Professional Documents
Culture Documents
Qr-Documentation
Qr-Documentation
1 .Outlook of QR code
2. Features of QR code
5. QR code generator
6. QR code reader
7. QR code parts
LIST OF TABLES
1. QR code data capacity
The format information records two things: the error correction level and the mask
pattern used for the symbol. Masking is used to break up patterns in the data area
that might confuse a scanner, such as large blank areas or misleading features that
look like the locator marks. The mask patterns are defined on a 6×6 grid that is
repeated as necessary to cover the whole symbol. Modules corresponding to the
dark areas of the mask are inverted. The format information is protected from
errors with a BCH code, and two complete copies are included in each QR
symbol.
The message data is placed from right to left in a zigzag pattern, as shown below.
In larger symbols, this is complicated by the presence of the alignment patterns
and the use of multiple interleaved error-correction blocks.
Meaning of format information Message placement within a QR code Larger symbol illustrating
interleaved blocks
Four-bit indicators are used to select the encoding mode and convey other
information. Encoding modes can be mixed as needed within a QR symbol.
Indicator Meaning
0101 FNC1 in first position (see Code 128 for more information)
After every indicator that selects an encoding mode is a length field that tells how
many characters are encoded in that mode. The number of bits in the length field
depends on the encoding and the symbol version, as shown below.
Numeric 10 12 14
Alphanumeric 9 11 13
Byte 8 16 16
Kanji 8 10 12
Alphanumeric encoding mode stores a message more compactly than the byte
mode can, but cannot store lower-case letters and has only a limited selection of
punctuation marks. Two characters are coded in an 11-bit value by this formula:
V = 45 × C1 + C2
Alphanumeric character codes are as follows.
Code Character Code Character Code Character Code Character Code Character
0 0 9 9 18 I 27 R 36 space
1 1 10 A 19 J 28 S 37 $
2 2 11 B 20 K 29 T 38 %
3 3 12 C 21 L 30 U 39 *
4 4 13 D 22 M 31 V 40 +
5 5 14 E 23 N 32 W 41 -
6 6 15 F 24 O 33 X 42 .
7 7 16 G 25 P 34 Y 43 /
8 8 17 H 26 Q 35 Z 44 :
Decoding of data
Levels and masks
Protocols
GENERATION OF QRCODE
1.Kaywa: http://qrcode.kaywa.com/
4.Delivr: http://delivr.com/qr-codegenerator
Step 2: The Website will generate the QR code for you as shown above
HOW TO READ QRCODE
Step 1: We can save the generated image file and embed it into wherever we want
in the document.
Step 2: We need to load the mobile device with the right decoder. You can find
many application Websites supplied the decoders for different mobile devices.
These include:
1. i-nigma: http://www.i-nigma.com/Downloadi-nigmaReader.html
2. Quickmark: http://www.quickmark.com.tw/En/basic/download.asp
Step 4: For the document with the embedded image, the user can just slide the
decoder over the area and the text will automatically be displayed as shown
below. If the text is an URL, you can just click the link and the reader will take
you to the Website. If the text is a contact record, the reader can save the record to
the address book of the phone with just one click.
Format information: Once after encoding the data if the data has to be changed
in the QR code it can be changed
Data and error correction keys: QR code has the capacity of retaining 30%
of the lost data if the code is scratched or damaged. This error correction is done
by data and error correction keys.
Position: This consists of position detection patterns located at upper left, upper
right and lower left regions .Each position detection pattern may be viewed as
three superimposed concentric squares and is constructed of dark 7x7 modules,
light 5x5 modules and dark 3x3 modules.
HARDWARE REQUIREMENTS:
1. Any cell phone with a camera and the ability to install software that can
interpret the code.
2. What the device can do with the resulting data will vary depending on
the devices other features. (i.e. Internet connection)
SOFTWARE REQUIREMENTS:
1.Barcode Scanner (Android)
2.Quickmark (iPhone)
4.UpCode (Blackberry)
ENCRYPTION:
Although encrypted QR Codes are not very common, there are a few
implementations. An Android app,for example, manages encryption and
decryption of QR codes using DES algorithm (56 bits).Japanese immigration use
encrypted QR Codes when placing visas in passports.
ERROR CORRECTION:
Codewords are 8 bits long and use the Reed–Solomon error correction algorithm
with four error correction levels. The higher the error correction level, the less
storage capacity. The following table lists the approximate error correction
capability at each of the four levels:
Level L (Low) 7% of codewords can be restored.
Level M (Medium) 15% of codewords can be restored.
Level Q (Quartile)[28] 25% of codewords can be restored.
Level H (High) 30% of codewords can be restored.
Due to the design of Reed–Solomon codes and the use of 8-bit codewords, an
individual code block cannot be more than 255 codewords in length. Since the
larger QR symbols contain much more data than that, it is necessary to break the
message up into multiple blocks. The QR specification does not use the largest
possible block size, though; instead, it defines the block sizes so that no more than
30 error-correction symbols appear in each block. This means that at most 15
errors per block can be corrected, which limits the complexity of certain steps in
the decoding algorithm. The code blocks are then interleaved together, making it
less likely that localized damage to a QR symbol will overwhelm the capacity of
any single block.
Thanks to error correction, it is possible to create artistic QR Codes that still scan
correctly, but contain intentional errors to make them more readable or attractive
to the human eye, as well as to incorporate colors, logos and other features into
the QR Code block
COMPARISION OF QRCODE WITH BARCODE
5. Barcode can contain only up to 20 numeric characters .QR code can store
very large amount of information when compared to barcode
7. Generally there will be set of numbers below the bar code to retain the
information present in the barcode if the code is damaged. But in QR code
there is no such necessity since QR code has error correction capacity,
30% of the lost information can be retained even if the code is damaged or
scratched.
