55
CHAPTER-1 INTRODUCTION TO QR CODES 1.1 WHAT IS QR CODE QR code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode (or two-dimensional barcode) first designed for the automotive industry in Japan. A barcode is a machine-readable optical label that contains information about the item to which it is attached. A QR code uses four standardized encoding modes (numeric, alphanumeric, byte / binary, and kanji) to efficiently store data; extensions may also be used The QR Code system has become popular outside the automotive industry due to its fast readability and greater storage capacity compared to standard UPC barcodes. Applications include product tracking, item identification, time tracking, document management, general marketing, and much more. A QR code consists of black modules (square dots) arranged in a square grid on a white background, which can be read by an imaging device (such as a camera) and processed using Reed– Solomon error correction until the image can be appropriately interpreted. The required data are then extracted from patterns present in both horizontal and vertical components of the image. 1

158539278 QR Code Final Report (2)

Embed Size (px)

DESCRIPTION

qr code

Citation preview

Page 1: 158539278 QR Code Final Report (2)

CHAPTER-1

INTRODUCTION TO QR CODES

1.1 WHAT IS QR CODE

QR code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode (or two-dimensional barcode) first designed for the automotive industry in Japan. A barcode is a machine-readable optical label that contains information about the item to which it is attached. A QR code uses four standardized encoding modes (numeric, alphanumeric, byte / binary, and kanji) to efficiently store data; extensions may also be used

The QR Code system has become popular outside the automotive industry due to its fast readability and greater storage capacity compared to standard UPC barcodes. Applications include product tracking, item identification, time tracking, document management, general marketing, and much more.

A QR code consists of black modules (square dots) arranged in a square grid on a white background, which can be read by an imaging device (such as a camera) and processed using Reed–Solomon error correction until the image can be appropriately interpreted. The required data are then extracted from patterns present in both horizontal and vertical components of the image.

Fig1.1: Quick Response Code

1

Page 2: 158539278 QR Code Final Report (2)

The QR (Quick Response) Code is a two-dimensional (2-D) matrix code that belongs to a

larger set of machine-readable codes, all of which are often referred to as barcodes, regardless

of whether they are made up of bars, squares or other-shaped elements.

Compared with 1-D codes, 2-D codes can hold a larger amount of data in a smaller space,

and compared with other 2-D codes, QR Code Essentials.

The QR Code can hold much more data still. In addition, an advanced error-correction

method and other unique characteristics allow the QR Code to be read more reliably and

at higher speeds than other codes. Like written language, barcodes are visual representations

of information. Unlike language, however, which humans can read, barcodes are designed to

be read and understood (decoded) by computers, using machine-vision systems consisting of

optical laser scanners or cameras and barcode-interpreting software. The rules with which a

barcode is constructed (its grammar) and the character set it uses (its alphabet) are called

its symbology.

Fig 1.1.1 To barcode-reading software, both of these 1-D barcodes are identical.Changing the height of the bars does not change the information they contain.

Differences in the second, vertical dimension of the bars and spaces—whether they are taller

or shorter—does not matter; all that counts is how wide they are and what order they are

placed in.

2

Page 3: 158539278 QR Code Final Report (2)

HISTORY

The QR code system was invented in 1994 by Denso Wave. Its purpose was to track vehicles during manufacture; it was designed to allow high-speed component scanning Although initially used for tracking parts in vehicle manufacturing, QR codes now are used in a much broader context, including both commercial tracking applications and convenience-oriented applications aimed at mobile-phone users (termed mobile tagging). QR codes may be used to display text to the user, to add a vCard contact to the user's device, to open a Uniform Resource Identifier (URI), or to compose an e-mail or text message. Users can generate and print their own QR codes for others to scan and use by visiting one of several paid and free QR code generating sites or apps. The technology has since become one of the most-used types of two-dimensional barcode

1.2 DEVELOPMENT OF QR CODE

1.2.1 FROM 1-D TO 2-D CODES

After the commercial introduction of 1-D barcodes in 1966, they quickly gained widespread

acceptance. In time, however, demand grew for new types of codes that could hold more

information and use more character types, yet occupy a smaller space. Attempts were

consequently made to increase the amount of data contained in barcodes by increasing the

number of bars or creating multiple-barcode layouts. These efforts, however, resulted in a

larger barcode area, complicated reading requirements and increased printing costs. To solve

these problems, two-dimensional (2-D) codes were developed, first as stacked barcodes,

which repeat the same linear symbology vertically, and then as matrix codes, composed of

small, symmetrical elements arranged in a square or rectangle.

