SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1020
Review of Types and Analysis of Two Dimensional Bar Codes in
Logistics and E-Commerce
Suraj1, Vanishree K2
1UG Student, RV College of Engineering, Bengaluru, Karnataka, India
2Professor, Dept of Information Science and Engineering, RV College of Engineering, Bengaluru, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Barcodes are visual form of representing data in
machine readable form. The Quick Response(QR) codes are
machine readable two-dimensional matrix barcodes used for
hiding data. These QR codes are increasingly used in
ecommerce and day to day logistics for identificationofcodes.
Security of bar codes is becoming a top priority for the
concerned organizations carrying out ecommerce businesses.
As the QR code is very popular these days, their usability and
attacks on QR code are described. Further, different types of
barcodes are reviewed with the limitations. The scenarios are
identified where a certain barcode is more profoundly used.
The future enhancements for making QR codes more secure
includes making the codes dynamic i.e. capable of storing
changing information.
Key Words: Item, Manifest, Staging Area, Line Haul, Trips,
Bar code, QR Code
1. INTRODUCTION
Quick Response codes are used to encode information like
website URL, SMS message, vCard information,
alphanumeric, numeric etc. The bar codes are designed to
simplify the process to retrieve information by scanning the
code on the camera. In the case of airlines business, the data
leak of 4.5 million customers happened because of low
security in the Quick Response codes of users boarding
passes. The user’spersonal data wascompromised.QRcodes
are very popular because of their fastreadabilityandgreater
storage capacity compared to othertypesofcodes.Barcodes
are increasingly used in almost all industries these days.
Thus the research on this topic is being conducted by us, to
make them more secure and reliable and can be used as per
the requirement in different scenarios. In logistics they play
a crucial role in transportation of the items and packages.
They are widely used in logistics because they are easily
generated and easy to read at any stages without affecting
the actual package. The Security of Quick Response (QR)
codes is becoming a major issue these days, due to
technological advancements and rapid growth in the field of
media and communication. It is really challenging to keep
the data secure in the field of logistics where the items keep
moving from one pallet to another in a rapidly fast manner.
2. USABILITY OF QR CODE
Static QR codes are non-modifiable after publishing. These
are non expirable. Thus they are generally used to store non
changing data. The data is not ingrained in the dynamic QR
codes, thus the information stored inQRcanbechangedafter
publishing. It takes the user to a location which can be
changed. Dynamic QR codes allow tracing the scanning
metrics like device, location and time of the scanner. QR
codes foundspecialrelevanceintheCovidPandemicenabling
users to perform touchless retrieval of information.
There are multiple resources businesses can access that will
allow them to insert a landing page URL and createaQRcode
that will direct users to that URL with the click of a button.
Nowadays the hotel menus, restaurants booking and entry
passes for various events all are done using the scanning of
QR codes through their handheld devices. But using this as
leverage some attackers falsify the QR and hijack the devices
and steal the personal information and use it for bad
intentions.
QR codes in the different aspects of business use cases have
risk associated with the informationstored.Inordertotackle
the risk, there are multiple algorithms introduced in the
improvement of QR codes and better security measuressuch
as digital signatures for watermarking and reduction of
duplication of QR codes, Reed Solomon Correction Method
algorithm to scan QR for partially visible QR code.
3. TYPES OF ATTACKS ON QR
In the following, we consider the foremost prominentattack
scenarios for QR codes and discuss to what extent we are
able to prevent them. Phishing: during a barcode phishing
attack, the attacker tries to urge sensitive information like
the login details and also the mastercard number of a user
by, e.g., encoding a malicious Web address inside the
barcode that redirects the user to a fake online page which
appears very just like the legitimate one. Malware
propagation: it's discussed howQRcodesmaybeutilizedby
attackers to redirect users to malicious sites that silently
install malware by exploiting vulnerable applications on the
device. this can be typically done through an exploit kit that
fingerprints the device and selects the suitable exploit and
malware.Barcodetamperingandcounterfeiting: SinceQR
codes will be wont to provide information a couple of good,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1021
an attacker can benefit by pasting a fake QR code so as to
advertise false products information or false special offers
during which the adversary will sell another product to the
victims. SQL and command injections: The study refers to
automated systems using the knowledge encodedwithinthe
barcodes to access an on-line database. If the string within
the barcode is appended to the query without proper
sanitization, the attacker may easily trigger a SQL injection
