Abstract
Quick response codes are widely used for tagging products, sharing information and making digital payments due to their robustness against distortion, error correction features and small size. As the adoption and popularity of quick response codes have grown, so have the associated security and privacy concerns. This chapter discusses advancements in quick response codes and the major security and privacy issues related to quick response codes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
M. Ahamed and H. Mustafa, A secure QR code system for sharing personal confidential information, Proceedings of the International Conference on Computer, Communications, Chemical, Materials and Electronic Engineering, 2019
C. Allen and A. Harfield, Authenticating physical locations using QR codes and network latency, Proceedings of the Fourteenth International Joint Conference on Computer Science and Software Engineering, 2017
Z. Arkah, L. Alzubaidi, A. Ali and A. Abdulameer, Digital color document authentication using QR codes based on digital watermarking, Proceedings of the International Conference on Intelligent Systems Design and Applications, pp. 1093–1101, 2018
A. Arya and S. Soni, Enhanced data security in quick response (QR) code using image steganography technique with DWT-DCT-SVD, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 3(5), pp. 59–65, 2018
E. Ayeleso, A. Adekiigbe, N. Onyeka and M. Oladele, Identity card authentication system using a QR code and smartphone, International Journal of Science, Engineering and Environmental Technology, vol. 2(9), pp. 61–68, 2017
R. Bani-Hani, Y. Wahsheh and M. Al-Sarhan, Secure QR code system, Proceedings of the Tenth International Conference on Innovations in Information Technology, 2014
A. Banu, K. Ganagavalli and G. Ramsundar, QR code based shop** with secure checkout for smartphones, Journal of Computational and Theoretical Nanoscience, vol. 15(5), pp. 1545–1550, 2018
T. Bui, N. Vu, T. Nguyen, I. Echizen and T. Nguyen, Robust message hiding for QR code, Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 520–523, 2014
H. Chu, C. Chang, R. Lee and N. Mitra, Halftone QR codes, ACM Transactions on Graphics, vol. 32(6), article no. 217, 2013
Z. Cui, W. Li, C. Yu and N. Yu, A new type of two-dimensional anti-counterfeit code for document authentication using neural networks, Proceedings of the Fourth International Conference on Cryptography, Security and Privacy, pp. 68–73, 2020
R. Dudheria, Evaluating features and effiectiveness of secure QR code scanners, Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 40–49, 2017
A. Gaikwad and K. Singh, Information hiding using image embedding in QR codes for color images: A review, International Journal of Computer Science and Information Technologies, vol. 26(1), pp. 278–283, 2015
S. Gotved, Privacy with public access: Digital memorials in quick response codes, Information, Communication and Society, vol. 18(3), pp. 269–280, 2015
A. Grillo, A. Lentini, M. Querini and G. Italiano, High capacity colored two-dimensional codes, Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 709–716, 2010
V. Hajduk, M. Broda, O. Kovac and D. Levicky, Image steganography using QR code and cryptography, Proceedings of the Twenty-Sixth International Conference on Radioelectronics, pp. 350–353, 2016
H. Huang, F. Chang and W. Fang, Reversible data hiding with histogram-based difference expansion for QR code applications, IEEE Transactions on Consumer Electronics, vol. 57(2), pp. 779–787, 2011
International Organization for Standardization, ISO/IEC Standard 18004: Information Technology – Automatic Identification and Data Capture Techniques – QR Code Bar Code Symbology Specification, Geneva, Switzerland, 2000
H. Keni, M. Earle and M. Min, Product authentication using hash chains and printed QR codes, Proceedings of the Fourth IEEE Annual Consumer Communications and Networking Conference, pp. 319–324, 2017
P. Kieseberg, S. Schrittwieser, M. Leithner, M. Mulazzani, E. Weippl, L. Munroe and M. Sinha, Malicious pixels using QR codes as an attack vector, in Trustworthy Ubiquitous Computing, I. Khalil and T. Mantoro (Eds.), Atlantis Press, Paris, France, pp. 21–38, 2012
K. Krombholz, P. Fruhwirt, P. Kieseberg, I. Kapsalis, M. Huberand and E.Weippl, QR code security: A survey of attacks and challenges for usable security, Proceedings of the International Conference on Human Aspects of Information Security, Privacy and Trust, pp. 79–90, 2014
