A proposed system for QR code generation and validation using mobile device 

A proposed system for QR code generation and validation using mobile device 

Source publication
Conference Paper
Full-text available
Fraud in certificate issuance of academic documents such as degree certificates are seen frequently. This scenario has been ongoing because conducting fraud certificate is extremely easy and inexpensive. It has become a worldwide problem and in addition the process of certificate validation is complicated. This type of fraud not only jeopardizes th...

Contexts in source publication

Context 1
... reach this general goal based on study, two major methods namely method of secure QR code generation and method of QR code validation are to be proposed as can be referred in Figure 1. Figure 1 shows the proposed system embodiment for secure QR code generation for certificate validation. ...
Context 2
... reach this general goal based on study, two major methods namely method of secure QR code generation and method of QR code validation are to be proposed as can be referred in Figure 1. Figure 1 shows the proposed system embodiment for secure QR code generation for certificate validation. In the proposed system, the electronic records consist of a particular certificate owner retrieved from institute's database. ...

Similar publications

Article
Full-text available
IoT devices has increased the number of connected devices on the internet to billions and expected to grow exponentially in the coming years. Services and applications based on IoT are expected to expand to cover more areas than any time before. Therefore, performance, connectivity and security are very important aspects to such widespread environm...

Citations

... They are essential for advancing one's job or pursuing additional study. Nevertheless, because of the abundance of online institutes, it is relatively simple to counterfeit such certifications [3]. Due to their lack of transparency and absence of a clear and rigorous evaluation mechanism, these systems fail to attract the interest of academics and are not yet considered part of the mainstream education system [4]. ...
Conference Paper
Full-text available
Traditional online education systems prioritize digital certification above establishing a clear and robust evaluation procedure that is universally accepted. This study introduces a novel e-learning system that utilizes blockchain technology, specifically Hyperledger Besu, to enhance and secure educational procedures. This paper develops and implements a system that employs tokenization within an academic context, aiming to revolutionize the certification and validation of learning achievements. Here NFTs have been used to reflect the lifelong learning achievements of scholars. The methodology involves utilizing smart contracts to represent academic progress with learning tokens, ensuring transparency and immutability in educational transactions. Performance benchmarks conducted with Hyperledger Caliper reveal the system's efficiency and areas for optimization. This study not only demonstrates the practical applications of blockchain in education but also aligns with modern digital solutions, providing a scalable and secure framework for academic credentialing and assessment.
... Other methods require manual user input for the verification of integrity of documents by comparing printed text with information presented by the application. Moreover, these security requirements of integrity and authenticity are met by making use of an online service [6]. ...
... Several studies successfully created verification apps using QR. One constructed a mobile app for securing issued degree documents which encrypts students' information from the database and saved it on a server, afterward creating a QR code to be printed on the document which is then used for validation purposes [12]. Another study combines QR codes, digital signatures, and hashing, in a smartphone application [13]. ...
Article
Full-text available
A previous study has been conducted integrating modification on secure hash algorithm 1 (SHA-1) to document integrity verification of printed documents using quick response (QR) codes. However, encryption is warranted as data is transmitted in plaintext directly to the server to prevent hacking and ensuring not only data integrity but data security as well. A more secured document integrity verification using QR code was designed and developed by successfully incorporating a better hashing algorithm– modified SHA-1 and integrating a modern encryption algorithm–modified blowfish algorithm. By integrating both, data integrity and data confidentiality is assured as compared to previous research. The developed software was checked against user requirements to check the acceptability of the software. Error rate and accuracy were also checked to see how the software performed. Based on the testing conducted, it has been found that the document integrity verification software using QR code with the integration of modified SHA-1 hash and Modified Blowfish encryption was acceptable, accurate, and more secure.
... Anti-certificate counterfeit is a crucial solution to defend the legitimacy and prestige of an institution, especially as more individuals graduate and certificates become more relevant. Yahya et al. [8] Present a mobile app solution for securing issued certificates that are supported by secure web services for any high institution or organization. The system will look for a student's information in the database. ...
Article
Full-text available
Over the years there has been a continuous request by Organizations Academic Institutions, Recruiters and Employers to verify graduated students' statements of results from Federal Polytechnic, Mubi. This occurs as a result of the delay in issuance of Certificates which are expected to be ready after three years of Student graduation as it is obtainable by other Institutions in the country. This issue is causing Organizations, Institutions and the Polytechnic time and resources over the years. This paper aims to design an online result verification system that will provide easy, fast and real-time verification of student Statements of the result. This system of verifying students' results will reduce the level of result forgery, ease the stress on the Polytechnic and reduce verification time which is done by physical document verification. The current system requires an employer or anybody concerned to send a representative to the Exams and Record Unit of the Polytechnic to verify a particular statement of result which takes a long time and is not cost-effective. This paper designed and implemented a proposed Web Base Statement of Result Verification System using Hypertext Markup Language (HTML), Cascading Style Sheets (CSS), JavaScript, Hypertext Preprocessor (PHP), MySQL Database and Windows, Apache, MySQL, and PHP (WAMP) Server. Unified Modeling Language (UML) Diagrams and System Architecture were designed for the proposed system. The proposed system was designed to process student results with an embedded Quick Response (QR) code and a Result Verification Code (RVC) which will help organizations to verify students’ statements of results in real-time. This system could be integrated into an already existing institution's official portal.