attack. Cross-site scripting attacks (XSS): Mobile apps are
often supported Web technology and this might allow
malicious JavaScript code to be injected into trusted HTML
pages, and executed within the app, for instance when the
server doesn't sanitize the user data that's rendered in a
very page. Reader applications attacks: During the
installation process, many barcode reader applications
enkindle full permissions to access user’s resources like the
device location, the contact list andthereforethephotos.just
in case of a vulnerability which will be triggered by an
acceptable crafted barcode, the attacker would get access to
personal user’s data. Discussion: Enhancing QR codes with
digital signature prevents the above attacks only if it's outof
the question for an attacker to perform a legitimate
signature. In an open environment this may be hard to
attain, since a Public Key Infrastructure (PKI), like the one
for the HTTPS protocol, would be at risk of the “HTTPS
phishing problem”, i.e., attackers that have a sound
certificate and use names the same as the one in every of
legitimate entities. However, in an exceedingly
closed/controlled environment, the reader may be
configured to only recognize internal certificates and
verifying the signature would prove the trustworthiness of
the QR code content. as an example, a supermarket with its
own app may well be configured to only use the
supermarket’s public key for signature verification.
4. PROPOSED USAGE METHOD
In this section we study the usability of QR codes supporting
the various scenarios, there are 31 forms of QR codes
available. like QR code for websites should be generated for
under a span of your time to avoid unnecessary attacks and
phishing. The QR reader then analyzes the QR code by
breaking the full thing all the way down to a grid. it's at the
individual grid squares and assigns all a worth supported
whether it's black or white. It then groups grid squares to
make larger patterns. In terms of logistics the various QR
codes of various colors may be used to support the priority
and therefore the security aspect, like using the redcolor QR
code to spot the high risk item during transportation. We
will use multiple link QR code to redirect to multiple links
and used for various purposes to realize the various tasks.
QR chaining will be accustomed avoid the direct access of qr
for the attacker, authenticationofQR data isextremelytough
to realize nowadays, so as to attain we are able to add the
digital signature by the assistance of personal key and also
the people can access it using the general public keys hench
we will assure the authenticity of knowledge of QR. We will
add other cryptography methods to make them safer like
using the digital signature and digital fingerprint using the
opposite encryption techniques and secure the information
forms of QR codes will be used are.
QR code - this refers to the initial version of the qr code
created by Denso Wave within the 1990s. itis easytospotby
its three finder patterns within the bottom–left,top–left,and
top–right corners. Dynamic QR codes allow for expiration of
QR after using for a prespecified number of times.
Aztec code - Similar to QR codes, the Aztec code was
developed by Welch Allyn. It has one finder pattern, right
within the middle. Aztec code can encode modules in the
range from 15 x 15 to an upper limit of 151 to 151 modules.
If Aztec code utilizes its maximum storage capacity of 151 x
151 modules it can encode 3000 characters and around
3750 numerical digits. These codes do not support Kana or
Kanji characters unlike QR codes which support them. Aztec
codes are typically employed for use in airline tickets, travel
documents, vehicle registration, in hospitals for patient,
medication or sample identification .
Maxi code - This kind of QR code is employedbytheUSpost.
It's almost like the Aztec code therein; it places the finder
pattern within the middle, but it uses a honeycomb pattern
rather than squares. Maxi codescanbescannedaccuratelyin
fast motion also(e.g in conveyor belt), and are capable of
encoding numbers and letters. It can encode a maximum of
93 characters of data.
PDF417 - Invented in 1991 by Ynjiun Wang of Symbol
Technologies, the oddly named PDF417 predates the QR
code by three years. It's sort of a mix between a QR code and
a barcode and is well recognizable by its rectangular shape.
PDF417 consists of a set of linear codes stacked together to
give a two dimensional outlook. The name is so because it
has 4 bars, each of 17 units length. It can have a maximum of
929 code words out of which 900 words are for data and
remaining 29 for functions like shifting between significant
modes. These find applications where it's required to store
complex data information in a barcode such as images and
high graphic data. It takes upto mode space than other two
dimensional barcodes.Tilted scanner might not be abe to
decode correct information form PDF417.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1022
Semacode - Developed by a software company of the
identical name, the Semacode may be a data matrix that
appears lots like a standard QR code but doesn’t have
recognizable finder patterns. Data Matrix is 30% to 60%
more spatially efficientforencodingthesamedata compared
to QR Codes. Semacode uses Data Matrix for encoding.
Semacode tags are put on posters of concerts to direct
