dc.description.abstract |
Securing and hiding personal confidential information has become a challenge in these modern days. Due to the lack of security and confidentiality, there are chances that forgery of the confidential information or unauthorized access of a system can cause a big margin loss to a person or a system. At present, confidentiality is maintained in old ways and for that reason, there are possibilities that the confidential information might get forged or hacked.
Personal confidential information can be securely shared with the expected person and the person can verify the information by checking its authenticity. Similarly, confidential information can also be kept securely hidden and used to meet a specific purpose like getting access privilege of a secured system and the system can validate the confidential information by checking whether the person is authorized or the information is valid.
QR codes are being used increasingly to share data for different purposes. In information communication, QR code is important because of its high data capacity. However, most existing QR code systems use insecure data format and encryption is rarely used. A user can use secure QR code technology to keep information secured and hidden.
In this project, we proposed a novel secure QR code system which will allow sharing authentic personal confidential information by means of QR code verification using RSA digital signature algorithm and also allow authorizing the confidential information by means of QR code validation using RSA public key cryptographic algorithm. In this way, the secure QR code system is intended to protect the confidential information encrypted in the QR code from being tampered.
Waterfall software development process was adopted as the methodology for developing the system. Here, we analyzed the proposed system requirements, designed the system prototype and then implemented the functionalities. Finally, the system was tested and achieved the expected results as to hiding personal confidential information in terms of verification and validation and thus, the system brought such security features to the areas where personal confidential information security is a major issue. |
en_US |