Open Access   Article Go Back

QR Code and its Security Issues

Dhwanish Shah1 , Yash Shah2

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-11 , Page no. 22-26, Nov-2014

Online published on Nov 30, 2014

Copyright © Dhwanish Shah , Yash Shah . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dhwanish Shah , Yash Shah , “QR Code and its Security Issues,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.22-26, 2014.

MLA Style Citation: Dhwanish Shah , Yash Shah "QR Code and its Security Issues." International Journal of Computer Sciences and Engineering 2.11 (2014): 22-26.

APA Style Citation: Dhwanish Shah , Yash Shah , (2014). QR Code and its Security Issues. International Journal of Computer Sciences and Engineering, 2(11), 22-26.

BibTex Style Citation:
@article{Shah_2014,
author = {Dhwanish Shah , Yash Shah },
title = {QR Code and its Security Issues},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2014},
volume = {2},
Issue = {11},
month = {11},
year = {2014},
issn = {2347-2693},
pages = {22-26},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=295},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=295
TI - QR Code and its Security Issues
T2 - International Journal of Computer Sciences and Engineering
AU - Dhwanish Shah , Yash Shah
PY - 2014
DA - 2014/11/30
PB - IJCSE, Indore, INDIA
SP - 22-26
IS - 11
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
4161 3619 downloads 3685 downloads
  
  
           

Abstract

With the wireless media becoming the most accessible commodity of the time to the people, barcodes are used as the message carriers with significant information transferred through at both ends. This paper aims to provide details about the most commonly 2D barcode, QR code in respect to its structure, symbology. Also it gives overview of different schemes that the attacker can use to deceive the people by directing them to malicious websites almost similar in domain name to the source.

Key-Words / Index Term

QR code, Error Correction, Reed Solomon, Malicious Code, Alteration, Phishing

References

[1]. Damon Gura, Kevin O’Shea, Arjuna Reddy ,Micheline (Mich) Sabatté, "QR Codes",Kellogg School of Management, Friday ,March 11, 2011
[2]. A. Sankara Narayanan, "QR Codes and Security Solutions", International Journal of Computer Science and Telecommunications,Volume 3, Issue 7, July 2012
[3]. Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar Weippl, "QR Code Security", SBA Research, Favoritenstrasse 16 AT-1040,Vienna
[4]. Ioannis Kapsalis, "Security of QR Codes", Norwegian University of Science andTechnology, June 2013
[5]. Sona Kaushik, "Strength of Quick Response Barcodes and Design of Secure Data Sharing System ", (IJACSA) International Journal of Advanced Computer Science and Applications, Volume 2, Issue 11, 2011
[6]. Denso Wave. To two-dimensional code from the barcode, http://www.qrcode.com/aboutqr.html, November 5,2014