You are on page 1of 3

Volume 3, Issue 2, February – 2018 International Journal of Innovative Science and Research Technology

ISSN No:-2456 –2165

2LQR Code for Advance Security


Sawant Vanita V. , Darekar Priyanka S. , Gangarde Sarika D. , Jagadale Komal B. , Jagtap Swapnaja L.
Department of Computer Engineering,
S.V.P.M COE Malegaon(BK),
Savitribai Phule Pune University, Maharashtra.

Abstract—The Quick Response (QR) code was designed timing patterns, version and format patterns.2LQR Code has
for storing information. These codes have a huge number come up with two storage levels:
of applications including: information storage,
identification, message sharing and document 1) public level
authentication etc. In our proposed system the new rich 2) private level
QR code named as 2LQR code .There are two storage
levels has public and private storage level. The first is Public level as the name itself says the information is publicly
public level , it is same as standard QR code storage level available. And if the user thinks that the information should be
and it is readable by any classical QR code application. kept as private ,that information is stored in private level.The
And second is private level, it is code with an error private level is constructed by replacing the black modules by
correction capacity. Private level is constructed by specific textured patterns [8].It consists of information
replacing black module with code words and texture encoded using qary code with an error correction capacity.
pattern. In this paper , by using this private level storage This allows to increase the storage capacity of the QR code.
capacity will be increase and also security is provided for 2LQR Code can be used for document authentication and
private information of user. The pattern recognition message sharing. In private message sharing scenario, the
method is used to read the second level information and be black modules of these patterns are also replaced by textured
used both in a private message sharing scenario. We will patterns. However, in document authentication scenario, the
be using Reed Solomon algorithm and AES(Advanced position tags are not changed i.e. they remain black modules.
Encryption Standard) algorithm. AES algorithm is used to
provide security. QR code is commonly used two- II. LITERATURE REVIEW
dimensional barcode recently with the advantage of larger
QR content and error correction capability. Based on this QR Code Features: The QR code was created for the Japanese
property of QR code we design a secrete hiding technique car industry by Denso Wave1 partnership in 1994. The most
for QR code. General browser can read the QR content critical qualities of this code are little printout estimate and
but 2LQR code cannot be readable by any general rapid perusing process [5]. The accreditation of QR code was
browser. performed by International Organization of Standardization
(ISO), and its entire particular can be found in . A QR code
Index Terms—QR code, two storage levels, private message, encodes the data into parallel shape. Each data bit is spoken to
document authentication, pattern recognition. by a dark or a white module. The Reed-Solomon blunder
revision code is utilized for information encryption.
Accordingly, one of four mistake revision levels needs to be
I. INTRODUCTION picked amid QR code era. The most reduced level can
reestablish almost 7 percent of harmed data, the most elevated
The use of graphical codes like QR codes and Barcode is amount can reestablish almost 30percent [2].
increased because they are robust to the copying process, easy
to read by any device and any user, they have a high encoding Rich Graphical Codes: In order to improve the graphical code
capacity enhanced by error correction facilities, they have a properties, several rich graphical codes have recently been
small size and are robust to geometrical distortions[11]. Along introduced. These rich graphical codes aim to add visual
being as advantageous as they are, codes have many flaws and significance, to personalize the stored information or to
one of the major flaw of these graphical codes is their lack of increase the storage capacities [9]. In this section, the different
security provisions. Anyone can read encoded data from the kinds of rich QR codes and several interesting rich graphical
QR code or Barcode and therefore major overhaul in this codes are presented. The most simple type of rich QR codes is
technology was necessary. The modified QR code or the Two the user-friendly QR code. The target of these codes is to
Level-QR code overcomes the problem of QR Codes [7]. Like improve the aesthetic view of QR codes. It consists of
the standard QR code, this 2LQR code has the same specific changing the colors and shape of the modules, or of adding an
structure, which consists of position tags, alignment patterns, image into the QR code. Different design QR code generators
are proposed as free or paid applications. However, most of

IJISRT18FB176 www.ijisrt.com 858


Volume 3, Issue 2, February – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456 –2165

these generators prefer to sacrifice the possibility of error


correction for attractive design. Recently, the rich QR code,
which adds the significance without losing error correction
capacity, was introduced [3].

