Counterfeited products are a significant problem in both developed and developing countries and has become more critical as an aftermath of COVID-19, exclusively for drugs and medical equipment’s. In this paper, an innovative approach is proposed to resist counterfeiting which is based on the principles of Synthetic DNA. The proposed encryption approach has employed the distinctive features of synthetic DNA in amalgamation with DNA encryption to provide information security and functions as an anticounterfeiting method that ensures usability. The scheme’s security analysis and proof of concept are detailed. Scyther is used to carry out the formal analysis of the scheme, and all of the modeled assertions are verified without any attacks.
Authored by C.S. Sreeja, Mohammed Misbahuddin
QR Codes 2022 - For any robot, animal, or social animal to learn, understand, and respond appropriately, visual perception is the most critical capacity. This paper presents an example of computer vision-based research written in the Python programming language which employs libraries like OpenCV and NumPy. To navigate a robot on its own USB 2.0 highdefinition camera mounted on robot captures the video stream in the operating area. Identification and decoding of QR code from the visible environment of camera using the image processing and QR code detection algorithm. Tracking of QR code is done using the Kalman filter. The robot will function according to the decision taken by program logic developed in minicomputer depending on data input from the camera.
Authored by Pranesh Kumar, Arti Khaparde
QR Codes 2022 - Poor hospital care in Peru is responsible for the constant dissatisfaction and time delays in care in a large number of patients who go to public hospitals. In this work, the development of a system was carried out to optimize the process of medical consultations using QR codes in the Hospitals of Peru that would allow the reduction of time in care and the increase in patient satisfaction. The implementation of the proposed system was supported by a new medical care process diagram, as well as the development of a mobile application for scheduling and managing appointments, complemented by the use of QR codes to display information. The validation process was carried out among a selected group of patients, determining that the time spent in medical attention decreased compared to that of a current medical appointment, in the same sense, satisfaction was increased.
Authored by Gianpaul Custodio-Chavarria, Ricardo Soldan-Araujo, Daniel Burga-Durango
QR Codes 2022 - This study examines a method of refining a low-resolution QR code image photographed from a distance into a decodable code image by using pix2pix, a deep learning technique. The experimental results confirm that the method can decode a 5.2 cm-square QR code taken from a distance of 4 m.
Authored by Sein Okazaki, Masaya Ohta
QR Codes 2022 - The study was conducted to model Wi-Fi password resource assets in a platform that can be shared and collaborated publicly securely and support dynamic data changes with online repository shortcuts documented in access support via dedicated search engines and QR CODE. This study uses 3 methods, namely the one-way SHA-256 HASH function which was formulated with the addition of sowing techniques and reversing techniques so as to produce a long String named Keycode, the second method uses modern cryptographic techniques, namely Digital Signature, which collects keycodes in Path the identity of the resource asset, and the last one is a QR CODE used as an access shortcut that collects digital signature access data. This study used testing data from comparator application contributors, namely wifimap.io randomly, the results of which the formulation results were then disassembled using the brute force technique using hashcat. The results of the research of password data from resources were successfully formulated into a combination of Strings with high confidentiality that cannot be disassembled to the original data but are still accessible to the owner and holder of the keycode that is balanced with the limitations of access control.
Authored by Dede Sudirman, Teguh Suharsono, Rina Mardiati
QR Codes 2022 - In this invited paper, the theory of quick response (QR) coded metasurfaces along with the realization of such kind of metasurfaces will be presented to the audience. The proposed metasurfaces can achieve more than 10-dB of RCS reduction over wide frequency band. The proposed 1-bit QR-coded metasurfaces can be designed without the need for any complicated and/or time-consuming algorithms to obtain the 1-bit phase distribution map required for low scattering and significant RCS reduction. The 1-bit phase coding sequence of the QR coded metasurfaces were generated using 1-bit QR code generator in MATLAB which are fast and efficient. It will be shown in this talk that a metasurfaces with their unit cells individual phase assigned according to 1-bit QR codes, are very powerful in achieving more than 10-dB RCS reduction with low-level diffusive scattering patterns. At microwave frequencies, 25 × 25 unit cells QR coded metasurface was designed with 1-bit phase distribution being similar to the QR code of the sentence “Radar Cross Section Reduction”, and more than 10-dB RCS reduction is preserved from 13.3 GHz to 24.5 GHz. At millimeter waves, 25 × 25 unit cells 1-bit metasurfaces were designed and their 1-bit phase distributions being same as the 1-bit QR codes of the words “Metasurface” and “IEEE” and more than 10-dB RCS reduction is preserved from 60 GHz to 120 GHz. It will be shown that such class of QR coded metasurfaces would reduce the design complexities associated with the conventional coding metasurfaces. The invited talk then will conclude with a discussion, design problems, and future challenges related with the proposed QR coded metasurfaces.
Authored by Mustafa Al-Nuaimi, Guan-Long Huang
QR Codes 2022 - QR code is a typical two-dimensional code tag consisting of square symbols, which is widely used in social life due to the advantages of high readability and large storage capacity. However, its security performance is low, which has caused widespread concern among scholars in various industries. This paper proposes a three-level QR code scheme based on superpixel segmentation in response. Public information can be scanned directly from shares using any standard QR code scanner. Moreover, secret information can only be obtained by the dissimilarity of shares. The reconstructed secret image in this paper retains the main features of the embedded image, and the scheme is resistant to deformation, high load, and robust because it retains the advantages of visual ciphers and QR codes. Experimental results and analysis show this scheme has many advantages over other schemes.
