SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES

  • Conference paper
  • First Online:
Advances in Digital Forensics XVII (DigitalForensics 2021)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 612))

Included in the following conference series:

  • 520 Accesses

Abstract

Quick response codes are widely used for tagging products, sharing information and making digital payments due to their robustness against distortion, error correction features and small size. As the adoption and popularity of quick response codes have grown, so have the associated security and privacy concerns. This chapter discusses advancements in quick response codes and the major security and privacy issues related to quick response codes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. M. Ahamed and H. Mustafa, A secure QR code system for sharing personal confidential information, Proceedings of the International Conference on Computer, Communications, Chemical, Materials and Electronic Engineering, 2019

    Google Scholar 

  2. C. Allen and A. Harfield, Authenticating physical locations using QR codes and network latency, Proceedings of the Fourteenth International Joint Conference on Computer Science and Software Engineering, 2017

    Google Scholar 

  3. Z. Arkah, L. Alzubaidi, A. Ali and A. Abdulameer, Digital color document authentication using QR codes based on digital watermarking, Proceedings of the International Conference on Intelligent Systems Design and Applications, pp. 1093–1101, 2018

    Google Scholar 

  4. A. Arya and S. Soni, Enhanced data security in quick response (QR) code using image steganography technique with DWT-DCT-SVD, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 3(5), pp. 59–65, 2018

    Google Scholar 

  5. E. Ayeleso, A. Adekiigbe, N. Onyeka and M. Oladele, Identity card authentication system using a QR code and smartphone, International Journal of Science, Engineering and Environmental Technology, vol. 2(9), pp. 61–68, 2017

    Google Scholar 

  6. R. Bani-Hani, Y. Wahsheh and M. Al-Sarhan, Secure QR code system, Proceedings of the Tenth International Conference on Innovations in Information Technology, 2014

    Google Scholar 

  7. A. Banu, K. Ganagavalli and G. Ramsundar, QR code based shop** with secure checkout for smartphones, Journal of Computational and Theoretical Nanoscience, vol. 15(5), pp. 1545–1550, 2018

    Google Scholar 

  8. T. Bui, N. Vu, T. Nguyen, I. Echizen and T. Nguyen, Robust message hiding for QR code, Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 520–523, 2014

    Google Scholar 

  9. H. Chu, C. Chang, R. Lee and N. Mitra, Halftone QR codes, ACM Transactions on Graphics, vol. 32(6), article no. 217, 2013

    Google Scholar 

  10. Z. Cui, W. Li, C. Yu and N. Yu, A new type of two-dimensional anti-counterfeit code for document authentication using neural networks, Proceedings of the Fourth International Conference on Cryptography, Security and Privacy, pp. 68–73, 2020

    Google Scholar 

  11. R. Dudheria, Evaluating features and effiectiveness of secure QR code scanners, Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 40–49, 2017

    Google Scholar 

  12. A. Gaikwad and K. Singh, Information hiding using image embedding in QR codes for color images: A review, International Journal of Computer Science and Information Technologies, vol. 26(1), pp. 278–283, 2015

    Google Scholar 

  13. S. Gotved, Privacy with public access: Digital memorials in quick response codes, Information, Communication and Society, vol. 18(3), pp. 269–280, 2015

    Google Scholar 

  14. A. Grillo, A. Lentini, M. Querini and G. Italiano, High capacity colored two-dimensional codes, Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 709–716, 2010

    Google Scholar 

  15. V. Hajduk, M. Broda, O. Kovac and D. Levicky, Image steganography using QR code and cryptography, Proceedings of the Twenty-Sixth International Conference on Radioelectronics, pp. 350–353, 2016

    Google Scholar 

  16. H. Huang, F. Chang and W. Fang, Reversible data hiding with histogram-based difference expansion for QR code applications, IEEE Transactions on Consumer Electronics, vol. 57(2), pp. 779–787, 2011

    Google Scholar 

  17. International Organization for Standardization, ISO/IEC Standard 18004: Information Technology – Automatic Identification and Data Capture Techniques – QR Code Bar Code Symbology Specification, Geneva, Switzerland, 2000

    Google Scholar 

  18. H. Keni, M. Earle and M. Min, Product authentication using hash chains and printed QR codes, Proceedings of the Fourth IEEE Annual Consumer Communications and Networking Conference, pp. 319–324, 2017

    Google Scholar 

  19. P. Kieseberg, S. Schrittwieser, M. Leithner, M. Mulazzani, E. Weippl, L. Munroe and M. Sinha, Malicious pixels using QR codes as an attack vector, in Trustworthy Ubiquitous Computing, I. Khalil and T. Mantoro (Eds.), Atlantis Press, Paris, France, pp. 21–38, 2012

    Google Scholar 

  20. K. Krombholz, P. Fruhwirt, P. Kieseberg, I. Kapsalis, M. Huberand and E.Weippl, QR code security: A survey of attacks and challenges for usable security, Proceedings of the International Conference on Human Aspects of Information Security, Privacy and Trust, pp. 79–90, 2014

