IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 1, January 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



information hiding using using qr code

[Full Text]

 

AUTHOR(S)

Iswaryah.G, Ramachandran.A

 

KEYWORDS

 

ABSTRACT

There are various types of information's are transferred within mile seconds so these information's have to be secure .there are different types of algorithm are used for both for securing of data and also for transmission of data.in this paper we use QR Code for the secure transmission of data. Data can be of any type for example image, text, audio or video and even most of the money transaction is made through the QR Code, etc…In this paper, we are going to talk about how to share big organized companies sensitive information or data can be securely transferred using the QR Code .The sensitive information like auditing files of a company.

 

REFERENCES

Sumit Tiwari," An Introduction to QR Code Technology" Published in: 2016 International Conference on Information Technology (ICIT)
[2] Dong-Hee Shin, Jaemin Jung, Byeng-Hee Chang "The psychology behind QR Codes: User experience perspective", Science Direct, Computers in Human Behavior 28 (2012) pp 1417-1426.
[3] QR Code, http://www.QR code.com/en/
[4] Babitha M.P. ; K.R. Remesh Babu, "Secure cloud storage using AES encryption" Published in: 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT)
[5] Shrivathsa Bhargav, Larry Chen, Abhinandan Majumdar, Shiva Ramudit, 128-bit AES decryption, CSEE 4840, 2008