Authored by Wei Wu, Lina Zhang, Jiehui Zhang, Chenyu Cui, Xiaoyu Zhang, Miao Liu
QR Codes 2022 - Due to the high adoption rate of QR codes across the world, researchers have been attempting to improve classical QR codes by either improving their appearance to be more meaningful to human perception or improving their capability to store more messages. In this work, we propose dual image QR codes that aim to improve both aspects while preserving the ability to scan by standard QR code readers. We improve the appearance of the QR code using the halftone QR principle and increase the capacity of the QR code with the lenticular imaging technique. To test the robustness of the proposed QR code, we evaluated six important parameters and searched for appropriate conditions through 24, 000 combinations. From the experiments, we found 3, 714 appropriate conditions that achieved 100\% successful scanning rate. Lastly, we also list examples of use cases to use in real-world situations for the proposed dual image QR codes.
Authored by Chakrit Kammason, Yupaporn Wanna, Kannika Wiratchawa, Thanapong Intharah
QR Codes 2022 - In order to enhance the security of the watermark and to ensure the stability of the algorithm against attacks and the concealment of the watermark, a NSCT-DWTSVD composite digital watermarking algorithm based on QR code is proposed. First, QR code encoding is conducted on the original watermark image to generate a QR code watermark image. In order to ensure the security of the watermark information, Arnold scrambling and encryption is performed on the QR code watermark information. Second, the original Lena image is carried out NSCT transform. The low frequency part that stores more information are selected for DWT. Then the low-frequency images with strong image resistance are performed SVD. The encrypted watermark information are embedded into the decomposed singular values. Through the experimental verification of the algorithm, the algorithm has strong concealment and strong resistance to conventional attacks on the basis of ensuring the security of watermarking. Especially for the rotation attack and JPEG compression attack, the NC values are above 0.92 and 1, respectively.
Authored by Ting Ma, Nongtian Chen
QR Codes 2022 - One of many challenges created by COVID-19 pandemic is to reduce need of contact. Quick Response (QR) codes offered a readily available solution to this challenge with offer to support contact less processes. Wide adaption of smart mobile devices like smart phones and tablets and huge number of mobile applications available in the respective application stores, which support QR code scanning acted as a catalyst in rapid adaption of QR codes to support contact less processes. Support of QR code-based processing rapidly increased during the pandemic, penetrated all processes like sales and marketing, authentication, and digital payments to name some. On one hand, this served the cause in terms of reducing contact, on other hand, factors like rapid adaption and using it in smart mobile devices, which are existing to cater to the larger purpose of human usage, scanning QR codes was not in that list to start with is bringing in the series of security issues which can arise starting from the human factor, software, misuse and hacking factors. This paper focuses on the QR code processes, differences in terms of security while using a smart device for QR codes when compared to the rugged devicebased barcode scanners, the kind of security issues such process can encounter while using smart devises for QR code scanning, factors that must be considered by the applications development as well as the consumers of such functionality and the way to ensure security of consumers of such functionality.
Authored by Venkateswara Bhamidipati, Raghavendra Wvs
QR Codes 2022 - Quick Response code (QR code) is a 2-D matrix barcode which stores data in four different encoding modes (numeric, alphanumeric, kanji, binary). They are widely used nowadays and can be seen almost everywhere whether it is on cosmetics products, general stores, billboards and so on. It has become an important part of day to day activities. As an information sharing medium, it has become so user friendly and mobile-friendly that with just one scan through smart phones you get the information stored in it. The main intent of this work is to secure QR code from unauthorized access by allowing only those who have authorization to access it by using cryptography (by encrypting and decrypting the QR code using a key value). And further security was enhanced by applying ‘k’ out of ‘n’ visual cryptography scheme on the QR code. It creates ‘n’ no. of share of the QR code out of which ‘k’ no. of shares is required to restore it. This work will briefly explain how cryptography and visual cryptography were used to secure the QR code. The experimental results showed that there was no data loss during this process. Also, if at the time of decryption wrong key is entered then the QR code will not be generated. And also it is required to input minimum k number of generated shares of the QR code for the successful retrieval of QR code. Quality of the reconstructed QR code was also measured using PSNR and SSIM which showed that reconstructed QR code was of good quality as well as original QR code and reconstructed QR code were identical.
Authored by Cheshtaa Bhardwaj, Hitendra Garg, Shashi Shekhar
The increasing number of vehicles registered demands for safe and secure carparks due to increase in vehicle theft. The current Automatic Number Plate Recognition (ANPR) systems is a single authentication system and hence it is not secure. Therefore, this research has developed a double authentication system by combing ANPR with a Quick Response (QR) code system to create ANPR-DAS that improves the security at a carpark. It has yielded an accuracy of up to 93% and prevents car theft at a car park.
Authored by Ezilaan Irraivan, Swee Phang
This study purpose was to examine the determinant factors that affect the Micro, Small, and Medium Enterprise (MSME) merchants who had the intention to use Quick Response Code Indonesian Standard (QRIS) as a payment system. QRIS was expected to be applied by merchants to diminish the virus spread and keep the circulation of money safe; but there were not many merchants using the QRIS as a payment method. The factors MSME merchant might not use the QRIS were related to perceived usefulness, perceived security, perceived ease of use, and trust. The population was MSMEs in South Tangerang City who did not use QRIS yet and the population was unknown. Using the Lemeshow formula, obtained a sample of 115 people, and the sampling technique used purposive sampling. Then data were analyzed using multi-regression analysis and processed by SPSS. The results indicated that perceived usefulness and perceived security had a significant affect on trust, whereas trust and ease of use significant affect the intention to use QRIS. Moreover, trust was able to mediate the perceived usefulness to intention to use. Since ease of use had no significant affect on trust, then the mediation given by trust to perceived ease of use had no significant affect on intention to use.
Authored by Brata Djoyo, Safira Nurzaqia, Salsa Budiarti, Syerina Agustin