Multiple-barcode 2-D stacked barcode 2-D matrix code

Fig1.2 development of qr codes

3

Page 4: 158539278 QR Code Final Report (2)

Because 2-D matrix codes contain information in both the horizontal and vertical direction,

they met the need for high data density and small size, yet further improvements were still

to follow, including those introduced by the QR Code. The following table summarizes the

features and characteristics of some typical 2-D codes.

1.2.2 FEATURES OF CODES

The following table summarizes the features and characteristic of some typical 2-D codes.

Fig 1.2.1 features of codes

4

Page 5: 158539278 QR Code Final Report (2)

fig 1.2.2: development of qr codes with characteristics

1.2.3 STORAGE

The amount of data that can be stored in the QR code symbol depends on the datatype (mode, or input character set), version (1, …, 40, indicating the overall dimensions of the symbol), and error correction level. The maximum storage capacities occur for 40-L symbols (version 40, error correction level L)

Maximum character storage capacity (40-L)character refers to individual values of the input mode/datatype

Input mode max. characters bits/char possible characters, default encoding

Numeric only 7,089 3⅓ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9

Alphanumeric 4,296 5½ 0–9, A–Z (upper-case only), space, $, %, *, +, -, ., /, :

Binary/byte 2,953 8 ISO 8859.1

Kanji/kana 1,817 13 Shift JIS X 0208

5

Page 6: 158539278 QR Code Final Report (2)

CHAPTER-2

UNDERSTANDING OF QR CODE STRUCTURE

2.1 CODE STRUCTURE

Fig 2.1 code structure

Unlike 1-D barcodes, the QR Code is a 2-D matrix code that conveys information not by the

size and position of bars and spaces in a single (horizontal) dimension, but by the

arrangement of its dark and light elements, called “modules,” in columns and rows, i.e. in

both the horizontal and vertical directions.

Each dark or light module of a QR Code symbol—a specific instance of a code—represents a

0 or 1, thus making it machineintelligible.

6

Page 7: 158539278 QR Code Final Report (2)

Fig 2.1.1 module structure

The QR Code modules perform several functions: Some contain the actual data itself, while

others are grouped into various function patterns that improve reading performance and allow

symbol alignment, error correction and distortion compensation. The timing pattern lets the

scanning device know the size of the symbol. There is also a required “quiet zone,” a four-

modulewide buffer area containing no data, to ensure that surrounding text or markings are

not mistaken for QR Code data.

Conventional 2-D matrix codes required a considerable amount of time to be spent searching

a symbol’s code to determine its angle of orientation, position (x and y coordinates) and size.

To address this problem, the QR Code was designed with special position-detection patterns

located in three corners of each symbol. The patterns have a symmetrical scan-line ratio of

1:1:3:1:1, which allows them to be scanned from any direction within a full 360 degrees. In

addition, the positional relationship of the patterns allows quick access to the relevant

angle, position and size information contained in the code’s periphery.

As a result, the QR Code does not require lengthy code searching, enabling reading speeds 20

times faster than those of conventional matrix codes. Also, searching the position detection

patterns can be performed by the scanning hardware, further increasing overall speed by

allowing image reading and data processing to be carried out simultaneously.

7

Page 8: 158539278 QR Code Final Report (2)

2.2 QR CODE SYMBOL VERSIONS

QR Codes can be generated in 40 different symbol versions, from 21 x 21 modules (version

1) to 177 x 177 modules (version 40).

Fig 2.2 symbol version

Each higher symbol version has 4 additional modules per side (16 additional modules per

symbol), and can contain a proportionally larger amount of data. The maximum amount of

data that can be contained by a given symbol is determined by its version, type of characters

and error-correction level.

2.3 READING OF QR CODES

• Mobile device must have a camera

• Start the QR reader app

• Point the camera at the code – orient code within designated area

8

Page 9: 158539278 QR Code Final Report (2)

CHAPTER-3 TYPES OF QR CODES

(1) URL:

These are the codes that redirect the user to a website. As soon the code is scanned, the phone

browser will open and load the company website. Company can put URL QR codes on their

promotional materials so that their customers who are looking for more information can land

on their website.