scanners to the web page to book tickets. Semacodetagsand
mobile phones used together enable multilingual exhibition
systems: Once the tag is scanned, it sets a languagecookie on
the phone's browser. Subsequently tag scans direct the
phone browser to a web page about the item, displayed in
the user's language of choice.
We can generate the precise kinds of QR using the open
source QR generation libraries, by providing the various
parameters like height, width, length, background color,
error correction factor, output formats like bitmap, vector,
etc, border, version range, masking pattern and error
correction level. These differing kinds of QR codes are often
employed in the various scenarios like qr codes in sales and
marketing, qr codes for coronavirus tracing, qr codes on
product packaging, qr codes in industry, QR codes in postal
services, qr codes in education,qrcodesforsharingcontacts,
QR codes for wedding invitation, qr for social media handler,
QR code for audio file. The morecomplextheconfigurationis
employed to get the qr makes it safer. The QR codes which
store the private information during logistics should be
terminated as soon as the operations are going to be over,
the qr code should be proper mechanism to handle the QR
codes after using it for the particular purpose.
5. ANALYSIS AND RESULT
The outcome can be measured on the basis of readability
range, efficiency, security, size, uniqueness, etc. Readability
is measured in terms of the maximum distance and
minimum distance required to scan the QR code by the
scanning device. Nowadays Qr codes are used day to day for
payments. The systems are growing complex day by day.
These payment QR codes need to be reliable and secure in
order to avoid the loss. After the covid outbreak theuseof qr
codes rapidly increased in all areas across the industries
particularly in the field of online payments as shown in the
graph below.
The growth of the uses of Qr codes is rapidly increasing
because of its advantages. In the field of ecommerce the
importance of QR codes is also growing because of high
demand in the market. By using the safety measures we can
avoid the loss due to Qr code based attacks.
There is a need for uniqueness of QR codes because of
multiple items moved on the basis of qr codes and there is
very less possibility of failure, to avoid the catastrophic
events. These Qr codes are becoming famous because of
their high availability and easy readability. The possibilities
to enhance QR codes security are by educating users, use of
dynamic QR codes, increasing error correction level and
usage of softwares for scanning and authenticating the QR
codes. Great emphasis needs to be given on securing the
code on generation and scanning the code.
6. CONCLUSION
In this research we find that there are various types of
barcodes dedicated for use invarioussituations basedon the
need, along with the rapid usage the security aspect is also
growing rapidly to tackle the technological advancement of
today's world. The usage of QR codes in the ecommerce,
especially in the payment section has grown more than any
other segment’s and it also ensures security by using these
techniques we have proposed. Same goes for logistics and
ecommerce the safety of personal information of customers
should be top priority of the organization's using QR codes
for day to day activities. Thus this study will help all
industries understand the possible usability scenarios of
available barcodes and their limitations in certain cases
REFERENCES
[1] Shuang Zheng, Linfan Zhang “Enhancing QR Code
Security”, Thesis, School of Health and Society
Department Design and Computer Science, 2015
[2] Overview 2D Barcode Symbologies”, https://www.tec-
it.com/en/support/knowbase/barcode-overview/2d-
barcodes/Default.aspx
[3] Sangeeta Singh, “QR Code Analysis”, International
Journal of Advanced Research in Computer Science and
Software Engineering, Vol. 6, Issue. 5, May 2016.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1023
[4] Supriya Chavan, Sujata Gadakh, Gholap Kanchan , Sorte
Surabhi , D. V. Shinkar “QR code Authentication System
for confidential (digital Mark sheet) Encrypted data
hiding and retrieval (Decryption)” International Journal
of Advanced Research in Computer and Communication
Engineering , 4 April 2016
[5] K. Li, F. Meng, Z. Huang, Q. Wang, “A Correction
Algorithm of QR Code on Cylindrical Surface”, IOP Conf.
Series: Journal of Physics: Conf. Series, Vol. 1237, Issue
2, pp. 1-6, 2019.
[6] Wang, J. Xu, J. Zhang, G. Li, X. Wang, “Motion Deblur of
QR Code Based on Generative Adversative Network”,
2nd International ConferenceonAlgorithms,Computing
and Artificial Intelligence, Sanya, China, 20- 22
December, 2019.
[7] Y. He, Y. Yang, “An Improved Sauvola Approach on QR
Code Image Binarization”, IEEE 11th International
Conference on AdvancedInfocommTechnology(ICAIT),
Jinan, China, 18-20 Oct., 2019.
[8] L. Xu, J. Jia, “Two-Phase Kernel Estimation for Robust
Motion Deblurring”, European ConferenceonComputer
Vision - ECCV 2010: Computer Vision - ECCV, pp. 157-
170, 2010.
[9] S. Li, J. Shang, Z. Duan, J. Huang, “Fast Detection Method
of Quick Response Code Based on Run-Length Coding”,
IET Image Processing, Vol. 12, Issue 4, pp. 546- 551,
2018.
[10] “QR Codes in Shipping and Logisitics Company”,
https://scanova.io/blog/qr-codes-shipping-and-
logistics/

