Integrating Cryptographic Security Features in Information System Barcodes for Self-Service Systems

Authors

  • Sucipto Universitas Nusantara PGRI Kediri
  • Aidina Ristyawan Universitas Nusantara PGRI Kediri
  • Dwi Harini Universitas Nusantara PGRI Kediri
  • Wahid Ibnu Zaman Universitas Nusantara PGRI Kediri
  • Muhammad Najibulloh  Muzaki Universitas Nusantara PGRI Kediri
  • Mohamed Naeem Antharathara Abdulnazar ISMA University

DOI:

https://doi.org/10.26877/asset.v6i4.850

Keywords:

QR Code, cryptography, attendance, integration, security, AES Algorithm

Abstract

Integrating services in an information system is necessary to provide services that can optimize an information system. One of the systems in PKKMB activities that will be combined with information security features is the attendance system. This research uses the Liner Sequential Model (LSM) method to integrate the QR Code attendance system with security features. This research aims to integrate QR Codes by optimizing increased security by combining the Advanced Encryption Standard (AES) algorithm with base64 with a dynamic data model to complicate the QR Code manipulation process. Contribution This study makes optimization of the AES encryption model to improve data security on QR Code. Algorithm testing results include using a Character Error Rate (CER) of 0%, Avalanche Effect (AE) testing with a value of 53.05%, and response time (RT) testing of 10.26ms

Author Biographies

Sucipto, Universitas Nusantara PGRI Kediri

Departement Information System

Aidina Ristyawan, Universitas Nusantara PGRI Kediri

Departement Information System

Dwi Harini, Universitas Nusantara PGRI Kediri

Departement Information System

Wahid Ibnu Zaman, Universitas Nusantara PGRI Kediri

Departement Education

Mohamed Naeem Antharathara Abdulnazar, ISMA University

Departement Computer Systems

References

A. Madhesh, “Quality of life of higher education students with disabilities at Shaqra University,” Res Dev Disabil, vol. 138, p. 104520, 2023, doi: https://doi.org/10.1016/j.ridd.2023.104520.

M. A. Briggs, C. Thornton, V. J. McIver, P. L. S. Rumbold, and D. J. Peart, “Investigation into the transition to online learning due to the COVID-19 pandemic, between new and continuing undergraduate students,” J Hosp Leis Sport Tour Educ, vol. 32, p. 100430, 2023, doi: https://doi.org/10.1016/j.jhlste.2023.100430.

C. Johnson et al., “Student support in higher education: campus service utilization, impact, and challenges,” Heliyon, vol. 8, no. 12, p. e12559, 2022, doi: https://doi.org/10.1016/j.heliyon.2022.e12559.

C. Xie, “Construction of Smart Campus Cloud Service Platform Based on Big Data Computer System,” Procedia Comput Sci, vol. 208, pp. 583–589, 2022, doi: https://doi.org/10.1016/j.procs.2022.10.081.

M. Mohzana, “The Impact of the New Student Orientation Program on the Adaptation Process and Academic Performance,” International Journal of Educational Narratives, vol. 2, no. 2, pp. 169–178, Apr. 2024, doi: 10.55849/IJEN.V2I2.763.

L. Diop, C. T. Diop, A. Giacometti, and A. Soulet, “Pattern on demand in transactional distributed databases,” Inf Syst, vol. 104, p. 101908, 2022, doi: https://doi.org/10.1016/j.is.2021.101908.

Y. Mansouri, V. Prokhorenko, and M. A. Babar, “An automated implementation of hybrid cloud for performance evaluation of distributed databases,” Journal of Network and Computer Applications, vol. 167, p. 102740, 2020, doi: https://doi.org/10.1016/j.jnca.2020.102740.

M. Asif-Ur-Rahman et al., “A semi-automated hybrid schema matching framework for vegetation data integration,” Expert Syst Appl, vol. 229, p. 120405, 2023, doi: https://doi.org/10.1016/j.eswa.2023.120405.

S. Melzer, O. C. Eichmann, H. Wang, and R. God, “Simulation of Database Interactions for Early Validation of Digitized Enterprise Processes,” Procedia Comput Sci, vol. 219, pp. 658–665, 2023, doi: https://doi.org/10.1016/j.procs.2023.01.336.

M. Pirani, A. Cucchiarelli, and L. Spalazzi, “Paradigms for database-centric application interfaces,” Procedia Comput Sci, vol. 217, pp. 835–845, 2023, doi: https://doi.org/10.1016/j.procs.2022.12.280.

