• Title/Summary/Keyword: quick response (QR) code

Search Result 51, Processing Time 0.051 seconds

Reversible Data Hiding based on QR Code for Binary Image (이진 이미지를 위한 QR 코드 기반의 가역적인 데이터 은닉)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.281-288
    • /
    • 2014
  • QR code (abbreviated from Quick Response Code) is code system that is strong in against to apply image processing techniques (skew, warp, blur, and rotate) as QR codes can store several hundred times the amount of information carried by ordinary bar codes. For this reason, QR code is used in various fields, e.g., air ticket (boarding control system), food(vegetables, meat etc.) tracking system, contact lenses management, prescription management, patient wrist band (patient management) etc. In this paper, we proposed reversible data hiding for binary images. A reversible data hiding algorithm, which can recover the original image without any distortion from the marked (stego) image after the hidden data have been extracted, because it is possible to use various kinds of purposes. QR code can be used to generate by anyone so it can be easily used for crime. In order to prevent crimes related QR code, reversible data hiding can confirm if QR code is counterfeit or not as including authentication information. In this paper, we proved proposed method as experiments.

An Embedded Information Extraction of Color QR Code for Offline Applications (오프라인 응용을 위한 컬러 QR코드의 삽입 정보 추출 방법)

  • Kim, Jin-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1123-1131
    • /
    • 2020
  • The quick-response (QR) code is a two-dimensional barcode which is widely being used. Due to several interesting features such as small code size, high error correction capabilities, easy code generation and reading process, the QR codes are used in many applications. Nowadays, a printed color QR code for offline applications is being studied to improve the information storage capacity. By multiplexing color information into the conventional black-white QR code, the storage capacity is increased, however, it is hard to extract the embedded information due to the color crosstalk and geometrical distortion. In this paper, to overcome these problems, a new type of QR code is designed based on the CMYK color model and the local spatial searching as well as the global spatial matching is introduced in the reading process. These results in the recognition rate increase. Through practical experiments, it is shown that the proposed algorithm can perform the bit recognition rate improvement of about 3% to 5%.

A Research on Expansion of Library Service by Using QR Code (QR코드를 활용한 도서관 서비스 확장 방안에 관한 연구)

  • Park, Jin-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.1
    • /
    • pp.321-347
    • /
    • 2012
  • Recently, the expansion of smart phones, wi-fi. and unlimited service changed our life style from personal computer based to mobile device based. With this trend, a lot of companies and government facilities use QR code as an advertising material, and now the QR code is very popular service in our ordinary life. In the meantime, libraries in abroad and university libraries started using QR code in library service about 2 or 3 years ago, and domestic libraries started using it in service due to the increase of establishment of mobile Library websites. In this research, starting with looking into the literature, I analyzed the examples of the use of QR code in libraries. On the base of it, I drew a QR code library service model, and what needs to be considered for the use of it.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

An Authentic Certification System of a Printed Color QR Code based on Convolutional Neural Network (인쇄된 컬러 QR코드의 합성곱 신경망 알고리즘에 의한 진위 판정 시스템)

  • Choi, Do-young;Kim, Jin-soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.3
    • /
    • pp.21-30
    • /
    • 2020
  • With the widespread of smartphones, the Quick response (QR) code became one of the most popular codes. In this paper, a new type of QR code is proposed to increase the storage capacities and also to contain private information by changing the colors and the shape of patterns in the codes. Then, for a variety of applications of the printed QR codes, this paper proposes an efficient authentic certification system, which is built on an conventional CNN (Convolutional neural network) architecture - VGGNet and classifies authentic or counterfeit with smartphones, easily. For authentic codes, the proposed system extracts the embedded private information. Through practical experiments with a printed QR code, it is shown that the proposed system can classify authentic or counterfeit code, perfectly, and also, are useful for extracting private information.

E-feedback System Using QR Cod Tag (QR 코드 태그를 이용한 전자 피드백 시스템)

  • Ahmed, Hamdi A.;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.282-283
    • /
    • 2017
  • A government or non-governmental organization give service to their customer. Each organization have different hierarch levels. Service satisfaction surveys have become an important tool for government planners, as important in the perceived quality of service lead to great delivery of public service. When a customer gives feedback at a bottom level of organization, it is so difficult reach to higher official in time. This paper argue that, Quick Response (QR) code open up the possibility of conducting public service satisfaction at lower cost and the way feedback is directly routed to the relevant party according to their hierarchical level and gate real time feedback using specific smart phone application.