More Related Content

Similar to Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-Commerce

What is the significance of the QR Code Maintenance App for Your Business- He...
What is the significance of the QR Code Maintenance App for Your Business- He...What is the significance of the QR Code Maintenance App for Your Business- He...
What is the significance of the QR Code Maintenance App for Your Business- He...Techugo
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for BankingIRJET Journal
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaIRJET Journal
 
Cracking the Code: How to Think about QR Codes
Cracking the Code: How to Think about QR CodesCracking the Code: How to Think about QR Codes
Cracking the Code: How to Think about QR CodesMolly Garris
 
Cracking the Code: How To Think About QR
Cracking the Code: How To Think About QRCracking the Code: How To Think About QR
Cracking the Code: How To Think About QRLeo Burnett
 
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)Tejas Lalwani
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodecsandit
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
QRC Presentation.pptx
QRC Presentation.pptxQRC Presentation.pptx
QRC Presentation.pptxGgDevil
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET Journal
 
A Barcode-Based Prototype Authentication System Using Python Programming and ...
A Barcode-Based Prototype Authentication System Using Python Programming and ...A Barcode-Based Prototype Authentication System Using Python Programming and ...
A Barcode-Based Prototype Authentication System Using Python Programming and ...IRJET Journal
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalIRJET Journal
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
 
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerIRJET Journal
 

Similar to Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-Commerce (20)

What is the significance of the QR Code Maintenance App for Your Business- He...
What is the significance of the QR Code Maintenance App for Your Business- He...What is the significance of the QR Code Maintenance App for Your Business- He...
What is the significance of the QR Code Maintenance App for Your Business- He...
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in India
 
QR codes in libraries (By Gaurav Boudh)
QR codes in libraries (By Gaurav Boudh)QR codes in libraries (By Gaurav Boudh)
QR codes in libraries (By Gaurav Boudh)
 
Cracking the Code: How to Think about QR Codes
Cracking the Code: How to Think about QR CodesCracking the Code: How to Think about QR Codes
Cracking the Code: How to Think about QR Codes
 
Cracking the Code: How To Think About QR
Cracking the Code: How To Think About QRCracking the Code: How To Think About QR
Cracking the Code: How To Think About QR
 
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)
 
QR CODE PPT.pptx
QR CODE PPT.pptxQR CODE PPT.pptx
QR CODE PPT.pptx
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
 
major 2
major 2major 2
major 2
 
major 2 ppt
major 2 pptmajor 2 ppt
major 2 ppt
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
QRC Presentation.pptx
QRC Presentation.pptxQRC Presentation.pptx
QRC Presentation.pptx
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
 
A Barcode-Based Prototype Authentication System Using Python Programming and ...
A Barcode-Based Prototype Authentication System Using Python Programming and ...A Barcode-Based Prototype Authentication System Using Python Programming and ...
A Barcode-Based Prototype Authentication System Using Python Programming and ...
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code Scanner
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-Commerce

