Date post: | 05-Dec-2014 |
Category: |
Technology |
Upload: | mrudula14 |
View: | 556 times |
Download: | 8 times |
QR CODE
SUMMARY
Introduction The QR code structure The Specification of QR code Encoding Characteristics of QR code Application
INTRODUCTION
QR codes, or quick response codes, are trademark for a type of matrix or (two-dimensional barcodes).
First created and introduced by Japanese corporation
Denso-Wave in 1994. QR codes can be read by camera phones. We can encode numeric, alphanumeric
byte/binary, kanji hold max 7,089 numeric characters and max 4,296
alphanumeric characters worth of data.
1.Comparison of different code formats
2. Types of QR code
Version 1 (21×21) version 2 (25×25). Version 3 (29×29).
Version 4 (33×33). Version 10 (57×57). Version 40 (177×177).
3. The QR code structure
FP : A pattern for detecting the position of the QR Code(
AP: A pattern for correcting the distortion of the QR Code.
TP: for correcting the central coordinate of the data cell
DA: The QR Code data will be stored (encoded) into the data area
360°).
4. The Specification of QR code
ENCODING
Step 1: Data Encodation Step 2: Error Correction
Codeword generation Step 3: Module placement in
matrix. Step 4: Masking Pattern
selection Step 5: Format Information Step 6: Final symbol
construction
Four-bit indicators
Indicator Meaning
0001 Numeric encoding (10 bits per 3 digits)
0010 Alphanumeric encoding (11 bits per 2 characters)
0100 Byte encoding (8 bits per character)
1000 Kanji encoding (13 bits per character)
0011Structured append (used to split a message across multiple QR symbols)
0111Extended Channel Interpretation (select alternate character set or encoding)
0101 FNC1 in first position (see Code 128 for more information)
1001 FNC1 in second position
0000 End of message
Are used to select the encoding mode and convey other information
Encoding Ver 1–9 10–26 27–40
Numeric 10 12 14
Alphanumeric
9 11 13
Byte 8 16 16
Kanji 8 10 12
• The number of bits in the length field depends on the encoding and the symbol version, as shown below.
7. Characteristics of QR code
1. All-Direction (360°) High-Speed Reading
2. Resistant to Distorted Symbols
3. Data Restoration Functionality
4. Efficiently Encoding of Kanji and Kana Characters
•QR Code has four different error correction levels• Reed-Solomon code which is highly resistant to burst errors arranged in the data area.
• QR Code has a linking functionality which will enable a single symbol to be represented in several symbols by dividing it .
• A single symbol can be divided into 16 symbols at maximum
5. Linking Functionality of the Symbols
6. The Confidentiality of the Code
By making the relationship between the character type and the stored data unique for a special usage, QR Code can be easily encrypted.
QR CODE ENCRYPTION Who may need encrypted QR codes? People used passports, driver license and other
identification or even loyalty cards. banking, hospitals, health care services QR should
be read only by workers How to encrypt QR codes use symmetrical keys to encryption and
decryption Key can be composed from the sentence or non
meaningful characters encryption is done by performing a bitwise XOR
operation on both data chunks using key Performing same operation on encryption we get
original msg
APPLICATION OF OR CODE
human tracking robot using QR codeso Earlier human-recognition systems have u, but the
tags require batteries, so the maintenance burden is largesed technology such as active infrared tags
o QR codes can simply be printed, creating inexpensive passive tags this is advantage of QR code
o recognition rates can drop dramatically as the distance to the subject increases the we used pattern matching method .
SYSTEM ARCHITECTURE (CONTD.)
QR CODE BASED MOBILE PAYMENT SYSTEM
QR CODES IN EDUCATION
catalogue search at the library of the University, a QR code will also be displayed automatically to summarize the key information, the title, the author, and the shelf location as
Processes of Preparing and Reading a Document with QR Codes
Conclusion QR code is a way of encoding more information than a
traditional bar code QR code is now being widely used in a variety of
businesses. For security of QR code info encryption is required goods are identified using QR codes in commerce, there
is a clear need to build new mobile payment systems for mobile users to support mobile transactions based on QR codes
REFERENCES
[1]. H. Aoki, S. Matsushita: “Balloon Tag: (In)visible Marker Which Tells Who’s Who,” Proc. of the
4th IEEE International Symposium on Wearable Computers, pp. 181-182 (2000-2010)
[2]. M. R. Rieback, B. Crispo, and A. S. Tanenbaum. Is your cat infected with a computer virus? In PERCOM ' 06: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing Communications, pages 169{179, Washington, DC ,USA, 2006. IEEE Computer Society
[3]. TRIER,O.D.,JAIN,A.K.,"Goal-Directed Evaluation of Binarization Methods",Pattern Analysis and Machine Intelligence,JEEETransactions on PAMI, Vo1.17,No.12,pp.1191-1201,Dec.1995
[4]. Yu-Hsuan Chang, Chung-Hua Chu and Ming-Syan Chen, “A General Scheme for Extracting QR Code from a Non-uniform Background in Camera Phones and Applications,” Ninth IEEE International Symposium on Multimedia, ISM 2007. pp. 123-130, 10-12 Dec. 2007
THANK YOU