You are on page 1of 3

S. Hemalatha et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol.

3 (2) , 2012,3318-3320

Inf format tion S Securit on Quick Resp ty Q k ponse code c


S.Hem malatha, P.C.S SenthilMahesh and Dr.Paul Rodrigues h, l
Abstract-QR code is al called Quic Response c lso ck code are widely us in a around the world to keep infor sed rmation about all kind of produ in industry .Initially wh uct hich has veloped by the automotiv industry to store ve been dev informati ion about the manufacturin product, b now ng but which h has been slow wly moves t other field like to ds supermar rket to learnin from QR co in educatio field. ng ode on These usa starts from automotive industry to a other age m all commercial products be ecause of its tw big advanta wo ages are fast acces ssing of data an provide lar storage are .Even nd rge ea though th growth in Q code which does not prov his QR h vide the facility of information s f security. By us sing a QR code reader e any person can read the content o the QR co of ode and modify it. In this paper we proposed a methodology which r y will overc come this secur issues in in rity nformation. ds-QR code,En ncryption,Decr ryption, Key word

1.IN NTRODUCTIO ON A QR co is an abbr ode reviated of Quick Respons code se is a type of two dimen nsional codes seems like a matrix bar cod de. This QR code init R tially designed for automotive industry, day by day t this design becomes pular from the outside indu ustry. There a two are more pop for most reason for b becoming popular is which is fast h with r readably comparing w other bar codes and another s vide large sto orage area. T QR The reason is which prov code is a arrangemen which cons of black m an nt sist modules arranged in a square pa attern on a wh backgroun The hite nd. ion will be stored in a QR code t through informati encoding of data which can be any o of four m g h one modes of data like numeric, alp numeric, byte or bina and e pha ary kanji. Ini itially this QR code in created in the year of R 1994 by Toyota to d the purpos of track v do se vehicles he manufacturing process day by day during th stage of m this QR code is the m most popular t that two dime ensional bar code because of i has been d e it designed to al llow its contents to be decod at high s ded speed. QR usage is United States, Canada and Hong d growing fastest in U c. Kong etc 2.BACKG GROUND OF QR CODE R On seein of QR code which not o ng e only consist o two of dimensio onal shape an storage ar nd rea, along wi that ith which als has five im so mportant area a 1)Standard used are ds for enco oding of QR codes 2)St R torage 3)Enc cryption 4)Inform mation Recordi ing There are several stan e ndards in docu uments cover ring the physical encoding of QR codes. The standar f rds are IS 8004:2000, IS SO/IEC AIM, JI X 0510, ISO/IEC 18 18004 in the year 199 1999, 2000 2006 respectively. n 97, 0, Finally D Docomo as est tablished defa standards for the acto encoding of URLs, c g contact inform mation, and several other dat types to ac ta ccess applicati layer. The openion e source "Z ZXing" projec maintains a list of QR co data ct ode types. ximum amou of data st unt torage in QR Code R The max depends on the data t types and ver rsion. Possibl there ly

e f are 1.40 versions in the error correction level of (L[ [ow], M[edium Q[uality], and H[igh]. m], For encryption and decryptio operation in QR codes on s es orithms (56 b bits).Reed So olomon error r use DES algo cor rrection algor rithm used fo error corre or ection at four r lev of error cor vel rrection. Th information records form consist of two things: he n mat o : the error correct e tion level and the mask pattern used for d r the symbol. Mas e sking is used to break up patterns in the p e dat area that m ta might confuse a scanner, such as large e s e bla areas or misleading f ank features that look like the e loc cator marks. T mask patt The terns are defin on a 66 ned 6 gri that is repeated as nece id essary to cov the whole ver e sym mbol. Module correspondi to the dark areas of the es ing e ma are inverte The forma information is protected ask ed. at n d fro errors with a BCH code and two com om h e mplete copies s are included in e e each QR symb bol. 3. AR RCHITECTURE OF QR COD E DE Fig gure 1 shows the structure of QR code which has the w e inn componen of version indicator, data and error ner nts n d r cor rrection level, information e , etc.