(2) MECARD:

Containing contact details, these codes automatically save information in a user’s phone

address book. This saves users from the hassle of entering the information manually and from

making input mistakes. These codes are very useful in an event such as conventions,

conferences, and seminars where there is a need to exchange business card.

(3) VCARD:

A vCard QR code can store more data than meCard QR code, like a salutation, job title,

mobile number, work details, address, zip code, and country. Such information is useful if a

person is working on a global level and needs to share more information about to consumers.

(4) CALENDAR EVENT:

Usually found on invitation cards and movie or concert tickets, these codes have information

regarding the event date, time, and location. They can also hold event descriptions. These

codes also have an option to automatically save the event in the phone’s calendar.

(5) EMAIL:

When scanned, email QR codes will have an email address to provide. Email QR codes can

also open email composition window on a user’s phone, with the email address field already

filled in. These codes can prompt users to send an email.

9

Page 10: 158539278 QR Code Final Report (2)

(6) PHONE NUMBER:

This code is used to encode a phone number so when a phone scans it, it will produce a

number on its home screen. This encourages users to call the advertiser, rather than continue

searching. This type of QR code is especially useful for pizza delivery and similar services.

(7) SMS:

This type of QR code prompts an SMS message from the user’s phone, automatically

addressing and composing the text message. An SMS QR code is best used for subscription

services.

(8) GPS Map Coordinates:

Information regarding the location of a particular place or an object is stored using latitude

and longitude coordinates and can be displayed on a smartphone. This code can also provide

directions.

(10) SOCIAL MEDIA:

Use this code to get a person to like a Facebook page or retweet on Twitter. You can also use

this code to share information on social networking websites.

(11) PLAIN TEXT:

This code displays a text message to the code’s scanner, and is useful for communicating

short messages.

(11) YOUTUBE VIDEO:

Embedding a YouTube video in your QR code directs users to promotional or how-to videos

about your company.

(12) LINKEDIN SHARE:

Creating a QR Code for LinkedIn lets clients and customers find your profile easily on this

popular business networking site.

10

Page 11: 158539278 QR Code Final Report (2)

(13) FOURSQUARE VENUE:

You can create a QR code to capitalize on the popularity for the FourSquare app, which

entices customers to check in at your location and tell their friends.

11

Page 12: 158539278 QR Code Final Report (2)

CHAPTER-4

CREATION AND WORKING OF QR CODES

4.1 QR CODE GENERATOR

As the inventor of the QR Code and owner of the QR Code trademark, DENSO Wave

Incorporated has allowed the patents for the code to be freely available to the public.

Consequently, many websites now feature online QR Code generators or

downloadable code-generating software. Such code generators and software are not certified

by the International Organization for Standardization (ISO), however, so there is no way of

telling if they adhere to the relevant ISO Standard 18004, which is based on the DENSO

Wave patent. As a result, the code symbols they create may not be readable by all devices or

the reading quality may be reduced. (An easy test is to create the same code symbol with two

or more online generators and compare the results. Differences in the arrangement of the

modules—similar to the differences in language translation—will be immediately apparent.)

Of particular concern is the fact that non-ISO-compliant code generators do not determine the

minimum printable size of a given QR Code symbol. If a symbol is printed at a size that is

below the ISO-specified minimum—which takes into account the amount of data contained

in that symbol, the symbol version and the resolution of the printing device—readability

will be dramatically reduced.

Using QR Code-generating software that is not ISO compliant can be especially problematic

if the QR Code is to be read by smart phones, whose quality may greatly vary. Also, the QR

Code-reading software used by smart phones, like code generating software, is not

necessarily based on ISO specifications.

12

Page 13: 158539278 QR Code Final Report (2)

Fig 4.1 : Only ISO-compliant QR Code-generating software can ensuremaximum symbol readability and specify the minimum printable

size for a given symbol

To ensure that a QR Code will be successfully read by the highest percentage of devices,

therefore, it is essential to use code-generating software offered only by a reputable

manufacturer who can be trusted to comply with ISO specifications.

