This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Testing Data Security Using a Vigenere Cipher Based on the QR Code
Corresponding Author(s) : Eko Hari Rachmawanto
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol. 8, No. 4, November 2023
Abstract
Data, especially personal data, is sensitive and if misused, it can become a source of threats and crimes for ourselves or for others. Therefore, data security is very important. Cryptography is a way to secure data that aims to safeguard the information that contained in data, so the information contained is not known by unauthorized parties. Vigenere Cipher is a cryptographic method used to hide data with steganography. In the process, the Vigenere cipher converts information called plain text into ciphertext or text that has been steganographed. In this research, process of encryption was carried out on the text based on the given key. The results of the text encryption were stored in the form of a QR-Code which can later be decrypted from the QR-Code using the key, so that the text contained in the QR-Code can be identified.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- Sun, P. J. (2019). Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions. IEEE Access, 7, 147420–147452. https://doi.org/10.1109/ACCESS.2019.2946185
- Mondal, S.K., Mukhopadhyay, I., Dutta, S. (2020). Review and Comparison of Face Detection Techniques. In: Chakraborty, M., Chakrabarti, S., Balas, V. (eds) Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, vol 1065. Springer, Singapore. https://doi.org/10.1007/978-981-15-0361-0_1
- Hidayat, T., & Mahardiko, R. (2020). A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing. International Journal of Artificial Intelligence Research, 4(1). https://doi.org/10.29099/ijair.v4i1.154
- Adil Yazdeen, A. ., Zeebaree , S. R. M. ., Mohammed Sadeeq, M., Kak, S. F. ., Ahmed, O. M. ., & Zebari, R. R. (2021). FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review. Qubahan Academic Journal, 1(2), 8–16. https://doi.org/10.48161/qaj.v1n2a38
- Machin, J., Batista, E., Martínez-Ballesté, A., & Solanas, A. (2021). Privacy and security in cognitive cities: A systematic review. In Applied Sciences (Switzerland) (Vol. 11, Issue 10). MDPI AG. https://doi.org/10.3390/app11104471
- Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H., & Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55–69. https://doi.org/10.1016/j.tele.2019.03.003
- A. R. Sai, J. Buckley and A. Le Gear, "Privacy and Security Analysis of Cryptocurrency Mobile Applications," 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, FL, USA, 2019, pp. 1-6, doi: 10.1109/MOBISECSERV.2019.8686583.
- Dave, R., R Sowells Boone, E., & Roy, K. (2019). Efficient Data Privacy and Security in Autonomous Cars. Journal of Computer Sciences and Applications, 7(1), 31–36. https://doi.org/10.12691/jcsa-7-1-5
- Malik, S., Khattak, H. A., Ameer, Z., Shoaib, U., Rauf, H. T., & Song, H. (2021). Proactive Scheduling and Resource Management for Connected Autonomous Vehicles: A Data Science Perspective. IEEE Sensors Journal, 21(22), 25151–25160. https://doi.org/10.1109/JSEN.2021.3074785
- Keshta, I., & Odeh, A. (2021). Security and privacy of electronic health records: Concerns and challenges. In Egyptian Informatics Journal (Vol. 22, Issue 2, pp. 177–183). Elsevier B.V. https://doi.org/10.1016/j.eij.2020.07.003
- Alqadi, Z., Abu-Faraj, M., & Alqadi, Z. A. (2021). Improving the Efficiency and Scalability of Standard Methods for Data Cryptography Improving the Efficiency and Scalability of Standard Methods for Data Cryptography Mua’ad. IJCSNS International Journal of Computer Science and Network Security, 21(12). https://doi.org/10.22937/IJCSNS.2021.21.12.61
- Navid Bin Anwar, M., Hasan, M., Hasan, M., Loren, J. Z., & Tanjim Hossain, S. M. (2019). Comparative Study of Cryptography Algorithms and Its’ Applications. In International Journal of Computer Networks and Communications Security (Vol. 7, Issue 5). www.ijcncs.org
