SlideShare a Scribd company logo
1 of 24
QR CODE
SUMMARY
Introduction
 The QR code structure
 The Specification of QR code
 Encoding
 Characteristics of QR code
 Application

INTRODUCTION









QR codes, or quick response codes, are trademark
for a type of matrix or (two-dimensional barcodes).
First created and introduced by Japanese
corporation
Denso-Wave in 1994.
QR codes can be read by camera phones.
We can encode numeric, alphanumeric
byte/binary, kanji
hold max 7,089 numeric characters and max 4,296
alphanumeric characters worth of data.
1.Comparison of different code

formats
2. Types of QR code

Version 1 (21×21)

Version 4 (33×33).

version 2 (25×25).

Version 10 (57×57).

Version 3 (29×29).

Version 40 (177×177).
3. The QR code structure

FP :

360°).
A pattern for detecting the position of the QR Code(

AP: A pattern for correcting the distortion of the QR Code.
TP: for correcting the central coordinate of the data cell
DA: The QR Code data will be stored (encoded) into the data
area
4. The Specification of QR

code
ENCODING
Step 1: Data Encodation
 Step 2: Error Correction Codeword
generation
 Step 3: Module placement in matrix.
 Step 4: Masking Pattern selection
 Step 5: Format Information
 Step 6: Final symbol construction

Four-bit indicators

Are used to select the encoding mode
and convey other
information
Indicator

Meaning

0001

Numeric encoding (10 bits per 3 digits)

0010

Alphanumeric encoding (11 bits per 2 characters)

0100

Byte encoding (8 bits per character)

1000

Kanji encoding (13 bits per character)

0011

Structured append (used to split a message across multiple QR
symbols)

0111

Extended Channel Interpretation (select alternate character set
or encoding)

0101

FNC1 in first position (see Code 128 for more information)

1001

FNC1 in second position

0000

End of message
• The number of bits in the length field depends on the encoding and
the symbol version, as shown below.

Encoding

Ver 1–9

10–26

27–40

Numeric

10

12

14

Alphanumeri
c

9

11

13

Byte

8

16

16

Kanji

8

10

12
6.MESSAGE PLACEMENT WITHIN A QR
SYMBOL
7 Characteristics of QR code
1. All-Direction (360°) High-Speed Reading
2. Resistant to Distorted Symbols
3. Data Restoration Functionality
•QR Code has four different error correction levels
• Reed-Solomon code which is highly resistant to
burst errors arranged in the data area.

4. Efficiently Encoding of Kanji and Kana
Characters
5. Linking Functionality of the Symbols
•
•

QR Code has a linking functionality which will
enable a single symbol to be represented in
several symbols by dividing it .
A single symbol can be divided into 16 symbols
at maximum
6. The Confidentiality of the Code



By making the relationship between the
character type and the stored data unique for
a special usage, QR Code can be easily
encrypted.
QR CODE ENCRYPTION
 Who may need encrypted QR codes?




People used passports, driver license and other
identification or even loyalty cards.
banking, hospitals, health care services QR should
be read only by workers



How to encrypt QR codes



use symmetrical keys to encryption and decryption
Key can be composed from the sentence or non
meaningful characters
encryption is done by performing a bitwise XOR
operation on both data chunks using key
Performing same operation on encryption we get
original msg




APPLICATION OF OR CODE


o

o

o

human tracking robot using QR codes
Earlier human-recognition systems have u, but the
tags require batteries, so the maintenance burden is
largesed technology such as active infrared tags
QR codes can simply be printed, creating
inexpensive passive tags this is advantage of QR
code
recognition rates can drop dramatically as the
distance to the subject increases the we used pattern
matching method .
SYSTEM ARCHITECTURE (CONTD.)
QR CODE BASED MOBILE PAYMENT SYSTEM
QR CODES IN EDUCATION
catalogue search at the library of the
University, a QR code will also be displayed
automatically to summarize the key
information, the title, the author, and the shelf
location as
 Processes of Preparing and Reading a
Document with QR Codes

