Dynamic QR Codes: A Solution for Secure Mobile Payments
Downloads
Black and white barcodes have been employed recently to encode additional data inside of a designated area. A barcode is composed of gaps and bars that are ordered according to preset rules. However, as the demand for additional data storage increases, a new technology known as QR codes has been developed. However, security remains a major worry, so this is by no means the end. Mobile payment is necessary for mobile business. An easy-to-use mobile payment solution is needed to allow mobile users to execute transactions using their mobile devices in a reliable and safe manner. The purpose of this study is to give us dynamic QR code refreshes during financial payment. The paper's primary goal is to create and comprehend QR code technology in the context of today's global security environment.
Downloads
ISO/IEC 18004: ISO Standard on QR Code 2005 Bar Code Symbology Specification.
Katharina Krombholz, Peter Fruhwirt, “QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes,” 2015 10th International Conference on Availability, Reliability and Security.
Chahil Choudhary, Inam Ul Haq Utilizing, Adil Husain Rather, Dynamic QR Codes to Enhance Secure Payment Transactions: An Approach to Secure Computer based Transactions, 2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI).
Y. Cheng, Z. Fu and B. Yu, ”Improved Visual Secret Sharing Scheme for QR Code Applications,” in IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, pp. 2393-2403, Sept. 2018.
S. Chandrasekaran, V. Dutt, N. Vyas and A. Anand, "Fuzzy KNN Implementation for Early Parkinson's Disease Prediction," 2023 7th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2023, pp. 896-901, doi: 10.1109/ICCMC56507.2023.10083522.
R. Bajaj, C. Chaudhary, H. Bhardwaj, L. Pawar, H. Gupta and D. Sharma, "A Robust Machine Learning Model for Prediction: The Electroencephalography," 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 2022, pp. 1270-1274, doi: 10.1109/SMART55829.2022.10047098
A. Trivedi, E. K. Kaur, C. Choudhary, Kunal, and P. Barnwal, "Should AI Technologies Replace the Human Jobs?" 2023 2nd International Conference for Innovation in Technology (INOCON), Bangalore, India, 2023, pp. 1-6, doi: 10.1109/INOCON57975.2023.10101202
V. S. Bhamidipati and R. S. Wvs, “A novel approach to ensure security and privacy while using qr code scanning in business applications,” in 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2022, pp. 198– 203.
K. Saranya, R. Reminaa, and S. Subhitsha, “Modern applications of qr-code for security,” in 2016 IEEE International Conference on Engineering and Technology (ICETECH). IEEE, 2016, pp. 173– 177.
H. A. M. Wahsheh, “Secure and usable QR codes,” 2019.
K. Krombholz, P. Fruhwirt, P. Kieseberg, I. Kapsalis, M. Huber, and ¨ E. Weippl, “Qr code security: A survey of attacks and challenges for usable security,” in Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22- 27, 2014. Proceedings 2. Springer, 2014, pp. 79–90.
A. Dabrowski, K. Krombholz, J. Ullrich, and E. R. Weippl, “Qr inception: Barcode-in-barcode attacks,” in Proceedings of the 4th ACM workshop on security and privacy in smartphones & mobile devices, 2014, pp. 3–10.
Ohbuchi, E., Hanaizumi., H., Hock, L.A, “Barcode Readers using the Camera Device in Mobile Phones”, in Proc. of 2004 International Conference on Cyberworlds, pp. 260-265, 2004.
Subernarekha Ghoshal, Shalini chaturvedi, Akshay Taywade and N. Jaysankar,“Android Application for secure Mobile base payment systems” Indian Journal of Science and Technology, Vol 8(S2), 171–178, January 2015.
Purnomo, A. T., Gondokaryono, Y. S., & Kim, C.-S. (2016). Mutual authentication in securing mobile payment system using encrypted QR code based on Public Key Infrastructure. 2016 6th International Conference on System Engineering and Technology.
J. Steeman. QR code data capacity, 2004. available online: http://blog.qr4.nl/page/QR-Code-Data-Capacity.aspx. last accessed on 02/07/2014.
Shao, Y.H., Wang, Y., Yang, Y. and Wang, X. (2022) Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm. Journal of Computer and Communications, 10, 42- 56.
J.-C. Chuang, Y.-C. Hu and H.-J. Ko, "A novel secret sharing technique using QR code", Int. J. Image Process., vol. 4, no. 5, pp. 468-475, 2010.
Meruga, J. M., Fountain, C., Kellar, J., Crawford, G., Baride, A., May, P. S., … Hoover, R. (2015). Multi-layered covert QR codes for increased capacity and security. International Journal of Computers and Applications, 37(1), 17–27. doi:10.1080/1206212x.2015.1061254
Zou Jian, Wu Wenling, Wu Shuang, Su Bozhan, Dong Le.Preimage Attacks on Step-Reduced SM3 Hash Function. LNCS, vol.7259: pp. 375-390, 2011.
Limin Guo, Lihui Wang, Qing Li. Differential power analysis of dynamic password token based on SM3 algorithm, and conutermeasures. 11th International Conference on Computational Intelligence and Security, Shenzhen, pp. 354-357, 2015.