SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
QR CODE
SUMMARY
Introduction
 The QR code structure
 The Specification of QR code
 Encoding
 Characteristics of QR code
 Application

INTRODUCTION









QR codes, or quick response codes, are trademark
for a type of matrix or (two-dimensional barcodes).
First created and introduced by Japanese
corporation
Denso-Wave in 1994.
QR codes can be read by camera phones.
We can encode numeric, alphanumeric
byte/binary, kanji
hold max 7,089 numeric characters and max 4,296
alphanumeric characters worth of data.
1.Comparison of different code

formats
2. Types of QR code

Version 1 (21×21)

Version 4 (33×33).

version 2 (25×25).

Version 10 (57×57).

Version 3 (29×29).

Version 40 (177×177).
3. The QR code structure

FP :

360°).
A pattern for detecting the position of the QR Code(

AP: A pattern for correcting the distortion of the QR Code.
TP: for correcting the central coordinate of the data cell
DA: The QR Code data will be stored (encoded) into the data
area
4. The Specification of QR

code
ENCODING
Step 1: Data Encodation
 Step 2: Error Correction Codeword
generation
 Step 3: Module placement in matrix.
 Step 4: Masking Pattern selection
 Step 5: Format Information
 Step 6: Final symbol construction

Four-bit indicators

Are used to select the encoding mode
and convey other
information
Indicator

Meaning

0001

Numeric encoding (10 bits per 3 digits)

0010

Alphanumeric encoding (11 bits per 2 characters)

0100

Byte encoding (8 bits per character)

1000

Kanji encoding (13 bits per character)

0011

Structured append (used to split a message across multiple QR
symbols)

0111

Extended Channel Interpretation (select alternate character set
or encoding)

0101

FNC1 in first position (see Code 128 for more information)

1001

FNC1 in second position

0000

End of message
• The number of bits in the length field depends on the encoding and
the symbol version, as shown below.

Encoding

Ver 1–9

10–26

27–40

Numeric

10

12

14

Alphanumeri
c

9

11

13

Byte

8

16

16

Kanji

8

10

12
6.MESSAGE PLACEMENT WITHIN A QR
SYMBOL
7 Characteristics of QR code
1. All-Direction (360°) High-Speed Reading
2. Resistant to Distorted Symbols
3. Data Restoration Functionality
•QR Code has four different error correction levels
• Reed-Solomon code which is highly resistant to
burst errors arranged in the data area.

4. Efficiently Encoding of Kanji and Kana
Characters
5. Linking Functionality of the Symbols
•
•

QR Code has a linking functionality which will
enable a single symbol to be represented in
several symbols by dividing it .
A single symbol can be divided into 16 symbols
at maximum
6. The Confidentiality of the Code



By making the relationship between the
character type and the stored data unique for
a special usage, QR Code can be easily
encrypted.
QR CODE ENCRYPTION
 Who may need encrypted QR codes?




People used passports, driver license and other
identification or even loyalty cards.
banking, hospitals, health care services QR should
be read only by workers



How to encrypt QR codes



use symmetrical keys to encryption and decryption
Key can be composed from the sentence or non
meaningful characters
encryption is done by performing a bitwise XOR
operation on both data chunks using key
Performing same operation on encryption we get
original msg




APPLICATION OF OR CODE


o

o

o

human tracking robot using QR codes
Earlier human-recognition systems have u, but the
tags require batteries, so the maintenance burden is
largesed technology such as active infrared tags
QR codes can simply be printed, creating
inexpensive passive tags this is advantage of QR
code
recognition rates can drop dramatically as the
distance to the subject increases the we used pattern
matching method .
SYSTEM ARCHITECTURE (CONTD.)
QR CODE BASED MOBILE PAYMENT SYSTEM
QR CODES IN EDUCATION
catalogue search at the library of the
University, a QR code will also be displayed
automatically to summarize the key
information, the title, the author, and the shelf
location as
 Processes of Preparing and Reading a
Document with QR Codes