Fig 1 Structure of a QR cod highlighting functional F e de, eleme ents Ve ersion: The 40 different ver 0 rsions of QR Codes mainly C y dif in the num ffer mber of modu ules. Version 1 consists of f 21x modules, up to 133 (low error cor x21 rrection level) ) west of which can b used for s be storing encod data. The ded e rgest QR Cod (Version 4 has a size of 177x177 de 40) e 7 lar mo odules and can store up to 2 n 23,648 data mo odules. Da and Error Correction Level: Error Correction in ata r n QR Codes is b R based on Ree ed-Solomon Codes [14], a C spe ecific Form of BCH error correcti codes. Th ion here are four r vels ) rection that can be chosen c n lev (Table 1) of error corr by the user at creation time. 7% L M 15% Q 25% H 30% Table 1: Error Co e orrection Lev vels he ata rom right to le in a zigzag eft g Th message da is placed fr pat ttern, as show figure 2 bel wn low. In larger symbols, this s
3318

S. Hemalatha et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012,3318-3320

is compli icated by the p presence of th alignment p he patterns and the use of mult tiple interleav ved error-cor rrection blocks.

phanumeric ch haracter codes are as follow ws. Alp C Ch C Ch C C Ch C Ch C 36 0 0 9 9 18 I 27 R 37 1 1 10 A 0 19 J 28 S 38 2 2 11 B 1 20 K 29 T 39 3 3 12 C 2 21 L 30 U 40 4 4 13 D 3 22 M 31 V 5 5 14 E 4 23 N 32 W 41 42 6 6 15 F 5 24 O 33 X 43 7 7 16 G 6 25 P 34 Y 44 8 8 17 H 7 26 Q 35 Z c-c code Ch character. h

Ch space $ % * + . / :

Fig 2 Meanin of format i ng information

4. RELATED WORK D 4.1 QR code gen 1 nerator Th QR code g he generator is re eadily available which will l be shown like be elow figure QR-CODE GENERATOR To of form op Co ontent type: URL Co ontent: acement withi a QR symbol in Fig 3Message pla e ct Four-bit indicators are used to selec the encoding mode vey ormation. Enc coding modes can be and conv other info mixed as needed withi a QR symbo s in ol. Indicator Meaning 0001 Numeric encoding 0010 Alphanumer encoding ric 0100 Byte encodi ing 1000 Kanji encod ding 0011 Structured a append 0111 Extended Ch hannel Interpr retation 0101 FNC1 in first position 1001 FNC1 in sec cond position 0000 End of mess sage Next hav to select the Encoding m ve e mode which sa how ays many cha aracters are en ncoded in this mode are sho own Encoding Ver. 1 1026 274 9 40 Numeric 10 12 14 Alphanum 11 13 meric 9 16 16 8 Byte 10 12 8 Kanji Alphanum meric encodin mode stor a message more ng res compactl than the by mode, but cannot store lowerly yte t case lett ters and has only a li imited select tion of punctuati marks. Tw characters are coded in an 11ion wo n bit value by this formu ula: V = 45 C1 + C2 UR RL:
http:// L Generate!

Text T

Pho Number one

SMS

Siz ze: QR code gene R erator can ge enerate a QR code from R m UR RL,text,phone numbers etc . Bo otton of Form 2 ader 4.2 QR code rea QR code reader operation is the reader will be read a R r s w QR code through the mobile d R h device can see the model is e s bel low

To of form op 4.3 Conventional Encryption 3 n/Decryption algorithm n Co onventional en ncryption alg gorithm a com mmon key is s sha between tw parties for encryption an decryption are wo r nd n pro ocess. 5.PROPOSE WORK ED Ou contribution to this pap we have taken of QR ur per R cod usage in th field of sup market. Assuming that, de he per A , the entire sale pr e roduct has the QR code sticker in which e h has the details of the produc along with the price. If s ct h f
3319

S. Hemalatha et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012,3318-3320

anyone like a buyer can try to buy a product by stick a new QR code sticker which also have the same details but less price. Because the QR code generator is easily available. In this paper we try to avoid such a information security issues on the QR code. We introduce the security on the information is conventional encryption algorithm, a common key which QR code reader. Whenever the generator created a QR code before that the information is Encrypted by a common shared key then its generate a QR code .That generated QR code sticker will be pasted on the sale product. While the QR code reader reading time the reader will do the reverse process of decryption on the information to get the original information.

6. CONCLUSION In this paper we conclude that the information stored in QR code is encrypted information which cannot be read by the unknown person by having a QR reader. Also cannot be replace by another QR code in the shopping mall. 7. FURTHER WORK We proposed security on the QR code information which also be implemented in all kind of information security places where needed security on information. REFERENCE
1.QRcode.com 2.William Stallings Cryptography and network security

3320

You might also like