... Since these certificates contains digital signature of degree's holder name, registration number, certificate registration id, and transcript. The QR code watermarked into the certificate in specific location to enable easy scan for user [8][9][10][11][12][13][14]. Besides that, the usage of near field communication (NFC) [15][16][17][18] also help academic or university increase the security of the certificate. ...
Article
Full-text available
span>Web-based degree document certification system with a digital signature in Semarang University has a purpose to support academic to do online document certification through a system. The main problem which occurs in academic administration is a long document certification process that causes an ineffective and inefficient certification process. To solve the problem, a system that can encrypt a document for better security is required. This system is built with the advanced encryption standard algorithm with a 128-bit sized key to encrypt confidential information inside the document. During the encryption process, this algorithm operates using 4x4 bit array blocks and passing many encryption processes for at least 10 (ten) times. The application is analyzed with object-oriented analysis and modeled with Unified modeling language. The result of this research is a system which can secure document with AES algorithm with a 256-bit sized key. The security element in this algorithm will make easier to identify the owner of the document. The secured document is easily accessible through PHP-based web or available QR code. When decrypting the document, the application will activate the camera function and decrypt the information document.</span
... Several studies have used QR code for authentication on printing document for fraud identification. A mobile app proposed to use student's information from the database to be encrypted and saved on the server which is then integrated into the QR code and printed on the document for verification purposes [14]. A different study combined QR Code, digital signature signed by university authorities, hashing and smartphone application [10] in the verification process. ...
Article
Full-text available
The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology. This paper identified the requirements needed in the certificate verification that uses the modified SHA-1. The application was tested using legitimate and fraudulent certificates. Based on the results, the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. During the trial run of the application, four test cases were seen which involves correct names and QR codes, and three other possible test cases of faking certificates such as modification of the name, regeneration of QR codes using valid hash and a fake name, and modification of the QR code. Although these cases exist, the application successfully verified all thirty certificates correctly. Also, it is noticed that during the scanning, the smartphone camera should be in focus to capture the QR code clearly. © 2018 Institute of Advanced Engineering and Science. All rights reserved.
... Several studies have used QR code for authentication on printing document for fraud identification. A mobile app proposed to use student's information from the database to be encrypted and saved on the server which is then integrated into the QR code and printed on the document for verification purposes [14]. A different study combined QR Code, digital signature signed by university authorities, hashing and smartphone application [10] in the verification process. ...
Article
Full-text available
The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology. This paper identified the requirements needed in the certificate verification that uses the modified SHA-1. The application was tested using legitimate and fraudulent certificates. Based on the results, the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. During the trial run of the application, four test cases were seen which involves correct names and QR codes, and three other possible test cases of faking certificates such as modification of the name, regeneration of QR codes using valid hash and a fake name, and modification of the QR code. Although these cases exist, the application successfully verified all thirty certificates correctly. Also, it is noticed that during the scanning, the smartphone camera should be in focus to capture the QR code clearly.
Chapter
Quick response codes are widely used for tagging products, sharing information and making digital payments due to their robustness against distortion, error correction features and small size. As the adoption and popularity of quick response codes have grown, so have the associated security and privacy concerns. This chapter discusses advancements in quick response codes and the major security and privacy issues related to quick response codes.
Article
Full-text available
The privacy and security of identity documents like Passports, PAN cards, Driving License as well as other important personal documents like academic degree certificates are now at an all-time high, given how easy and cheap the new technologies make it to produce forged documents which not just carry threat to an individual’s respect in society or career aspirations but can also prove to be life threatening if they are placed in the wrong hands. Thus, it is very important to have mechanisms that prevent or rather make it computationally unfeasible to forge these important documents. In this paper, we present an extensive review of techniques aimed at making tamper resistant physical documents, published across last two decades. We provide an in-depth classification of the means used for securing documents in the existing literature, discuss their limitations, open areas and future insights to address the open issues and challenges.