SlideShare a Scribd company logo
SBVLC: Secure Barcode-based Visible Light
Communication for Smart phones
ABSTRACT:
As an alternative to NFC technology, 2D barcodes have been increasingly used for
security-sensitive applications including payments and personal identification.
However, the security of barcode-based communication in mobile applications has
not been systematically studied. In this paper, we propose SBVLC - a secure
system for barcode-based visible light communication (VLC) between smart
phones. We formally analyze the security of SBVLC based on geometric models
and propose physical security enhancement mechanisms for barcode
communication by manipulating screen view angles and leveraging user-induced
motions. We then develop two secure data exchange schemes. These schemes are
useful in many security-sensitive mobile applications including private information
sharing, secure device pairing, and mobile payment. SBVLC is evaluated through
extensive experiments on both Android and I OS smart phones.
In our application we have implemented the idea of QR code as password
verification to overcome all the hacking issues. We have two modules as banker
and the user. In the user module there will be two categories they are shopping and
paying bill. In the shopping section user will shop the product and enter the card
and bank details and send request to the banker regarding the transaction purpose.
And in turn the banker module there are two categories they are the create OTP
and the send OTP details. The banker will check the details of the user request
regarding the purchase and all the card and balance details and prepare a password
in the form of QR code. The password will be I the form of QR code and will be
sent to the user through the mail service to the user personal mail id. In turn the
user will pay the bill by loading the QR from the mail and scanning. On scanning
the password will generate if the password matches with the banker details the
transaction will become successful. Thus password hacking, key logging and
eavesdropping issues will be overcome.
EXISTING SYSTEM:
Short-range communication technologies including near field communication
(NFC) and 2D barcodes have enabled many popular smart phone applications such
as contactless payments, mobile advertisements, and device pairing. Evolved from
the RFID technology, NFC can enable reliable low-power communication between
RF tags and readers. However, NFC requires additional hardware and has been
supported by only a few smart phone platforms on the market. Recent studies have
shown that NFC is subject to security vulnerabilities such as eavesdropping and
jamming. Moreover, most existing barcode applications are based on a single
barcode exchange, which is insufficient for establishing a secure communication
channel. Whenever a user types in her password in a bank’s sign in box, the key
logger intercepts the password. The threat of such key loggers is pervasive and can
be present both in personal computers and public kiosks; there are always cases
where it is necessary to perform financial transactions using a public computer
although the biggest concern is that a user’s password is likely to be stolen in these
computers. Even worse, key loggers, often root kitted, are hard to detect since they
will not show up in the task manager process list.
DISADVANTAGE:
 NFC requires additional hardware and has been supported by only a few
smart phone platforms on the market.
 NFC is subject to security vulnerabilities such as eavesdropping and
jamming.
 The threat of such key loggers is pervasive and can be present both in
personal computers and public kiosks.
 Even worse, key loggers, often root kitted, are hard to detect since they will
not show up in the task manager process list.
 Lack of accuracy. It is very burden to Users.
PROPOSED SYSTEM:
Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration
rate in mobile applications. This is largely due to the extremely low barrier to
adoption – almost every camera-enabled smart phone can read and process 2D
barcodes. As an alternative to NFC, 2D barcodes have been increasingly used for
security-sensitive applications including mobile payments and personal
identification. For instance, PayPal recently rolled out a barcode-based payment
service for retail customers. As one of the most anticipated new features of I Phone
5, the Passbook App stores tickets, coupons, and gift/loyalty cards using barcodes.
Proposes an iterative Increment Constrained Least Squares filter method for certain
2D matrix bar codes within a Gaussian blurring ersatz. In particular, they use the
L-shaped finder pattern of their codes to estimate the standard deviation of the
Gaussian PSF, and then restore the image by successively implementing a bi-level
constraint, our approach to solving the problem is to introduce an intermediate
device that bridges a human user and a terminal. Then, instead of the user directly
invoking the regular authentication protocol, she invokes a more sophisticated but
user-friendly protocol via the intermediate helping device. Every interaction
between the user and an intermediate helping device is visualized using a Quick
Response (QR) code. The goal is to keep user-experience the same as in legacy
authentication methods as much as possible, while preventing key logging attacks.
ADVANTAGE:
 Compared with NFC, 2D barcodes have enjoyed a significantly higher
penetration rate in mobile applications.
 As an alternative to NFC, 2D barcodes have been increasingly used for
security-sensitive applications including mobile payments and personal
identification.
 Every interaction between the user and an intermediate helping device is
visualized using a Quick Response (QR) code.
 Preventing key logging attacks.
ARCHITECHTURAL DIAGRAM:
MODULES:
The SBVLC application consists of two modules .They are:
 User.
 Banker.
USER:
The User module consists of two categories. They are
 Go for shopping.
 Pay bill.
Go for shopping:
In the go for shopping, user can choose the product and to get the
password he/she has to enter the bank and card details. And has to send
the details to the banker the banker verify all the details and prepare
password for the user and send it to him through mail.
Pay bill:
In the pay bill, the user will scan the QR code sent by the banker and
gets the password and use that password to claim his purchase, if the
details matches with the banker details, the purchase will be successful.
BANKER:
The Banker module consists of two categories. They are
 Create QR.
 Send password as QR.
Create QR:
In the create QR code category the banker will check for purchase
request from the user and verify the user details and prepare a password
in the form of QR code to him through mail service.
Send password as QR:
In this send password category, the banker will send the QR code to the
user through mail service, where the QR code can get from the gallery
which is stored in the SD card by the create password category .The
banker will send the QR code as a attachment to the user. From where
the user can download and can scan it to get the password.
ALGORITHM AND TECHNIQUES:
SYSTEM SPECIFICATION:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 14’ Colour Monitor.
 Mouse : Optical Mouse.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7 Ultimate.
 Coding Language : Java.
 Front-End : Eclipse.
 Data Base : SQLite Manger.
CONCLUSION:
As an alternative to NFC, 2D barcodes have been increasingly used for security-
sensitive applications including mobile payments and personal identification.
Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration
rate in mobile applications. As an alternative to NFC, 2D barcodes have been
increasingly used for security-sensitive applications including mobile payments
and personal identification. Every interaction between the user and an intermediate
helping device is visualized using a Quick Response (QR) code. Preventing key
logging attacks. Thus in our project password hacking, key logging and
eavesdropping issues will be overcome.

