International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2326
2.3 Web Tracking: Mechanisms, Implications
Tomasz Bujlow [3],Defines For User Tracking Purpose
Mainly five main groups of methods have been used, that are
based on sessions, client storage, client cache, fingerprinting,
and other approaches. A special focus is placed on
mechanisms that use web caches, operational caches, and
fingerprinting, as they are usually very rich in terms of using
various creative methodologies. Identification of Users on
the web and connecting with their real names, e-mail
addresses, phone numbers, are detailed. Here shows why
tracking is being used and its possible implications for each
users. For each of the tracking methods, possible defenses
are also mentioned. Finally, Detailing about the user tracking
future trends and show that they can potentially Control
significant threats to the users' privacy. The user is
familiarized with different tracking mechanisms while
browsing the web on a regular basis. He or she knows how to
properly use simple means of protection as private browsing
mode or Ad Block like browser addons will decreases
privacy threats.
2.4 Proxy Re-Encryption
K.Lakshmi [4] Proposed In barcodes, machine readable
Information’s are encoded ,a human can’t differentiate
whether it’s a valid or a maliciously manipulated code.
While humans might Undergo for phishing attacks,
automated readers likely vulnerable to SQL injections and
command injections. In this approach both encoding rate
and interference level will be optimized with two robust
error correction methods. Existing systems uses techniques
like Steganography, DCT, DFT and Secret (N, N)-Threshold
QR Code Sharing Approach. But in proposed system
convolution coder is has been used for encoding the QR
Code at the transmitted side and decode the same at the
receiver side.
2.5 Strength of QR Code
Lokesh S.[4],Proposed a new system for image based
authentication, where the image is represented as
identification of authenticated user. Storing unique id or
password into image which helps to restrict unauthorized
user access. This proposed algorithm is help to remove the
weakness of password authentication and bypass the risk
generated from password authentication. Here algorithm
takes input string as user name and it is directed to binary
search algorithm for availability or unique user name. User
enter password as tier1 identification. Using DES encryption
technique Encrypting the password string and there by
passing to Selective algorithm for generating QR code image.
By applying Reed Solomon code or error correcting
technique data can be recovered even if part of the printed
symbol has been destroyed and Decoding process also
explained in detail and security issue with QR code image
has been examined.
2.6 A Desktop Application of QR Code
Partiksha Mittra [6],Proposed technique Contains two
modules QR code generator and QR code reader. the user
will be able to generate a QR code using text and image. QR
code base on text and the other one is QR code based image
,by entering the Image Location.User can encrypt the QR
code by setting Password. Once the password is entered, the
encrypted QR code will be generated accordingly. Once a QR
code is generated, it will be displayed on the screen as well
as saved as an image file at a specific destination
folder/directory within the hard drive of the user PC. After
the QR code is generated, the user will be able to scan it
through the “Scan” option present in our field that will
become visible below the generated QR code.
2.7 QR Code Steganography
Pei-Yu Lin [7],Proposed In this article, explored the
characteristic of QR barcode and design a QR barcode
steganography mechanism. The private information can be
embedded into a cover QR tag with high secret payload. In
case of a normal scanner, from the marked QR code a
browser reveal the cover QR content. Only the authorized
user/scanner can reveal the private secret information from
the marked QR tag. Based on the Result, the new algorithm
can convey a better secret payload in to a QR tag. This is
efficient and feasible for private QR applications. To protect
the confidential secret of QR tag and barcode reader directly
decoded it.
2.8 Signing In Using Quick Response Codes
Kalpesh Adhatrao [8],Proposed the emerging threats to user
privacy over the internet are increasing at an alarming rate.
Signing in from an unreliable terminal into a web account
may result in compromising private details of a user such as
username and password, by means of keylogger software. A
login method is used for signing in Using Quick Response
(QR) codes via mobile authentication. Through this method,
the user can securely sign-in into a web account by
authenticating the user session on an terminal browser, with
a mobile device. Also proposed a new login system, which
strengthens the virtual privacy of a each user. The objective
is to provide a reliable login technique for the user,
operating based on an unreliable terminal, such as one in a
cyber cafe.
By shoulder surfing, an attacker can retrieve only the
characters that are entered via keyboard and the
authentication system takes an asymmetric key technique,
even if an unauthorized person gets access to the QR code
and scans it to grant access to the mobile website and the
public key, but the private key will be still safe at the user
session on the terminal web browser operated by the user
himself. Thus users of this system are safe from shoulder
surfing attacks. As one can notice, this system is also secure
from screen-capturing, mouse and eye tracking software.