2018
DOI: 10.11591/ijeei.v6i4.494
|View full text |Cite
|
Sign up to set email alerts
|

QR Code Integrity Verification Based on Modified SHA-1 Algorithm

Abstract: The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology. This paper identified the requirements needed in the certificate verification that uses the modified SHA-1. The application was tested using legitimate and fraudulent certificates. Based on the results, the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. During the trial run of the application, four test cases were seen whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…The modified SHA-1 method was used in the work by [31] to check the data integrity of certificates utilizing QR code technology. During the process, the hardware and software requirements for certificate verification using the updated SHA-1 were identified.…”
Section: ) Local Studiesmentioning
confidence: 99%
“…The modified SHA-1 method was used in the work by [31] to check the data integrity of certificates utilizing QR code technology. During the process, the hardware and software requirements for certificate verification using the updated SHA-1 were identified.…”
Section: ) Local Studiesmentioning
confidence: 99%
“…Blockchain was successfully integrated with QR in one more study but failed to add additional security on transit [17]. Previous research applied QR code technology in verifying the authenticity of documents using a web application that doesn't require additional installation on the part of the user [18] but failed to consider data security by transmitting data in plaintext and thus is prone to hacking. To address this data security weakness, other studies make use of encryption schemes for security [19]- [21] against hacking.…”
mentioning
confidence: 99%