Abstract

The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology. This paper identified the requirements needed in the certificate verification that uses the modified SHA-1. The application was tested using legitimate and fraudulent certificates. Based on the results, the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. During the trial run of the app, four test cases were seen which involves correct names and QR codes, and three other possible test cases of faking certificates such as modification of the name, regeneration of QR codes using valid hash and a fake name, and modification of the QR code. Although these cases exist, the app successfully verified all thirty certificates correctly. Also, it is noticed that during the scanning, the smartphone camera should be in focus to capture the QR code clearly.

Highlights

  • Quick Response (QR) codes are a low-cost tagging technology famous for its simple production and less difficulty in implementation [1]

  • This paper presents a certificate integrity verification process that can be quite convenient and quick by combining the modified Secure Hash Algorithm 1 (SHA-1) hash and QR code technology in a windows and web application

  • The web application will involve the capturing of the QR code printed on the certificate using the phone’s camera and sending the obtained message and hash code to the web server

Read more

Summary

Introduction

Quick Response (QR) codes are a low-cost tagging technology famous for its simple production and less difficulty in implementation [1]. Many areas use QR codes such as in authentication of products [4], [5] student result mark sheets and their profile information [6], [7] and banking [8], [9]. Another application of QR codes includes the checking of the data integrity of certificates issued by institutions to prevent dissemination of fraudulent documents [10]. Multimedia security researchers recommend document verification and authentication due to the rise in the number of fake documents because of advances in printing and scanning [13]

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.