More Related Content

PPTX
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
PDF
PDF
Android HCE: An intro into the world of NFC
PPTX
Secure mobile payment
PPT
e-wallet , The future of Cards and Money
PPT
Overview of Mobile Payment Systems
PDF
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
PDF
Gresham Publication
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Android HCE: An intro into the world of NFC
Secure mobile payment
e-wallet , The future of Cards and Money
Overview of Mobile Payment Systems
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
Gresham Publication

What's hot (20)

PPT
Mobile Payment fraud & risk assessment
PDF
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
PPTX
Near Field Communication (NFC Architecture and Operating Modes)
PPTX
NFC: Shaping the Future of the Connected Customer Experience
PPTX
Near Field Communication in m-Commerce
PPT
Mobile Money Business Track: understanding the Model and Market
PDF
Mobile payment
PDF
Near field communication
PDF
Paper id 252014116
PPTX
MasterCard and Penrillian Partnership in NFC
PDF
The User Experience of Near Field Communication
DOCX
Ict project (1)
PDF
Co Je A Bude Nfc Jan Nemec Gemalto
PPTX
Mobile payments: A history of [in]security
PDF
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
PPSX
SmartWorld Portfolio
DOCX
QR Codes seminar
PDF
Pay-Cloak:Biometric
PDF
NFC Presentation [Compatibility Mode]
PDF
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Mobile Payment fraud & risk assessment
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
Near Field Communication (NFC Architecture and Operating Modes)
NFC: Shaping the Future of the Connected Customer Experience
Near Field Communication in m-Commerce
Mobile Money Business Track: understanding the Model and Market
Mobile payment
Near field communication
Paper id 252014116
MasterCard and Penrillian Partnership in NFC
The User Experience of Near Field Communication
Ict project (1)
Co Je A Bude Nfc Jan Nemec Gemalto
Mobile payments: A history of [in]security
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
SmartWorld Portfolio
QR Codes seminar
Pay-Cloak:Biometric
NFC Presentation [Compatibility Mode]
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Ad

