Distributed Secret Sharing Approach with Cheater Prevention Based on QR Code

0
1780
Distributed Secret Sharing Approach with Cheater Prevention based on QR Code

Distributed Secret Sharing Approach with Cheater Prevention Based on QR Code

Abstract

Distributed Secret Sharing Approach with Cheater Prevention Based on QR Code,QR barcodes are used extensively due to their beneficial properties, including small tag, large data capacity, reliability, and high-speed scanning. However, the private data of the QR barcode lacks adequate security protection. In this article, we design a secret QR sharing approach to protect the private QR data with a secure and reliable distributed system. The proposed approach differs from related QR code schemes in which it uses the QR characteristics to achieve secret sharing and can resist the print-and-scan operation. The secret can be split and conveyed with QR tags in the distribution application, and the system can retrieve the lossless secret when authorized participants cooperate. General browsers can read the original data from the marked QR tag via a barcode reader, and this helps reduce the security risk of the secret. Based on our experiments, the new approach is feasible and provides content readability, cheater detectability, and an adjustable secret payload of the QR barcode.
 
 

Introduction

QR code (abbreviated from Quick Response Code) [1] is the trademark for a type of matrix barcode (or twodimensional barcode) first designed for the automotive industry in Japan. A barcode is a machine-readable optical label that contains information about the item to which it is attached. A QR code uses four standardized encoding modes (numeric, alphanumeric, byte/binary, and kanji) to efficiently store data; extensions may also be used.

The QR code system became popular outside the automotive industry due to its fast readability and greater storage capacity compared to standard UPC barcodes. Applications include product tracking, item identification, time tracking, document management, and general marketing.

A QR code consists of black squares arranged in a square grid on a white background, which can be read by an imaging device such as a camera, and processed using Reed–Solomon error correction until the image can be appropriately interpreted. The required data is then extracted from patterns that are present in both horizontal and vertical components of the image.

The proper execution of democratic rights has become linked to the availability and reliable functioning of advanced information and communication technology (ICT) [2]. While modern societies fully rely on ICT for business, work and leisure time activities, the use of ICT for democratic decision making is still in its infancy. In fact, the out date technological concepts for voting have been blamed in part for lost and uncounted votes and could therefore be responsible for biased political decisions making. Countries all over the world are examining e-voting, for it has some striking advantages over traditional paper voting, including security for casting votes, accuracy of counting and analyzing votes,options to conduct voting in a centralized and decentralized manner, etc. The reasons why the e-voting technology has not matured to equivalent levels as known for business and leisure time activities lies mostly in an inherent lack of trust and fear of electronic threats.

While most countries are still conceptualizing or testing e-voting systems, three cantons in Switzerland have pioneered the development of e-voting to its full technological maturity. The world is always in improvement and growth in technology, that’s why we should go parallel with it, to be able as much as we can get benefit from these improvements.

AIM of the Project

To keep the privacy of the barcode data, the data normally are stored in a back-end database, and the barcode shows the web link for the database. Only a browser with the correct access can log into the database and get the confidential data. However, the web link of the back-end database creates a possible risk in which it may attract the intruder‟s attention. Chuang et al. proposed a secret sharing scheme for the QR tag to protect the secret barcode data. Unfortunately, the content of the QR tags is meaningless, and the shares can be easily obtained by scanning the QR tags with a barcode reader. The sharing system is also unable of preventing cheaters in its realworld application. A dependable distributed secret storage system with the QR code can be used in important applications, such as offering secret organization and authorization in ecommerce. Based on our observations, our aim was to design a distributed secret sharing scheme based on the QR barcode, thereby allowing a secret to be split into pieces and shared between individual QR-tag owners to ensure the privacy of the QR data [3]. The secret data can be revealed when qualified QR-tag owners help. Recently, most QRrelated study has used the conventional image hiding method or the conventional watermarking technique without utilizing the characteristics of the QR barcode. The image hiding schemes treat the QR tag as a secret image and then embed the QR image into the unique domain or the frequency domain of a cover image. Hence, the secret payload of such schemes is equivalent to the QR data. These schemes do not activate on the QR tag directly, so they are unable of allowing the practice of hiding/reading the secret into/from the QR code directly.

Distributed Secret Sharing Approach with Cheater Prevention based on QR Code

Related Work

QR Related Data Hiding Scheme:- Advanced Steganography Algorithm:- Due to excessive raise in communication technology, now it is a actual problem / challenge to send some confidential information data through communication network. For this reason, Nath et al. developed some information security systems, combining cryptography and steganography simultaneously, and the present method, Advance Steganography Algorithm QR, is as well individual of them. In the present paper, the authors present a new steganography algorithm to hide any minute encrypted confidential data inside QR Code, which is then assemble in random order and then, finally embed that randomized QR Code inside some ordinary image. Quick Response Codes are a category of twodimensional matrix barcodes used for encoding data. It has become very popular in recent times for its high storage ability. The present technique is Advance Steganography Algorithm QR is a arrangement of strong encryption algorithm and data hiding in two stages to make the whole method very hard to break. Here, the confidential message is encrypted first and hide it in a QR Code and then once more that QR Code is embed in a cover file in random technique, using the standard technique of steganography. In this technique the data, which is secured, can not be retrieved without knowing the cryptography key, steganography password and the accurate unhide technique. For encrypt In this method to secure a data we use the following algorithm:

1) Encrypt small secret message using TTJSA method.