O. . O. Mayowa, E. . W. Adedayo, O. . O. Olamide, J. A. P. Awokola, and Q. . B. Sodipo, “Design and Implementation of a Certificate Verification System using Quick Response (QR) Code,” LAUTECH JOURNAL OF COMPUTING AND INFORMATICS , vol. 2, no. 1, pp. 35–40, Jul. 2021, Accessed: Jun. 19, 2024. [Online]. Available: http://laujci.lautech.edu.ng/index.php/laujci/article/view/36

R. V. Imbar, B. Renaldy Sutedja, and M. Christianti, “Smart Attendance Recording System using RFID and e-Certificate using QR Code-based Digital Signature,” 8th International Conference on ICT for Smart Society: Digital Twin for Smart Society, ICISS 2021 - Proceeding, Aug. 2021, doi: 10.1109/ICISS53185.2021.9533199.

P. H. Kumar, J. P. V. H. S. S. Lingesh, B. M. Ram, A. P. N. Priyanka, K. V. Babu, and U. K. Vamsi, “Touchless Attendance System using QR Code and Power Apps,” International Journal of Research in Engineering, Science and Management, vol. 5, no. 5, pp. 279–281, Jun. 2022, Accessed: Aug. 25, 2022. [Online]. Available: http://www.journals.resaim.com/ijresm/article/view/2128

C. Song et al., “Collection of patient-generated health data with a mobile application and transfer to hospital information system via QR codes,” Computer Methods and Programs in Biomedicine Update, vol. 3, p. 100099, 2023, doi: https://doi.org/10.1016/j.cmpbup.2023.100099.

J. Raja, J. Rajeswari, and S. Jayashri, “A secured QR pattern based E health care CAD system for CXR image analyzes,” Optik (Stuttg), vol. 273, p. 170344, 2023, doi: https://doi.org/10.1016/j.ijleo.2022.170344.

P. Escobedo et al., “QRsens: Dual-purpose quick response code with built-in colorimetric sensors,” Sens Actuators B Chem, vol. 376, p. 133001, 2023, doi: https://doi.org/10.1016/j.snb.2022.133001.

M. A. Kusuma, P. Sukarno, and A. A. Wardana, “Security System for Digital Land Certificate Based on Blockchain and QR Code Validation in Indonesia,” ICACNIS 2022 - 2022 International Conference on Advanced Creative Networks and Intelligent Systems: Blockchain Technology, Intelligent Systems, and the Applications for Human Life, Proceeding, 2022, doi: 10.1109/ICACNIS57039.2022.10055114.

I. Makhdoom, M. Abolhasan, and J. Lipman, “A comprehensive survey of covert communication techniques, limitations and future challenges,” Comput Secur, vol. 120, p. 102784, Sep. 2022, doi: 10.1016/J.COSE.2022.102784.

X. Huo and X. Wang, “Internet of things for smart manufacturing based on advanced encryption standard (AES) algorithm with chaotic system,” Results in Engineering, vol. 20, p. 101589, Dec. 2023, doi: 10.1016/J.RINENG.2023.101589.

M. Maazouz, A. Toubal, B. Bengherbia, O. Houhou, and N. Batel, “FPGA implementation of a chaos-based image encryption algorithm,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 10, pp. 9926–9941, Nov. 2022, doi: 10.1016/J.JKSUCI.2021.12.022.

Sucipto et al., “Hidden Treasures of Kediri’s Medicinal Plants: A Collaborative Effort to Map and Validate Authentic Information Using Innovative QR Code Security and Cryptography,” IOP Conf Ser Earth Environ Sci, vol. 1242, no. 1, p. 012036, Sep. 2023, doi: 10.1088/1755-1315/1242/1/012036.

Y. Wahyu Agung Prasetyo, R. Rahim, M. A. Manuhutu, and S. Sujito, “QRIS and GOST: A Symbiotic Approach for Secure QR Code Transactions,” International Journal of Electronics and Communication Engineering, vol. Volume 10, no. 5, pp. 138–147, May 2023, doi: 10.14445/23488549/IJECE-V10I5P113.

S. Das Mohapatra, S. C. Nayak, S. Parida, C. R. Panigrahi, and B. Pati, “COVTrac: Covid-19 Tracker and Social Distancing App,” Advances in Intelligent Systems and Computing, vol. 1299 AISC, pp. 607–619, 2021, doi: 10.1007/978-981-33-4299-6_50.

G. Xue et al., “ScreenID: Enhancing QRCode Security by Utilizing Screen Dimming Feature,” IEEE/ACM Transactions on Networking, vol. 31, no. 2, pp. 862–876, Apr. 2023, doi: 10.1109/TNET.2022.3203044.

T. Yuan, Y. Wang, K. Xu, R. R. Martin, and S. M. Hu, “Two-Layer QR Codes,” IEEE Transactions on Image Processing, vol. 28, no. 9, pp. 4413–4428, Sep. 2019, doi: 10.1109/TIP.2019.2908490.