Similar to SBVLC: Secure Barcode-based Visible Light Communication for Smart phones (20)

PDF
IRJET- Two Way Authentication for Banking Systems
PDF
IRJET - Three Layered Security for Banking
PDF
IRJET- Two Way Authentication for Banking Systems
PDF
5.[25 33]survey on 2-step security for authentication in m-banking
PDF
Security Analysis of Mobile Authentication Using QR-Codes
PDF
SECURITY ANALYSIS OF MOBILE AUTHENTICATION USING QR-CODES
PDF
E AUTHENICATION SYSTEM USING QR CODE AND OTP
PDF
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
PDF
E Authentication System with QR Code and OTP
PDF
mwallet
PDF
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
PDF
QR BASED CARD-LESS ATM TRANSACTIONS
PDF
Laboratory Access Implementing QR Code Authentication Using OTP
PDF
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
PDF
Railway Concession Automation
PDF
Sample projectdocumentation
PDF
IRJET- Secured Merchant Payment using Biometric Transaction
PDF
SMS hashing system (Real-Time) for the reliability of financial transactions
PPTX
Moneypadppt 110917211442-phpapp02
PDF
IRJET- Two Way Authentication for Banking Systems
IRJET - Three Layered Security for Banking
IRJET- Two Way Authentication for Banking Systems
5.[25 33]survey on 2-step security for authentication in m-banking
Security Analysis of Mobile Authentication Using QR-Codes
SECURITY ANALYSIS OF MOBILE AUTHENTICATION USING QR-CODES
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
E Authentication System with QR Code and OTP
mwallet
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
QR BASED CARD-LESS ATM TRANSACTIONS
Laboratory Access Implementing QR Code Authentication Using OTP
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
Railway Concession Automation
Sample projectdocumentation
IRJET- Secured Merchant Payment using Biometric Transaction
SMS hashing system (Real-Time) for the reliability of financial transactions
Moneypadppt 110917211442-phpapp02
Ad

Recently uploaded (20)

PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PPTX
Fundamentals of Mechanical Engineering.pptx
PPT
Occupational Health and Safety Management System
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
737-MAX_SRG.pdf student reference guides
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Soil Improvement Techniques Note - Rabbi
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
communication and presentation skills 01
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Visual Aids for Exploratory Data Analysis.pdf
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
Fundamentals of Mechanical Engineering.pptx
Occupational Health and Safety Management System
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
737-MAX_SRG.pdf student reference guides
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Soil Improvement Techniques Note - Rabbi
Abrasive, erosive and cavitation wear.pdf
Categorization of Factors Affecting Classification Algorithms Selection
86236642-Electric-Loco-Shed.pdf jfkduklg
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
communication and presentation skills 01
Exploratory_Data_Analysis_Fundamentals.pdf
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Visual Aids for Exploratory Data Analysis.pdf
Nature of X-rays, X- Ray Equipment, Fluoroscopy
CURRICULAM DESIGN engineering FOR CSE 2025.pptx