  • PDF

Counterplan of the XSS Attack to QR Code (QR 코드의 XSS 공격에 대한 대응방안)

  • Bahn, Kee-Bong;Jung, Jae-Wook;Won, Dong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.102-104
    • /
    • 2011
  • 최근 스마트폰 사용자가 빠른 속도로 늘어나면서 'QR(Quick Response)코드가 새로운 마케팅 및 정보의 전달 수단으로 크게 각광받고 있다. 또한, QR코드는 인터넷 주소(URL), 사진 및 동영상 정보, 지도 정보, 명함 정보 등을 제공하는 매우 효율적인 수단으로 작용하고 있다. 하지만 스마트폰으로 무심코 인식한 QR 코드로 인해 악성코드에 감염될 가능성이 높아 사용자 주의가 필요하다. 로그인된 웹 사이트에서 QR 코드를 읽어 웹 브라우저로 접근할 때 XSS(Cross Site Scripting)을 통해 해당 웹사이트의 로그인 정보를 획득하거나 게시판 회원정보와 같은 데이터를 수정할 수도 있기 때문이다. 이에 본 논문에서는 QR 코드의 XSS 공격에 대한 대응방안을 상세히 기술하여 QR 코드를 사용하는 유저들에게 도움이 되고자 한다.

Numerical and experimental study on flexural behavior of reinforced concrete beams: Digital image correlation approach

  • Krishna, B. Murali;Reddy, V. Guru Prathap;Tadepalli, T.;Kumar, P. Rathish;Lahir, Yerra
    • Computers and Concrete
    • /
    • v.24 no.6
    • /
    • pp.561-570
    • /
    • 2019
  • Understanding the realistic behavior of concrete up to failure under different loading conditions within the framework of damage mechanics and plasticity would lead to an enhanced design of concrete structures. In the present investigation, QR (Quick Response) code based random speckle pattern is used as a non-contact sensor, which is an innovative approach in the field of digital image correlation (DIC). A four-point bending test was performed on RC beams of size 1800 mm × 150 mm × 200 mm. Image processing was done using an open source Ncorr algorithm for the results obtained using random speckle pattern and QR code based random speckle pattern. Load-deflection curves of RC beams were plotted for the results obtained using both contact and non-contact (DIC) sensors, and further, Moment (M)-Curvature (κ) relationship of RC beams was developed. The loading curves obtained were used as input data for material model parameters in finite element analysis. In finite element method (FEM) based software, concrete damage plasticity (CDP) constitutive model is used to predict the realistic nonlinear quasi-static flexural behavior of RC beams for monotonic loading condition. The results obtained using QR code based DIC are observed to be on par with conventional results and FEM results.

Multifactor Authentication Using a QR Code and a One-Time Password

  • Malik, Jyoti;Girdhar, Dhiraj;Dahiya, Ratna;Sainarayanan, G.
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.483-490
    • /
    • 2014
  • In today's world, communication, the sharing of information, and money transactions are all possible to conduct via the Internet, but it is important that it these things are done by the actual person. It is possible via several means that an intruder can access user information. As such, several precautionary measures have to be taken to avoid such instances. The purpose of this paper is to introduce the idea of a one-time password (OTP), which makes unauthorized access difficult for unauthorized users. A OTP can be implemented using smart cards, time-based tokens, and short message service, but hardware based methodologies require maintenance costs and can be misplaced Therefore, the quick response code technique and personal assurance message has been added along with the OTP authentication.

Converting Panax ginseng DNA and chemical fingerprints into two-dimensional barcode

  • Cai, Yong;Li, Peng;Li, Xi-Wen;Zhao, Jing;Chen, Hai;Yang, Qing;Hu, Hao
    • Journal of Ginseng Research
    • /
    • v.41 no.3
    • /
    • pp.339-346
    • /
    • 2017
  • Background: In this study, we investigated how to convert the Panax ginseng DNA sequence code and chemical fingerprints into a two-dimensional code. In order to improve the compression efficiency, GATC2Bytes and digital merger compression algorithms are proposed. Methods: HPLC chemical fingerprint data of 10 groups of P. ginseng from Northeast China and the internal transcribed spacer 2 (ITS2) sequence code as the DNA sequence code were ready for conversion. In order to convert such data into a two-dimensional code, the following six steps were performed: First, the chemical fingerprint characteristic data sets were obtained through the inflection filtering algorithm. Second, precompression processing of such data sets is undertaken. Third, precompression processing was undertaken with the P. ginseng DNA (ITS2) sequence codes. Fourth, the precompressed chemical fingerprint data and the DNA (ITS2) sequence code were combined in accordance with the set data format. Such combined data can be compressed by Zlib, an open source data compression algorithm. Finally, the compressed data generated a two-dimensional code called a quick response code (QR code). Results: Through the abovementioned converting process, it can be found that the number of bytes needed for storing P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can be greatly reduced. After GTCA2Bytes algorithm processing, the ITS2 compression rate reaches 75% and the chemical fingerprint compression rate exceeds 99.65% via filtration and digital merger compression algorithm processing. Therefore, the overall compression ratio even exceeds 99.36%. The capacity of the formed QR code is around 0.5k, which can easily and successfully be read and identified by any smartphone. Conclusion: P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can form a QR code after data processing, and therefore the QR code can be a perfect carrier of the authenticity and quality of P. ginseng information. This study provides a theoretical basis for the development of a quality traceability system of traditional Chinese medicine based on a two-dimensional code.