial of service [11, 12].Therefore, security threats (such as eavesdropping, data modification, phishing, website leaks etc.) force us to develop new methods to counter them. Considering QR barcodes as an effective media of sharing information, many researchers have proposed information/data hiding methods [6,7, 8, 9.] as well as online transaction systems [1,2,3,4,5] using QR barcode. In this paper, we describe different information hiding schemes using QR barcode. Dhinaharan Nagamalai et al. (Eds) : ACITY, WiMoN, CSIA, AIAA, DPPR, NECO, InWeS - 2014 pp. 243 249, 2014. CS & IT-CSCP 2014 DOI : 10.5121/csit.2014.4525

244 Computer Science & Information Technology (CS & IT) This paper is organized as follows: Section 2 gives details about QR barcode and their features. Section 3 gives details of different information hiding methods using QR barcodes and section 4 compares these methods. Section 5 presents our conclusion. 2. BACKGROUND QR Code, also known as "Quick Response" [10] code, is a two dimensional matrix barcode that can store over 1800 characters of text information. QR Barcodes contain PDF 417 for its high data capacity, Data Matrix for its high density printing and MAXI Code for its high speed reading as shown in fig 1. Fig.1.The formation of QR Code QR Codes are capable of handling of data such as numbers, alphanumeric characters, Kanji, Kana, binary and control codes [10]. A QR code can store information [10] such as: Website URL SMS Text message Calendar event Contact Information Phone number Geographic location 2.1. Structure of QR Barcode QR code consists of the functionality patterns for making it easily decodable. QR code has a position pattern for detecting the position of code, alignment pattern for correcting distortion, and timing pattern for identifying the central coordinate of each cell in the QR code. Quiet zone is the margin space for reading the QR code and the data area where the data is stored [10].

Computer Science & Information Technology (CS & IT) 245 2.2. Features of QR Barcode 2.2.1. High Encoding Capacity Fig.2. the internal pattern Structure of QR code QR Barcode is capable of handling hundred times more data than conventional barcode. Conventional barcode has capacity to store maximum 20 digits [14]. While for QR code, up to 7,089(Numeric),4,296(Alphanumeric),2,953(Binary/byte),1,817(kanji/kana)characters can be encoded in one symbol. 2.2.2. Small Size QR Barcode stores information in both horizontal and vertical fashion. QR Code is capable of storing the same amount of information in one-tenth the space of a conventional barcode [14]. 2.2.3. Dirt and Damage resistant capability QR Code has four different error correction levels, detailed as follows [14]. L - Allows recovery of up to 7% damage. M - Allows recovery of up to 15% damage Q - Allows recovery of up to 25% damage H - Allows recovery of up to 30% damage The error correction level can be selected by the user when he/she creates the symbol depending on how much damage the QR code is expected to suffer in its usage environment. 2.2.4. Structure linking functionality QR Code has a structure appending functionality which will enable a single QR code to be represented in several symbols by dividing it as presented in fig 3. A single symbol can be divided into up to 16 symbols [14].

246 Computer Science & Information Technology (CS & IT) 2.2.5. The Confidentiality of the QR Code Fig 3.The association of the Symbols The QR code can be easily encrypted and no one will be able to read the data until QR code is deciphered. 3. INFORMATION HIDING METHODS USING QR BARCODE 3.1. Using Hash function Authors of [6] proposed an information hiding method using QR barcode. In this Method, information which is to be transmitted is first encrypted by using hash function, with a secret key K. The key K is known in advance to both sender as well as receiver. After the encryption process; QR code for encrypted information is created and sent over the network for the receiver. If an intruder were to try to extract the information from QR code, he/she would only be able to read the code with a QR code decoder but would not be able to get the secret information from QR code. Only the authorized user with secret key K can retrieve the secret information from QR code. The scheme is able to encode large amounts of secret information into a QR code based on selection of the QR version and the error correction level. The main disadvantage is that the whole secrecy of this scheme depends on key K. If someone gets the key, this scheme can reveal the secret information by simply decoding the QR code. 3.2. Using TTJSA symmetric key Algorithm Authors of [7] proposed an encrypted information hiding mechanism using QR barcode. In this method, information which is to be transmitted is first encrypted using TTJSA symmetric key algorithm. For encrypted information, QR code is generated by using QR generator [15]. If an intruder tries to extract the information from QR code then he cannot do that because the cryptographic key is unknown to him. The decryption process is exactly reverse of the encryption process. TTJSA algorithm is free from attacks such as differential attacks, plain-text attacks or brute force attacks. 3.3. SD-EQR Author of [8] presents a new technique using QR barcode to transfer information securely through public network. In this method, the password is entered along with the information. The secret key generated from the password which acts as the key for encryption process. The process of generating secret key is:

