Abstract

Cellular automata (CA) is a veritable tool that provides useful insights into the intricate composition of physical systems. By exploiting this as well as the ability of CA to utilise local interactions of individual CA cells to function as a receptable for information processing, we propose a CA-based security protocol (CASP) to safeguard the integrity of QR codes. First, undertaking an extensive and conscientious study of the composition of QR codes, we propose delineating an encrypt-able area ( $E_{\mathrm {A}}$ ) that excludes key areas needed to retain physical appearance and properties of an innocuous QR Code. Further, we adduce a zoning structure that demarcates the $E_{\mathrm {A}}$ into seven zones. Our analysis shows that careful adulteration of contents of at least two zones are enough to produce encrypted versions of the QR codes. Second, each zone is partitioned into $m$ tiles, each a $3\times 3$ sub-block and then local interactions emanating from the occupancy (or strength) of the tiles are used to determine the composition of first- and second-tier rulesets. Third, to steer the evolution of the QR Codes, we propose the use of zone and cell-wise dextral boundary conditions (DBC) that combine a troika of cells permeating contents of a tile at state $t$ to determine the left-most cell entry at state $t+1$ of its evolution. Further, we impose a pixel-wise constraint that ensures that each encrypted tile has a discordance that is no less than the in-built error correction tolerance of the code. This property guarantees adequate scrambling of the QR code to mitigate unauthorised access to it and the information it conceals. Meanwhile, considering the properties (balanced, linear and reversible) and nature of our rulesets, the proposed CASP protocol recovers QR codes that are seamlessly scannable as conduits leading authorized users to confidential information. We validated our protocol by implementing both the encryption and recovery procedures on different versions of QR Codes and our results suggest that, on average, modifications up to a minimum of 2 to 5% of any two zones of the delineated $E_{\mathrm {A}}$ were enough to securely encrypt Versions 2, 3, and 4 QR Codes that were reported in the experiments; thus, rendering them unscannable and the information they conceal inaccessible. Similarly, the recovery process yields an average 97% fidelity between the original and recovered QR Codes, which is enough to restore full functionality of the codes without need for any special hardware or add-ons. Moreover, rulesets employed in our protocol are profuse, dynamic and complex, which are key properties for CA-based cryptography. This demonstrates the efficacy of our protocol as a tool to to confine the transitory role of QR Codes to authorised users.

Highlights

  • Since both our encryption and recovery algorithms are based on one tile, it is trivial that (like the so-called shares in visual cryptography schemes (VCS) [13] these tiles are juxtaposed to form the encrypted QR code as well as its recovered version, i.e. Q∗ and Q that is inferred in the last steps of both of our algorithms

  • It is veritable tool that provides useful insights into the intricate composition of physical systems. Exploiting these astounding properties of Cellular automata (CA), our study proposes a CA-based security protocol (CASP) to safeguard the integrity of QR codes whose main objectives are twofold: first, to render otherwise useable QR Codes unscannable to unauthorized users, and second, to do so while retaining the physical appearance and properties of an innocuous QR Code

  • Guided by a conscientious study of the structure and properties of QR Codes and in order to attain the identified objectives of the CASP protocol, we developed a series of concepts to delineate a QR Code into its encrypt-able and unaltered regions with the latter comprising essential areas that aesthetically define a QR Code, i.e. the finder, alignment patterns, etc. unaltered

Read more

Summary

INTRODUCTION

The aim of that study was to retrieve an alternated content that was decoded by repainting the QR code In another departure from our cogitation, the author (of [9]) adopted an empirical, survey-based approach to ascertain the dynamics involved in ‘‘tricking users to scan potentially malicious QR codes.’’ Apparently, the similitude between [9] and our proposed study stops at the cell-focused manipulations. We present a framework that assesses the performance of our proposed technique in terms of its core properties of being an image and a security contrivance, a transitory media that is intended to confine access to certain content only to authorised users

OVERVIEW ON CELLULAR AUTOMATA
BOUNDARY CONDITIONS AND REVERSIBLE CA
Delineate the zones of SQ
31 Return Q
EXPERIMENTAL VALIDATION OF PROPOSED CASP PROTOCOL
Findings
CONCLUDING REMARKS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call