SBVLC: Secure Barcode-based Visible Light Communication for Smart phones

  • 1. SBVLC: Secure Barcode-based Visible Light Communication for Smart phones ABSTRACT: As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones. In our application we have implemented the idea of QR code as password verification to overcome all the hacking issues. We have two modules as banker and the user. In the user module there will be two categories they are shopping and paying bill. In the shopping section user will shop the product and enter the card and bank details and send request to the banker regarding the transaction purpose. And in turn the banker module there are two categories they are the create OTP and the send OTP details. The banker will check the details of the user request regarding the purchase and all the card and balance details and prepare a password in the form of QR code. The password will be I the form of QR code and will be sent to the user through the mail service to the user personal mail id. In turn the user will pay the bill by loading the QR from the mail and scanning. On scanning
  • 2. the password will generate if the password matches with the banker details the transaction will become successful. Thus password hacking, key logging and eavesdropping issues will be overcome. EXISTING SYSTEM: Short-range communication technologies including near field communication (NFC) and 2D barcodes have enabled many popular smart phone applications such as contactless payments, mobile advertisements, and device pairing. Evolved from the RFID technology, NFC can enable reliable low-power communication between RF tags and readers. However, NFC requires additional hardware and has been supported by only a few smart phone platforms on the market. Recent studies have shown that NFC is subject to security vulnerabilities such as eavesdropping and jamming. Moreover, most existing barcode applications are based on a single barcode exchange, which is insufficient for establishing a secure communication channel. Whenever a user types in her password in a bank’s sign in box, the key logger intercepts the password. The threat of such key loggers is pervasive and can be present both in personal computers and public kiosks; there are always cases where it is necessary to perform financial transactions using a public computer although the biggest concern is that a user’s password is likely to be stolen in these computers. Even worse, key loggers, often root kitted, are hard to detect since they will not show up in the task manager process list. DISADVANTAGE:  NFC requires additional hardware and has been supported by only a few smart phone platforms on the market.
  • 3.  NFC is subject to security vulnerabilities such as eavesdropping and jamming.  The threat of such key loggers is pervasive and can be present both in personal computers and public kiosks.  Even worse, key loggers, often root kitted, are hard to detect since they will not show up in the task manager process list.  Lack of accuracy. It is very burden to Users. PROPOSED SYSTEM: Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption – almost every camera-enabled smart phone can read and process 2D barcodes. As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification. For instance, PayPal recently rolled out a barcode-based payment service for retail customers. As one of the most anticipated new features of I Phone 5, the Passbook App stores tickets, coupons, and gift/loyalty cards using barcodes. Proposes an iterative Increment Constrained Least Squares filter method for certain 2D matrix bar codes within a Gaussian blurring ersatz. In particular, they use the L-shaped finder pattern of their codes to estimate the standard deviation of the Gaussian PSF, and then restore the image by successively implementing a bi-level constraint, our approach to solving the problem is to introduce an intermediate device that bridges a human user and a terminal. Then, instead of the user directly invoking the regular authentication protocol, she invokes a more sophisticated but user-friendly protocol via the intermediate helping device. Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code. The goal is to keep user-experience the same as in legacy authentication methods as much as possible, while preventing key logging attacks.
  • 4. ADVANTAGE:  Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications.  As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification.  Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code.  Preventing key logging attacks. ARCHITECHTURAL DIAGRAM:
  • 5. MODULES: The SBVLC application consists of two modules .They are:  User.  Banker. USER: The User module consists of two categories. They are  Go for shopping.  Pay bill. Go for shopping: In the go for shopping, user can choose the product and to get the password he/she has to enter the bank and card details. And has to send the details to the banker the banker verify all the details and prepare password for the user and send it to him through mail. Pay bill: In the pay bill, the user will scan the QR code sent by the banker and gets the password and use that password to claim his purchase, if the details matches with the banker details, the purchase will be successful. BANKER: The Banker module consists of two categories. They are  Create QR.
  • 6.  Send password as QR. Create QR: In the create QR code category the banker will check for purchase request from the user and verify the user details and prepare a password in the form of QR code to him through mail service. Send password as QR: In this send password category, the banker will send the QR code to the user through mail service, where the QR code can get from the gallery which is stored in the SD card by the create password category .The banker will send the QR code as a attachment to the user. From where the user can download and can scan it to get the password. ALGORITHM AND TECHNIQUES:
  • 7. SYSTEM SPECIFICATION: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 14’ Colour Monitor.  Mouse : Optical Mouse.  Ram : 512 Mb.
  • 8. SOFTWARE REQUIREMENTS:  Operating system : Windows 7 Ultimate.  Coding Language : Java.  Front-End : Eclipse.  Data Base : SQLite Manger. CONCLUSION: As an alternative to NFC, 2D barcodes have been increasingly used for security- sensitive applications including mobile payments and personal identification. Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications. As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification. Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code. Preventing key logging attacks. Thus in our project password hacking, key logging and eavesdropping issues will be overcome.