Effective Feature Extraction Method in Novel Key Generation Using QR Code to secure the data
Sandha 1 , M. Ganaga Durga2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-11 , Page no. 72-76, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.7276
Online published on Nov 30, 2018
Copyright © Sandha, M. Ganaga Durga . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Sandha, M. Ganaga Durga, “Effective Feature Extraction Method in Novel Key Generation Using QR Code to secure the data,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.72-76, 2018.
MLA Style Citation: Sandha, M. Ganaga Durga "Effective Feature Extraction Method in Novel Key Generation Using QR Code to secure the data." International Journal of Computer Sciences and Engineering 6.11 (2018): 72-76.
APA Style Citation: Sandha, M. Ganaga Durga, (2018). Effective Feature Extraction Method in Novel Key Generation Using QR Code to secure the data. International Journal of Computer Sciences and Engineering, 6(11), 72-76.
BibTex Style Citation:
@article{Durga_2018,
author = {Sandha, M. Ganaga Durga},
title = {Effective Feature Extraction Method in Novel Key Generation Using QR Code to secure the data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {72-76},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3126},
doi = {https://doi.org/10.26438/ijcse/v6i11.7276}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.7276}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3126
TI - Effective Feature Extraction Method in Novel Key Generation Using QR Code to secure the data
T2 - International Journal of Computer Sciences and Engineering
AU - Sandha, M. Ganaga Durga
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 72-76
IS - 11
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
737 | 653 downloads | 259 downloads |
Abstract
In cloud environment data can be stored and shared between other resources. Any symmetric or asymmetric algorithm is used for secure data in cloud. We need to store the keys in database .The main objective of our work is to improve the protection by encrypting the information with the key generated by QR. It proposes a novel algorithm for generating key using QR image features. It is a reliable and flexible method of key generation for information security. Existing technique for key generation using feature extraction have problem such as high extraction time and high searching time .Existing method need to store more images and stored image may be damaged,. In cloud environment, searching process for authentication causes high network bandwidth, congestion and delay. This paper suggests QR code, a two dimensional code can be used for authentication. Key is extracted from the user unique QR code which is used to achieve the fast retrieval of data from the server. Lost image can be recovered using QR error correction technique. Particularly it is very useful to access mobile applications and there is no need to store more images in server. Additionally extracted key is used as prime factors p and q of the modulus n in RSA for encryption process which tries to secure from mathematical attack. This novel key is applied with asymmetric algorithm.
Key-Words / Index Term
Mobile Cloud computing, Feature Extraction, GLCM , Spectral Cluster Algorithm, QR Code, RSA
References
[1] Yao-Jen Chang,Wende Zhang, and Tsuhan Chen “Biometrics-based cryptographic key generation” .In the Proceedings of the 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763)
[2] David PintorMaestre "QRP: An improved secure authentication method using QR codes" UniversitatOberta de Catalunya 08018, Barcelona, Spaindpintor@uoc. edu June 8, 2012.
[3] Thiyagarajan M, Dinesh Kumar K”Qr code authentication for product using cloud computing”Journal Of Global Research InComputer Science,Volume 3, No. 2, February 2012
[4] Suraj Kumar Sahu: " Encryption in QR Code Using Stegnography”International Journal of Engineering Research and Applications,Vol. 3, Issue 4, Jul-Aug 2013, pp.1738-1741
[5] Dong sik-oh, Bong han-kim and Jae- Kwang Lee : "A Study on Authentication System using QR code for Mobile cloud computing Environment".Springer,Hennam University Daejeon,Korea “Future Information Technology” pp500-507
[6] GaurangPanchal a , DebasisSamanta a , “A Novel Approach to Fingerprint Biometric-Based Cryptographic Key Generation and its Applications to Storage Security“ Elsevier “Computer and electrical engineering “Volume 69, July 2018, Pages 461-4782018
[7] Tawfiq S. Barhoom,Zakaria M. Abusilmiyeh”A Novel Cryptography Method Based on Image for KeyGeneration“ Palestinian International Conference on Information and Communication Technology 2013 pages 71-76
[8] Mohammed Tajuddin C. Nandini “Cryptographic Key Generation using Retina Biometric Parameter” International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
[9] P Selvarani , N Malarvizhi“Secure data in cloud with multimodal key generation” International Journal of Engineering &Technology, Volume 7 (1.7) 2018 Special Issue 7
[10] SonalSharma“Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm” ijarcsse Volume 2, Issue 8, August 2012 ISSN: 2277 128X
[11] Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, SebastianSchrittwieser, MayankSinha, EdgarWeippl: "QR-Code Security". SBA Research, 2010
[12] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song. “Remote data checking using provable data possession”.ACM Trans. Info.& System Security , May 2011.
[13] C. Wang, Q. Wang, K. Ren and W. Lou, &ldquo,”Privacy-Preserving Public Auditing for Storage Security in Cloud Computing”rdquo, Proc. IEEE INFOCOM `,10, Mar. 2010.
[14] Sandha, M.GanagaDurga, “ Study on Data Security Mechanism in Cloud Computing” 2014 ,IEEE digital Library
[15] E. Mary Shyla , M.Punithavalli “Hybrid Facial Color Component Feature Identification Using Bayesian Classifier” International Journal of Scientific Research in Computer Science and Engineering Vol-1, Issue-3 E-ISSN: 2320-7639
[16] A. Shakin Banu1 , P.Vasuki 2 , S. Mohamed Mansoor Roomi3 , A. Yusuf Khan4,” SAR Image Classification by Wavelet Transform and Euclidean Distance with Shanon Index Measurement” International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256) Vol.6 , Issue.3 , pp.13-17, Jun-2018