Table 5 - uploaded by Sawsan Kamal
Content may be subject to copyright.
Alphanumeric character codes

Alphanumeric character codes

Source publication
Article
Full-text available
In this paper, we have introduced a new data-hiding algorithm, where message is converted to QR code (Quick Response Code) and generate QR for mask (Key). QR Codes are mainly used to carry or store messages because they have higher or large storage capacity than any other normal conventional 'barcodes'. In the present work the authors have introduc...

Similar publications

Preprint
Full-text available
The Playfair cipher operates as a symmetric en-cryption method, simultanously encrypting pairs of letters. This research aims to enhance the Playfair cipher’s security by incorporating a modified Blum Blum Shub algorithm and utilizing Keystream values. The Blum Blum Shub algorithm undergoes modification through the introduction of four Blum prime n...
Preprint
Full-text available
In the arena of security, various encryption algorithms are used to protect information transmitted through insecure channels. Employing a hybrid encryption algorithm provides a strong defense and complicates the decryption process for potential intruders. A hybrid cipher system that combines the Vigenere and Polybius ciphers has proven to be more...
Conference Paper
Full-text available
Franceschi’s recently discovered folder of writings sheds new light on his Cifra delle Caselle, and Falso Scontro ciphers; in fact he had in mind a uera ziffra (true cipher) a concept that, in a suggestive parallel, resembles the perfect Shannon cryptosystem, while the Falso Scontro (fake key) cipher closely resembles Vernam cipher.
Article
Full-text available
In this paper, we have introduced a new data-hiding algorithm, where message is converted to QR code (Quick Response Code). QR Codes are mainly used to carry or store messages because they have higher or large storage capacity than any other normal conventional 'barcodes'. In the present work the authors have introduced the encryption technique by...
Article
Full-text available
Playfair is the earliest known classical block cipher which is capable of taking two characters as a unit in the process of encryption and decryption. However, the cipher is suffering from vulnerability to many cryptanalysis attacks due to a lack of confusion and diffusion properties, an inability to handle numbers and special characters in the pro...