F. Anwar, E. H. Rachmawanto, C. A. Sari, and de Rosal Ignatius Moses Setiadi, “StegoCrypt Scheme using LSB-AES Base64,” 2019 International Conference on Information and Communications Technology, ICOIACT 2019, pp. 85–90, Jul. 2019, doi: 10.1109/ICOIACT46704.2019.8938567.

A. R. Pathak, S. Deshpande, and M. Panchal, “A secure framework for file encryption using base64 encoding,” Lecture Notes in Networks and Systems, vol. 75, pp. 359–366, 2019, doi: 10.1007/978-981-13-7150-9_38/COVER.

A. M. Logunleko, K. B. Logunleko, and O. O. Lawal, “An End-to-End Secured Email System using Base64 Algorithm,” Int J Comput Appl, vol. 175, no. 28, pp. 1–6, Oct. 2020, doi: 10.5120/ijca2020920669.

E. S. Selvapriya and L. Suganthi, “Design and implementation of low power Advanced Encryption Standard cryptocore utilizing dynamic pipelined asynchronous model,” Integration, vol. 93, p. 102057, Nov. 2023, doi: 10.1016/J.VLSI.2023.102057.

R. S. Pressman, Software Enggineering: A Practitioner’s Approach (7th Edition). New York: McGraw-Hill, 2010.

K. D. Prasetya, Suharjito, and D. Pratama, “Effectiveness Analysis of Distributed Scrum Model Compared to Waterfall approach in Third-Party Application Development,” Procedia Comput Sci, vol. 179, pp. 103–111, 2021, doi: https://doi.org/10.1016/j.procs.2020.12.014.

T. Thesing, C. Feldmann, and M. Burchardt, “Agile versus Waterfall Project Management: Decision Model for Selecting the Appropriate Approach to a Project,” Procedia Comput Sci, vol. 181, pp. 746–756, 2021, doi: https://doi.org/10.1016/j.procs.2021.01.227.

M. Bianchi, G. Marzi, and M. Guerini, “Agile, Stage-Gate and their combination: Exploring how they relate to performance in software development,” J Bus Res, vol. 110, pp. 538–553, Mar. 2020, doi: 10.1016/J.JBUSRES.2018.05.003.

S. Pradhan and V. Nanniyur, “Large scale quality transformation in hybrid development organizations – A case study,” Journal of Systems and Software, vol. 171, p. 110836, Jan. 2021, doi: 10.1016/J.JSS.2020.110836.

M. Gilsing, J. Pelay, and F. Hermans, “Design, implementation and evaluation of the Hedy programming language,” J Comput Lang, vol. 73, p. 101158, 2022, doi: https://doi.org/10.1016/j.cola.2022.101158.

H. Zhang, X. Hu, J. Li, and H. Guan, “A comprehensive test framework for cryptographic accelerators in the cloud,” Journal of Systems Architecture, vol. 113, p. 101873, 2021, doi: https://doi.org/10.1016/j.sysarc.2020.101873.

F. Thabit, O. Can, A. O. Aljahdali, G. H. Al-Gaphari, and H. A. Alkhzaimi, “Cryptography Algorithms for Enhancing IoT Security,” Internet of Things, vol. 22, p. 100759, 2023, doi: https://doi.org/10.1016/j.iot.2023.100759.

S. M. Wadi and N. Zainal, “Rapid Encryption Method based on AES Algorithm for Grey Scale HD Image Encryption,” Procedia Technology, vol. 11, pp. 51–56, 2013, doi: https://doi.org/10.1016/j.protcy.2013.12.161.

M. Bedoui, H. Mestiri, B. Bouallegue, B. Hamdi, and M. Machhout, “An improvement of both security and reliability for AES implementations,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 10, Part B, pp. 9844–9851, 2022, doi: https://doi.org/10.1016/j.jksuci.2021.12.012.

F. Merchan, K. Contreras, R. A. Gittens, J. R. Loaiza, and J. E. Sanchez-Galan, “Deep metric learning for the classification of MALDI-TOF spectral signatures from multiple species of neotropical disease vectors,” Artificial Intelligence in the Life Sciences, vol. 3, p. 100071, 2023, doi: https://doi.org/10.1016/j.ailsci.2023.100071.

D. M. A. Cortez, A. M. Sison, and R. P. Medina, “Cryptographic Randomness Test of the Modified Hashing Function of SHA256 to Address Length Extension Attack,” in Proceedings of the 2020 8th International Conference on Communications and Broadband Networking, in ICCBN ’20. New York, NY, USA: Association for Computing Machinery, 2020, pp. 24–28. doi: 10.1145/3390525.3390540.

S. D. Sanap and V. More, “Performance Analysis of Encryption Techniques Based on Avalanche effect and Strict Avalanche Criterion,” in 2021 3rd International Conference on Signal Processing and Communication (ICPSC), 2021, pp. 676–679. doi: 10.1109/ICSPC51351.2021.9451784.