- Benssalah, M., Rhaskali, Y., & Drouiche, K. (2021). An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimedia Tools and Applications, 80(2), 2081–2107. https://doi.org/10.1007/s11042-020-09775-9
- Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2020). Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73–80. https://doi.org/10.1109/TSMC.2019.2903785
- Wahab, O. F. A., Khalaf, A. A. M., Hussein, A. I., & Hamed, H. F. A. (2021). Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access, 9, 31805–31815. https://doi.org/10.1109/ACCESS.2021.3060317
- Hureib, E., Gutub, A., bin Hureib, E. S., & Gutub, A. A. (2020). Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography Steganography and Secret sharing View project Cryptography and Steganography View project Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography. In IJCSNS International Journal of Computer Science and Network Security (Vol. 20, Issue 8). https://www.researchgate.net/publication/344311992
- Alyousuf, F. Q., Qasim, F., Al-Yousuf, A., & Din, R. (2020). Review on secured data capabilities of cryptography, steganography, and watermarking domain Topic identification using filtering and rule generation algorithm for textual document View project The modeling of E-Supervised (E-SUV) for distance learning centre View project Review on secured data capabilities of cryptography, steganography, and watermarking domain. Indonesian Journal of Electrical Engineering and Computer Science, 17(2), 1053–1059. https://doi.org/10.11591/ijeecs.v17.i2.pp1053-1059
- Alqad, Z., Majid Oraiqat, ;, Almujafet, ; Hisham, Al-Saleh, S., Hind, ;, Husban, A., & Al-Rimawi, S. (2019). International Journal of Computer Science and Mobile Computing A New Approach for Data Cryptography. In International Journal of Computer Science and Mobile Computing (Vol. 8, Issue 9). www.ijcsmc.com
- Qowi, Z., & Hudallah, N. (2021). Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm. Journal of Physics: Conference Series, 1918(4). https://doi.org/10.1088/1742-6596/1918/4/042009
- Abu-Faraj, M. M., Aldebei, K., & Alqadi, Z. A. (2022). Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography. Traitement Du Signal, 39(1), 173–178. https://doi.org/10.18280/ts.390117
- Nahar, K., & Chakraborty, P. (2020). A Modified Version of Vigenere Cipher using 95 95 Table. International Journal of Engineering and Advanced Technology, 9(5), 1144–1148. https://doi.org/10.35940/ijeat.E9941.069520
- Qowi, Z., & Hudallah, N. (2021). Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm. Journal of Physics: Conference Series, 1918(4). https://doi.org/10.1088/1742-6596/1918/4/042009
- Voleti, L., Balajee, R. M., Vallepu, S. K., Bayoju, K., & Srinivas, D. (2021). A Secure Image Steganography Using Improved Lsb Technique and Vigenere Cipher Algorithm. Proceedings - International Conference on Artificial Intelligence and Smart Systems, ICAIS 2021, 1005–1010. https://doi.org/10.1109/ICAIS50930.2021.9395794
- Hameed, T. H., & Sadeeq, H. T. (2022). Modified Vigenère cipher algorithm based on new key generation method. Indonesian Journal of Electrical Engineering and Computer Science, 28(2), 954–961. https://doi.org/10.11591/ijeecs.v28.i2.pp954-961
- Sermeno, J. P., Secugal, K. A. S., & Mistio, N. E. (2021). Modified Vigenere cryptosystem: An integrated data encryption module for learning management system. International Journal of Applied Science and Engineering, 18(4(Special Issue)), 1–10. https://doi.org/10.6703/IJASE.202106_18(4).003
- Banday, S.A., Pandit, M.K., Khan, A.R. (2021). Securing Medical Images via a Texture and Chaotic Key Framework. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds) Multimedia Security. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-8711-5_1
- Politeknik Ganesha Medan, R. (2020). Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security. International Journal of Information System & Technology Akreditasi, 4(1), 471–481. https://doi.org/10.30645/ijistech.v4i1.85
- Kumar Mittal, V., Mukhija, M., & Tech, M. (2019). Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique the Creative Commons Attribution License (CC BY 4.0). International Journal of Trend in Scientific Research and Development (IJTSRD) International Journal of Trend in Scientific Research and Development, 5, 1936–1939. https://doi.org/10.31142/ijtsrd27878