Citations

... Information from the code can only be retrieved once these variables match certain pre-defined values. The authors of [8] performed a simple symmetric encryption. The key used for the encryption process was attached to the QR code. ...
Article
Full-text available
Counterfeit products have become a pervasive problem in the global marketplace, necessitating effective strategies to protect both consumers and brands. This study examines the role of cybersecurity in addressing counterfeiting issues, specifically focusing on a multi-level grayscale watermark-based authentication system. The system comprises a generator responsible for creating a secure 2D code, and an authenticator designed to extract watermark information and verify product authenticity. To authenticate the secure 2D code, we propose various features, including the analysis of the spatial domain, frequency domain, and grayscale watermark distribution. Furthermore, we emphasize the importance of selecting appropriate interpolation methods to enhance counterfeit detection. Our proposed approach demonstrates remarkable performance, achieving precision, recall, and specificities surpassing 84.8%, 83.33%, and 84.5%, respectively, across different datasets.
... Both types of signatures have a low level of security because unauthorized persons can forge them. Several schemes of signature have been proposed in the literature [2]- [4] to solve this problem, and one of them is to use a digital signature combined with barcodes such as QR codes or other appropriate barcode models [5]- [7]. This paper proposes a system for academic document authentication with students' final project approval documents adopted as the case study. ...
Article
Full-text available
Paper-based documents or printed documents such as recommendation letters, academic transcripts, and diplomas are prone to forgery. Several methods have been used to protect them, such as watermarking, security holograms, or using paper with specific security features. This paper presents a document authentication system that utilizes QR code and ECDSA as the digital signature algorithm to protect this kind of document from counterfeiting. A digital signature is a well-known technique in modern cryptography used for providing data integrity and authentication. The idea proposed herein is to put a QR code in the printed documents where the QR code includes a digital signature. The signature can later be authenticated using the proposed system by uploading the document for authentication or scanning the document's QR code. The proposed system is particularly developed for digital signature generation and verification of students' final project approval documents as the case study. In traditional settings, the approval form is typically signed directly by the student's advisor dan co-advisor using handwritten signatures. However, using the conventional handwritten signature, the signature on the approval form can be falsified. Therefore, a digital signature generation and verification system is implemented herein to avoid handwritten signature falsification. The advisors can use this system to sign the approval form using a digital signature instead of a handwritten one. The signature is stored in a QR code and is generated using ECDSA with SHA-256 as the hash function. The proposed system is evaluated using documents (i.e., approval forms) with genuine and forged QR codes. The evaluation results showed that the system could verify the authenticity of the approval forms, which contain genuine QR codes. The approval forms that contained forged QR codes were correctly identified.
... Interestingly, the utilization of QR code as two dimensional have been numerously deliver the benefit for various sectors due to the ability to store large information and extracting them with small amount of little distortion compare to one dimensional barcode [29], [30]. It can be said QR code as a fast readable way that can increase the process to scan, improving the degree of reading up to 360, support for more languages and durability against soil and damage such as several researches conducted for visual cryptography in ciphering messages [31], [32], securing the sharing process of personal confidential information either in term of forgery prevention or anti phishing attack [33]- [37]. In addition, there also several researches that focus on secure recognition process in login system using QR image [38], which mainly have challenges in term of localization such as illumination variation and perspective distorting as well as the adaptation into embedded system platform for processing complexity and resource requirement [39]. ...
Article
Full-text available
This research mainly talks about the use of quick response (QR) code reader in automating of recording the users' face. The applied QR code reader system is a dynamic type, which can be modified as required, such as adding a database, functioning to store or retrieve information in the QR code image. Since the QR code image is randomly based on its information, a QR code generator is required to display the image and store the information. While the face recorder uses a dataset available in the OpenCV library. Thus, only the registered QR code image can be used to record the user's face. To be able to work, the QR code reader should be 10 to 55 cm from the QR code image.
... To enable the complete concealment of visual images, existing visual cryptography (VC) techniques [43] encode a secret image into shared images with camouflaged visual patterns such that stacking a sufficient number of shared images reveals the original secret image. In [10,20,27,36,51], VC technology has been applied to QR codes to check the identity of individuals accessing QR codes or to control permissions related to accessing protected data. However, those works require that users scan multiple images or exchange key images in advance in order to recover the original QR code. ...
Conference Paper
Quick response (QR) codes are becoming pervasive due to their rapid readability and the popularity of smartphones with built-in cameras. QR codes are also gaining importance in the retail sector as a convenient mobile payment method. However, researchers have concerns regarding the security of QR codes, which leave users susceptible to financial loss or private information leakage. In this study, we addressed this issue by developing a novel QR code (called mQRCode), which exploits patterns presenting a specific spatial frequency as a form of camouflage. When the targeted receiver holds a camera in a designated position (e.g., directly in front at a distance of 30 cm from the camouflaged QR code), the original QR code is revealed in form of a Moire pattern. From any other position, only the camouflaged QR code can be seen. In experiments, the decryption rate of mQRCode was > 98.6% within 10.2 frames via a multi-frame decryption method. The decryption rate for cameras positioned 20° off axis or > 10cm away from the designated location dropped to 0%, indicating that mQRCode is robust against attacks.