F. A. C. Parapat, G. P. Kusuma, and M. R. N. Majiid, “Automation testing using silk test workbench for website,” Procedia Comput Sci, vol. 216, pp. 128–135, 2023, doi: https://doi.org/10.1016/j.procs.2022.12.119.

S. Massaro et al., “Surveying volcanic crises exercises: From open-question questionnaires to a prototype checklist,” Journal of Volcanology and Geothermal Research, vol. 440, p. 107850, 2023, doi: https://doi.org/10.1016/j.jvolgeores.2023.107850.

P. Quifer-Rada, L. Aguilar-Camprubí, I. Gómez-Sebastià, A. Padró-Arocas, and D. Mena-Tudela, “Spanish version of the mHealth app usability questionnaire (MAUQ) and adaptation to breastfeeding support apps,” Int J Med Inform, vol. 174, p. 105062, 2023, doi: https://doi.org/10.1016/j.ijmedinf.2023.105062.

T. Yamashita, “Analyzing Likert scale surveys with Rasch models,” Research Methods in Applied Linguistics, vol. 1, no. 3, p. 100022, 2022, doi: https://doi.org/10.1016/j.rmal.2022.100022.

K. Anjaria, “Knowledge derivation from Likert scale using Z-numbers,” Inf Sci (N Y), vol. 590, pp. 234–252, 2022, doi: https://doi.org/10.1016/j.ins.2022.01.024.

O. Leßenich and S. Sobernig, “Usefulness and usability of heuristic walkthroughs for evaluating domain-specific developer tools in industry: Evidence from four field simulations,” Inf Softw Technol, vol. 160, p. 107220, 2023, doi: https://doi.org/10.1016/j.infsof.2023.107220.

R. Silva, A. C. Lima, E. Andrade, A. I. Martins, and N. P. Rocha, “Heuristic Evaluation of the Usability of a Mechanical Ventilator Interface through a Simulator,” Procedia Comput Sci, vol. 219, pp. 1232–1239, 2023, doi: https://doi.org/10.1016/j.procs.2023.01.406.

J. Memon, M. Sami, R. A. Khan, and M. Uddin, “Handwritten Optical Character Recognition (OCR): A Comprehensive Systematic Literature Review (SLR),” IEEE Access, vol. 8, pp. 142642–142668, 2020, doi: 10.1109/ACCESS.2020.3012542.

S. D. Sanap and V. More, “Performance analysis of encryption techniques based on avalanche effect and strict avalanche criterion,” 2021 3rd International Conference on Signal Processing and Communication, ICPSC 2021, pp. 676–679, May 2021, doi: 10.1109/ICSPC51351.2021.9451784.

N. Ahmad and S. M. R. Hasan, “A new ASIC implementation of an advanced encryption standard (AES) crypto-hardware accelerator,” Microelectronics J, vol. 117, p. 105255, Nov. 2021, doi: 10.1016/J.MEJO.2021.105255.

F. R. Willett, D. T. Avansino, L. R. Hochberg, J. M. Henderson, and K. V. Shenoy, “High-performance brain-to-text communication via handwriting,” Nature 2021 593:7858, vol. 593, no. 7858, pp. 249–254, May 2021, doi: 10.1038/s41586-021-03506-2.

D. Upadhyay, N. Gaikwad, M. Zaman, and S. Sampalli, “Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications,” IEEE Access, vol. 10, pp. 112472–112486, 2022, doi: 10.1109/ACCESS.2022.3215778.

X. Huo and X. Wang, “Internet of things for smart manufacturing based on advanced encryption standard (AES) algorithm with chaotic system,” Results in Engineering, vol. 20, p. 101589, Dec. 2023, doi: 10.1016/J.RINENG.2023.101589.

S. Ariyani, M. Sudarma, and P. A. Wicaksana, “Analysis of Functional Suitability and Usability in Sales Order Procedure to Determine Management Information System Quality,” INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi, vol. 5, no. 2, pp. 234–248, Aug. 2021, doi: 10.29407/INTENSIF.V5I2.15537.

M. Yunus, I. S. Sakkinah, U. E. Rahmawati, A. Deharja, and M. W. Santi, “Electronic Health Records (EHR) Usability and User Experience Evaluation: A Case Study,” INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi, vol. 7, no. 2, pp. 192–201, Aug. 2023, doi: 10.29407/INTENSIF.V7I2.19090.

I. Wahyudi, Syahrullah, D. S. Anggreni, and R. Laila, “Implementation Aes-128 Encryption For Enhanced Data Security In Central Sulawesi Provincial Inspectorate,” Advance Sustainable Science Engineering and Technology, vol. 6, no. 3, pp. 0240302–0240302, Jun. 2024, doi: 10.26877/ASSET.V6I3.560.

Downloads

Published

2024-09-20