Conclusion








QR code is a way of encoding more information than a
traditional bar code
QR code is now being widely used in a variety of
businesses.
For security of QR code info encryption is required
goods are identified using QR codes in commerce, there
is a clear need to build new mobile payment systems for
mobile users to support mobile transactions based on QR
codes
REFERENCES








[1]. H. Aoki, S. Matsushita: “Balloon Tag: (In)visible Marker Which Tells
Who’s Who,” Proc. of the
4th IEEE International Symposium on Wearable Computers, pp. 181182 (2000-2010)
[2]. M. R. Rieback, B. Crispo, and A. S. Tanenbaum. Is your cat infected
with a computer virus? In
PERCOM ' 06: Proceedings of the
Fourth Annual IEEE International Conference on Pervasive Computing
Communications, pages 169{179, Washington, DC ,USA, 2006. IEEE
Computer Society
[3]. TRIER,O.D.,JAIN,A.K.,"Goal-Directed Evaluation of Binarization
Methods",Pattern Analysis and Machine Intelligence,JEEETransactions
on PAMI, Vo1.17,No.12,pp.1191-1201,Dec.1995
[4]. Yu-Hsuan Chang, Chung-Hua Chu and Ming-Syan Chen, “A General
Scheme for Extracting QR Code from a Non-uniform Background in
Camera Phones and Applications,” Ninth IEEE International Symposium
on Multimedia, ISM 2007. pp. 123-130, 10-12 Dec. 2007
THANK YOU

Mais conteúdo relacionado

Mais procurados

QR Codes: A Point of View
QR Codes: A Point of ViewQR Codes: A Point of View
QR Codes: A Point of ViewBBDO
 
QR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeQR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeRehan Guha
 
Barcode latest technology1
Barcode latest technology1Barcode latest technology1
Barcode latest technology1dhananajay95
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Likan Patra
 
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Jishnu Mandal
 
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.RobbySahoo
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBadshah34
 
Barcode Technology
Barcode TechnologyBarcode Technology
Barcode TechnologyARUN SUNNY
 
"The Barcode" Presentation
 "The Barcode" Presentation  "The Barcode" Presentation
"The Barcode" Presentation sh94880
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology pptNeeta Chavare
 
Barcode technology
Barcode technologyBarcode technology
Barcode technologyPRANJAL SONI
 
Bar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationBar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationAkshay Shelake
 

Mais procurados (20)

Qr code
Qr codeQr code
Qr code
 
QR Codes: A Point of View
QR Codes: A Point of ViewQR Codes: A Point of View
QR Codes: A Point of View
 
QR Codes presentation
QR Codes presentationQR Codes presentation
QR Codes presentation
 
QR-CODE presentation slide
QR-CODE presentation slideQR-CODE presentation slide
QR-CODE presentation slide
 
QR code
QR codeQR code
QR code
 
QR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeQR Code - Mobile readable Barcode
QR Code - Mobile readable Barcode
 
Qr codes
Qr codesQr codes
Qr codes
 
Barcode latest technology1
Barcode latest technology1Barcode latest technology1
Barcode latest technology1
 
Barcode
BarcodeBarcode
Barcode
 
QR Codes: What, Why, How & Where
QR Codes: What, Why, How & WhereQR Codes: What, Why, How & Where
QR Codes: What, Why, How & Where
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
 
BARCODE TECHNOLOGY
 BARCODE TECHNOLOGY BARCODE TECHNOLOGY
BARCODE TECHNOLOGY
 
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPT
 
Barcode Technology
Barcode TechnologyBarcode Technology
Barcode Technology
 
"The Barcode" Presentation
 "The Barcode" Presentation  "The Barcode" Presentation
"The Barcode" Presentation
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology ppt
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Bar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationBar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its application
 

