A Review on Design Development and Performance Assessment of QR Code based Secure User Identification System
Keywords:
EEG; Signal Processing; muscular artifacts; spike detection; Brain waves; ,Wavelet transform; Neural network; EEG lab.Abstract
Authentication is the process of securing and authenticating a user, usually by combining a username and password when logging in to an IT system or application. The various factors of certification are knowledge, ownership and inherent factors. In fact, the basis for certification is that the system will not be able to associate a certification factor with a particular entity without a proper form of identification. There are many security incidents happening around the world. The authentication system based on single factor knowledge, such as user name and password, is not enough to prevent authentication attacks. In this study, both ownership-based and biometric-based certifications have been investigated and five schemes have been developed that use smartcards, QR codes, encrypted QR codes and finger veins. The embedded data may be stolen because the two-dimensional code is not encrypted. So, developed an encrypted QR code. To illustrate the use of encrypted QR codes, use online banking certification. One-time passwords (OTPs) are encrypted and embedded in the QR code and displayed to users on the Bank's website. An improved verification scheme OTP-EQR has been developed. The method of encoding the data in the QR code is modified so that it is only readable by the corresponding QR code reader with the password. Other QR code reading software will not be able to read the data. QR codes generated using the proposed improved coding and encryption procedures have higher entropy, negative correlation coefficients and higher mean square error, indicating that the original image and the encrypted QR code are different and therefore safe. The existing and proposed methods both show higher entropy, and between them, the proposed encryption method gives a higher entropy.
References
2. Alvarez, G, Montoya, F, Romera, M & Pastor, G 2003, ‘Cryptanalysis of a discrete chaotic cryptosystem using external key’, Physics Letters A, pp. 334-339
3.Aziz, WNAA, Seman, K & Abdullah, I 2011, ‘Polynomial Hardening of Biometric Fuzzy Vault’, Proceedings of the 1st Annual Young Researchers International Conference and Exhibition Beyond 2020, PWTC, Kualalumpur, pp. 810-818.
4.Behnia, S, Akhshani, A, Ahadpour, S, Mahmodi, H & Akhavan, A 2007, ‘A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps’, Physics Letters A, pp. 391-396.
5.Bourbakis, N & Alexopoulos, C 1992, ‘Picture data encryption using scan patterns’, Pattern Recognition, vol. 25, no. 6, pp. 567-581.
6. Cappelli, R, Maio, D, Maltoni, D, Wayman, J & Jain, A 2006,‘Performance evaluation of fingerprint verification systems’, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 1, pp. 3-18
7. Chang, HKC & Liu, JL 1997, ‘A linear quad tree compression scheme for image encryption’, Signal Processing, vol. 10, no. 4, pp. 279-290.
8. Chen, G, Mao, Y & Chui, CK 2004, ‘A symmetric image encryption based on 3D chaotic maps’, Chaos Solitons and Fractals, pp. 749-761.
9. Chong, SC, Teoh, ABJ & Ngo, DCL 2006, ‘Iris authentication using privatized advanced correlation filter’, Proceedings of the International Conference on Biometrics, pp. 382-388.
10. Crihalmeanu, S & Ross, A 2012, ‘Multispectral scleral patterns for ocular biometric recognition’, Pattern Recognition Letters, vol. 5, no. 2, pp. 41-68.
11. Crihalmeanu, S, Ross, A & Derakhshani, R 2009,
‘Enhancement and registration schemes for matching conjunctival vasculature’, Proceedings of the International Conference on Biometrics, Alghero, Italy, pp. 1240-1249.
12. Derakhshani, R & Ross, A 2007, ‘A texture-based neural network classifier for biometric identification using ocular surface vasculature’, ‘Proceedings of the International Joint Conference on Neural Networks, Orlando, USA, pp. 2982-2987.
13. Derakhshani, R, Ross, A & Crihalmeanu, S 2006, ‘A new biometric modality based on conjunctival vasculature’, Proceedings of the international Conference on Artificial Neural Networks in Engineering, ST.Louis, MO, pp 1-8.
14. Dey, S 2013, ‘New generation of digital academic-transcripts using encrypted QR code™: Use of encrypted QR code™ in mark-sheets (academic transcripts)’, Proceedings of the International Multi-conference on Automation, Computing, Communication, Control and Compressed Sensing, pp. 313-317.
15. Dubrova, E 2013, ‘A scalable method for constructing Galois NLFSRs with period 2n?1 using cross-join pairs’, IEEE Transactions on Information Theory, vol. 59, no. 1, pp. 703-709.
16. Eriksson, A & Wretling, P 1997, ‘How flexible is the human voice, A case study of mimicry’, Proceedings of the European Conference on Speech Technology, Rhodes, pp. 1043-1046.
17. Farooq, F, Bolle, R, Jea, T, & Ratha, N 2007, ‘Anonymous and revocable fingerprint recognition’, Proceedings of the
International Conference on Computer Vision and Pattern
Recognition, pp. 1-7.
18. Feng Hao, Anderson, R & Daugman, J 2008, ‘Combining Crypto with Biometrics Effectively’, IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081-1088.
19. Gao, Y & Maggs, M 2005, ‘Feature-level fusion in personal identification’, Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 468-473.
20. Gentile, JE, Ratha, N & Connell, J 2009, ‘SLIC: Short-length iris codes’, Proceedings of the 3rd IEEE International Conference on Biometrics: Theory, Applications and Systems’, pp. 28-30.
21. Golic, JD & Baltatu, M 2008, ‘Entropy analysis and new constructions of biometric key generation systems’, IEEE Transactions on Information Theory, vol. 54, no. 5, pp. 2026-
2040.
22. Gongping, Y, Xiaoming, X & Yilong, Y 2012, ‘Finger Vein Recognition Based on a Personalized Best Bit Map’, Journal on Sensors, vol. 12, pp. 1738-1757.
23. Hashimoto, J 2006, ‘Finger Vein Authentication Technology and its Future’, Symposium on VLSI Circuits, Digest of Technical Papers, pp. 5-8.
24. http://www.verizonenterprise.com/DBIR
25. Huang, HC, Chang, FC & Fang, WC 2013, ‘Reversible data hiding with histogram-based difference expansion for QR code applications’, IEEE Transactions on Consumer Electronics, vol. 57, no. 2, pp. 779-787.
26. Imesch, PD, Wallow, IHL & Albert, DM 2006, ‘The color of the human eye: A review of morphologic correlates and of some conditions that affect iridial pigmentation’, Survey of Ophthalmology, vol. 41, pp. 117-122.
27. Jain, A, Ross, A & Prabhakar, S 2004, ‘An introduction to biometric recognition’, IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, pp. 4-20.
28. Jawad, A & Fawad, A 2012, ‘Efficiency analysis and security evaluation of image encryption schemes’, International Journal of Video & Image Processing and Network Security, vol. 12, no. 4, pp. 18-31.
29. Jinfeng, Y, Jinli, Y & Yihua, S 2013, ‘Finger-Vein Segmentation Based on Multi-channel Even-symmetric Gabor Filters’, Proceedings of the IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 4, pp. 500-
503.
30. Jing, H, Xinge, Y, Yuan, YT, Liang, D & Yuan, Y 2009,
‘A novel iris segmentation using radial suppression edge detection’, Signal Processing, vol. 89, no. 12, pp. 2630-2643.