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1020 Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-Commerce Suraj1, Vanishree K2 1UG Student, RV College of Engineering, Bengaluru, Karnataka, India 2Professor, Dept of Information Science and Engineering, RV College of Engineering, Bengaluru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Barcodes are visual form of representing data in machine readable form. The Quick Response(QR) codes are machine readable two-dimensional matrix barcodes used for hiding data. These QR codes are increasingly used in ecommerce and day to day logistics for identificationofcodes. Security of bar codes is becoming a top priority for the concerned organizations carrying out ecommerce businesses. As the QR code is very popular these days, their usability and attacks on QR code are described. Further, different types of barcodes are reviewed with the limitations. The scenarios are identified where a certain barcode is more profoundly used. The future enhancements for making QR codes more secure includes making the codes dynamic i.e. capable of storing changing information. Key Words: Item, Manifest, Staging Area, Line Haul, Trips, Bar code, QR Code 1. INTRODUCTION Quick Response codes are used to encode information like website URL, SMS message, vCard information, alphanumeric, numeric etc. The bar codes are designed to simplify the process to retrieve information by scanning the code on the camera. In the case of airlines business, the data leak of 4.5 million customers happened because of low security in the Quick Response codes of users boarding passes. The user’spersonal data wascompromised.QRcodes are very popular because of their fastreadabilityandgreater storage capacity compared to othertypesofcodes.Barcodes are increasingly used in almost all industries these days. Thus the research on this topic is being conducted by us, to make them more secure and reliable and can be used as per the requirement in different scenarios. In logistics they play a crucial role in transportation of the items and packages. They are widely used in logistics because they are easily generated and easy to read at any stages without affecting the actual package. The Security of Quick Response (QR) codes is becoming a major issue these days, due to technological advancements and rapid growth in the field of media and communication. It is really challenging to keep the data secure in the field of logistics where the items keep moving from one pallet to another in a rapidly fast manner. 2. USABILITY OF QR CODE Static QR codes are non-modifiable after publishing. These are non expirable. Thus they are generally used to store non changing data. The data is not ingrained in the dynamic QR codes, thus the information stored inQRcanbechangedafter publishing. It takes the user to a location which can be changed. Dynamic QR codes allow tracing the scanning metrics like device, location and time of the scanner. QR codes foundspecialrelevanceintheCovidPandemicenabling users to perform touchless retrieval of information. There are multiple resources businesses can access that will allow them to insert a landing page URL and createaQRcode that will direct users to that URL with the click of a button. Nowadays the hotel menus, restaurants booking and entry passes for various events all are done using the scanning of QR codes through their handheld devices. But using this as leverage some attackers falsify the QR and hijack the devices and steal the personal information and use it for bad intentions. QR codes in the different aspects of business use cases have risk associated with the informationstored.Inordertotackle the risk, there are multiple algorithms introduced in the improvement of QR codes and better security measuressuch as digital signatures for watermarking and reduction of duplication of QR codes, Reed Solomon Correction Method algorithm to scan QR for partially visible QR code. 3. TYPES OF ATTACKS ON QR In the following, we consider the foremost prominentattack scenarios for QR codes and discuss to what extent we are able to prevent them. Phishing: during a barcode phishing attack, the attacker tries to urge sensitive information like the login details and also the mastercard number of a user by, e.g., encoding a malicious Web address inside the barcode that redirects the user to a fake online page which appears very just like the legitimate one. Malware propagation: it's discussed howQRcodesmaybeutilizedby attackers to redirect users to malicious sites that silently install malware by exploiting vulnerable applications on the device. this can be typically done through an exploit kit that fingerprints the device and selects the suitable exploit and malware.Barcodetamperingandcounterfeiting: SinceQR codes will be wont to provide information a couple of good,