13

Page 14: 158539278 QR Code Final Report (2)

4.2 CREATE QR CODES BY CODE GENRATING SOFTWARES

many websites now feature online QR Code generators or downloadable code-generating

software. Such code generators and software are not certified by the International

Organization for Standardization (ISO)

Very easy to create

1. Find URL of desired information

2. Copy that URL

3. Go on http://qrcode.kaywa.com/ (one of many QR generators)

4. Paste the URL in the desired box

5. Click to generate

6. Save the QR Code picture

14

Page 15: 158539278 QR Code Final Report (2)

Fig 4.2 code generating software

Fig 4.2.1 code generating software with url

15

Page 16: 158539278 QR Code Final Report (2)

16

Page 17: 158539278 QR Code Final Report (2)

fig : 4.2.2 code generating software generated qr code

17

Page 18: 158539278 QR Code Final Report (2)

Fig 4.2.3 another code generation software

Fig 4.2.4 code generation software with different services

18

Page 19: 158539278 QR Code Final Report (2)

CHAPTER-5 FUNCTIONS AND SECURITY OF QR CODES

5.1 FUNCTIONS

1 HIGH-SPEED READING:

Faster scanning and the ability to scan barcodes from a distance increase operator efficiency.

Look for devices with advanced CCD scanning technology, which enables even high-density

or poorly printed barcodes to be read at high speed and from a distance.

2. EASE OF USE:

Lightweight, ergonomic designs, featuring large display screens and easy-to-hold grips,

reduce operator fatigue, a key factor in productivity.

3. DURABILITY:

In the field, hand-held scanners and terminals are vulnerable to harsh environments and rough

handling, including being bumped or dropped. Devices featuring rugged, drop-resistant

construction and resistance to water and dust protect your equipment investment.

4. LONG BATTERY LIFE:

Scanners are available with power-saving features that result in longer operating time,

eliminating frequent, time-consuming battery changes.

5. EXPERIENCE AND REPUTATION OF THE MANUFACTURER:

Look for a manufacturer that has established itself as an industry leader and innovator, and

whose products have stood the test of time.

19

Page 20: 158539278 QR Code Final Report (2)

5.2 SECURITY OF QR CODES

5.2.1 THREAT MODELOne can distinguish two different threat models for manipulating QR Codes. First, an

attacker may invert any module, changing it either from black to white or the other

way round. Second, a more restricted attacker can only change white modules to black

and not vice versa.

BOTH COLORS

The easiest approach for attacking an existing QR Code is by generating a sticker

containing a QR Code with the manipulated QR Code in the same style as the original QR

Code and position it over the code on the advertisement Of course this would either

require some preparation or a mobile printer and design applications for a mobile

device. At least when attacking on a large scale against one chosen target, the time

needed for preparation should not pose a serious limitation. Since this attack is trivial,

we have decided to exclude it from the scope of this paper. However, we believe that

using this method in an attack against a real-world advertisement is a viable option for

large-scale attacks.

SINGLE COLOR

In this case we restrict ourselves to the modi_cation of a single color only. The

background for this restriction lies in the scenario of an attacker seeking to modify a

single poster on the y just by using a pen (thereby reducing the possible modi_cations to

changing white modules to black).

This restriction is the basis for the attacks further outlined throughout this paper.

5.2.2 ATTACKING DIFFERENT PARTS

Since QR Codes contain a lot of different information, including meta information on version, masking and source encoding, several different regions exist that can be targeted either individually or in combination.

5.2.3 ATTACKING HUMAN INTERACTION

Humans can not read the code without a reader software, the information stored within the code is completely obfuscated. But by reading the manipulated QR code, vulnerability in the reader software or the browser might get triggered.

1. Phishing and Pharming2. Fraud

20

Page 21: 158539278 QR Code Final Report (2)

3. Attacking reader software4. Social engineering attacks

5 .3 SOLUTION

In this we outlined the dangers of possible attacks utilizing manipulated QR Codes. Since QR Codes gain increasing popularity through their use for marketing purposes, we expect that this kind of attack will receive more and more attention by the hacking community in the future. Furthermore, many mobile devices (e.g., Smartphone’s) at present are able to decode QR Codes and access the URLs contained in them. This adds a new dimension to the topic of trust, especially since most users are not security-conscious enough when using their mobile phones (which also enable the use of novel phishing techniques). In addition to phishing, a multitude of other attack methods, both against humans and automated systems, might be performed using QR

21

Page 22: 158539278 QR Code Final Report (2)

CHAPTER-6

QR CODE GENERATION There are 6 stages in qr generation

DATA ANALYSIS

DATA ENCODING

ERROR CORRECTING

STRUCTURE FINAL MESSAGE

DATA MASKING

FORMAT INFORMATION STRING

6.1 DATA ANALYSIS

MODES SUPPORTED BY QR CODES:-

NUMERIC: for decimal digits from 0-9

ALPHA-NUMERIC: digits from 0-9,upper-case alphabets & symbols($,%,*,+,-,/,space)

BYTE: strings in form of hexadecimal bytes

6.2 DATA ENCODING

STEP 1: Select error correction level.

