2. SUMMARY
Introduction
The QR code structure
The Specification of QR code
Encoding
Characteristics of QR code
Application
3. INTRODUCTION
QR codes, or quick response codes, are trademark
for a type of matrix or (two-dimensional barcodes).
First created and introduced by Japanese
corporation
Denso-Wave in 1994.
QR codes can be read by camera phones.
We can encode numeric, alphanumeric
byte/binary, kanji
hold max 7,089 numeric characters and max 4,296
alphanumeric characters worth of data.
5. 2. Types of QR code
Version 1 (21×21)
Version 4 (33×33).
version 2 (25×25).
Version 10 (57×57).
Version 3 (29×29).
Version 40 (177×177).
6. 3. The QR code structure
FP :
360°).
A pattern for detecting the position of the QR Code(
AP: A pattern for correcting the distortion of the QR Code.
TP: for correcting the central coordinate of the data cell
DA: The QR Code data will be stored (encoded) into the data
area
8. ENCODING
Step 1: Data Encodation
Step 2: Error Correction Codeword
generation
Step 3: Module placement in matrix.
Step 4: Masking Pattern selection
Step 5: Format Information
Step 6: Final symbol construction
9. Four-bit indicators
Are used to select the encoding mode
and convey other
information
Indicator
Meaning
0001
Numeric encoding (10 bits per 3 digits)
0010
Alphanumeric encoding (11 bits per 2 characters)
0100
Byte encoding (8 bits per character)
1000
Kanji encoding (13 bits per character)
0011
Structured append (used to split a message across multiple QR
symbols)
0111
Extended Channel Interpretation (select alternate character set
or encoding)
0101
FNC1 in first position (see Code 128 for more information)
1001
FNC1 in second position
0000
End of message
10. • The number of bits in the length field depends on the encoding and
the symbol version, as shown below.
Encoding
Ver 1–9
10–26
27–40
Numeric
10
12
14
Alphanumeri
c
9
11
13
Byte
8
16
16
Kanji
8
10
12
14. 3. Data Restoration Functionality
•QR Code has four different error correction levels
• Reed-Solomon code which is highly resistant to
burst errors arranged in the data area.
4. Efficiently Encoding of Kanji and Kana
Characters
15. 5. Linking Functionality of the Symbols
•
•
QR Code has a linking functionality which will
enable a single symbol to be represented in
several symbols by dividing it .
A single symbol can be divided into 16 symbols
at maximum
16. 6. The Confidentiality of the Code
By making the relationship between the
character type and the stored data unique for
a special usage, QR Code can be easily
encrypted.
17. QR CODE ENCRYPTION
Who may need encrypted QR codes?
People used passports, driver license and other
identification or even loyalty cards.
banking, hospitals, health care services QR should
be read only by workers
How to encrypt QR codes
use symmetrical keys to encryption and decryption
Key can be composed from the sentence or non
meaningful characters
encryption is done by performing a bitwise XOR
operation on both data chunks using key
Performing same operation on encryption we get
original msg
18. APPLICATION OF OR CODE
o
o
o
human tracking robot using QR codes
Earlier human-recognition systems have u, but the
tags require batteries, so the maintenance burden is
largesed technology such as active infrared tags
QR codes can simply be printed, creating
inexpensive passive tags this is advantage of QR
code
recognition rates can drop dramatically as the
distance to the subject increases the we used pattern
matching method .
21. QR CODES IN EDUCATION
catalogue search at the library of the
University, a QR code will also be displayed
automatically to summarize the key
information, the title, the author, and the shelf
location as
Processes of Preparing and Reading a
Document with QR Codes
22. Conclusion
QR code is a way of encoding more information than a
traditional bar code
QR code is now being widely used in a variety of
businesses.
For security of QR code info encryption is required
goods are identified using QR codes in commerce, there
is a clear need to build new mobile payment systems for
mobile users to support mobile transactions based on QR
codes
23. REFERENCES
[1]. H. Aoki, S. Matsushita: “Balloon Tag: (In)visible Marker Which Tells
Who’s Who,” Proc. of the
4th IEEE International Symposium on Wearable Computers, pp. 181182 (2000-2010)
[2]. M. R. Rieback, B. Crispo, and A. S. Tanenbaum. Is your cat infected
with a computer virus? In
PERCOM ' 06: Proceedings of the
Fourth Annual IEEE International Conference on Pervasive Computing
Communications, pages 169{179, Washington, DC ,USA, 2006. IEEE
Computer Society
[3]. TRIER,O.D.,JAIN,A.K.,"Goal-Directed Evaluation of Binarization
Methods",Pattern Analysis and Machine Intelligence,JEEETransactions
on PAMI, Vo1.17,No.12,pp.1191-1201,Dec.1995
[4]. Yu-Hsuan Chang, Chung-Hua Chu and Ming-Syan Chen, “A General
Scheme for Extracting QR Code from a Non-uniform Background in
Camera Phones and Applications,” Ninth IEEE International Symposium
on Multimedia, ISM 2007. pp. 123-130, 10-12 Dec. 2007