Computer Science & Information Technology (CS & IT) 247 Choose password of any size, but should consist of only ASCII characters (0-255). Find the length of the entered password denoted by L. Multiply L2 with the sum of the ASCII values of each letter of the word entered in the password to get S. Each digit of the S is added with each other. The ultimate sum is the secret key. This secret key will be added to each character in the text entered in the information and complete the first phase of encryption process. After doing the first level of encryption, many other several encryption techniques are used to encrypt the message further to increase the level of security. At last final encrypted information is encoded into QR code. QR code efficiently handles the 1,264 characters of ASCII text in version 40 with Error correction level H. if encrypted information size is larger than capacity of QR code then other QR code is generated containing encrypted information after 1,264 characters. This method is continued until the whole encrypted information is converted into QR codes. Decryption is actually the reverse process of the encryption. 3.4. Using reversible data hiding Authors of [9] propose a new algorithm in reversible data hiding, with the application associated with the QR code. Reversible data hiding is a new technique to hide data. During encoding process, data is hidden into original image. Hidden data and original image should be perfectly recovered during decoding process. The secret information which is to be conveyed is first encoded into QR code. At the lower portion of the original image, the pixels in this region are replaced by QR code. While decoding, the QR code is first removed from the image and original information can be recovered with reversible data hiding techniques from the rest of the image. During encoding process, the information in original image might be lost due to replacement of the corner portion of the original image with the QR code. The authors used reversible data hiding techniques to hide pixels in the corner portion of the original image into the rest of the original image in advance. The detailed process of information embedding and extraction by using reversible data hiding techniques is well explained in [10]. 4. COMPARISON CHART Table1. Comparison between Different Information Hiding Methods Methods Using Hash function Using TTJSA symmetric key Algorithm SD-EQR Using reversible data hiding Basic Secret hiding Secret hiding Secret hiding Image hiding Application ComputatioLow Low High Low nal Complexity Processing No No No No On QR code Utilizing the error correction capability Yes Yes Yes No

248 Computer Science & Information Technology (CS & IT) Encryption Yes Yes Yes No on Data before embedding into QR code Hiding Encrypted data embedded into QR Barcode QR barcode of data Mechanism embedded into cover image 5. CONCLUSION This paper describes QR barcode and its use in different information hiding techniques. Such techniques employ traditional information hiding mechanisms like hash functions, image steganography, symmetric key algorithms, etc. in conjunction with QR barcodes. SD-EQR makes use of user entered password to formulate a private key and generates a QR barcode of the encrypted information. Finally the paper compares these techniques. 6. ACKNOWLEDGEMENTS I take this opportunity to express my heartfelt gratitude to my guide Mrs Shital A Raut, Assistant Professor, VNIT Nagpur and my confederate Mr Viraj Jagtap for the time and efforts they have contributed to my work. REFERENCES [1] Kaushik S., Strength of Quick Response Barcodes and Design of Secure Data Sharing System International Journal on Advanced Computing & Science (IJACSA), Dec 2011. [2] Kaushik S.; Puri S., Online Transaction Processing using Sensitive Data Transfer Security Model 4th International Conference on Electronics Computer Technology (ICECT), IEEE, April. 2012. [3] Suresh Gonaboina, Lakshmi Ramani Burra, Pravin Tumuluru, Secure QR-Pay System With Ciphering Techniques In Mobile Devices International Journal of Electronics and Computer Science Engineering. [4] Jaesik Lee, Chang-Hyun Cho, Moon-Seog Jun, Secure Quick Response Payment(QR-Pay) System using Mobile Device, Feb 2011. [5] Sana Nseir, Nael Hirzallah, Musbah Aqel, A Secure Mobile Payment System using QR Code, 5th International Conference on Computer Science and Information Technology (CSIT), 2013. [6] Pei-Yu Lin, Yi-Hui Chen, Eric Jui-Lin Lu and Ping-Jung Chen Secret Hiding Mechanism Using QR Barcode, International Conference on Signal-Image Technology & Internet-Based Systems, 2013. [7] Somdip Dey, Asoke Nath, Shalabh Agarwal, Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System, International Conference on Communication Systems and Network Technologies, 2013. [8] Somdip Dey, SD-EQR: A New Technique To Use QR Codes in Cryptography Use of QR Codes In Data Hiding and Securing. [9] H. C. Huang, F. C. Chang and W. C. Fang, Reversible data hiding with histogram-based difference expansion for QR Code applications, IEEE Transactions on Consumer Electronics, vol. 57, no. 2, pp. 779-787, 2011 [10] "QR Code, Wikipedia", http://en.wikipedia.org/wiki/qr_code [Online]. [11] Cryptography & Network Security, Behrouz A. Forouzan, Tata McGraw Hill Book Company. [12] Cryptography and Network Security, William Stallings, Prentice Hall of India. [13] www.tldp.org/howto/secure-programs-howto/crypto.html. [14] http://www.qrcode.com/en. [15] http://zxing.appspot.com/generator.

Computer Science & Information Technology (CS & IT) 249 AUTHORS Mr. Manoj S. Rewatkar has received his B.Tech degree from Dr.B.A.T.U. Lonere Dist. Raigad (M.H.) He is currently pursuing M.Tech from Visvesvaraya National Institute of Technology in the department of computer science and engineering in Nagpur (M.H.) India. Mrs Shital A. Raut is Assistant Professor at Visvesvaraya National Institute of Technology Nagpur. Her areas of interest include Data Mining and Warehousing, Business Information Systems.