{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:23:32Z","timestamp":1760081012506,"version":"3.40.5"},"reference-count":0,"publisher":"IOS Press","isbn-type":[{"type":"print","value":"9781643685380"},{"type":"electronic","value":"9781643685397"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,18]]},"abstract":"<jats:p>Quick Response (QR) two-dimensional codes were designed to send information in a simple and versatile way, such as sharing a product or company website. Nowadays they can be found in documents with sensitive information, such as personal documents (passports, visas, bank transfers) and documents with restricted information of companies (financial reports, legal documents), for this reason it is important to take care of the information that is sent or shared, depending on its use, it is important to add levels of security to the information encoded in QR codes, since in some cases sensitive information is sent. In this paper we propose to add two levels of security to QR codes that will share sensitive information. A first level of security is the encryption of the original information through the Privacy Guard (GPG) method, a second level of security is the multiplexing of two pieces of information in a chromatic QR code, where each color represents an encoded information, the incorporation of the two levels of security will keep the information shared by the users secure.<\/jats:p>","DOI":"10.3233\/faia240358","type":"book-chapter","created":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T07:57:01Z","timestamp":1726819021000},"source":"Crossref","is-referenced-by-count":2,"title":["Information Encryption with Combined QR Codes with Two Security Levels: GPG Method and Chromatic Multiplexing"],"prefix":"10.3233","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5173-2598","authenticated-orcid":false,"given":"Paola Noemi","family":"San Agust\u00edn Crescencio","sequence":"first","affiliation":[{"name":"Instituto Polit\u00e9cnico Nacional, Escuela Superior de Ingenier\u00eda Mec\u00e1nica y El\u00e9ctrica, Unidad Culhuacan, Av. Santa Ana No. 1000, Col. San Francisco Culhuacan, M\u00e9xico City C.P. 04430, M\u00e9xico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4555-8695","authenticated-orcid":false,"given":"Leobardo","family":"Hern\u00e1ndez Gonz\u00e1lez","sequence":"additional","affiliation":[{"name":"Instituto Polit\u00e9cnico Nacional, Escuela Superior de Ingenier\u00eda Mec\u00e1nica y El\u00e9ctrica, Unidad Culhuacan, Av. Santa Ana No. 1000, Col. San Francisco Culhuacan, M\u00e9xico City C.P. 04430, M\u00e9xico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5373-1403","authenticated-orcid":false,"given":"Pedro","family":"Guevara L\u00f3pez","sequence":"additional","affiliation":[{"name":"Instituto Polit\u00e9cnico Nacional, Escuela Superior de Ingenier\u00eda Mec\u00e1nica y El\u00e9ctrica, Unidad Culhuacan, Av. Santa Ana No. 1000, Col. San Francisco Culhuacan, M\u00e9xico City C.P. 04430, M\u00e9xico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4487-5047","authenticated-orcid":false,"given":"Jazm\u00edn","family":"Ram\u00edrez Hern\u00e1ndez","sequence":"additional","affiliation":[{"name":"Instituto Polit\u00e9cnico Nacional, Escuela Superior de Ingenier\u00eda Mec\u00e1nica y El\u00e9ctrica, Unidad Culhuacan, Av. Santa Ana No. 1000, Col. San Francisco Culhuacan, M\u00e9xico City C.P. 04430, M\u00e9xico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1184-6859","authenticated-orcid":false,"given":"Eduardo Salvador","family":"Estevez Encarnaci\u00f3n","sequence":"additional","affiliation":[{"name":"Instituto Polit\u00e9cnico Nacional, Escuela Superior de Ingenier\u00eda Mec\u00e1nica y El\u00e9ctrica, Unidad Culhuacan, Av. Santa Ana No. 1000, Col. San Francisco Culhuacan, M\u00e9xico City C.P. 04430, M\u00e9xico"}]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","New Trends in Intelligent Software Methodologies, Tools and Techniques"],"original-title":[],"link":[{"URL":"https:\/\/ebooks.iospress.nl\/pdf\/doi\/10.3233\/FAIA240358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T07:57:02Z","timestamp":1726819022000},"score":1,"resource":{"primary":{"URL":"https:\/\/ebooks.iospress.nl\/doi\/10.3233\/FAIA240358"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,18]]},"ISBN":["9781643685380","9781643685397"],"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia240358","relation":{},"ISSN":["0922-6389","1879-8314"],"issn-type":[{"type":"print","value":"0922-6389"},{"type":"electronic","value":"1879-8314"}],"subject":[],"published":{"date-parts":[[2024,9,18]]}}}