STEP 2: Determine the smallest version for the data.

STEP 3: Add the mode indicator

STEP 4: Add the character count indicator

STEP 5: Encode using the selected mode

STEP 6: Breaking up to form code-words

22

Page 23: 158539278 QR Code Final Report (2)

6.3 ERROR CORRECTION CODING

Allows the QR code readers to detect & correct the errors in the code.

Reed-Solomon error-correcting algorithm is used.

Codewords are 8 bits long and use the Reed–Solomon error correction algorithm with four error correction levels. The higher the error correction level, the less storage capacity. The following table lists the approximate error correction capability at each of the four levels:

Level L (Low) 7% of codewords can be restored.

Level M (Medium) 15% of codewords can be restored.

Level Q (Quartile) 25% of codewords can be restored.

Level H (High) 30% of codewords can be restored.

In larger QR symbols, the message is broken up into several Reed–Solomon code blocks. The block size is chosen so that at most 15 errors can be corrected in each block; this limits the complexity of the decoding algorithm. The code blocks are then interleaved together, making it less likely that localized damage to a QR symbol will overwhelm the capacity of any single block.

Due to error correction, it is possible to create artistic QR codes that still scan correctly, but contain intentional errors to make them more readable or attractive to the human eye, as well as to incorporate colors, logos, and other features into the QR code block

6.4 STRUCTURE FINAL MESSAGE

If code-word is small, it is left as such.

Larger QR codes are broken up into blocks of either 15 or 16 data code-words each.

6.5 DATA MASKING

23

Page 24: 158539278 QR Code Final Report (2)

“MASKING” means, changing the color of a module.

QR codes define 7 masking patterns.

For ex: in mask pattern #1, every even numbered row in the matrix is masked

6.6 FORMAT INFORMATION STRING

Includes the error correction level & the masking pattern currently in use.

(7x4) i.e. 28 format information strings exist.

Format string table gives the list of 28 format information strings

CHAPTER-7

24

Page 25: 158539278 QR Code Final Report (2)

ENCRYPTION AND

IMPLEMENTATION OF QR CODES

7. 1 ENCRYPTION

Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily

understood by unauthorized people. Decryption is the process of converting encrypted data

back into its original form, so it can be understood.

The use of encryption/decryption is as old as the art of communication. In wartime, a cipher,

often incorrectly called a code, can be employed to keep the enemy from obtaining the

contents of transmissions. (Technically, a code is a means of representing a signal without the

intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the

substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling"

of voice signals by inverting the sideband frequencies. More complex ciphers work according

to sophisticated computer algorithms that rearrange the data bits in digital signals.

In order to easily recover the contents of an encrypted signal, the correct decryption key is

required. The key is an algorithm that undoes the work of the encryption algorithm.

Alternatively, a computer can be used in an attempt to break the cipher. The more complex

the encryption algorithm, the more difficult it becomes to eavesdrop on the communications

without access to the key.

Encryption/decryption is especially important in wireless communications. This is because

wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless,

encryption/decryption is a good idea when carrying out any kind of sensitive transaction,

such as a credit-card purchase online, or the discussion of a company secret between different

departments in the organization. The stronger the cipher -- that is, the harder it is for

unauthorized people to break it -- the better, in general. However, as the strength of

encryption/decryption increases, so does the cost.

In recent years, a controversy has arisen over so-called strong encryption. This refers to

ciphers that are essentially unbreakable without the decryption keys. While most companies

25

Page 26: 158539278 QR Code Final Report (2)

and their customers view it as a means of keeping secrets and minimizing fraud, some

governments view strong encryption as a potential vehicle by which terrorists might evade

authorities. These governments, including that of the United States, want to set up a key-

escrow arrangement. This means everyone who uses a cipher would be required to provide

the government with a copy of the key. Decryption keys would be stored in a supposedly

secure place, used only by authorities, and used only if backed up by a court order.