Conclusion








QR code is a way of encoding more information than a
traditional bar code
QR code is now being widely used in a variety of
businesses.
For security of QR code info encryption is required
goods are identified using QR codes in commerce, there
is a clear need to build new mobile payment systems for
mobile users to support mobile transactions based on QR
codes
REFERENCES








[1]. H. Aoki, S. Matsushita: “Balloon Tag: (In)visible Marker Which Tells
Who’s Who,” Proc. of the
4th IEEE International Symposium on Wearable Computers, pp. 181182 (2000-2010)
[2]. M. R. Rieback, B. Crispo, and A. S. Tanenbaum. Is your cat infected
with a computer virus? In
PERCOM ' 06: Proceedings of the
Fourth Annual IEEE International Conference on Pervasive Computing
Communications, pages 169{179, Washington, DC ,USA, 2006. IEEE
Computer Society
[3]. TRIER,O.D.,JAIN,A.K.,"Goal-Directed Evaluation of Binarization
Methods",Pattern Analysis and Machine Intelligence,JEEETransactions
on PAMI, Vo1.17,No.12,pp.1191-1201,Dec.1995
[4]. Yu-Hsuan Chang, Chung-Hua Chu and Ming-Syan Chen, “A General
Scheme for Extracting QR Code from a Non-uniform Background in
Camera Phones and Applications,” Ninth IEEE International Symposium
on Multimedia, ISM 2007. pp. 123-130, 10-12 Dec. 2007
THANK YOU

More Related Content

What's hot

QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationZachary Moore
 
QR Code - Quick Response Code
QR Code - Quick Response CodeQR Code - Quick Response Code
QR Code - Quick Response CodeAditya Vishnu
 
QR Codes: A Point of View
QR Codes: A Point of ViewQR Codes: A Point of View
QR Codes: A Point of ViewBBDO
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Likan Patra
 
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Jishnu Mandal
 
QR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeQR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeRehan Guha
 
Barcode latest technology1
Barcode latest technology1Barcode latest technology1
Barcode latest technology1dhananajay95
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBadshah34
 
Barcode Technology
Barcode TechnologyBarcode Technology
Barcode TechnologyARUN SUNNY
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology pptNeeta Chavare
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr codeCoder Tech
 
Documentation on barcode technology
Documentation on barcode technologyDocumentation on barcode technology
Documentation on barcode technologybhupathi vikas
 
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.RobbySahoo
 
seminar-on-barcodes
seminar-on-barcodesseminar-on-barcodes
seminar-on-barcodesalibefkani
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013JASON WOODHOUSE
 

What's hot (20)

QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint Presentation
 
Qr code
Qr codeQr code
Qr code
 
QR codes
QR codesQR codes
QR codes
 
QR code
QR codeQR code
QR code
 
QR Code - Quick Response Code
QR Code - Quick Response CodeQR Code - Quick Response Code
QR Code - Quick Response Code
 
QR Codes: A Point of View
QR Codes: A Point of ViewQR Codes: A Point of View
QR Codes: A Point of View
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
 
QR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeQR Code - Mobile readable Barcode
QR Code - Mobile readable Barcode
 
Barcode latest technology1
Barcode latest technology1Barcode latest technology1
Barcode latest technology1
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPT
 
Barcode Technology
Barcode TechnologyBarcode Technology
Barcode Technology
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology ppt
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
 
Documentation on barcode technology
Documentation on barcode technologyDocumentation on barcode technology
Documentation on barcode technology
 
Barcodes
BarcodesBarcodes
Barcodes
 
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.
 
seminar-on-barcodes
seminar-on-barcodesseminar-on-barcodes
seminar-on-barcodes
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013
 