- Khasanah, Nguyen, P. T., Gunawan, G., & Rahim, R. (2020). Three-pass protocol scheme on vigenere cipher to avoid key Distribution. Journal of Critical Reviews, 7(1), 68–71. https://doi.org/10.22159/jcr.07.01.13
- Jaithunbi, A. K., Sabena, S., & Sairamesh, L. (2023). Preservation of Data Integrity in Public Cloud Using Enhanced Vigenere Cipher Based Obfuscation. Wireless Personal Communications, 129(1), 271–284. https://doi.org/10.1007/s11277-022-10097-2
- Tan, C. M. S., Arada, G. P., Abad, A. C., & Magsino, E. R. (2021). A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher. Journal of Physics: Conference Series, 1997(1). https://doi.org/10.1088/1742-6596/1997/1/012021
- Rizal, A., Utomo, D. S. B., Rihartanto, R., Hiswati, M. E., & Haviluddin, H. (2019). Modified key using multi-cycle key in vigenere cipher. International Journal of Recent Technology and Engineering, 8(2 Special Issue 11), 2600–2606. https://doi.org/10.35940/ijrte.B1313.0982S1119
- S. Vatshayan, R. A. Haidri and J. Kumar Verma, "Design of Hybrid Cryptography System based on Vigenère Cipher and Polybius Cipher," 2020 International Conference on Computational Performance Evaluation (ComPE), Shillong, India, 2020, pp. 848-852, doi: 10.1109/ComPE49325.2020.9199997.
- Uniyal, N., Dobhal, G., Rawat, A., & Sikander, A. (2021). A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication. Wireless Personal Communications, 119(2), 1577–1587. https://doi.org/10.1007/s11277-021-08295-5
- Ahamed, B. B., & Krishnamoorthy, M. (2022). SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm. Journal of the Operations Research Society of China, 10(4), 835–848. https://doi.org/10.1007/s40305-020-00320-x
- A. Nuhi, A. Memeti, F. Imeri and B. Cico, "Smart Attendance System using QR Code," 2020 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 2020, pp. 1-4, doi: 10.1109/MECO49872.2020.9134225.
- Tiantian Wang , Fei Jia, The impact of health QR code system on older people in China during the COVID-19 outbreak, Age and Ageing, Volume 50, Issue 1, January 2021, Pages 55–56, https://doi.org/10.1093/ageing/afaa222
- A. G. Khan, A. H. Zahid, M. Hussain and U. Riaz, "Security Of Cryptocurrency Using Hardware Wallet And QR Code," 2019 International Conference on Innovative Computing (ICIC), Lahore, Pakistan, 2019, pp. 1-10, doi: 10.1109/ICIC48496.2019.8966739.
- Dey, S., Saha, S., Singh, A. K., & McDonald-Maier, K. (2021). FoodSQRBlock: Digitizing food production and the supply chain with blockchain and QR code in the cloud. Sustainability (Switzerland), 13(6). https://doi.org/10.3390/su13063486
- Mohammed Ali, A., & Farhan, A. K. (2020). Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document. IEEE Access, 8, 27448–27458. https://doi.org/10.1109/ACCESS.2020.2971779
- Putra, I. P., Witriyono, H. ., Rifqo, M. H. ., & Muntahanah, M. (2022). Utilization of Base64 Encryption Repetition for QR Code Presence on Online Attendance. Jurnal Komputer, Informasi Dan Teknologi (JKOMITEK), 2(2), 519–528. https://doi.org/10.53697/jkomitek.v2i2.942
- Ichsan, M., & Hutrianto, H. (2022). Implementasi Algoritma Vignere Chiper Berbasis QRCode Untuk Absensi Pegawai PT. Delameta Bilano Cabang Ruas Tol Palembang - Inderalaya. Journal of Software Engineering Ampera, 3(3), 170–185. https://doi.org/10.51519/journalsea.v3i3.267
- Hameed, T. H., & Sadeeq, H. T. (2022). Modified Vigenère cipher algorithm based on new key generation method. Indonesian Journal of Electrical Engineering and Computer Science, 28(2), 954–961. https://doi.org/10.11591/ijeecs.v28.i2.pp954-961
- Pujeri, Dr. U., & Pujeri, Dr. R. (2020). Symmetric Encryption Algorithm using ASCII Values. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 2355–2359. https://doi.org/10.35940/ijrte.E5980.018520
References
Sun, P. J. (2019). Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions. IEEE Access, 7, 147420–147452. https://doi.org/10.1109/ACCESS.2019.2946185