PS Process Impact: Any QR code creation suggests a printing


procedure and a checking process. The PS procedure in
verification situations are considered as a physical unclonable
capacity . The finished examples, that we propose to use in
2LQR code, are touchy to the PS procedure. In this area, the
progressions included amid the PS procedure are talked about,
keeping in mind the end goal to get it why the yield pictures
experience the ill effects of this procedure. The PS procedure
produces obvious and undetectable picture alterations, which
can be caused by resampling intrinsic to the PS procedure,
inhomogeneous lighting conditions, ink scattering, fluctuating
paces of the filtering gadget . The changes gave by the printer
are not detachable from changes included by the scanner, that
is the reason the bends have a place with them two [5].

III. EXISTING SYSTEM

In earlier days, QR code with only one level was used for
different purposes in different application so information Fig.1. Block Diagram of Proposed System
hidden within QR code can be readable by any general
browser or any QR code scanner. The applications in which In proposed system , the first block i.e in public message block
these QR Codes are used are as follows: users public information is an input given. Here Reed-
Solomon algorithm is applied on that information and plain
 Information storage:In that it can be used in advertising, text can be converted in cipher text. And standard QR code of
museum art description [6]. that text will be generated. In second block i.e in private
 Redirection to web sites [6]. message block, private information of user is given as the
 Track and trace it can be used for transportation tickets input. Pattern database will store different types of patterns.
or brands [6]. Then AES (Advanced Encryption Standard) algorithm is
 Identification of flight passenger information, applied on that information so that more security is provided
supermarket products [6]. to private information. After that code words of that
 This will give less security to users information [6]. information
will get generated and then scrambling technique is applied on
Disadvantages Of Existing System: that and scrambled code words will get generated by using the
 Less security to users information / data. following formula ,
 Less storage capacity.
 Barcode decoding speed is low. C(x)=m(x)g(x), ...(1)
 Only public message is transferred and this message can C(x)= c0 + c1x + + cn-1(x(n) - 1) ...(2)
be read by any one.
Where, m(x)=Polynomial of degree, at most k-1
 Any QR code scanner can scan QR code.
g(x)=Generated Polynomial g(x) is a factor of polynomial
(x(n) - 1) [6] For third block standard QR code of public
IV. PROPOSED WORK
information, pattern and scrambled code words are the given
inputs. Patterns are placed in position tags of 2LQR code. And
In Proposed system we are going to develop a new rich 2LQR
scrambled code words are replaced in black modules. Finally
code that has two storage levels and can be used for document
2LQR Code will be generated [6].
authentication and to avoid remembering username and
password and also to ease online transaction in banking. In
proposed system we are going to develop an banking V. METHODOLOGY
application for ease of online transaction using 2LQR code. In
1) Two Level QR (2LQR) Code Generation depicts the
proposed system, 2LQR code will provide more security for
particular structure of the standard QR code. Like the
users information and it has an error correction capability.
standard QR code, the 2LQR code has a similar

IJISRT18FB176 www.ijisrt.com 859


Volume 3, Issue 2, February – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456 –2165