Similar to Qr code ppt

IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaIRJET Journal
 
NFC Solutions Dubai QR Code Solution NFC Solution
NFC Solutions Dubai QR Code Solution NFC SolutionNFC Solutions Dubai QR Code Solution NFC Solution
NFC Solutions Dubai QR Code Solution NFC Solutionribstechnologies2024
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...IRJET Journal
 
Understanding Bar Codes
Understanding Bar Codes  Understanding Bar Codes
Understanding Bar Codes NEPSLLC
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesEditor IJCATR
 
CREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptxCREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptxELECTRONICSCOMMUNICA6
 
QR Code Scanning PowerPoint Templates.pptx
QR Code Scanning PowerPoint Templates.pptxQR Code Scanning PowerPoint Templates.pptx
QR Code Scanning PowerPoint Templates.pptxpraanyakishore
 
Navin ashokan qr_code
Navin ashokan qr_codeNavin ashokan qr_code
Navin ashokan qr_codeNavin Ashokan
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareMuhammed Afsal Villan
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
 

Similar to Qr code ppt (20)

14 571
14 57114 571
14 571
 
Three qr code
Three qr codeThree qr code
Three qr code
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
Qr codes web
Qr codes webQr codes web
Qr codes web
 
&^^&
&^^&&^^&
&^^&
 
Qr code in education
Qr code in educationQr code in education
Qr code in education
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in India
 
NFC Solutions Dubai QR Code Solution NFC Solution
NFC Solutions Dubai QR Code Solution NFC SolutionNFC Solutions Dubai QR Code Solution NFC Solution
NFC Solutions Dubai QR Code Solution NFC Solution
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
 
Understanding Bar Codes
Understanding Bar Codes  Understanding Bar Codes
Understanding Bar Codes
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
 
CREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptxCREATION AND DETECTION OF QR CODE.pptx
CREATION AND DETECTION OF QR CODE.pptx
 
QR Code Scanning PowerPoint Templates.pptx
QR Code Scanning PowerPoint Templates.pptxQR Code Scanning PowerPoint Templates.pptx
QR Code Scanning PowerPoint Templates.pptx
 
DETECTION OF QR CODE.pptx
 DETECTION OF QR CODE.pptx DETECTION OF QR CODE.pptx
DETECTION OF QR CODE.pptx
 
Navin ashokan qr_code
Navin ashokan qr_codeNavin ashokan qr_code
Navin ashokan qr_code
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and Hardware
 
Qr codes
Qr codesQr codes
Qr codes
 
QR codes in libraries (By Gaurav Boudh)
QR codes in libraries (By Gaurav Boudh)QR codes in libraries (By Gaurav Boudh)
QR codes in libraries (By Gaurav Boudh)
 
Qr code
Qr codeQr code
Qr code
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Qr code ppt