Mondal, S.K., Mukhopadhyay, I., Dutta, S. (2020). Review and Comparison of Face Detection Techniques. In: Chakraborty, M., Chakrabarti, S., Balas, V. (eds) Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, vol 1065. Springer, Singapore. https://doi.org/10.1007/978-981-15-0361-0_1
Hidayat, T., & Mahardiko, R. (2020). A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing. International Journal of Artificial Intelligence Research, 4(1). https://doi.org/10.29099/ijair.v4i1.154
Adil Yazdeen, A. ., Zeebaree , S. R. M. ., Mohammed Sadeeq, M., Kak, S. F. ., Ahmed, O. M. ., & Zebari, R. R. (2021). FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review. Qubahan Academic Journal, 1(2), 8–16. https://doi.org/10.48161/qaj.v1n2a38
Machin, J., Batista, E., Martínez-Ballesté, A., & Solanas, A. (2021). Privacy and security in cognitive cities: A systematic review. In Applied Sciences (Switzerland) (Vol. 11, Issue 10). MDPI AG. https://doi.org/10.3390/app11104471
Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H., & Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55–69. https://doi.org/10.1016/j.tele.2019.03.003
A. R. Sai, J. Buckley and A. Le Gear, "Privacy and Security Analysis of Cryptocurrency Mobile Applications," 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, FL, USA, 2019, pp. 1-6, doi: 10.1109/MOBISECSERV.2019.8686583.
Dave, R., R Sowells Boone, E., & Roy, K. (2019). Efficient Data Privacy and Security in Autonomous Cars. Journal of Computer Sciences and Applications, 7(1), 31–36. https://doi.org/10.12691/jcsa-7-1-5
Malik, S., Khattak, H. A., Ameer, Z., Shoaib, U., Rauf, H. T., & Song, H. (2021). Proactive Scheduling and Resource Management for Connected Autonomous Vehicles: A Data Science Perspective. IEEE Sensors Journal, 21(22), 25151–25160. https://doi.org/10.1109/JSEN.2021.3074785
Keshta, I., & Odeh, A. (2021). Security and privacy of electronic health records: Concerns and challenges. In Egyptian Informatics Journal (Vol. 22, Issue 2, pp. 177–183). Elsevier B.V. https://doi.org/10.1016/j.eij.2020.07.003
Alqadi, Z., Abu-Faraj, M., & Alqadi, Z. A. (2021). Improving the Efficiency and Scalability of Standard Methods for Data Cryptography Improving the Efficiency and Scalability of Standard Methods for Data Cryptography Mua’ad. IJCSNS International Journal of Computer Science and Network Security, 21(12). https://doi.org/10.22937/IJCSNS.2021.21.12.61
Navid Bin Anwar, M., Hasan, M., Hasan, M., Loren, J. Z., & Tanjim Hossain, S. M. (2019). Comparative Study of Cryptography Algorithms and Its’ Applications. In International Journal of Computer Networks and Communications Security (Vol. 7, Issue 5). www.ijcncs.org
Benssalah, M., Rhaskali, Y., & Drouiche, K. (2021). An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimedia Tools and Applications, 80(2), 2081–2107. https://doi.org/10.1007/s11042-020-09775-9
Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2020). Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73–80. https://doi.org/10.1109/TSMC.2019.2903785
Wahab, O. F. A., Khalaf, A. A. M., Hussein, A. I., & Hamed, H. F. A. (2021). Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access, 9, 31805–31815. https://doi.org/10.1109/ACCESS.2021.3060317
Hureib, E., Gutub, A., bin Hureib, E. S., & Gutub, A. A. (2020). Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography Steganography and Secret sharing View project Cryptography and Steganography View project Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography. In IJCSNS International Journal of Computer Science and Network Security (Vol. 20, Issue 8). https://www.researchgate.net/publication/344311992
Alyousuf, F. Q., Qasim, F., Al-Yousuf, A., & Din, R. (2020). Review on secured data capabilities of cryptography, steganography, and watermarking domain Topic identification using filtering and rule generation algorithm for textual document View project The modeling of E-Supervised (E-SUV) for distance learning centre View project Review on secured data capabilities of cryptography, steganography, and watermarking domain. Indonesian Journal of Electrical Engineering and Computer Science, 17(2), 1053–1059. https://doi.org/10.11591/ijeecs.v17.i2.pp1053-1059