Semelhante a Qr code ppt

IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaIRJET Journal
 
NFC Solutions Dubai QR Code Solution NFC Solution
NFC Solutions Dubai QR Code Solution NFC SolutionNFC Solutions Dubai QR Code Solution NFC Solution
NFC Solutions Dubai QR Code Solution NFC Solutionribstechnologies2024
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...IRJET Journal
 
Understanding Bar Codes
Understanding Bar Codes  Understanding Bar Codes
Understanding Bar Codes NEPSLLC
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesEditor IJCATR
 
CREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptxCREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptxELECTRONICSCOMMUNICA6
 
QR Code Scanning PowerPoint Templates.pptx
QR Code Scanning PowerPoint Templates.pptxQR Code Scanning PowerPoint Templates.pptx
QR Code Scanning PowerPoint Templates.pptxpraanyakishore
 
Navin ashokan qr_code
Navin ashokan qr_codeNavin ashokan qr_code
Navin ashokan qr_codeNavin Ashokan
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareMuhammed Afsal Villan
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
 

Semelhante a Qr code ppt (20)

14 571
14 57114 571
14 571
 
Three qr code
Three qr codeThree qr code
Three qr code
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
Qr codes web
Qr codes webQr codes web
Qr codes web
 
&^^&
&^^&&^^&
&^^&
 
Qr code in education
Qr code in educationQr code in education
Qr code in education
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in India
 
NFC Solutions Dubai QR Code Solution NFC Solution
NFC Solutions Dubai QR Code Solution NFC SolutionNFC Solutions Dubai QR Code Solution NFC Solution
NFC Solutions Dubai QR Code Solution NFC Solution
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
 
Understanding Bar Codes
Understanding Bar Codes  Understanding Bar Codes
Understanding Bar Codes
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
 
CREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptxCREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptx
 
QR Code Scanning PowerPoint Templates.pptx
QR Code Scanning PowerPoint Templates.pptxQR Code Scanning PowerPoint Templates.pptx
QR Code Scanning PowerPoint Templates.pptx
 
DETECTION OF QR CODE.pptx
 DETECTION OF QR CODE.pptx DETECTION OF QR CODE.pptx
DETECTION OF QR CODE.pptx
 
Navin ashokan qr_code
Navin ashokan qr_codeNavin ashokan qr_code
Navin ashokan qr_code
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and Hardware
 
Qr codes
Qr codesQr codes
Qr codes
 
QR codes in libraries (By Gaurav Boudh)
QR codes in libraries (By Gaurav Boudh)QR codes in libraries (By Gaurav Boudh)
QR codes in libraries (By Gaurav Boudh)
 
Qr code
Qr codeQr code
Qr code
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 

Último

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Último (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