... The VC is also combined with other encryption methods, such as the QR codes. Some researchers proposed QR-code-based VC systems [31][32][33][34], in which the picture of the QR code is further split into double VKs and then embedded into the background image. The hidden QR code is extracted by stacking the shared-keys together, and then further information can be obtained from the revealed QR code. ...
Article
Full-text available
In this paper, we propose a visual-cryptographic image hiding method based on visual cryptography (VC) and volume grating optics. The secret image is converted to the encrypted visual keys (VKs) according to the normal VC algorithm. Then the VKs are further embellished to the QR-code-like appearance and hidden as the holographic optical elements (HOEs), which are fabricated by the holographic exposure of photopolymer. In the decryption process, the fabricated HOE-VKs are illuminated with the laser beam. The reconstructed VKs are overlaid to extract the hidden information directly in the optical facility, without additional computation. Optical experiments verify that the VKs in HOE mode improves the system with high security and good robustness on the random noise attack. Besides, the volume grating nature also enlarges the system bandwidth by using the multiplexing technique. The proposed method may provide a promising potential for the practical image hiding systems.
... The cost of resolving of data breaches due to malicious or criminal attacks increased in U.S. from an average of $159 in 2014 study to $170 in 2015 [11]. Analyzing different publications and researches within the cybersecurity area it can be noticed that also particular trends noticed in the modern technology development have huge impact on cybersecurity [12] [13] [14] such as: web serversthe threat of attacks on web applications to extract data or to distribute malicious code [15] [16]; cloud computing and its servicesthis trend presents a big challenge for cyber security, as traffic can go around traditional points of inspection [17] [18]; APT'stargeted attacks APT (Advanced Persistent Threat) [19]; mobile networkspeople use devices such as tablets, smartphones, PC's etc. where traditional approach to security such as firewalls doesn't feet the purpose and require extra securities apart from those present in the applications used [20]; IPv6is the new Internet protocol which is replacing IPv4 and needs the new methods to secure the communication [21]; encryption of the codeencryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it [22]; blockchain technologiescontain cryptography, mathematics, algorithm and economic model, combining peer-to-peer networks and using distributed consensus algorithm to solve traditional distributed database synchronize problem [23]. ...
Article
Full-text available
The major purpose of this article is to analyze state of knowledge within the cybersecurity area accompanied with identification of behavior patterns represented by students (seen as future users and managers of modern technology). The research was divided into: source of knowledge used as so called cybersecurity best practices and password protection aspects. The research was performed using the CAWI method in February 2017. The process included following steps: prepared questionnaire was verified and validated by cybersecurity experts, after expert assessment questionnaire was placed at servers of Faculty of Management (University of Warsaw). The following structure was applied within the article: short introduction and literature review of the researched subject, definition of research conditions and thesis, and used research method, analysis and discussion of research findings, and the last part was dedicated to conclusions related to the research and cybersecurity awareness represented by respondents. Author used 3 working thesis to support the research that fully were proved by collected answers. The research showed that Internet and Friends and Colleagues are the leading sources of knowledge about cybersecurity within the examined group. Based on that author got an evidence that those practices are faulty and lead to wrong behavior patterns both in internet and password protection. It also showed that people indicate lacking of reliable sources of information about cybersecurity where professional training was treated marginally comparing to the leading sources of information. Received results indicate that either employer or university was not interested in promoting good behavior patterns nor the training was the target for respondents. And it can be a reason that users of modern technology put more trust in Internet than in qualified sources of knowledge.
Article
In this paper, we describe the design and implementation of a secure URL-sharing system based on Visual Cryptography, that is, QR codes that have been extensively used in recent years because they speed up the process and provide users with ultimate convenience. However, as convenient as possible, regular URL- sharing systems are vulnerable to different types of attacks. Therefore, sharing must be sufficiently secure to protect integrity and confidentiality. Moreover, the URL sharing system must provide authenticity for both the sender and receiver. In this study, the security of the proposed QR-based system was demonstrated using visual cryptography. The proposed system comprises a mobile application that implements visual cryptography. The application provides a simple and user-friendly interface for users to conduct payment transactions in a user-friendly secure environment.
Article
Quick response (QR) codes have been widely used in mobile applications, especially mobile payments, such as Alipay, WeChat, PayPal, etc due to their convenience and the pervasive built-in cameras on smartphones. Recently, however, attacks against QR codes have been reported and attackers can capture a QR code of the victim and replay it to achieve a fraudulent transaction or intercept private information, just before the original QR code is scanned. In this study, we enhance the security of a QR code by identifying its authenticity. We propose, which embeds a QR code with information of the screen which displays it, thereby the QR code can reveal whether it is reproduced by an adversary or not. In, PWM frequency of screens is exploited as the unique screen fingerprint. To improve the estimation accuracy of PWM frequency, incorporates a model for the interaction between the camera and screen in the temporal and spatial domains. Extensive experiments demonstrate that can differentiate screens of different models, types, and manufacturers and thus improve the security of QR codes.