CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Securing Barcodes Using Compressed Secret Sharing Scheme

by Kiran R. Chaudhari, Sonali Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 8
Year of Publication: 2016
Authors: Kiran R. Chaudhari, Sonali Patil
10.5120/ijca2016907902

Kiran R. Chaudhari, Sonali Patil . Securing Barcodes Using Compressed Secret Sharing Scheme. International Journal of Computer Applications. 134, 8 ( January 2016), 19-21. DOI=10.5120/ijca2016907902

@article{ 10.5120/ijca2016907902,
author = { Kiran R. Chaudhari, Sonali Patil },
title = { Securing Barcodes Using Compressed Secret Sharing Scheme },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 8 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 19-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number8/23934-2016907902/ },
doi = { 10.5120/ijca2016907902 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:33:37.508141+05:30
%A Kiran R. Chaudhari
%A Sonali Patil
%T Securing Barcodes Using Compressed Secret Sharing Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 8
%P 19-21
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Bar code provides convenient way for people labeling a tag on a product so that people can easily and quickly identify the content of product itself. Large information of any product can be store in the form of bar codes which reduces the size of data. When this bar code contains important data or privacy information, the risk of security becomes an important problem. This paper proposes a secret sharing mechanism to enhance the security and data privacy for bar codes. The proposed technique uses Thein and Lin’s image secret sharing to improves barcode image security during transmission. It also provides compressed shares of the barcode which reduces overhead of bandwidth in the network.

References
  1. Adi Shamir, “How to share a secret", Communication of the ACM, Volume 22, No. 11, PP. 612- 613, Nov 1979.
  2. G. R. Blakey, “Safeguarding Cryptographic Keys”, Proceedings of National Computer Conference, American Federation of Information, 1979.
  3. Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko, “A Novel Secret Sharing Technique Using QR Code,” International Journal of Image Processing (IJIP), Volume (4): Issue (5), pp.468-475.
  4. M. Karthikeyan and Andreas Bender, “Encoding and Decoding Graphical Chemical Structures as Two-Dimensional (PDF417)Barcodes,” J. Chem. Inf. Model. 2005, 45,pp- 572-580
  5. T. Chen, “The application of bar code forgery - proof technology in the product sales management”. In Proceedings of the Intelligent Information Technology Application Workshops, Washington, DC, USA, 2008.
  6. Y. L. Yeh, J. C. You, and G. J. Jong, “The 2D bar-code technology applications in medical information management”. In Proceedings of the Intelligent Systems Design and Applications, Kaohsiung, Taiwan, 2008.
  7. A Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, and Toshiaki Tanaka “New (k, n)-Threshold Secret Sharing Scheme and Its Extension”
Index Terms

Computer Science
Information Sciences

Keywords

Barcodes Secret Sharing Information Security Network Security.