8. Barcode needs a scanner ,QR code needs small devices like mobiles which
contains QR code scanner in it. Bardode doesn’t need internet connection
like QR code.
APPLICATIONS
QR code cab be any
Text
Website URL
Telephone Number
SMS Message
Google Map
Facebook Profile
Brands can use QR codes in all kinds of new ways to reach consumers.
QR codes can be used on posters and billboards, providing anyone with a cell
phone immediate access to everything from information on consumer prize
campaigns to addresses and maps for retail outlets QR codes are also handy for
various branding purposes. They can be used to direct mobile phone users to
special websites to download brand ads, ringtones, character logos, viral videos,
branded flash games and more.
1.Fast food brands can print QR codes on sandwich wrappers. One quick scan and
you're instantaneously provided with nutritional and/or ingredient information.
4.Doctor's offices and beauty salons use them to let people make appointments
over their mobile phones.
5.Companies can print them on business cards so clients and suppliers can suck
contact info right into their cell phones and PDAs.
6.TV shows can use QR codes to appear on the corner of the screen to provide
product information
Other 2D codes:
QR code types:
2. Sharing content over the MOBILE web is still pretty new, but has explosive
potential! You are already seeing it with adoption of text messaging (texting)
and Twitter (tweets), which are both “mobile born” forms of communication.
4. Make sure that the content is accessible on the web also. Mobile to desktop
sharing is still prominent.
License:
The use of QR Codes is free of any license. The QR Code is clearly defined and
published as an ISO standard.Denso Wave owns the patent rights on QR Codes,
but has chosen not to exercise them.In the USA, the granted QR Code patent
is US 5726435 and in Japan JP 293833. The European Patent Office granted
patent "EPO 0672994" to Denso Wave, which was then validated into French,
British and German patents, all of which are still in force as of November
2011.The word QR Code itself is a registered trademark of Denso Wave
Incorporated.In UK, the trademark is registered as E921775, the word “QR
Code”, with a filing date of 03/09/1998.The UK version of the trademark is based
on the Kabushiki Kaisha Denso (DENSO CORPORATION) trademark, filed as
Trademark 000921775, the word “QR Code”, on 03/09/1998 and registered on
6/12/1999 with the European Union OHIM (Office for Harmonization in the
Internal Market)
Variants:
Standard QR Code is the QR code standard for applications that possess the
ability to handle large scans. A standard QR Code can contain up to 7,089
characters, though not all QR readers can accept that much data.
Custom or artistic QR codes are standard QR codes that have been modified
for aesthetic purposes or to make it easier for people to recognize a brand. Many
companies use different design techniques to help their code stand out among the
crowd. These techniques include: adding color, shapes and various techniques
such as round or pointed edges.
Risks:
Malicious QR Codes combined with a permissive reader can put a computer's
contents and user's privacy at risk. This practice is known as "attagging",
a portmanteau of "attack tagging."They are easily created and may be affixed over
legitimate QR Codes On a smartphone, the reader's many permissions may allow
use of the camera, full internet access, read/write contact data, GPS, read browser
history, read/write local storage, and global system changesRisks include linking
to dangerous websites with browser exploits, enabling the microphone/
camera/GPS and then streaming those feeds to a remote server, analysis of
sensitive data (passwords, files, contacts, transactions), and sending email
/SMS/IM messages or DDOS packets as part of a botnet corrupting privacy
settings, stealing identity and even containing malicious logic themselves such
as JavaScript or a virus. These actions may occur in the background while the user
only sees the reader opening a seemingly harmless webpage.
ADVANTAGES AND DISADVANTAGES
Advantages:
1. There is no need to write vital details down. A simple scan captures the
desired information.
2. QR Codes can be used to store addresses and URLs that can appear in
magazines, on signs, buses, business cards or just about any product that
users might need information about.
3. QR code provides personal information security
Disadvantages:
1. Users must be equipped with a camera phone and the correct reader
software that can scan the image of the QR Code.
2. Currently only Smartphone’s are technically equipped to do this. Many
users that have mobile phones that have cameras are unable to get QR
reading software for their phones.
3. The other disadvantage is user must have knowledge about the code.
CONCLUSION
[2] Denso (2010a). QR Code Standardization. Retrieved June 21, 2010, from
http://www.denso-wave.com/qrcode/qrstandard-e.html
[4]Denso (2009). Denso Wave Incorporated. Retrieved June 21, 2010, from
http://www.denso-wave.com/en/index.html
[11] London: Routledge.Liu, T., Tan, T., & Chu, Y. (2007). 2D Barcode and
Augmented Reality Supported English Learning System. Proceeding of the 6th
IEEE/ACIS International Conference on Computer and Information Science (pp
5-10). IEEE Computer Society.
[12]Naismith, L., Lonsdale, P., Vavoula, G., & Sharples, M. (2005). Literature
[13]NWT (2010). The National Math Trail. Retrieved September 20, 2010, from
http://www.nationalmathtrail.org/
[14]Osawa, N., Noda, K., Tsukagoshi, S., Noma, Y., Ando, A., Shinuya, T., &
Kondo, K. (2007). Outdoor Education Support System with Location Awareness
Using RFID and Symbology Tags. Journal of Educational Multimedia and
Hypermedia 16(4), 411-428. Pachler, N. (Ed.) (2010).
[17]Susono, H., & Shimomura, T. (2006). Using Mobile Phones and QR Codes
for Formative Class Assessment, In A. Méndez-Vilas, A. Solano Martín, J.A.
Mesa González and J. Mesa González (Eds), Current Developments in
Technology-Assisted Education (Vol. 2) (pp 1006-1010). Badajoz, Spain:
FORMATEX