Opponents of this scheme argue that criminals could hack into the key-escrow database and

illegally obtain, steal, or alter the keys. Supporters claim that while this is a possibility,

implementing the key escrow scheme would be better than doing nothing to prevent criminals

from freely using encryption/decryption.

7.2 ENCRYPTION IN QR CODES

When we talk about Encrypted Code, we do not mean that the code itself (e.g. QR Code) is

encrypted, but, instead, a part of the URL where the code is pointing is encrypted.

 

The Encrypted Codes feature can be used to hide or encrypt sensitive parts of the target URL

of your code or to prevent users from manipulating parts of the URL, e.g. changing the values

of parameters.

 

This can be of relevance in the following use cases:

Contests

Games

Voting

Security applications

Prevent crawling of sensitive data

Encrypted Codes are standard Dynamic Link Codes and therefore manageable, trackable and

editable like all other System Codes.

 

The contact data is stored in a database and accessible by providing the contact ID. Without

encryption, the URL for recalling this contact data would probably look something like this:

26

Page 27: 158539278 QR Code Final Report (2)

 

http://www.somesite.com/contactpage.php?contactid=12345

 

The problem with that approach is that someone could easily try contact IDs other than the

given ID of 12345 and collect the contact information that is associated with those other IDs.

That’s certainly something the BeeTagg Contact application has to prevent, and it can do so

by using Encrypted Codes.

The visible URL after encryption looks similar to this:

 

http://www.xyz.com/en/m/contact/data/-1/-1/0v0fZINM__Wc-WWFf7h93A

 

The last part of the URL (bold) is the ID of the contact, but in an encrypted form. Therefore,

plugging in random IDs to the URL will no longer lead you to a customer’s contact

information. Sure, you could encrypt the sensitive part of the URL yourself, but it means

exactly that: you need to do it yourself.

7.3 ENCRYPTION ALGORITHMS

XOR

XOR is not a real encryption algorithm. It only obfuscates the text, but in most cases XOR

will be sufficient. The advantage of XOR is that the length of the encrypted text has the same

length as the non-encrypted text and decryption is easier.

 

Rijandael

Rijandael is a standardized encryption algorithm. It is very secure, but implementation is not

as easy as with XOR and the length of the encrypted text is longer than the non-encrypted

text. Keep that in mind, because URLs have a limited length (a URL shouldn’t exceed 1024

characters, because some browsers cannot handle them otherwise).

27

Page 28: 158539278 QR Code Final Report (2)

In order for Encrypted Codes to work you need to 

1. Provide a secret encryption key. Secret means that you should not tell anybody and

you should not share it with others.

Example: ThI3**iS--an"EncRPtiOn::::KeY

2. Select one of the two encryption algorithms XOR or Rijandael

3. Define which part of the URL should be encrypted.

7.4 IMPLEMENTATION

To implement qr codes, a user interface code is being used

7.4.1 USER INTERFACE CODE

The user interface development of our code it consisists of two main packages one

is for design framework of our project responsible for views and layout of

application, and other contains main class and the codes which generates QR code

and add Encryption to them.

28

Page 29: 158539278 QR Code Final Report (2)

Fig 7.4.1: user interface code generator

29

Page 30: 158539278 QR Code Final Report (2)

CHAPTER-8

CHARACTERISTICS OF QR CODE Additional to the characteristics for two-dimensional symbol s such as large volume data (7,089

numerical characters a t maximum), high-density recording (approx. 100 times higher in density than

linear symbols), and high-speed reading, QR Code has other superiority in both performance and

functionalities aspects.

8.1 ALL-DIRECTION (360°) HIGH-SPEED READING

Reading matrix symbols will be implemented by using a CCD sensor (area sensor). The data of the scan line captured by the sensor will be stored into the memory. Then, by using the software, the details will be analyzed, finder patterns identified, and the position/size/angle of the symbol detected, and the decoding process will be implemented.

