Abstract

Quick Response (QR) codes seem to appear everywhere these days. We can see them on posters, magazine ads, websites, product packaging and so on. Using the QR codes is one of the most intriguing ways of digitally connecting consumers to the internet via mobile phones since the mobile phones have become a basic necessity thing of everyone. Information about QR codes and their types get examine in the paper. Identification of objects and places in the real world is very important, and QR (2-D printing) code is useful to store identifiers of them. At the point when a barcode contains useful information or security data, the danger of security turns into an important issue. Because QR codes essentially highlight a square barcode with a special pattern, individuals have no clue whether the code will take them to legitimate data or a site loaded with malware. In recent year’s security of information have become big concern in the internet, so the information hiding has become an important issue. In steganography, Steganography hides the data in a medium such as text file, image, audio, video etc., and restrain the very existence of the message in the medium from a third party. In this paper, we present a methodology for creating QR codes and how they can be used to attack human interaction and automated systems and their different data types. Latest approach is proposed for secret communication by combining the concept of steganography and QR codes.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.