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1021 an attacker can benefit by pasting a fake QR code so as to advertise false products information or false special offers during which the adversary will sell another product to the victims. SQL and command injections: The study refers to automated systems using the knowledge encodedwithinthe barcodes to access an on-line database. If the string within the barcode is appended to the query without proper sanitization, the attacker may easily trigger a SQL injection attack. Cross-site scripting attacks (XSS): Mobile apps are often supported Web technology and this might allow malicious JavaScript code to be injected into trusted HTML pages, and executed within the app, for instance when the server doesn't sanitize the user data that's rendered in a very page. Reader applications attacks: During the installation process, many barcode reader applications enkindle full permissions to access user’s resources like the device location, the contact list andthereforethephotos.just in case of a vulnerability which will be triggered by an acceptable crafted barcode, the attacker would get access to personal user’s data. Discussion: Enhancing QR codes with digital signature prevents the above attacks only if it's outof the question for an attacker to perform a legitimate signature. In an open environment this may be hard to attain, since a Public Key Infrastructure (PKI), like the one for the HTTPS protocol, would be at risk of the “HTTPS phishing problem”, i.e., attackers that have a sound certificate and use names the same as the one in every of legitimate entities. However, in an exceedingly closed/controlled environment, the reader may be configured to only recognize internal certificates and verifying the signature would prove the trustworthiness of the QR code content. as an example, a supermarket with its own app may well be configured to only use the supermarket’s public key for signature verification. 4. PROPOSED USAGE METHOD In this section we study the usability of QR codes supporting the various scenarios, there are 31 forms of QR codes available. like QR code for websites should be generated for under a span of your time to avoid unnecessary attacks and phishing. The QR reader then analyzes the QR code by breaking the full thing all the way down to a grid. it's at the individual grid squares and assigns all a worth supported whether it's black or white. It then groups grid squares to make larger patterns. In terms of logistics the various QR codes of various colors may be used to support the priority and therefore the security aspect, like using the redcolor QR code to spot the high risk item during transportation. We will use multiple link QR code to redirect to multiple links and used for various purposes to realize the various tasks. QR chaining will be accustomed avoid the direct access of qr for the attacker, authenticationofQR data isextremelytough to realize nowadays, so as to attain we are able to add the digital signature by the assistance of personal key and also the people can access it using the general public keys hench we will assure the authenticity of knowledge of QR. We will add other cryptography methods to make them safer like using the digital signature and digital fingerprint using the opposite encryption techniques and secure the information forms of QR codes will be used are. QR code - this refers to the initial version of the qr code created by Denso Wave within the 1990s. itis easytospotby its three finder patterns within the bottom–left,top–left,and top–right corners. Dynamic QR codes allow for expiration of QR after using for a prespecified number of times. Aztec code - Similar to QR codes, the Aztec code was developed by Welch Allyn. It has one finder pattern, right within the middle. Aztec code can encode modules in the range from 15 x 15 to an upper limit of 151 to 151 modules. If Aztec code utilizes its maximum storage capacity of 151 x 151 modules it can encode 3000 characters and around 3750 numerical digits. These codes do not support Kana or Kanji characters unlike QR codes which support them. Aztec codes are typically employed for use in airline tickets, travel documents, vehicle registration, in hospitals for patient, medication or sample identification . Maxi code - This kind of QR code is employedbytheUSpost. It's almost like the Aztec code therein; it places the finder pattern within the middle, but it uses a honeycomb pattern rather than squares. Maxi codescanbescannedaccuratelyin fast motion also(e.g in conveyor belt), and are capable of encoding numbers and letters. It can encode a maximum of 93 characters of data. PDF417 - Invented in 1991 by Ynjiun Wang of Symbol Technologies, the oddly named PDF417 predates the QR code by three years. It's sort of a mix between a QR code and a barcode and is well recognizable by its rectangular shape. PDF417 consists of a set of linear codes stacked together to give a two dimensional outlook. The name is so because it has 4 bars, each of 17 units length. It can have a maximum of 929 code words out of which 900 words are for data and remaining 29 for functions like shifting between significant modes. These find applications where it's required to store complex data information in a barcode such as images and high graphic data. It takes upto mode space than other two dimensional barcodes.Tilted scanner might not be abe to decode correct information form PDF417.