PRODUCT AUTHENTICATION USING QR CODE WITH THE HELP OF RSA ALGORITHM
DOI:
https://doi.org/10.61841/5wfva532Keywords:
authentication, QR code, RSA algorithm, encryptionAbstract
The advent of online shopping has led to a surge in ecommerce websites offering products from well
known brands at very competitive prices. However, the cases of fake products and duplicity have also
seen an increase in recent years, because of lack of proper mechanism to ensure authenticity of the
products, whether purchased online or from a physical shop. In spite of the availability of a number of
techniques and technology, there is still no means to check the delicacy occurring due to copying
product information and generating fake QR codes, barcodes etc and using on fake or duplicate
products. In this paper, we propose a methodology for product authentication by using the RSA
algorithm on QR code. RSA involves a public key and private key. The public key can be known to
everyone- it is used to encrypt messages. Messages encrypted using the public key can only be
decrypted with the private key.
Downloads
References
[1] J. Shieh, J. Zhang, Y. Liao and C. Lin, “Enhancing the Recognition Rate of Two-Dimensional
Barcodes Image and Applications,” In Proc. Of IEEE 4th International Congress on Image and Signal
Processing, Vol. 3, PP. (1567-1571), (2011)
[2] Sayantan Majumdar,Abhisek Maiti,Biswarup Bhattacharyya,Asoke Nath” A new encrypted data
hiding algorithm inside a QR code implemented for an android Smartphone system:S_QR
system”International journal of Innovative Research in advanced Engineering,volume2,Issue 4, April
2015, Pages 40-46.
[3] K.Naresh and prathibha N.Pillai“ QR verification system using RSA algorithm” International
journal of innovation and scientific Research, Volume 10, ISSN 2351-8014 No. 2 Oct 2014, Pages 433–
437.
[4] Somdip Dey”SD-EQR: A New Technique to use QR Codes in Cryptography”International journal
of Information Technology & Computer Science (IJITCS), may 2012.
[5] Basheer N. Ameen and Sawsan K.Thamer ” A novel method for Ciphering a Message Based on QR
code”International journal of scientific & Engineering Research,Volume 8,Issues 4,April-2017.
[6] Okfalisa,Novi Yanti,Wahyu Aidil Dita Surya Amany Akhyar & Frica A
Ambarwati“Implementation of advanced Encryption Standard(AES) and QR code Algorithm on Digital
Legalization System” ICENIS E3S web of conferences,
2018,https://doi.org/10.1051/e3sconf/20187313009.
[7] Priyanka Gupta,Sandeep Saini & Kusum Lata” Secure QR codes by RSA on fpga” International
Conference on Advances in Computing,Communications and Informatics(ICACCI),Dec 2017,
https://ieeexplore.ieee.org/document/8126188.
[8]Supyiya chavan,Sujata Gadakh,GholapKanchan,Sorte Surabhi & D.V Shinkar”QR code
Authentication system for confidential Encrypted data hiding and retrieval(Decryption)”International
journal of Advanced Research in computer and Communication Engineering, volume 5,Issue 4,April
2016.
[9] Md.Salahuddin Ahamed Hossen Asiful Mustafa “A secure QR code System for sharing personal
confidential information”International Conference on Computer,Communication,Chemical,Materials
and Electronic Engineering(IC4ME2),march2020,https://ieeexplore.ieee.org/document/9036521.
[10] Vitalii Susukailo & Yuriy lakh”Access control system based on encryption in QR code
technology” ieee 4th international Symposium on wireless systems within the international conferences
on intelligent data Acquisition and advanced computing system(IDAACS-SWS),November
2018,INSPEC Accession Number:18248813.
[11] Abhijeet Mendhe,Deepak Kumar Gupta & Krishna Pal Sharma“Secure QR code based system
using Cryptography and stegamgraphy” First International Conference on Secure Cyber Computing
and Commuication(ICSCCC),May 2019,INSPEC Number:18637363
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Author
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.