J. Lee, T. Kwon, S. Song and J. Song, A model for embedding and authorizing digital signatures in printed documents, Proceedings of the International Conference on Information Security and Cryptology, pp. 465–477, 2002
O. Lewis and S. Thorpe, Authenticating motor insurance documents using QR codes, Proceedings of the Southeast Conference, 2019
P. Lin and Y. Chen, QR code steganography with secret payload enhancement, Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2016
S. Liu, J. Zhang, J. Pan and C. Weng, SVQR: A novel secure visual quick response code and its anti-counterfeiting solution, Journal of Information Hiding and Multimedia Signal Processing, vol. 8(5), pp. 1132–1140, 2017
J. Lu, Z. Yang, L. Li, W. Yuan, L. Li and C. Chang, Multiple schemes for mobile payment authentication using QR codes and visual cryptography, Mobile Information Systems, vol. 2017, article no. 4356038, 2017
S. Maheswari and D. Hemanth, Frequency domain QR code based image steganography using the Fresnelet transform, AEU International Journal of Electronics and Communications, vol. 69(2), pp. 539–544, 2015
V. Mavroeidis and M. Nicho, Quick response code secure: A cryptographically-secure anti-phishing tool for QR code attacks, Proceedings of the International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, pp. 313–324, 2017
A. Mendhe, D. Gupta and K. Sharma, Secure QR code based message sharing system using cryptography and steganography, Proceedings of the First International Conference on Secure Cyber Computing and Communications, pp. 188–191, 2018
H. Nguyen, A. Delahaies, F. Retraint, D. Nguyen, M. Pic and F. Morain-Nicolier, A watermarking technique to secure printed QR codes using a statistical test, Proceedings of the IEEE Global Conference on Signal and Information Processing, pp. 288–292, 2017
M. Rogers, Hacking the Internet of Things for Good, Lookout, San Francisco, California (www.slideshare.net/LookoutInc/hacking-the-internet-of-things-for-good), 2013
J. Swartz, The growing “magic” of automatic identification, IEEE Robotics and Automation, vol. 6(1), pp. 20–23, 1999
A. Tikhonov, On Double-Sided QR-Codes, ar**v: 1902.05722 (arxiv.org/abs/1902.05722), 2019
I. Tkachenko, W. Puech, O. Strauss, C. Destruel, J. Gaudin and C. Guichard, Rich QR code for multimedia management applications, Proceedings of the International Conference on Image Analysis and Processing, pp. 383–393, 2015
T. Vidas, E. Owusu, S. Wang, C. Zeng, L. Cranor and N. Christin, QRishing: The susceptibility of smartphone users to QR code phishing attacks, in Financial Cryptography and Data Security, A. Adams, M. Brenner and M. Smith (Eds.), Springer, Berlin Heidelberg, Germany, pp. 52–69, 2013
S. Vongpradhip, Using multiplexing to increase information in QR codes, Proceedings of the Eighth International Conference on Computer Science and Education, pp. 361–364, 2013
M. Warasart and P. Kuacharoen, Paper-based document authentication using digital signatures and QR codes, presented at the International Conference on Computer Engineering and Technology, 2012
N. Woodland and B. Silver, Classifying Apparatus and Method, U.S. Patent No. 2,612,994, October 7, 1952
M. Xu, Q. Li, J. Niu, H. Su, X. Liu, W. Xu, P. Lv, B. Zhou and Y. Yang, ART-UP: A novel method for generating scanning-robust aesthetic QR codes, ACM Transactions on Multimedia Computing, Communications and Applications, vol. 17(1), article no. 25, 2021
Z. Yahya, N. Kamarzaman, N. Azizan, Z. Jusoh, R. Isa, M. Shafazand, N. Salleh and S. Mokhtaruddin, A new academic certificate authentication using leading-edge technology, Proceedings of the International Conference on E-Commerce, E-Business and E-Government, pp. 82–85, 2017
B. Zhang, K. Ren, G. **ng, X. Fu and C. Wang, SBVLC: Secure barcode-based visible light communications for smartphones, IEEE Transactions on Mobile Computing, vol. 15(2), pp. 432–446, 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 IFIP International Federation for Information Processing
About this paper
Cite this paper
Garg, P., Chhabra, S., Gupta, G., Gupta, G., Gupta, M. (2021). SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XVII. DigitalForensics 2021. IFIP Advances in Information and Communication Technology, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-030-88381-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-88381-2_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-88380-5
Online ISBN: 978-3-030-88381-2
eBook Packages: Computer ScienceComputer Science (R0)