Alqad, Z., Majid Oraiqat, ;, Almujafet, ; Hisham, Al-Saleh, S., Hind, ;, Husban, A., & Al-Rimawi, S. (2019). International Journal of Computer Science and Mobile Computing A New Approach for Data Cryptography. In International Journal of Computer Science and Mobile Computing (Vol. 8, Issue 9). www.ijcsmc.com
Qowi, Z., & Hudallah, N. (2021). Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm. Journal of Physics: Conference Series, 1918(4). https://doi.org/10.1088/1742-6596/1918/4/042009
Abu-Faraj, M. M., Aldebei, K., & Alqadi, Z. A. (2022). Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography. Traitement Du Signal, 39(1), 173–178. https://doi.org/10.18280/ts.390117
Nahar, K., & Chakraborty, P. (2020). A Modified Version of Vigenere Cipher using 95 95 Table. International Journal of Engineering and Advanced Technology, 9(5), 1144–1148. https://doi.org/10.35940/ijeat.E9941.069520
Qowi, Z., & Hudallah, N. (2021). Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm. Journal of Physics: Conference Series, 1918(4). https://doi.org/10.1088/1742-6596/1918/4/042009
Voleti, L., Balajee, R. M., Vallepu, S. K., Bayoju, K., & Srinivas, D. (2021). A Secure Image Steganography Using Improved Lsb Technique and Vigenere Cipher Algorithm. Proceedings - International Conference on Artificial Intelligence and Smart Systems, ICAIS 2021, 1005–1010. https://doi.org/10.1109/ICAIS50930.2021.9395794
Hameed, T. H., & Sadeeq, H. T. (2022). Modified Vigenère cipher algorithm based on new key generation method. Indonesian Journal of Electrical Engineering and Computer Science, 28(2), 954–961. https://doi.org/10.11591/ijeecs.v28.i2.pp954-961
Sermeno, J. P., Secugal, K. A. S., & Mistio, N. E. (2021). Modified Vigenere cryptosystem: An integrated data encryption module for learning management system. International Journal of Applied Science and Engineering, 18(4(Special Issue)), 1–10. https://doi.org/10.6703/IJASE.202106_18(4).003
Banday, S.A., Pandit, M.K., Khan, A.R. (2021). Securing Medical Images via a Texture and Chaotic Key Framework. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds) Multimedia Security. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-8711-5_1
Politeknik Ganesha Medan, R. (2020). Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security. International Journal of Information System & Technology Akreditasi, 4(1), 471–481. https://doi.org/10.30645/ijistech.v4i1.85
Kumar Mittal, V., Mukhija, M., & Tech, M. (2019). Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique the Creative Commons Attribution License (CC BY 4.0). International Journal of Trend in Scientific Research and Development (IJTSRD) International Journal of Trend in Scientific Research and Development, 5, 1936–1939. https://doi.org/10.31142/ijtsrd27878
Khasanah, Nguyen, P. T., Gunawan, G., & Rahim, R. (2020). Three-pass protocol scheme on vigenere cipher to avoid key Distribution. Journal of Critical Reviews, 7(1), 68–71. https://doi.org/10.22159/jcr.07.01.13
Jaithunbi, A. K., Sabena, S., & Sairamesh, L. (2023). Preservation of Data Integrity in Public Cloud Using Enhanced Vigenere Cipher Based Obfuscation. Wireless Personal Communications, 129(1), 271–284. https://doi.org/10.1007/s11277-022-10097-2
Tan, C. M. S., Arada, G. P., Abad, A. C., & Magsino, E. R. (2021). A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher. Journal of Physics: Conference Series, 1997(1). https://doi.org/10.1088/1742-6596/1997/1/012021
Rizal, A., Utomo, D. S. B., Rihartanto, R., Hiswati, M. E., & Haviluddin, H. (2019). Modified key using multi-cycle key in vigenere cipher. International Journal of Recent Technology and Engineering, 8(2 Special Issue 11), 2600–2606. https://doi.org/10.35940/ijrte.B1313.0982S1119
S. Vatshayan, R. A. Haidri and J. Kumar Verma, "Design of Hybrid Cryptography System based on Vigenère Cipher and Polybius Cipher," 2020 International Conference on Computational Performance Evaluation (ComPE), Shillong, India, 2020, pp. 848-852, doi: 10.1109/ComPE49325.2020.9199997.
