Using QR Code and a Smartphone to Provide University of Cross River State (UNICROSS) Certificate Authentication
In the modern world, people frequently fabricate their credentials in order to secure a job or to show up where and when it is necessary. Verification is the most effective approach to identify those fraudulent certificates. Despite this, the paper verification method requires a drawn-out and time-consuming process to handle certificate verification because the certificates must be returned to the institutions who awarded them. As a result, the certificates either fail to pass verification or are delayed by the lengthy process. Hence, a certificate verification method using QR codes is developed in this study for quick verification of University of Cross River State (UNICROSS) certificate genuineness. A Smartphone and 3D Printed QR Code were employed for the enhancement of UNICROSS certificate mobile authentication services. ScanTrust anti-counterfeiting services were used to secure and host the encrypted information. Results show that our framework is effective for creating mobile authentication services with high user satisfaction rate and having reasonably low computing requirements.
39
- 10.1186/s40064-016-3020-9
- Aug 30, 2016
- SpringerPlus
2
- 10.5120/ijca2022922419
- Dec 24, 2022
- International Journal of Computer Applications
7
- 10.1007/978-3-642-01244-0_38
- Jan 1, 2009
3
- 10.1109/icecco.2017.8333323
- Nov 1, 2017
19
- 10.1629/24s47
- Nov 1, 2011
- Serials: The Journal for the Serials Community
54
- 10.1016/j.techfore.2022.121968
- Aug 19, 2022
- Technological Forecasting and Social Change
23
- 10.1109/csnt.2013.112
- Apr 1, 2013
16
- 10.1016/j.measurement.2019.03.080
- Apr 18, 2019
- Measurement
- Research Article
- 10.11591/ijeei.v6i4.494
- Dec 25, 2018
- Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology. This paper identified the requirements needed in the certificate verification that uses the modified SHA-1. The application was tested using legitimate and fraudulent certificates. Based on the results, the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. During the trial run of the app, four test cases were seen which involves correct names and QR codes, and three other possible test cases of faking certificates such as modification of the name, regeneration of QR codes using valid hash and a fake name, and modification of the QR code. Although these cases exist, the app successfully verified all thirty certificates correctly. Also, it is noticed that during the scanning, the smartphone camera should be in focus to capture the QR code clearly.
- Research Article
1
- 10.52549/ijeei.v6i4.494
- Dec 25, 2018
- Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology. This paper identified the requirements needed in the certificate verification that uses the modified SHA-1. The application was tested using legitimate and fraudulent certificates. Based on the results, the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. During the trial run of the app, four test cases were seen which involves correct names and QR codes, and three other possible test cases of faking certificates such as modification of the name, regeneration of QR codes using valid hash and a fake name, and modification of the QR code. Although these cases exist, the app successfully verified all thirty certificates correctly. Also, it is noticed that during the scanning, the smartphone camera should be in focus to capture the QR code clearly.
- Conference Article
5
- 10.1109/icccn.1999.805526
- Oct 11, 1999
Nested certificates are used to certify their subject certificates. In this way, the subject certificates can be verified via their nested certificates without using signature verification methods based on public key cryptosystems. Such a verification method is called subject certificate verification. In this paper, a subject certificate verification method will be introduced. It will be shown that subject certificate verification has the same confidence as the cryptographic certificate verification. Moreover, subject certificate verification is faster than cryptographic certificate verification. It will also be shown that a classical certificate can be verified via a sequence of nested certificates-called nested certificate path-and such verification has the same confidence as the cryptographic verification of the same certificate. Nested certificate path verification is faster than the classical certificate path verification also. Moreover in this paper, simulation results will be presented for efficiency improvement in the nested certificate path verification method over the cryptographic classical certificate path verification method.
- Research Article
1
- 10.31673/2412-9070.2022.033942
- Jan 1, 2022
- Connectivity
The modern world is gaining momentum in the field of information technologies every day. «QR code» has become an integral part of our lives, such as paying with a smartphone, buying plane and train tickets, reading website URLs, and downloading programs and applications. The application of the QR code can be seen even in the field of education and medicine Considering this, there is a need to present information in a new, more compact form that meets the long list of requirements of the modern information society. This topic is so popular and recognized in the world that it can be discussed for a long time. Although QR codes look simple, they can store a lot of information. But no matter how much information a QR code contains, the information must be available immediately after the user scans it — hence the name Quick Response. A QR code is a convenience designed for the use of large amounts of information. The latest QR code technology is very practical for many companies. The benefit of the development of this system can be traced to such examples when there were mass accidents, plane crashes, train derailments, floods, and other disasters. Also, the current situation in Ukraine, when a rocket hit a high-rise building and many people found themselves under the rubble with serious injuries, can serve as an actual example. The relevance of QR code application in medicine will be shown in the example of this situation. QR code identification features are also provided. A comparison of a QR code with a barcode is demonstrated. The advantages of the QR code are highlighted. The method of using the QR code and the algorithm of actions for its use by medics in a disaster with a large number of injured people are presented.
