Skip to main content


Journal Issues

Plan and Implementation of a Secure QR Payment System Based on Visual Cryptography
K. Ganesh
Pages: 9-14 | First Published: 05 Apr 2021
Full text | Abstract | Purchase | References | Request permissions

Abstract
In this paper, we are able to depict the plan and execution of a secure installment framework in mild of QR codes. These QR codes were widely applied currently in view that they boost up the installment cycle and provide customers with excessive comfort. Nonetheless, as effective as they could sound, QR-primarily based totally net-primarily based totally installment frameworks are defenseless towards diverse types of assaults. Thusly, alternate managing must be accurately stable to shield the trustworthiness and secrecy of every and each installment cycle. Additionally, the net-primarily based totally installment framework must supply validness to each the shipper and collector of each alternate. In this paper, the safety of the proposed QR-primarily based totally device is given the use of visible cryptography. The proposed device consists of a bendy software and a component entryway server that does visible cryptography. The software offers an critical and simple factor of interplay for customers to complete component trades in honest stable environment.
Keywords: On-Line Installment Frameworks, QR Codes, Visible Cryptography.

References
1. T. Ma, H. Zhang, J. Qian, X. Hu and Y. Tian, "The Design and Implementation of an Innovative Mobile Payment System Based on QR Bar Code," 2015 International Conference on Network and Information Systems for Computers, Wuhan, 2015, pp. 435-440.
2. L. BURRA P. TUMULURU, S. GONABOINA “Secure QR-Pay System with Ciphering Techniques in Mobile Devices”, International Journal of Electronics and Computer Science Engineering, P.V.P.Siddhardha Institute of Technology, Kanuri, Vijayawada, Krishna, 2012 .
3. Jian Feng Lu, Zeroing Yang, Lina Li, Wenjing Yuan, Li Li, and Chin Chen Chang, “Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography,” Mobile Information Systems, vol. 2017, Article ID 4356038, 12 pages, 2017.
4. Yang, Ching-Nong & Liao, Jung-Kou & Wu, Fu-Heng & Yamaguchi, Yasushi. (2016). “Developing Visual Cryptography for Authentication on Smartphones”. 189-200. 10.1007/978-3-319-44350-8_19.
5. Sangeeta Singh. May 2016. “QR Code Analysis” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 5, ISSN: 2277 128
6. Espejo-Trujillo, I. Castillo-Camacho, M. Nakano-Miya take, and H. Perez-Meana, “Identity document authentication based on VSS and QR codes,” Procedia Technology, vol. 3, pp. 241–250, 2012.
7. S. Agrawal, "Impact of Error Filters on Shares in Halftone Visual Cryptography," International Conference on Computer Science, Engineering and Applications , 2012, pp.139-148
8. L. P. Feng , et al. "A halftone visual cryptography schema using ordered dither," vol.9159, 2014, pp.4177-4180
9. Y.C. Hou,Z.Y. Quan,C.F. Tsai,D.S. Wang, “(3,n)-Visual Secret Sharing Scheme with Unexpanded Shares”. Chinese Journal Of Computers, vol.39, Mar 2016
10. Z. Zhou, G. R. Arce, and G. D. Crescenzo. "Halftone visual cryptography." Image Processing, 2003 International Conference on IEEE, I-521-4 .vol.1, 2003