Publication Type : Book Chapter
Thematic Areas : TIFAC-CORE in Cyber Security
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2
Source : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 473-480). Springer India.
Campus : Coimbatore
School : School of Engineering, Centre for Cybersecurity Systems and Networks
Center : TIFAC CORE in Cyber Security
Department : cyber Security
Year : 2015
Abstract : pQuick response codes (QR codes) are widely being used for various applications such as user authentication and advertisements. The data in QR codes can easily be read with the help of a QR code reader application installed in a smartphone with camera. Here, we cannot neglect the possibility of an attacker tampering the QR code data. For example, in authentication, the attacker can forge the text password. In order to avoid such attacks as well as hide this data from the public, we propose a secret sharing scheme with reversing. This scheme not only splits the QR code into different shares, but also allows us to perfectly reconstruct back the original QR code./p