- Book Chapter
47
- 10.1007/978-3-211-99407-8_12
- Jan 1, 2009
Mobile services support various situations in everyday life and with the spread of mobile internet and better equipped mobile devices mobile services are becoming increasingly important, especially in tourism. Mobile tagging, based on QR codes or similar approaches, offers a technique to increase the accessibility of mobile services. In this paper potential applications of QR Codes in tourism, and specifically within a cultural institution (the Mercedes-Benz Museum), are identified and prototypically implemented. In a second step, these application scenarios are evaluated within a test user study. Results show that both, usability and intention to use the services are potentially high and QR codes are able to provide additional comfort in accessing mobile content and services.
- Research Article
2
- 10.30630/joiv.7.3.1584
- Sep 10, 2023
- JOIV : International Journal on Informatics Visualization
One of the major challenges the university faces is to provide real-time verification of their student's degree certification upon request by other parties. Conventional verification systems are typically costly, time-consuming and bureaucratic against certificate credential misconduct. In addition, the forgery of graduation degree certificates has become more efficient due to easy-to-use scanning, editing, and printing technologies. Therefore, this research proposes verifying Ph.D. certificates using QR codes on the Ethereum blockchain to address certificate verification challenges. Blockchain technology ensures tamper-proof and decentralized management of degree certificates as the certificates stored on the blockchain are replicated across the network. The issuance of certificates requires the use of the issuer's private key, thus preventing forgery. The system was developed using Solidity for the smart contract, PHP, HTML/CSS for the web-based implementation, and MetaMask for blockchain integration. User testing confirmed the successful implementation and functionality of the system. Users can add, update, and delete certificates, generate and scan QR codes, and receive instant verification feedback. The verification system effectively meets all requirements, providing a robust solution for validating Ph.D. certificates. Future research may focus on scalability and adoption, privacy and data protection, user experience, and integration with existing systems. Other researchers can optimize the verification system for widespread adoption and utilization by exploring these areas. This research contributes to securing and efficiently verifying academic certificates using QR codes on the Ethereum blockchain. Ultimately, this work advances the field of certificate verification and promotes trust in academic credentials.
- Conference Article
1
- 10.1109/iccteie54047.2021.9650641
- Oct 27, 2021
In Indonesia, there have been many certificates forgery happened. The lack of security system for the certificate and the difficulty in verification process toward the authenticity certificate become the main factor of the certificate forgery cases happen. The aim of this research is to improve the security system such digital signature and QR code to authenticate the authenticity certificate and to facilitate the user in verify their certificate and also to minimize the certificate forgery cases. The aim of this research is to improve the security system such digital signature and QR code to authenticate the authenticity certificate and to facilitate the user in verify their certificate and also to minimize the certificate forgery cases. The application is built in web system to facilitate the user to access it everywhere and any time. This research uses Research and Development method for problem analysis and to develop application using Software Development Life Cycle method with waterfall approach. Black box testing is chosen as testing method for each function in this system. The result of this research is creatcate application that’s designed to support the publishing and the verification of the electronic authenticity certificate by online. There are two main schemes in system: the scheme in making e-certificate and the scheme of verification QR Code. There is the electronic professional certificate application by applying digital signature and QR Code. It can publish e-certificate that can prevent from criminal action such certificate forgery, that’s showed in implementation and can be proven in test.
- Research Article
- 10.29196/jubpas.v26i7.1410
- May 30, 2018
- JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences
In light of the information revolution taking place in the modern world, therefore it becomes necessary and important to save this electronic messages. So we offered this technique to ensure the safety of the content of the messages and authenticity of the sender through networks communication by converting the message's symbols to numbers , each one of this symbols (letters, numbers, symbols) will converted into three digits, the first digit represents the ASCII code of the symbol , the second digit represents the frequency of this symbol in the message (the number of times this symbol is appear in the message), and the third digit represents the total number of the locations of the symbol (calculates the symbol location from the first symbol in the message to this symbol itself and blanks also calculated too) .The digital signature of the sender will converted to numbers like the symbols of message we explained it before, and this numbers of the digital signature will gathering together to produce three numbers only, this number will gathering with each numbers of the message's symbols, the final numbers will converted to QR Code , the QR Code will placed with the message and sent to the recipient. The recipient returns the steps of the sender (produce QR Code from the received message) and compared it the received QR Codes, if it is match or not. The recipient will ensure that the content is secure, and confirms the authenticity of the sender.