Fig 8.1 all direction reading

30

Page 31: 158539278 QR Code Final Report (2)

8.2 RESISTANT TO DISTORTED SYMBOLS

Symbols often get distorted when attached onto a curved surface or by the reader being tilted (angled between the CCD sensor face and the symbol face). To correct this distortion, QR Code has alignment patterns arranged with a regular interval within the range of the symbol. The variance between the Centre positions of the alignment pattern estimated from the outer shape of the symbol and the actual Centre position of the alignment pattern will be calculated to have the mappings (for identifying the Centre position of each cell)corrected. This will make the distorted linear/non-linear symbols readable.

Figure 8.2 : Correcting Distorted Symbol

31

Page 32: 158539278 QR Code Final Report (2)

8.3 DATA RESTORATION FUNCTIONALITY

QR Code has four different error correction levels (7%, 15%,25%, and 30% per symbol area).

The error correction functionality is implemented according to each of the smudge/damage,

and is utilizing Reed-Solomon code which is highly resistant to burst errors. Reed-Solomon

codes are arranged in the QR Code data area. By this error correction functionality, the codes

can be read correctly even when they are smudged or damaged up until the error correction

level.

Fig 8.3: Smudged/Damaged Symbols

8.4 LINKING FUNCTIONALITY OF THE SYMBOLS

• QR Code has a linking functionality which will enable a single symbol to be

represented in several symbols by dividing it .

• A single symbol can be divided into 16 symbols at maximum

32

Page 33: 158539278 QR Code Final Report (2)

Fig 8.4 linking functionality of the symbols

8.5 VARIANTS

Micro QR code is a smaller version of the QR code standard for applications where symbol size is limited. There are 4 different versions (sizes) of Micro QR codes: the smallest is 11×11 modules; the largest can hold 35 numeric characters

IQR code is an alternative to existing QR codes developed by Denso Wave. IQR codes can be created in square or rectangular formations; this is intended for situations where a rectangular barcode would otherwise be more appropriate, such as cylindrical objects. IQR codes can fit the same amount of information in 30% less space. There are 61 versions of square IQR codes, and 15 versions of rectangular codes. For squares, the minimum size is 9x9 modules; rectangles have a minimum of 19x5 modules. IQR codes add error correction level S, which allows for 50% error correction. QR Codes have not yet been given an ISO specification, and only proprietary Denso Wave products can create or read IQR codes.

Model 1 QR code is an older version of the specification. It is visually similar to the widely seen model 2 codes, but lacks alignment patterns

Micro QR code example

33

Page 34: 158539278 QR Code Final Report (2)

Micro QR code functional regions

Model 1 QR code example

Model 1 QR code functional regions

Fig 8.3.1 variants of qr codes

34

Page 35: 158539278 QR Code Final Report (2)

CHAPTER-9

APPLICATIONS AND

ADVANTAGES/DISADVANTAGES OF QR CODES

9.1 APPLICATIONS

Although the QR Code was originally designed to track automotive components and systems

through the manufacturing process and distribution supply chain, it has rapidly spread to

virtually every other area where traditional barcodes are used, as well as some entirely new

ones.

Typical applications include:

• Manufacturing

Product traceability

Process control

Order and time tracking

Inventory and equipment management

• Warehousing and logistics

Item tracking

• Retailing

35

Page 36: 158539278 QR Code Final Report (2)

Point-of-purchase product identification

Sales management

Inventory control

• Healthcare

Medical records management

Patient identification

Medication tracking

Equipment and device tracking

• Life sciences

Specimen tracking

• Transportation

Fleet management

Ticketing and boarding passes

• Office automation

Document management

• Marketing and advertising

Mobile marketing

Electronic tickets, coupons, payments and loyalty programs

9.2 ADVANTAGES AND LIMITAIONS

Advantages

1. Fast, omni directional scanning.

2. High-capacity data storage.

3. Small size

4. Error correction.

5. Many types of data.

6. Distortion compensation.

7. Linkability (Structured Append.)

8. Direct Marking.

36

Page 37: 158539278 QR Code Final Report (2)

9. Most of all the Qr code generated have encrypted data and thus provides better safety

measure than normal codes.

10. The main advantage of a QR code is its versatility. QR codes can be used for

anything and everything. They are also beneficial for both customers and businesses

11. There is no need to write vital details down. A simple scan captures the

desired information

LIMITIONS

1. Since Qr codes are main used for marketing purpose they are now used as large

medium to encode data, so they cannot be a safe medium to encode a confidential

data.