Uniyal, N., Dobhal, G., Rawat, A., & Sikander, A. (2021). A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication. Wireless Personal Communications, 119(2), 1577–1587. https://doi.org/10.1007/s11277-021-08295-5
Ahamed, B. B., & Krishnamoorthy, M. (2022). SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm. Journal of the Operations Research Society of China, 10(4), 835–848. https://doi.org/10.1007/s40305-020-00320-x
A. Nuhi, A. Memeti, F. Imeri and B. Cico, "Smart Attendance System using QR Code," 2020 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 2020, pp. 1-4, doi: 10.1109/MECO49872.2020.9134225.
Tiantian Wang , Fei Jia, The impact of health QR code system on older people in China during the COVID-19 outbreak, Age and Ageing, Volume 50, Issue 1, January 2021, Pages 55–56, https://doi.org/10.1093/ageing/afaa222
A. G. Khan, A. H. Zahid, M. Hussain and U. Riaz, "Security Of Cryptocurrency Using Hardware Wallet And QR Code," 2019 International Conference on Innovative Computing (ICIC), Lahore, Pakistan, 2019, pp. 1-10, doi: 10.1109/ICIC48496.2019.8966739.
Dey, S., Saha, S., Singh, A. K., & McDonald-Maier, K. (2021). FoodSQRBlock: Digitizing food production and the supply chain with blockchain and QR code in the cloud. Sustainability (Switzerland), 13(6). https://doi.org/10.3390/su13063486
Mohammed Ali, A., & Farhan, A. K. (2020). Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document. IEEE Access, 8, 27448–27458. https://doi.org/10.1109/ACCESS.2020.2971779
Putra, I. P., Witriyono, H. ., Rifqo, M. H. ., & Muntahanah, M. (2022). Utilization of Base64 Encryption Repetition for QR Code Presence on Online Attendance. Jurnal Komputer, Informasi Dan Teknologi (JKOMITEK), 2(2), 519–528. https://doi.org/10.53697/jkomitek.v2i2.942
Ichsan, M., & Hutrianto, H. (2022). Implementasi Algoritma Vignere Chiper Berbasis QRCode Untuk Absensi Pegawai PT. Delameta Bilano Cabang Ruas Tol Palembang - Inderalaya. Journal of Software Engineering Ampera, 3(3), 170–185. https://doi.org/10.51519/journalsea.v3i3.267
Hameed, T. H., & Sadeeq, H. T. (2022). Modified Vigenère cipher algorithm based on new key generation method. Indonesian Journal of Electrical Engineering and Computer Science, 28(2), 954–961. https://doi.org/10.11591/ijeecs.v28.i2.pp954-961
Pujeri, Dr. U., & Pujeri, Dr. R. (2020). Symmetric Encryption Algorithm using ASCII Values. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 2355–2359. https://doi.org/10.35940/ijrte.E5980.018520