    Google Scholar 

  21. J. Lee, T. Kwon, S. Song and J. Song, A model for embedding and authorizing digital signatures in printed documents, Proceedings of the International Conference on Information Security and Cryptology, pp. 465–477, 2002

    Google Scholar 

  22. O. Lewis and S. Thorpe, Authenticating motor insurance documents using QR codes, Proceedings of the Southeast Conference, 2019

    Google Scholar 

  23. P. Lin and Y. Chen, QR code steganography with secret payload enhancement, Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2016

    Google Scholar 

  24. S. Liu, J. Zhang, J. Pan and C. Weng, SVQR: A novel secure visual quick response code and its anti-counterfeiting solution, Journal of Information Hiding and Multimedia Signal Processing, vol. 8(5), pp. 1132–1140, 2017

    Google Scholar 

  25. J. Lu, Z. Yang, L. Li, W. Yuan, L. Li and C. Chang, Multiple schemes for mobile payment authentication using QR codes and visual cryptography, Mobile Information Systems, vol. 2017, article no. 4356038, 2017

    Google Scholar 

  26. S. Maheswari and D. Hemanth, Frequency domain QR code based image steganography using the Fresnelet transform, AEU International Journal of Electronics and Communications, vol. 69(2), pp. 539–544, 2015

    Google Scholar 

  27. V. Mavroeidis and M. Nicho, Quick response code secure: A cryptographically-secure anti-phishing tool for QR code attacks, Proceedings of the International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, pp. 313–324, 2017

    Google Scholar 

  28. A. Mendhe, D. Gupta and K. Sharma, Secure QR code based message sharing system using cryptography and steganography, Proceedings of the First International Conference on Secure Cyber Computing and Communications, pp. 188–191, 2018

    Google Scholar 

  29. H. Nguyen, A. Delahaies, F. Retraint, D. Nguyen, M. Pic and F. Morain-Nicolier, A watermarking technique to secure printed QR codes using a statistical test, Proceedings of the IEEE Global Conference on Signal and Information Processing, pp. 288–292, 2017

    Google Scholar 

  30. M. Rogers, Hacking the Internet of Things for Good, Lookout, San Francisco, California (www.slideshare.net/LookoutInc/hacking-the-internet-of-things-for-good), 2013

    Google Scholar 

  31. J. Swartz, The growing “magic” of automatic identification, IEEE Robotics and Automation, vol. 6(1), pp. 20–23, 1999

    Google Scholar 

  32. A. Tikhonov, On Double-Sided QR-Codes, ar**v: 1902.05722 (arxiv.org/abs/1902.05722), 2019

    Google Scholar 

  33. I. Tkachenko, W. Puech, O. Strauss, C. Destruel, J. Gaudin and C. Guichard, Rich QR code for multimedia management applications, Proceedings of the International Conference on Image Analysis and Processing, pp. 383–393, 2015

    Google Scholar 

  34. T. Vidas, E. Owusu, S. Wang, C. Zeng, L. Cranor and N. Christin, QRishing: The susceptibility of smartphone users to QR code phishing attacks, in Financial Cryptography and Data Security, A. Adams, M. Brenner and M. Smith (Eds.), Springer, Berlin Heidelberg, Germany, pp. 52–69, 2013

    Google Scholar 

  35. S. Vongpradhip, Using multiplexing to increase information in QR codes, Proceedings of the Eighth International Conference on Computer Science and Education, pp. 361–364, 2013

    Google Scholar 

  36. M. Warasart and P. Kuacharoen, Paper-based document authentication using digital signatures and QR codes, presented at the International Conference on Computer Engineering and Technology, 2012

    Google Scholar 

  37. N. Woodland and B. Silver, Classifying Apparatus and Method, U.S. Patent No. 2,612,994, October 7, 1952

    Google Scholar 

  38. M. Xu, Q. Li, J. Niu, H. Su, X. Liu, W. Xu, P. Lv, B. Zhou and Y. Yang, ART-UP: A novel method for generating scanning-robust aesthetic QR codes, ACM Transactions on Multimedia Computing, Communications and Applications, vol. 17(1), article no. 25, 2021

    Google Scholar 

  39. Z. Yahya, N. Kamarzaman, N. Azizan, Z. Jusoh, R. Isa, M. Shafazand, N. Salleh and S. Mokhtaruddin, A new academic certificate authentication using leading-edge technology, Proceedings of the International Conference on E-Commerce, E-Business and E-Government, pp. 82–85, 2017

    Google Scholar 

  40. B. Zhang, K. Ren, G. **ng, X. Fu and C. Wang, SBVLC: Secure barcode-based visible light communications for smartphones, IEEE Transactions on Mobile Computing, vol. 15(2), pp. 432–446, 2016

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saheb Chhabra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Garg, P., Chhabra, S., Gupta, G., Gupta, G., Gupta, M. (2021). SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XVII. DigitalForensics 2021. IFIP Advances in Information and Communication Technology, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-030-88381-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-88381-2_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-88380-5

  • Online ISBN: 978-3-030-88381-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation