Securing Criminal Records using R-Pi, QR code and Steganography
Asha Durafe

Asha Durafe, Department of Electronics Engineering, Shah & Anchor Kutchhi Engineering College, Mumbai.

Manuscript received on March 15, 2020. | Revised Manuscript received on March 26, 2020. | Manuscript published on April 10, 2020. | PP: 684-689 | Volume-9 Issue-6, April 2020. | Retrieval Number: F3656049620/2020©BEIESP | DOI: 10.35940/ijitee.F3656.049620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: In today`s digital scenario it has become very essential to maintain secrecy of criminal records otherwise forgery could happen. Using steganography it is possible to provide security for the information which is communicated over the internet from one crime branch to the other. Steganography one of the emerging security fields works to mask the very existence of the message. A wide range of carrier file formats can be utilized, but digital steganography is the extremely beneficial data hiding technique to secure criminal image as well as the crime scene images. Various applications have various prerequisites of the steganography method utilized. In this paper, we proposed CRSS (Criminal Record Security System) an image steganography method with LSB and RSA technique for enhanced security and along with that Raspberry pi and GSM module is used. Thus, for a more secure approach, the proposed method hides the criminal`s confidential records such as criminal`s image, crime scene digital images etc. using LSB steganography and also encrypts the confidential data making use of a private key using RSA algorithm and then sends it to the desired end. The receiver then decrypts the confidential data to get the original criminal information. CRSS is also proposed to send a QR code to the receiver which hides sensitive data and may include criminal`s previous crime history and other written proofs which are scanned at the receiving end reveals the entire criminal record. The entire system is implemented on Raspberry Pi 3 processor and thus a secure transmission of data without traditional desktop dependency in a more economical way could be established. 
Keywords: Steganography, Data Hiding, Least Significant Bit (LSB), RSA, Raspberry-Pi, QR code, GSM.
Scope of the Article: Data Analytics