Open Access   Article Go Back

Forged Marksheet detection System Using QR code

Sanjeev Kumar Pandey1 , Rahul Patel2 , Sanket Ubale3 , D.A.Lokare 4

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-4 , Page no. 30-32, Apr-2015

Online published on May 04, 2015

Copyright © Sanjeev Kumar Pandey, Rahul Patel, Sanket Ubale , D.A.Lokare . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sanjeev Kumar Pandey, Rahul Patel, Sanket Ubale , D.A.Lokare, “Forged Marksheet detection System Using QR code,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.4, pp.30-32, 2015.

MLA Style Citation: Sanjeev Kumar Pandey, Rahul Patel, Sanket Ubale , D.A.Lokare "Forged Marksheet detection System Using QR code." International Journal of Computer Sciences and Engineering 3.4 (2015): 30-32.

APA Style Citation: Sanjeev Kumar Pandey, Rahul Patel, Sanket Ubale , D.A.Lokare, (2015). Forged Marksheet detection System Using QR code. International Journal of Computer Sciences and Engineering, 3(4), 30-32.

BibTex Style Citation:
@article{Pandey_2015,
author = { Sanjeev Kumar Pandey, Rahul Patel, Sanket Ubale , D.A.Lokare},
title = {Forged Marksheet detection System Using QR code},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2015},
volume = {3},
Issue = {4},
month = {4},
year = {2015},
issn = {2347-2693},
pages = {30-32},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=456},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=456
TI - Forged Marksheet detection System Using QR code
T2 - International Journal of Computer Sciences and Engineering
AU - Sanjeev Kumar Pandey, Rahul Patel, Sanket Ubale , D.A.Lokare
PY - 2015
DA - 2015/05/04
PB - IJCSE, Indore, INDIA
SP - 30-32
IS - 4
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2892 2573 downloads 2582 downloads
  
  
           

Abstract

Digital world requires digital data, so it is important to optimize the data accordingly. Therefore it is important to preserve the digital space for saving digital data. This paper presents an Alternative way to optimize the digital data by utilising the technique of QR code. This QR code is obtained by encrypting the normal digital data. Here in this paper, we are utilising this technique to design Digital Marksheet system. Here the digital data would be the students record which would be saved using QR code because this optimize technique is secure and quite useful. We would be using .NET platform to design the system. This paper provides a new dimension for storing, accessing and authenticating the digital data.

Key-Words / Index Term

Digital Code, QR code, Digital Marksheet, Authentication,Encryption,Decryption

References

[1] Somdip Dey, Asoke Nath, Shalabh Agarwal ” Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System”International Conference on Communication Systems and Network Technologies 2013
[2] QR Code, Wikipedia", http://en.wikipedia.org/wiki/QR_code [Online] [Retrieved 2012-02-09]
[3] Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: “Symmetric Key Cryptography using Random Key generator:” Proceedings of International conference on security and management(SAM’10” held at Las Vegas, USA Jull 12-15, 2010), P-Vol-2, 239-244(2010).
[4] Neeraj Khanna,Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath : “ New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm” Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130(2011).
[5] Somdip Dey, Joyshree Nath, Asoke Nath, "An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm,Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm", IJMECS, vol.4, no.5, pp.1-9, 2012.
[6] Somdip Dey, Joyshree Nath and Asoke Nath. Article: An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm. International Journal of Computer Applications46(20): 46-53, May 2012. Published by Foundation of Computer Science, New York, USA.
[7] Somdip Dey, ”SD-EQR: A New Technique To Use QR CodesTM in Cryptography”, Proceedings of “1st International Conference on Emerging Trends in Computer and Information Technology (ICETCIT 2012)”, Coimbatore, India, pp. 11-21.
[8] Behrouz A. Forouzan,” Cryptography & Network Security”, TataMcGraw Hill Book Company.
[9] Reed and G. Solomon, “Polynomial codes over certain finite fields”, Journal of the Society for Industrial and Applied Mathematics, 8(2):300–304, 1960.
[10] "ZXING- QR Code Library ",http://code.google.com/p/zxing/
[11] N. Johnson and S. Jajodia, “Steganaly- sis: The investigation of hidden information”, Proc. Of the 1998 IEEE Information Technology Conference, 1998.
[12] Somdip Dey, Kalyan Mondal, Joyshree Nath, Asoke Nath,"Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm", IJMECS, vol.4, no.6, pp. 59-67, 2012.