an alternate way of tracking products using quick response code

B.R.Shunmugapriya,S.Venkataraman,R.Krishnamoorthy,D.Kalaichezhian,R.Rajakumaran

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:4         Issue:3         Year: 01 April,2016         Pages:676-683

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

This paper talks about the real time capturing system for consumer supplies using Quick Response (QR) code in a android smart phone. In recent years, extensive research has been carried out on vision based automatic identification technology that recognize the authenticity of any product. Using Multiplexing and de-multiplexing process encode and decode the information from single QR code with special symbols and split the data back to their QR code pattern where these QR code pattern can be read by android smart phones. Standard image codes like one- dimensional barcode are not effective in retrieval of data. QR code is generated by encoding the message in binary bit stream, representing the bits by binary code pattern of 2*2 blocks and injecting the patterns into the target image by a novel image-block luminance modulation scheme. Thus the QR code generated can be used for billing process.

Kewords

QR code, data encoding, data decoding, android application, billing process.

Reference

[1] I. Charon, I. Honkala, O. Hudry, and A. Lobstein, “General bounds for identifying codes in some infinite regular graphs,” Electron. J.Combinat., vol. 8, no. 1, pp. 1–21, 2001. [2] G. Cohen, I. Honkala, S. Litsyn, and A. Lobstein, Covering Codes, vol. 54, the Netherlands: North Holland, 1997. [3] G. Exoo, T. Laihonen, and S. Ranto, “New bounds on binary identifying codes,” Discrete Appl. Math., vol. 156, no. 12, pp. 2250–2263, 2008. [4].J. ýFridrich,andýJ“Statistically.KodovskT.Pevn undetectable JPEG steganography: Dead ends challenges, and opportunities,” in Proc. 9thACM Workshop Multimedia Security, Dallas, TX, USA, Sep. 2007, pp. 3–14.