QR Code-Based Attendance System for Contact Tracking Post-Pandemic
DOI:
https://doi.org/10.31154/cogito.v10i1.490.436-450Keywords:
QR Code, AES (Advanced Encryption Standard), Contact TrackingAbstract
The COVID-19 pandemic has brought about profound changes in daily life and introduced new challenges to public health maintenance. Despite ongoing uncertainties, with certain regions easing or completely lifting community activity restrictions, persistent concerns about the virus's continued threat prompt the need for robust health monitoring measures. In this context, the use of contact tracing apps becomes pivotal for organizing individuals' movements, monitoring social distancing, and ensuring adherence to health protocols. This study introduces a QR code-based attendance system, a meticulously designed web and Android application aimed at efficiently and accurately tracking individuals' whereabouts. The system leverages QR code scanning technology, and to enhance security, employs the Advanced Encryption Standard (AES) method for data encryption. This ensures the safe encryption of sensitive data, preserving its confidentiality and integrity during transmission and storage. The research outcome is a versatile application facilitating seamless access across diverse locations, allowing real-time tracking of individuals' presence. This capability proves crucial for contact tracing efforts in the event of positive cases, contributing to the implementation of post-pandemic security and surveillance policies. The system's design and features align with the evolving landscape of the pandemic, emphasizing adaptability and comprehensive support for public health initiatives.References
B. Sowmiya, V. S. Abhijith, S. Sudersan, R. Sakthi Jaya Sundar, M. Thangavel, and P. Varalakshmi, “A survey on security and privacy issues in contact tracing application of COVID-19,” SN Comput Sci, vol. 2, pp. 1–11, 2021.
Y. Gvili, “Security analysis of the COVID-19 contact tracing specifications by Apple Inc. and Google Inc.,” Cryptology ePrint Archive, 2020.
B. Chappell, “Coronavirus: Sacramento county gives up on automatic 14-Day quarantines.” 2020.
R. Flood, S. C. Chan, W. Chen, and D. Aspinall, “Checking Contact Tracing App Implementations with Bespoke Static Analysis,” SN Comput Sci, vol. 3, no. 6, p. 496, 2022.
L.-Y. Yan, G. W.-H. Tan, X.-M. Loh, J.-J. Hew, and K.-B. Ooi, “QR code and mobile payment: The disruptive forces in retail,” Journal of Retailing and Consumer Services, vol. 58, p. 102300, 2021.
A. Ateka and T. Kwanya, “Using QR codes to Promote Information Services and Products in Academic Libraries in Kenya,” 2019.
T. Kuncara, A. S. Putra, N. Aisyah, and V. H. Valentino, “Effectiveness of the E-Ticket System Using QR Codes For Smart Transportation Systems,” International Journal of Science, Technology & Management, vol. 2, no. 3, pp. 900–907, 2021.
X. Yu et al., “Positioning, navigation, and book accessing/returning in an autonomous library robot using integrated binocular vision and QR code identification systems,” Sensors, vol. 19, no. 4, p. 783, 2019.
Y. Liu, J. Yang, and M. Liu, “Recognition of QR Code with mobile phones,” in 2008 Chinese Control and Decision Conference, IEEE, 2008, pp. 203–206.
S. V. S. H. Reddy et al., “Design of QR Based Smart Student Attendance System,” in 2023 IEEE 2nd International Conference on AI in Cybersecurity (ICAIC), 2023, pp. 1–4. doi: 10.1109/ICAIC57335.2023.10044175.
C. Song et al., “Collection of patient-generated health data with a mobile application and transfer to hospital information system via QR codes,” Computer Methods and Programs in Biomedicine Update, vol. 3, 2023, doi: 10.1016/j.cmpbup.2023.100099.
L. Yingli, “Design and Implementation of QR Code Payment in Power Self-service Payment Terminal,” in 2021 6th International Symposium on Computer and Information Processing Technology (ISCIPT), 2021, pp. 432–435. doi: 10.1109/ISCIPT53667.2021.00093.
Y. Dong, Z. Fu, S. Stankovski, S. Wang, and X. Li, “Nutritional Quality and Safety Traceability System for China’s Leafy Vegetable Supply Chain Based on Fault Tree Analysis and QR Code,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.3019593.
G. Custodio-Chavarría, R. P. Soldán-Araujo, and D. Burga-Durango, “System to Optimize the Process of Medical Consultations Using QR Codes in the Hospitals of Peru,” in 2022 Congreso Internacional de Innovación y Tendencias en Ingeniería (CONIITI), 2022, pp. 1–4. doi: 10.1109/CONIITI57704.2022.9953670.
M. A. Azad et al., “A first look at privacy analysis of COVID-19 contact-tracing mobile applications,” IEEE Internet Things J, vol. 8, no. 21, pp. 15796–15806, 2020.
C. Troncoso et al., “Decentralized privacy-preserving proximity tracing,” arXiv preprint arXiv:2005.12273, 2020.
Y.-J. Chiang, P.-Y. Lin, R.-Z. Wang, and Y.-H. Chen, “Blind QR Code Steganographic Approach Based upon Error Correction Capability.,” KSII Transactions on Internet & Information Systems, vol. 7, no. 10, 2013.
M. M. S. Rani and K. R. Euphrasia, “Data security through QR code encryption and steganography,” Advanced Computing: An International Journal (ACIJ), vol. 7, no. 1/2, pp. 1–7, 2016.
J. Rouillard, “Contextual QR codes,” in 2008 The Third International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008), IEEE, 2008, pp. 50–55.
D. Joan and R. Vincent, “The design of Rijndael: AES-the advanced encryption standard,” Information Security and Cryptography, 2002.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 CogITo Smart Journal
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).