Qr code ppt

  • 2. SUMMARY Introduction  The QR code structure  The Specification of QR code  Encoding  Characteristics of QR code  Application 
  • 3. INTRODUCTION      QR codes, or quick response codes, are trademark for a type of matrix or (two-dimensional barcodes). First created and introduced by Japanese corporation Denso-Wave in 1994. QR codes can be read by camera phones. We can encode numeric, alphanumeric byte/binary, kanji hold max 7,089 numeric characters and max 4,296 alphanumeric characters worth of data.
  • 5. 2. Types of QR code Version 1 (21×21) Version 4 (33×33). version 2 (25×25). Version 10 (57×57). Version 3 (29×29). Version 40 (177×177).
  • 6. 3. The QR code structure FP : 360°). A pattern for detecting the position of the QR Code( AP: A pattern for correcting the distortion of the QR Code. TP: for correcting the central coordinate of the data cell DA: The QR Code data will be stored (encoded) into the data area
  • 7. 4. The Specification of QR code
  • 8. ENCODING Step 1: Data Encodation  Step 2: Error Correction Codeword generation  Step 3: Module placement in matrix.  Step 4: Masking Pattern selection  Step 5: Format Information  Step 6: Final symbol construction 
  • 9. Four-bit indicators  Are used to select the encoding mode and convey other information Indicator Meaning 0001 Numeric encoding (10 bits per 3 digits) 0010 Alphanumeric encoding (11 bits per 2 characters) 0100 Byte encoding (8 bits per character) 1000 Kanji encoding (13 bits per character) 0011 Structured append (used to split a message across multiple QR symbols) 0111 Extended Channel Interpretation (select alternate character set or encoding) 0101 FNC1 in first position (see Code 128 for more information) 1001 FNC1 in second position 0000 End of message
  • 10. • The number of bits in the length field depends on the encoding and the symbol version, as shown below. Encoding Ver 1–9 10–26 27–40 Numeric 10 12 14 Alphanumeri c 9 11 13 Byte 8 16 16 Kanji 8 10 12
  • 12. 7 Characteristics of QR code 1. All-Direction (360°) High-Speed Reading
  • 13. 2. Resistant to Distorted Symbols
  • 14. 3. Data Restoration Functionality •QR Code has four different error correction levels • Reed-Solomon code which is highly resistant to burst errors arranged in the data area. 4. Efficiently Encoding of Kanji and Kana Characters
  • 15. 5. Linking Functionality of the Symbols • • QR Code has a linking functionality which will enable a single symbol to be represented in several symbols by dividing it . A single symbol can be divided into 16 symbols at maximum
  • 16. 6. The Confidentiality of the Code  By making the relationship between the character type and the stored data unique for a special usage, QR Code can be easily encrypted.
  • 17. QR CODE ENCRYPTION  Who may need encrypted QR codes?   People used passports, driver license and other identification or even loyalty cards. banking, hospitals, health care services QR should be read only by workers  How to encrypt QR codes  use symmetrical keys to encryption and decryption Key can be composed from the sentence or non meaningful characters encryption is done by performing a bitwise XOR operation on both data chunks using key Performing same operation on encryption we get original msg   
  • 18. APPLICATION OF OR CODE  o o o human tracking robot using QR codes Earlier human-recognition systems have u, but the tags require batteries, so the maintenance burden is largesed technology such as active infrared tags QR codes can simply be printed, creating inexpensive passive tags this is advantage of QR code recognition rates can drop dramatically as the distance to the subject increases the we used pattern matching method .
  • 20. QR CODE BASED MOBILE PAYMENT SYSTEM
  • 21. QR CODES IN EDUCATION catalogue search at the library of the University, a QR code will also be displayed automatically to summarize the key information, the title, the author, and the shelf location as  Processes of Preparing and Reading a Document with QR Codes 
  • 22. Conclusion     QR code is a way of encoding more information than a traditional bar code QR code is now being widely used in a variety of businesses. For security of QR code info encryption is required goods are identified using QR codes in commerce, there is a clear need to build new mobile payment systems for mobile users to support mobile transactions based on QR codes
  • 23. REFERENCES      [1]. H. Aoki, S. Matsushita: “Balloon Tag: (In)visible Marker Which Tells Who’s Who,” Proc. of the 4th IEEE International Symposium on Wearable Computers, pp. 181182 (2000-2010) [2]. M. R. Rieback, B. Crispo, and A. S. Tanenbaum. Is your cat infected with a computer virus? In PERCOM ' 06: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing Communications, pages 169{179, Washington, DC ,USA, 2006. IEEE Computer Society [3]. TRIER,O.D.,JAIN,A.K.,"Goal-Directed Evaluation of Binarization Methods",Pattern Analysis and Machine Intelligence,JEEETransactions on PAMI, Vo1.17,No.12,pp.1191-1201,Dec.1995 [4]. Yu-Hsuan Chang, Chung-Hua Chu and Ming-Syan Chen, “A General Scheme for Extracting QR Code from a Non-uniform Background in Camera Phones and Applications,” Ninth IEEE International Symposium on Multimedia, ISM 2007. pp. 123-130, 10-12 Dec. 2007