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1022 Semacode - Developed by a software company of the identical name, the Semacode may be a data matrix that appears lots like a standard QR code but doesn’t have recognizable finder patterns. Data Matrix is 30% to 60% more spatially efficientforencodingthesamedata compared to QR Codes. Semacode uses Data Matrix for encoding. Semacode tags are put on posters of concerts to direct scanners to the web page to book tickets. Semacodetagsand mobile phones used together enable multilingual exhibition systems: Once the tag is scanned, it sets a languagecookie on the phone's browser. Subsequently tag scans direct the phone browser to a web page about the item, displayed in the user's language of choice. We can generate the precise kinds of QR using the open source QR generation libraries, by providing the various parameters like height, width, length, background color, error correction factor, output formats like bitmap, vector, etc, border, version range, masking pattern and error correction level. These differing kinds of QR codes are often employed in the various scenarios like qr codes in sales and marketing, qr codes for coronavirus tracing, qr codes on product packaging, qr codes in industry, QR codes in postal services, qr codes in education,qrcodesforsharingcontacts, QR codes for wedding invitation, qr for social media handler, QR code for audio file. The morecomplextheconfigurationis employed to get the qr makes it safer. The QR codes which store the private information during logistics should be terminated as soon as the operations are going to be over, the qr code should be proper mechanism to handle the QR codes after using it for the particular purpose. 5. ANALYSIS AND RESULT The outcome can be measured on the basis of readability range, efficiency, security, size, uniqueness, etc. Readability is measured in terms of the maximum distance and minimum distance required to scan the QR code by the scanning device. Nowadays Qr codes are used day to day for payments. The systems are growing complex day by day. These payment QR codes need to be reliable and secure in order to avoid the loss. After the covid outbreak theuseof qr codes rapidly increased in all areas across the industries particularly in the field of online payments as shown in the graph below. The growth of the uses of Qr codes is rapidly increasing because of its advantages. In the field of ecommerce the importance of QR codes is also growing because of high demand in the market. By using the safety measures we can avoid the loss due to Qr code based attacks. There is a need for uniqueness of QR codes because of multiple items moved on the basis of qr codes and there is very less possibility of failure, to avoid the catastrophic events. These Qr codes are becoming famous because of their high availability and easy readability. The possibilities to enhance QR codes security are by educating users, use of dynamic QR codes, increasing error correction level and usage of softwares for scanning and authenticating the QR codes. Great emphasis needs to be given on securing the code on generation and scanning the code. 6. CONCLUSION In this research we find that there are various types of barcodes dedicated for use invarioussituations basedon the need, along with the rapid usage the security aspect is also growing rapidly to tackle the technological advancement of today's world. The usage of QR codes in the ecommerce, especially in the payment section has grown more than any other segment’s and it also ensures security by using these techniques we have proposed. Same goes for logistics and ecommerce the safety of personal information of customers should be top priority of the organization's using QR codes for day to day activities. Thus this study will help all industries understand the possible usability scenarios of available barcodes and their limitations in certain cases REFERENCES [1] Shuang Zheng, Linfan Zhang “Enhancing QR Code Security”, Thesis, School of Health and Society Department Design and Computer Science, 2015 [2] Overview 2D Barcode Symbologies”, https://www.tec- it.com/en/support/knowbase/barcode-overview/2d- barcodes/Default.aspx [3] Sangeeta Singh, “QR Code Analysis”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 6, Issue. 5, May 2016.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1023 [4] Supriya Chavan, Sujata Gadakh, Gholap Kanchan , Sorte Surabhi , D. V. Shinkar “QR code Authentication System for confidential (digital Mark sheet) Encrypted data hiding and retrieval (Decryption)” International Journal of Advanced Research in Computer and Communication Engineering , 4 April 2016 [5] K. Li, F. Meng, Z. Huang, Q. Wang, “A Correction Algorithm of QR Code on Cylindrical Surface”, IOP Conf. Series: Journal of Physics: Conf. Series, Vol. 1237, Issue 2, pp. 1-6, 2019. [6] Wang, J. Xu, J. Zhang, G. Li, X. Wang, “Motion Deblur of QR Code Based on Generative Adversative Network”, 2nd International ConferenceonAlgorithms,Computing and Artificial Intelligence, Sanya, China, 20- 22 December, 2019. [7] Y. He, Y. Yang, “An Improved Sauvola Approach on QR Code Image Binarization”, IEEE 11th International Conference on AdvancedInfocommTechnology(ICAIT), Jinan, China, 18-20 Oct., 2019. [8] L. Xu, J. Jia, “Two-Phase Kernel Estimation for Robust Motion Deblurring”, European ConferenceonComputer Vision - ECCV 2010: Computer Vision - ECCV, pp. 157- 170, 2010. [9] S. Li, J. Shang, Z. Duan, J. Huang, “Fast Detection Method of Quick Response Code Based on Run-Length Coding”, IET Image Processing, Vol. 12, Issue 4, pp. 546- 551, 2018. [10] “QR Codes in Shipping and Logisitics Company”, https://scanova.io/blog/qr-codes-shipping-and- logistics/