particular structure, which comprises of position labels, of the QR code and provide document authentication ensuring
arrangement designs, timing examples, form and overall security. Thus we present a new rich 2LQR code, that
arrangement designs. Be that as it may, in the standard has two storage levels and can be used for document
QR code, we have white and dark modules and in the authentication. This application avoid remembering username
2LQR code we have white modules and finished and password and also to ease online transactions, QRLogin is
modules rather than dark modules. This substitution of developed. The main aim is to provide secured login systems
dark modules by finished modules does not disturb the which also perform online transactions.
standard QR code perusing process. Yet, it enables us to
have a moment stockpiling level, which is imperceptible
to the standard QR code peruser. This second level References
contains the private message, encoded with q-ary (q [1] T. V. Bui, N. K. Vu, T. T. P. Nguyen, I. Echizen, and T. D.
Nguyen, Robust message hiding for QR code, in Proc. IEEE
2) Code with blunder rectification limit. The finished 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process.
modules are named finished examples in whatever is left (IIH-MSP), Aug. 2014, pp. 520523.
of this paper. These finished examples have particular [2] C. Baras and F. Cayre, 2D bar-codes for authentication: A
includes and are utilized for private message Mpriv security approach, in Proc. 20th Eur. Signal Process. Conf.
stockpiling in the proposed 2LQR code [6]. (EUSIPCO), Aug. 2012, pp. 17601766.
[3] A. T. P. Ho, B. A. M. Hoang, W. Sawaya, and P. Bas,
3) Capacity of 2LQR Code In this segment the capacity Document authentication using graphical codes: Reliable
limits of proposed 2LQR code delineated is talked about. performance analysis and channel optimization, EURASIP J.
Give N2 a chance to be the quantity of modules in a Inf. Secur., vol. 2014, no. 1, p. 9, 2014.
standard QR code. As QR code development means to [4] T. Langlotz and O. Bimber, Unsynchronized 4D barcodes,
have a roughly rise to number of dark and white in Proc. 3rd Int. Symp., ISVC 2007, Lake Tahoe, NV, USA,
modules, we can assume that N2/2 is around the quantity Nov. 2628, 2007, pp. 363374.
of dark modules in standard QR code. It has three [5] C.-Y. Lin and S.-F. Chang, Distortion modeling and
position labels, each tag has 33 dark modules. That is invariant extraction for digital image print-and-scan process,
why, there are roughly (N2/2 3 33) dark modules in QR in Proc. Int. Symp. Multimedia Inf. Process., 1999, pp. 110.
code, that could be supplanted by finished examples [6]. [10] P.-Y. Lin, Y.-H. Chen, E. J.-L. Lu, and P.-J. Chen, Secret
hiding mechanism using QR barcode, in Proc. IEEE Int. Conf.
4) In this area, we intend to contemplate the capacity limit Signal-Image Technol. Internet-Based Syst. (SITIS), Dec.
of the 2LQR code, utilizing a settled surface equivalent 2013, pp. 2225.
to 1.2 1.2 cm2 also, a settled example thickness [6] Iuliia Tkachenko et al, Two-Level QR Code for Private
equivalent to roughly 42percent. The capacity limit of Message Sharing and Document Authentication, IEEE
the 2LQR code can be expanded both by expanding the Transactions on Information Forensics and Security, 11 (3),
estimation of q, which is the quantity of digits and 2016.
finished examples and by diminishing the size p p pixels [7] Information Technology Automatic Identification and Data
of the finished examples. In the two cases, a few issues Capture Techniques Data Matrix Bar Code Symbology
in design identification are distinguished. In this way, we Specification, ISO/IEC Standard 16022:2006, 2006.
need to discover an example estimate and an example [8] Information Technology Automatic Identification and Data
number exchange off [6]. Capture Techniques Bar
Code Symbology QR Code, ISO/IEC Standard 18004:2000,
2000.
VI. CONCLUSION [9] Z. Baharav and R. Kakarala, Visually significant QR
codes: Image blending and statistical analysis, in Proc. IEEE
We believe that QR codes have great potential in business Int. Conf. Multimedia Expo (ICME), Jul. 2013, pp. 16.
media. This 2LQR code can be used for private message [10] C. Baras and F. Cayre, 2D bar-codes for authentication: A
sharing or for authentication scenarios. The private level is security approach, in Proc. 20th Eur. Signal Process. Conf.
created by replacing black modules with specific textured (EUSIPCO), Aug. 2012, pp. 17601766.
patterns. The proposed 2LQR code increases the storage [11] International Journal of Innovative Research in Computer
capacity of the classical QR code due to its supplementary and Communication
reading level. One important feature of the textured patterns Engineering (An ISO 3297: 2007 Certified Organization)
used is their sensitivity to the P&S process and sensitivity. The Website: www.ijircce.com Vol. 4, Issue 12, December 2016.
two level color QR code scheme improves the storage capacity

IJISRT18FB176 www.ijisrt.com 860

You might also like