Академический Документы
Профессиональный Документы
Культура Документы
Abstract
QR barcodes are used extensively due to their beneficial properties,
including small tag, large data capacity, reliability, and high-speed scanning.
However, the private data of the QR barcode lacks adequate security protection.
In this article, we design a secret QR sharing approach to protect the private QR
data with a secure and reliable distributed system. The proposed approach
differs from related QR code schemes in that it uses the QR characteristics to
achieve secret sharing and can resist the print-and-scan operation. The secret
can be split and conveyed with QR tags in the distribution application, and the
system can retrieve the lossless secret when authorized participants cooperate.
General browsers can read the original data from the marked QR tag via a
barcode reader, and this helps reduce the security risk of the secret. Based on
our experiments, the new approach is feasible and provides content readability,
cheater detectability, and an adjustable secret payload of the QR barcode.
EXISTING SYSTEM
TV based regularizations
It is used for deconvolution and denoising of QRCODE. Specically, it
perform the following four steps:
(i)
(ii)
comparison of the known nder pattern in the upper left corner with
the denoised signal from step (i) in the same corner;
(iii)
(iv)
separate steps to each procedure. Hence, we rst denoise the image using
the weighted TV ow.
TV flow
The ow (3) is closely related to the standard total variation ow and can
be obtained as a limiting case of hierarchical (BV a , L 2 ) decomposition
of f . Here, the BV a semi-norm of u is dened as |u| BV a := _ a|u|. In the
hierarchical (BV a , L 2 ) decomposition of f , ner scale components are
removed from f successively. The weight function a reduces the diffusion
at prominent edges of the given QR image, i.e. at points x where the
gradient
is
high.
The
Gaussian
smoothing
avoids
false
Disadvantage
Algorithm is complex
Time consuming
Not reliable for large data.
PROPOSED SYSTEM:
components,
the
frequency
contents
and
Advantage:
No frequency elimination. So all types of frequency will be used
More efficient for large size data
Accuracy will be more
Input design
The input design is the link between the information system and the user. It
comprises the developing specification and procedures for data preparation and
those steps are necessary to put transaction data in to a usable form for
processing can be achieved by inspecting the computer to read data from a
written or printed document or it can occur by having people keying the data
directly into the system. The design of input focuses on controlling the amount
of input required, controlling the errors, avoiding delay, avoiding extra steps and
keeping the process simple. This project will have a users registration details as
an input attribute for generation of QRCODE. It will also have message from a
user forum as input. Both message in an encrypted format using DES algorithm
and QR Code will be sent as a mail to the receiver.
Output design
The ouput design is used to select methods for presenting information. It is used
to create document, report, or other formats that contain information produced
by the system. It decides the output form of an information system should
accomplish one or more of the following objectives. Convey information about
past activities, current status or projections of the Future. Signal important
events, Opportunities, problems, or warnings, trigger an action and to confirm an
action.
In this project we will have the output as the decrypted message that can
be readable by the receiver. The QRCODE will be sent by the sender to receivers
mail id which should be given in the receiver side. The right QRCODE will
generate the exact message that is sent by the server.
Architecture Diagram
QR code
generat
or
Retrieve
message
r
Messagi
ng
Techniqu
e
QR code
Deblurin
g
Encryption
of message
with QR
code
Denoisin
g QR
CODE
Domain Details
Network Security
Network security consists of the policies and practices adopted to prevent
and monitor unauthorized access, misuse, modification, or denial of a computer
network and network-accessible resources. Network security involves the
authorization of access to data in a network, which is controlled by the network
administrator. Users choose or are assigned an ID and password or other
authenticating information that allows them access to information and programs
within their authority. Network security covers a variety of computer networks,
both public and private, that are used in everyday jobs; conducting transactions
and communications among businesses, government agencies and individuals.
Networks can be private, such as within a company, and others which might be
open to public access. Network security is involved in organizations, enterprises,
and other types of institutions. It does as its title explains: It secures the network,
as well as protecting and overseeing operations being done. The most common
and simple way of protecting a network resource is by assigning it a unique
name and a corresponding password.
Image processing
Image processing is processing of images using mathematical operations by using any
form of signal processing for which the input is an image, a series of images, or a video, such as
a photograph or video frame; the output of image processing may be either an image or a set of
characteristics or parameters related to the image. Most image-processing techniques involve