2. Making encryption better and developing a universal decoder for decoding encrypted

codes is not available yet universally.

3. Although QR codes are popping up everywhere from on plant specimen labels to

library catalogues, there is a large demographic in society that still don’t know what

QR codes represent. These proses a problem as companies and business are using the

QR code to advertise information that a potential customer might be interested in, but

if the customer doesn’t know how to find the information, then they might not buy the

product or service and this can lose business thousands of dollars

4. Another major disadvantage of a QR code is the codes dependability on a mobile

device or smartphone. The whole concept of a QR code and its benefits are strictly

based on its ability to be scanned by a mobile device. If a consumer does not have a

mobile device or smartphone, then the QR code is not beneficial to them and they lose

out.

37

Page 38: 158539278 QR Code Final Report (2)

5. QR codes appear on billboards, branded products, product tags and business cards. A

bad print job renders your QR code useless. Blurry, crooked and bad print quality

make it impossible to scan the QR code and retrieve the information stored within.

You need to make sure your print QR codes correctly print and test them before

distribution.

9.3 LICENSE

The use of QR codes is free of any license. The QR code is clearly defined and published as an ISO standard.

Denso Wave owns the patent rights on QR codes, but has chosen not to exercise them In the USA, the granted QR code patent is US 5726435, and in Japan JP 2938338. The European Patent Office granted patent "EPO 0672994". to Denso Wave, which was then validated into French, UK, and German patents, all of which are still in force as of November 2011.

The word QR code itself is a registered trademark of Denso Wave Incorporated.In UK, the trademark is registered as E921775, the word "QR Code", with a filing date of 03/09/1998.

The UK version of the trademark is based on the Kabushiki Kaisha Denso (DENSO CORPORATION) trademark, filed as Trademark 000921775, the word "QR Code", on 03/09/1998 and registered on 6/12/1999 with the European Union OHIM (Office for Harmonization in the Internal Market). The U.S. Trademark for the word "QR Code" is Trademark 2435991 and was filed on 29 September 1998 with an amended registration date of 13 March 2001, assigned to Denso Corporation.

38

Page 39: 158539278 QR Code Final Report (2)

FUTURE WORK The possibilities for attacks proposed open up a quite large held for further research.

The main target lies in the accurate analysis and practical application of one

or more of the outlined attacks on a given target. Furthermore, it should be investigated

which parts of a QR Code are the easiest to attack, and what countermeasures can be

taken to thwart attacks.

In even more general terms, it would be very interesting to and metrics that can be

used to measure the vulnerability of QR Codes depending on a given type of attack outline

and with respect to characteristics like black/white-distribution, version, masking, etc.

Last but not least, other 2D-Codes such as Aztec or DataMatrix need to be analyzed in the

same way to identify possible attack vectors and find suitable countermeasures.

39

Page 40: 158539278 QR Code Final Report (2)

CONCLUSION

In general, we believe that QR codes have great potential in business media. Some

possibilities are there are many creative ideas waiting for us to explore. We examine outlined

the dangers of possible malicious attacks utilizing manipulated QR Codes.

Since QR Codes gain increasing popularity through their use for marketing purposes,

we expect that this kind of attack will receive more and more attention by the hacking

community in the future. This paper will present some security conscious of the mobile

phones users.

40

Page 41: 158539278 QR Code Final Report (2)

REFERENCES

[1] R. Bose and D. Ray-Chaudhuri. On a class of error correcting binary group codes*.

Information and control, 3(1):68{79, 1960.

[2] M. Canadi, W. Hopken, and M. Fuchs. Application of qr codes in online travel�

distribution. In ENTER, pages 137{148, 2010.

[3] https://developers.google.com

[4] QR Code from Wikipedia, The free encyclopedia

[5] J. Gao, V. Kulkarni, H. Ranavat, L. Chang, and H. Mei. A 2d barcode-based mobile

payment system. In MUE, pages 320{329, 2009.

[6] ISO 16022:2006. Data Matrix bar code symbology speci_cation. ISO, Geneva,

Switzerland.

[7] http://www.sicet.org/journals/jetde/jetde10/7-So.pdf

[8] http://www.sba-research.org/wp-content/uploads/publications/QR_Code_Security.pdf

41

Page 42: 158539278 QR Code Final Report (2)

42