Security of Quick Response Code
K. Ravikumar1 , R. Geetha2
Section:Survey Paper, Product Type: Journal Paper
Volume-8 ,
Issue-1 , Page no. 90-92, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.9092
Online published on Jan 31, 2020
Copyright © K. Ravikumar, R. Geetha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: K. Ravikumar, R. Geetha, “Security of Quick Response Code,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.90-92, 2020.
MLA Citation
MLA Style Citation: K. Ravikumar, R. Geetha "Security of Quick Response Code." International Journal of Computer Sciences and Engineering 8.1 (2020): 90-92.
APA Citation
APA Style Citation: K. Ravikumar, R. Geetha, (2020). Security of Quick Response Code. International Journal of Computer Sciences and Engineering, 8(1), 90-92.
BibTex Citation
BibTex Style Citation:
@article{Ravikumar_2020,
author = {K. Ravikumar, R. Geetha},
title = {Security of Quick Response Code},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2020},
volume = {8},
Issue = {1},
month = {1},
year = {2020},
issn = {2347-2693},
pages = {90-92},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5002},
doi = {https://doi.org/10.26438/ijcse/v8i1.9092}
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i1.9092}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5002
TI - Security of Quick Response Code
T2 - International Journal of Computer Sciences and Engineering
AU - K. Ravikumar, R. Geetha
PY - 2020
DA - 2020/01/31
PB - IJCSE, Indore, INDIA
SP - 90-92
IS - 1
VL - 8
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
437 | 324 downloads | 192 downloads |




Abstract
QR (Quick Response) Codes and the way they will be wont to attack each human interaction and automatic systems. Because the encoded data is meant to be code solely, some individuals cannot distinguish between a legitimate and a maliciously manipulated QR code. Whereas humans may fall for phishing attacks, automatic readers square measure possibly susceptible to SQL injections and command injections. Our contribution consists of Associate in Nursing Associate in Nursing lysis of the QR Code as an attack vector, showing totally different attack methods from the attackers purpose of read and exploring their potential consequences.
Key-Words / Index Term
Security, QR Code, DES Algorithm, Protocols
References
[1] A. Lewko, A. Sahai, B. Waters, ”Revocation Systems with Very Small Private Keys” , Proc. IEEE Symposium on Security and Privacy 2010, pp. 273–285, 2017.
[2] A. Boldyreva, V.Goyal, V. Kumar, ”Identity-Based Encryption with Efficient Revocation” Proc. ACM Conference on Computer and Communications Security 2008, pp. 417–426, 2017.
[3] International standard ISO/IEC 18004, “Information technology Automatic identification and data capture techniques Bar code symbology QR Code‖”, Reference number - ISO/IEC 18004:2000(E), First edition 2000-06-15.
[4] HenrykBlasinski, “Per-colorant- channel color barcodes for mobile applications an interference cancellation framework”, IEEE Transactions on Image Processing, vol. 22, no. 4, April 2013.
[5] A. Sankara Narayanan, “QR codes and security solutions‖, International Journal of Computer Science and Telecommunication” , Volume 3, Issue 7, July 2012.
[6] KamonHomkajorn, MahasakKetcham, and SartidVongpradhip, “A technique to remove scratches from QR code images” , International Conference on Computer and Communication Technologies (ICCCT`2012), May 26-27, 2012.
[7] Kuan-Chieh Liao, “A novel user authentication scheme based on QR-code” , Journal of networks, vol. 5, no. 8, August 2010.