[PDF][PDF] A secure network communication protocol based on text to barcode encryption algorithm

A Ahmad, B Hawashin - International Journal of Advanced …, 2015 - researchgate.net
There are various methods for securing data on the internet and ensuring its privacy; one of
these methods is data encryption. This technique is used to protect the data from hackers by …

[PDF][PDF] Strength of quick response barcodes and design of secure data sharing system

S Kaushik - International Journal of Advanced Computer Science …, 2011 - Citeseer
With the vast introduction of the wireless world, the exchanged information now is more
prone to security attacks than ever. Barcodes are the information careers in the form of an …

[PDF][PDF] A novel network security algorithm based on encrypting text into a white-page image

ZM Ahmad Abusukhon, M Talib - Proceedings of the World Congress …, 2016 - academia.edu
Nowadays, data security becomes a big issue and a challenge when sending sensitive data
through the Internet. For example; sending user password, performing money transaction (e …

[PDF][PDF] Survey On Information Sharing Techniques Using QR Barcode

MS Rewatkar, SA Raut - International, Journal on Cryptography and …, 2014 - academia.edu
Nowadays, the information processing system plays crucial part in the internet. Online
information security has become the top priority in all sectors. Failing to provide online …

Security Mechanism Improvement for 2D Barcodes using Error Correction with Random Segmentation

G Wang, Z Yang, J Chen, K Wattanachote… - Proceedings of the 6th …, 2018 - dl.acm.org
2D barcode becomes a famous technology in information security issue in this decade. We
propose a security mechanism improvement method by applying the error correction with …

[PDF][PDF] A Secure and Optimal QR Code

S Goel, AK Singh - International Journal Of Engineering Research & …, 2014 - Citeseer
Barcode are used for storing the different type of data. Today different type of barcode is
used for different purpose. In market lots of barcode are available. There are three type of …

QR code authentication with embedded message authentication code

C Chen - Mobile Networks and Applications, 2017 - Springer
Quick Response (QR) code is widely used nowadays but its authenticity is an open issue.
Attackers can easily replace the original barcode by a modified one which is generated …

[PDF][PDF] Analyzing the efficiency of Text-to-Image encryption algorithm

A Abusukhon, M Talib, MA Nabulsi - International Journal of …, 2012 - academia.edu
Today many of the activities are performed online through the Internet. One of the methods
used to protect the data while sending it through the Internet is cryptography. In a previous …

A desktop application of QR code for data security and authentication

P Mittra, N Rakesh - 2016 International Conference on Inventive …, 2016 - ieeexplore.ieee.org
Initially the barcodes have been widely used for the unique identification of the products.
Quick Response ie QR codes are 2D representation of barcodes that can embed text, audio …

Protecting computer network with encryption technique: A Study

KI Lakhtaria - … International Conference, UCMA 2011, Daejeon, Korea …, 2011 - Springer
In today's world the networking plays a very important role in our life. Most of the activities
occur through the Internet. For the safe and secured exchange of information, we need to …