- Research Article
- 10.34925/eip.2025.177.4.152
- Mar 16, 2025
- Экономика и предпринимательство
В современном мире наблюдается стремительная цифровизация экономики, одним из признаков которой можно считать увеличение количества безналичных платежей. Однако совершить платеж теперь можно не только при непосредственном использовании банковской карты, но и при помощи QR-кода. Так, в России на данный момент в магазинах могут использоваться разные типы QRкодов от разных компаний. Уже сейчас помимо известного QR-кода от СБП (Системы быстрых платежей), используется SberPay QR (Сбер), многие другие цифровые корпорации разрабатывают свои QRкоды. В научной и профессиональной среде существует мнение, что необходимо ввести единый QR-код для совершения платежей, тем самым повысить контроль Центрального банка за совершением операций, а также упростить процесс оплаты для покупателей. In the modern world, there is a rapid digitalization of the economy, one of the signs of which can be considered an increase in the number of non-cash payments. However, it is now possible to make a payment not only by directly using a bank card, but also using a QR code. So, in Russia, nowadays, different types of QR codes from different companies can be used in stores. Already, in addition to the well-known QR code from SBP (Fast Payment System), SberPay QR (Sber) is being used, and many other digital corporations are developing their own QR codes. There is an opinion in the scientific and professional environment that it is necessary to introduce a single QR code for making payments, thereby increasing the Central Bank's control over transactions, as well as simplifying the payment process for buyers.
- Research Article
1
- 10.14505/jemt.v15.1(73).14
- Feb 29, 2024
- Journal of Environmental Management and Tourism
The integration of technology with tourism increases its efficiency and improves the tourist experience, especially through QR codes and NFC technologies, which are already widely used. The number of research related to digitization and the sustainability of tourism is increasing, and the focus is shifting towards ICT, AR and VR. Mobile services like QR codes are crucial in tourism, improving service availability and user experience. The article analyzes the importance of QR codes and image processing in logistics and tourism. The focus is on the technological foundations, recognition, and decoding methods of QR codes, highlighting the role of artificial intelligence. The article discusses in detail the application of QR codes in tourism, along with technological challenges and development opportunities. It also presents future research directions and the potential effects of QR codes on tourism.
- Research Article
2
- 10.31866/2616-7654.5.2020.205735
- Jun 19, 2020
- Ukrainian Journal on Library and Information Science
The article analyzes the scientific comprehension state of QR-coding technology in the domestic and foreign scientific literature. It has been revealed in which industries the QR-technology is most widely used. Two basic types of QR-codes are explored – dynamic and static, and the differences between them are identified. The possibilities of providing information services using QR-codes are outlined. The types of information and data that can be encoded (text and multimedia) are analyzed. Mobile applications of the new format (“smart” QR-code generators) have been considered to provide additional connectivity between smartphones, QR-codes, and content. The dynamics of the use of QR-codes and their popularity in foreign countries have been revealed.The advantages of QR-coding technology, which are easy to use and financially affordable due to the availability of free online services, are verified. Such advantages of QR-codes as versatility, flexibility, economy, environmental friendliness, tracking and analytics, user involvement are emphasized. It has been found that in order to get effective marketing results using QR-coding technology, certain recommendations are required, such as pre-testing QR-code readings, checking of the expediency of selecting their location, the relevance and importance of encoded content.On the basis of the experience of using QR-codes in library work, the prospect of QR-coding technology as a type of mobile service in library institutions from the point of view of modern marketing means of communication is substantiated. It has been established that today QR-codes in the library can be considered as a component of a mobile service, which makes it possible to increase the level of library service, as an effective way to provide additional information for the reader, to promote the books, authors and the library itself.
- Conference Article
14
- 10.1145/988772.988797
- May 17, 2004
A certificate of authenticity (COA) is an inexpensivephysical object that has a random unique structure with a highcost of exact reproduction. An additional requirement is that theuniqueness of COA's random structure can be verified using aninexpensive device. Donald Bauder was the first to propose COA screated as a randomized augmentation of a set of fixed-length fibers into a transparent gluing material that fixes once for all the position of the fibers within. The statistics of the positioning of fibers is used as a source of randomness that is difficult to replicate.As oppose to recording authentic fiber-based COA structures in adatabase, we use public-key cryptography to authenticate COAs.During certification, the unique property of the physical objectis extracted, combined with an arbitrary text, signed with the private key of the issuer, and the signature is encoded andprinted as a barcode on the COA. Since the capacity of the barcodeis limited, the goal of any COA system is to contain in the signed message as much information about the random structure of the physical object as possible. In this paper, we show that the cost of forging a particular COA instance is exponentially proportional to the improvement in compressing COA's random features. Next, we formally define the compression objective, show that finding its optimal solution is an NP-hard problem, and propose a heuristic that improves significantly upon best standard compression methods.