2) Formation of QR Code of the encrypted data.

3) Encrypting the QR Code using Randomization.

4) Hide Encrypted QR Code in the cover file using steganography.


Using data The authors used a method developed by Nath et al A. Encrypt Data Using TTJSA Method: The detail description of TTJSA method is discussed in detail by Nath et al. TTJSA is a symmetric key algorithm which is a combination of 3 distinct cryptography met technique namely  Generalized modified vernam cipher method with feedback,  NJJSAA technique which is essentially bit level encryption method and  MSA algorithm which is actually modified generalized Play fair method. Nath et al developed NJJSAA and MSA method.

The modified generalized vernam cipher method developed by Nath et al. B. NJJSAA Algorithm: Nath et al. future a technique which is basically a bit manipulation method to encrypt or to decrypt any file. C. MSA (Meheboob, Saima, Asoke) Encryption and Decryption Algorithm:- Nath et al. (1) future a symmetric key method where they have used a random key generator for generating the primary key and that key is used for encrypting the given resource file. MSA technique is mostly a replacement method where we take 2 characters from any input file and then search the equivalent characters from the random key matrix and store the encrypted data in a new file. MSA technique provides us several encryptions and several decryptions. The key matrix (16×16) is formed from all characters (ASCII code 0 to 255) in a random order.

Proposed System

A reliable distributed secret storage system with the QR code can be used in significant applications, such as offering secret management and authorization in ecommerce. Based on our observations, our aim was to design a distributed secret sharing system based on the QR barcode, thereby allowing a secret to be split into pieces and shared among individual QR-tag owners to ensure the privacy of the QR data. The secret data can be revealed when qualified QR-tag owners cooperate. Recently, most QR-related research has used the traditional image hiding manner or the traditional watermarking technique without utilizing the characteristics of the QR barcode [3]. The image hiding schemes treat the QR tag as a secret image and then embed the QR image into the special domain or the frequency domain of a cover image. Hence, the secret payload of such schemes is equal to the QR data. These schemes do not operate on the QR tag directly, so they Quick Response (QR) code is a trademark name given to this 2 dimensional code system. This code was first created by Denso-Waver, a Japanese Toyota subsidiary, back in „94. It was first created as a method of tracking vehicles during assembly of different parts.

Feature Scope

1.The word steganography is well identified to data communication and network for hiding data inside some known image and then send through internet. We embed encrypted confidential message inside QR Code. Then, the embedded QR Code is randomized by the randomization technique used in MSA algorithm. lastly, The randomized embedded code is inserted inside some regular image. To get back the original confidential message, we have to initialy decode the randomized embedded QR Code from the embedded image. Then, we have to apply reverse randomization technique to get back original embedded QR Code. Finally, we extract the confidential message from that second host file and then apply the decryption technique to get back original confidential message. Because of this double encryption and double embedding technique, no one can extract the original confidential message without knowing the exact technique.

2. In this we have discussed about QR code and it can be captured using mobile phones cameras. We proposed new algorithm in reversible data hiding. This algorithm has the capacity of hiding the information and bit side information. But in practical the existence of such code may reduce the value of original image and may also conceals some information contained in original image. User can access the image on web page with QR code and then remove the QR code from corner of the image and original image can be recovered. It can be used in online shopping sites and can also be used in many more applications in future.

3 This technique improves data security during data transmission and also the data privacy. But on the other hand it does not establish a backend database beforehand for content searching. It also saves lot of hardware cost and software maintenance. This technique can also be used in fields such as electronic tickets, air luggage inspection system, medical e-health system and other fields.

4 This paper gives the detail study of steganography & watermarking schemes. Two types of data are served as secret data which are embedded into a cover image. JPEG compression is used or for robustness 25% error correction is designed. 

Conclusion

Distributed Secret Sharing Approach with Cheater Prevention based on QR Code,The cloud acts as php side from where you can get the QR code that is the encrypted pieces of your password you have to scan the QR and get the pieces of password and have to set the password with the file name that the admin sends you. And can see the details of your secret file you have queried about to the admin. Accuracy, desirable that a query result contains exact the records matching the query. Generated qr provides more robustness than the related QR schemes. The image hiding schemes treat the QR tag as a secret image and then embed the QR image into the special domain or the frequency domain of a cover image. Hence, the secret payload of such schemes is equal to the QR data. The secret sharing system is also used in e-coupons and esharing.