This paper provides a novel method to improve the data storage of a quick response code (QR code) by applying encrypted lossless compression technology. QR codes are used in several domains, particularly when there is a need to transfer various types of text information. A key aspect of this work is to thus propose a new methodology to overcome the weaknesses of the limited size of the traditional QR code, which has long been an important issue in a wide range of areas. The proposed algorithm incorporates a clear and simple plan for overcoming this difficulty by inserting confidential information into a QR code message. The QR code is updated through the addition of levels that help to share secure messages of various sizes and to authenticate documents for verification and validation. In this work, the newly proposed QR code does not reconstruct the configuration or structure of the QR code. Rather, it provides better security because it relies on the features of the Huffman compression algorithm to reduce the size of the input data and the principles of encryption through the XOR function, which is done through a variable encryption key. The experimental results show the superiority of our method over the previous methods. The scope of this endeavour is thus wide, and there is potential for the encoding of different types of data with a high compression rate in the near future. INDEX TERMS 1D barcode, quick response code (QR code), Huffman coding, security.
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage. Most users are familiar with validating electronic documents based on a Hash function, such as the MD5 algorithm and other hash functions, to demonstrate the data integrity. There are many weaknesses of the current MD5 algorithm, mainly its failures and weaknesses against varying types of attacks, such as brute force attacks, rainbow table attacks, and Christmas attacks. Therefore, the method proposed in this paper enhances the MD5 algorithm by adding a dynamic variable length and a high efficiency that simulates the highest security available. Whereas the logistic system was used to encode ribonucleic acid (RNA) by generating a random matrix based on a new key that was created using the initial permutation (IP) tables used in the data encryption stander (DES) with the linear-feedback shift register (LFSR), this work proposes several structures to improve the MD5 hash function. The experimental results demonstrate its high resistance to hackers while maintaining a suitable duration. This paper discusses the design of a confident hash algorithm. This algorithm has characteristics that enable it to succeed in the field of digital authentication and data integrity.
The Vehicular Cloud Environment (VCE) is a brand-new study field in cloud and vehicular network.It gives cars networking and sensor capabilities for V2I or V2V communication with roadside infrastructure. Cloud applications are frequently used in traffic control and road safety. A hybrid technical solution that utilises vehicle resources, cloud infrastructure, and Internet of Things (IoT) settings is needed for effective vehicular communication networking. VCE is a smart vehicular communication architecture that promotes system security, enhanced vehicle control, and self-driving cars. Due to the integration of unknown vehicles and infrastructure via the public network, security and privacy seem to be significant challenges with VCE. In this regard, we propose a PSEBVC, which is a provably secure elliptic curve cryptography (ECC) and biometric based authentication system for VCE employing smartphones. In the face of active and passive adversaries, the offered framework obtains the majority of security features and properties for secure communication. We also propose and prove a formal security model based on the random oracle concept. We also demonstrate the security analysis using the Scyther tool. In the same scenario, we evaluate the performance of our protocol against that of other frameworks. The proposed system, according to our findings, is both secure and efficient in terms of communication and processing overhead. The proposed architecture, according to our findings, provides all needed security criteria while also permitting effective communication.
In this work, a new device is designed for measuring the light intensity of the Bioluminescence reaction between Luminol with Hydrogen peroxide that is produced as an activity of Triglycerides Phosphate Oxidase. The project includes the use of a homemade and semi-automated device for the determination of Chemiluminescence (CL) and Bioluminescence light by direct reaction analysis of Luminol with oxidant and using a Mobile –phone as a recorder which is employed in chemistry with Arduino and applied this device into the enzymatic reaction for determine Triglyceride by this new methods. The method is easy, simple, and rapid with high sensitivity for the determination of hydrogen peroxide. The light of the Bioluminescence reaction of Luminol (5-amino-2,3-dihydro-1,4_phthalazinedione) with oxidant (H2O2) was sensed by photocell and the signal was sent to Mobile. The method used to determine glycerol and compare the results of the device with real value to give high accuracy, Triglyceride was determined in its kit. It gave 99.2 and ±0.1 of Recovery and RSD, respectively.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.