Your SlideShare is downloading. ×
0
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Qr code ppt
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Qr code ppt

937

Published on

Qr code

Qr code

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
937
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
91
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. QR CODE
  • 2. SUMMARY Introduction  The QR code structure  The Specification of QR code  Encoding  Characteristics of QR code  Application 
  • 3. INTRODUCTION      QR codes, or quick response codes, are trademark for a type of matrix or (two-dimensional barcodes). First created and introduced by Japanese corporation Denso-Wave in 1994. QR codes can be read by camera phones. We can encode numeric, alphanumeric byte/binary, kanji hold max 7,089 numeric characters and max 4,296 alphanumeric characters worth of data.
  • 4. 1.Comparison of different code formats
  • 5. 2. Types of QR code Version 1 (21×21) Version 4 (33×33). version 2 (25×25). Version 10 (57×57). Version 3 (29×29). Version 40 (177×177).
  • 6. 3. The QR code structure FP : 360°). A pattern for detecting the position of the QR Code( AP: A pattern for correcting the distortion of the QR Code. TP: for correcting the central coordinate of the data cell DA: The QR Code data will be stored (encoded) into the data area
  • 7. 4. The Specification of QR code
  • 8. ENCODING Step 1: Data Encodation  Step 2: Error Correction Codeword generation  Step 3: Module placement in matrix.  Step 4: Masking Pattern selection  Step 5: Format Information  Step 6: Final symbol construction 
  • 9. Four-bit indicators  Are used to select the encoding mode and convey other information Indicator Meaning 0001 Numeric encoding (10 bits per 3 digits) 0010 Alphanumeric encoding (11 bits per 2 characters) 0100 Byte encoding (8 bits per character) 1000 Kanji encoding (13 bits per character) 0011 Structured append (used to split a message across multiple QR symbols) 0111 Extended Channel Interpretation (select alternate character set or encoding) 0101 FNC1 in first position (see Code 128 for more information) 1001 FNC1 in second position 0000 End of message
  • 10. • The number of bits in the length field depends on the encoding and the symbol version, as shown below. Encoding Ver 1–9 10–26 27–40 Numeric 10 12 14 Alphanumeri c 9 11 13 Byte 8 16 16 Kanji 8 10 12
  • 11. 6.MESSAGE PLACEMENT WITHIN A QR SYMBOL
  • 12. 7 Characteristics of QR code 1. All-Direction (360°) High-Speed Reading
  • 13. 2. Resistant to Distorted Symbols
  • 14. 3. Data Restoration Functionality •QR Code has four different error correction levels • Reed-Solomon code which is highly resistant to burst errors arranged in the data area. 4. Efficiently Encoding of Kanji and Kana Characters
  • 15. 5. Linking Functionality of the Symbols • • QR Code has a linking functionality which will enable a single symbol to be represented in several symbols by dividing it . A single symbol can be divided into 16 symbols at maximum
  • 16. 6. The Confidentiality of the Code  By making the relationship between the character type and the stored data unique for a special usage, QR Code can be easily encrypted.
  • 17. QR CODE ENCRYPTION  Who may need encrypted QR codes?   People used passports, driver license and other identification or even loyalty cards. banking, hospitals, health care services QR should be read only by workers  How to encrypt QR codes  use symmetrical keys to encryption and decryption Key can be composed from the sentence or non meaningful characters encryption is done by performing a bitwise XOR operation on both data chunks using key Performing same operation on encryption we get original msg   
  • 18. APPLICATION OF OR CODE  o o o human tracking robot using QR codes Earlier human-recognition systems have u, but the tags require batteries, so the maintenance burden is largesed technology such as active infrared tags QR codes can simply be printed, creating inexpensive passive tags this is advantage of QR code recognition rates can drop dramatically as the distance to the subject increases the we used pattern matching method .
  • 19. SYSTEM ARCHITECTURE (CONTD.)
  • 20. QR CODE BASED MOBILE PAYMENT SYSTEM
  • 21. QR CODES IN EDUCATION catalogue search at the library of the University, a QR code will also be displayed automatically to summarize the key information, the title, the author, and the shelf location as  Processes of Preparing and Reading a Document with QR Codes 
  • 22. Conclusion     QR code is a way of encoding more information than a traditional bar code QR code is now being widely used in a variety of businesses. For security of QR code info encryption is required goods are identified using QR codes in commerce, there is a clear need to build new mobile payment systems for mobile users to support mobile transactions based on QR codes
  • 23. REFERENCES      [1]. H. Aoki, S. Matsushita: “Balloon Tag: (In)visible Marker Which Tells Who’s Who,” Proc. of the 4th IEEE International Symposium on Wearable Computers, pp. 181182 (2000-2010) [2]. M. R. Rieback, B. Crispo, and A. S. Tanenbaum. Is your cat infected with a computer virus? In PERCOM ' 06: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing Communications, pages 169{179, Washington, DC ,USA, 2006. IEEE Computer Society [3]. TRIER,O.D.,JAIN,A.K.,"Goal-Directed Evaluation of Binarization Methods",Pattern Analysis and Machine Intelligence,JEEETransactions on PAMI, Vo1.17,No.12,pp.1191-1201,Dec.1995 [4]. Yu-Hsuan Chang, Chung-Hua Chu and Ming-Syan Chen, “A General Scheme for Extracting QR Code from a Non-uniform Background in Camera Phones and Applications,” Ninth IEEE International Symposium on Multimedia, ISM 2007. pp. 123-130, 10-12 Dec. 2007
  • 24. THANK YOU

×