  • 2. SUMMARY Introduction  The QR code structure  The Specification of QR code  Encoding  Characteristics of QR code  Application 
  • 3. INTRODUCTION      QR codes, or quick response codes, are trademark for a type of matrix or (two-dimensional barcodes). First created and introduced by Japanese corporation Denso-Wave in 1994. QR codes can be read by camera phones. We can encode numeric, alphanumeric byte/binary, kanji hold max 7,089 numeric characters and max 4,296 alphanumeric characters worth of data.
  • 5. 2. Types of QR code Version 1 (21×21) Version 4 (33×33). version 2 (25×25). Version 10 (57×57). Version 3 (29×29). Version 40 (177×177).
  • 6. 3. The QR code structure FP : 360°). A pattern for detecting the position of the QR Code( AP: A pattern for correcting the distortion of the QR Code. TP: for correcting the central coordinate of the data cell DA: The QR Code data will be stored (encoded) into the data area
  • 7. 4. The Specification of QR code
  • 8. ENCODING Step 1: Data Encodation  Step 2: Error Correction Codeword generation  Step 3: Module placement in matrix.  Step 4: Masking Pattern selection  Step 5: Format Information  Step 6: Final symbol construction 
  • 9. Four-bit indicators  Are used to select the encoding mode and convey other information Indicator Meaning 0001 Numeric encoding (10 bits per 3 digits) 0010 Alphanumeric encoding (11 bits per 2 characters) 0100 Byte encoding (8 bits per character) 1000 Kanji encoding (13 bits per character) 0011 Structured append (used to split a message across multiple QR symbols) 0111 Extended Channel Interpretation (select alternate character set or encoding) 0101 FNC1 in first position (see Code 128 for more information) 1001 FNC1 in second position 0000 End of message
  • 10. • The number of bits in the length field depends on the encoding and the symbol version, as shown below. Encoding Ver 1–9 10–26 27–40 Numeric 10 12 14 Alphanumeri c 9 11 13 Byte 8 16 16 Kanji 8 10 12
  • 12. 7 Characteristics of QR code 1. All-Direction (360°) High-Speed Reading
  • 13. 2. Resistant to Distorted Symbols
  • 14. 3. Data Restoration Functionality •QR Code has four different error correction levels • Reed-Solomon code which is highly resistant to burst errors arranged in the data area. 4. Efficiently Encoding of Kanji and Kana Characters
  • 15. 5. Linking Functionality of the Symbols • • QR Code has a linking functionality which will enable a single symbol to be represented in several symbols by dividing it . A single symbol can be divided into 16 symbols at maximum
  • 16. 6. The Confidentiality of the Code  By making the relationship between the character type and the stored data unique for a special usage, QR Code can be easily encrypted.
  • 17. QR CODE ENCRYPTION  Who may need encrypted QR codes?   People used passports, driver license and other identification or even loyalty cards. banking, hospitals, health care services QR should be read only by workers  How to encrypt QR codes  use symmetrical keys to encryption and decryption Key can be composed from the sentence or non meaningful characters encryption is done by performing a bitwise XOR operation on both data chunks using key Performing same operation on encryption we get original msg   
  • 18. APPLICATION OF OR CODE  o o o human tracking robot using QR codes Earlier human-recognition systems have u, but the tags require batteries, so the maintenance burden is largesed technology such as active infrared tags QR codes can simply be printed, creating inexpensive passive tags this is advantage of QR code recognition rates can drop dramatically as the distance to the subject increases the we used pattern matching method .
  • 20. QR CODE BASED MOBILE PAYMENT SYSTEM
  • 21. QR CODES IN EDUCATION catalogue search at the library of the University, a QR code will also be displayed automatically to summarize the key information, the title, the author, and the shelf location as  Processes of Preparing and Reading a Document with QR Codes 
  • 22. Conclusion     QR code is a way of encoding more information than a traditional bar code QR code is now being widely used in a variety of businesses. For security of QR code info encryption is required goods are identified using QR codes in commerce, there is a clear need to build new mobile payment systems for mobile users to support mobile transactions based on QR codes
  • 23. REFERENCES      [1]. H. Aoki, S. Matsushita: “Balloon Tag: (In)visible Marker Which Tells Who’s Who,” Proc. of the 4th IEEE International Symposium on Wearable Computers, pp. 181182 (2000-2010) [2]. M. R. Rieback, B. Crispo, and A. S. Tanenbaum. Is your cat infected with a computer virus? In PERCOM ' 06: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing Communications, pages 169{179, Washington, DC ,USA, 2006. IEEE Computer Society [3]. TRIER,O.D.,JAIN,A.K.,"Goal-Directed Evaluation of Binarization Methods",Pattern Analysis and Machine Intelligence,JEEETransactions on PAMI, Vo1.17,No.12,pp.1191-1201,Dec.1995 [4]. Yu-Hsuan Chang, Chung-Hua Chu and Ming-Syan Chen, “A General Scheme for Extracting QR Code from a Non-uniform Background in Camera Phones and Applications,” Ninth IEEE International Symposium on Multimedia, ISM 2007. pp. 123-130, 10-12 Dec. 2007