- Book Chapter
15
- 10.1007/978-981-15-9213-3_36
- Jan 1, 2020
Distance education has become an important learning method for students. Nevertheless, online teaching is difficult to ensure the traceability of student activities. The difficulty in managing the non-instantaneous diploma verification and digital/paper files have always been severe problems in education management. The education information stored within the current centralized system is simply leaked and cannot be guaranteed in terms of impartiality and authenticity. In the present paper, a digital education certificate prototype is designed utilizing the permissioned blockchain of PKI-CA, digest algorithm, and interactive data authentication by digital signatures. The digital certificates can be issued by the system realizing the instant certificate verification between students and third parties via QR codes or dynamic authorization codes. The test results indicated that 100% correct work of the prototype, with the significant throughputs of getting and creating transactions are respectively 1982.6 tps and 263.9 tps on-chain during the test cycle.KeywordsPermissioned blockchainSmart contractCertificates authenticationData verification
- Research Article
1
- 10.35940/ijeat.c5256.029320
- Feb 28, 2020
- International Journal of Engineering and Advanced Technology
Fake education certificates or fake degree is one of the major concerns in higher education. This fraud can be minimized if there is a tamper-proof and confidential registry of certificates wherein not one but multiple certified authorities verifies and stores the issued certificate in immutable repositories with proper privacy maintained. Secondly, there should be a mechanism for retrieving the authentic certificate without much cost and time. Blockchain is an immutable, shared, distributed ledger without the control of a single centralized authority that fits very well for the discussed use case. The proposed work, PrivateCertChain, has implemented the idea for university having multiple affiliated colleges, by deploying and verifying digitally signed e-certificate on Ethereum Blockchain. Multiple affiliated colleges can serve as the miners for verifying the signature of the issuer. For privacy concerns, the content of the certificate will be hashed and this hashed value will be stored in Blockchain along with the roll number of the certificate holder. Once the transaction hash is generated, it will be converted to QR code. The QR code is shared with the respective owner of the certificate and it will also serve as the credential of the certificate. Thus, anyone having the credential can view the authentic certificate which is kept on the blockchain, by scanning QR through the dedicated application designed for verification. The proposed solution can be a foolproof mechanism against all frauds as it guards for integrity, confidentiality, authenticity, and privacy of educational certificates.
- Research Article
- 10.37745/ejcsit.2013/vol13n32042
- Mar 15, 2025
- European Journal of Computer Science and Information Technology
This study implements a QR code-based authentication system at Federal Polytechnic Ukana, Nigeria, as a technological solution to the challenges of traditional manual verification methods in examination management. The system architecture includes a database management module (MySQL), a QR code generation module (Python QR Code library), and an authentication module (Android mobile application). The system integrates web-based and mobile platforms, enhancing accessibility and usability. Advanced Encryption Standard (AES) is used to secure QR code data. The system undergoes rigorous testing to validate its functionality, accuracy, and security. A pilot deployment in two departments over a two-week examination period showed improved efficiency, reduced impersonation cases, and enhanced overall examination integrity. Performance metrics showed reduced verification time, increased accuracy, and system reliability under varying conditions. The findings confirm that QR code technology significantly enhances examination security and operational efficiency. However, challenges such as internet connectivity dependency and potential QR code tampering are acknowledged. Future research may explore the integration of biometric authentication and blockchain technology to strengthen security measures. The successful implementation at Federal Polytechnic Ukana provides a model for broader adoption, offering a scalable and cost-effective solution to modernize examination management across Nigerian polytechnics and beyond.
- Research Article
- 10.52589/bjcnit-r9wormxv
- Sep 3, 2025
- British Journal of Computer, Networking and Information Technology
- Research Article
- 10.52589/bjcnit-bqjkbu5p
- Jul 18, 2025
- British Journal of Computer, Networking and Information Technology
- Research Article
- 10.52589/bjcnit-jgxgnutr
- Jul 14, 2025
- British Journal of Computer, Networking and Information Technology
- Research Article
- 10.52589/bjcnit-26tc9jlg
- Jul 14, 2025
- British Journal of Computer, Networking and Information Technology
- Research Article
- 10.52589/bjcnit-i0v0hk0y
- May 30, 2025
- British Journal of Computer, Networking and Information Technology
- Research Article
1
- 10.52589/bjcnit-qc5eelje
- May 13, 2025
- British Journal of Computer, Networking and Information Technology
- Research Article
- 10.52589/bjcnit-vruhjjln
- Apr 15, 2025
- British Journal of Computer, Networking and Information Technology
- Research Article
- 10.52589/bjcnit-hrfn7zoe
- Mar 6, 2025
- British Journal of Computer, Networking and Information Technology
- Research Article
- 10.52589/bjcnit-45vtypqo
- Feb 20, 2025
- British Journal of Computer, Networking and Information Technology
- Research Article
- 10.52589/bjcnit-1hh9npsn
- Jan 17, 2025
- British Journal of Computer, Networking and Information Technology
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.