Using Two Level QR Code System For Providing Security To Important Data
  • Author(s): Priyanka Kishor Trimbake ; Anuradha Narendra Nawathe
  • Paper ID: 1700132
  • Page: 81-84
  • Published Date: 05-01-2018
  • Published In: Iconic Research And Engineering Journals
  • Publisher: IRE Journals
  • e-ISSN: 2456-8880
  • Volume/Issue: Volume 1 Issue 6 December-2017
Abstract

The Quick Response (QR) codes are optics labels which are machine readable. User can create QR either dynamic or static QR by using Code Generator and download them for immediate use. QR code is use to store the data on to that. QR codes are the way to provide a linking between the Internet and real world products and. QR codes make it so easy to transfer a web link to a mobile. There is a new rich QR code use for data security, that has two storage levels. That QR code called two level QR code because it is having two parts. One part is for public data and it is generated by standard process. It can be reads by any application which is standard QR code reader. The second part of QR code is private data and it will generats using texture patterns. These patterns are replaces the black modules of the QR code. Because of using texture patterns, there will be increase capacity of the QR code to store the data as well as user can be check the actual document with the copied documents. Recognizing the patterns is method that can be use to scan the second part of the QR code. It is also use both in shares the private data and to provide the security for data. The capacity QR code is to store the data can be increase by increasing the size of texture pattern .

Keywords

Quick response code, Data security, Print and Scan, Golay algorithm

Citations

IRE Journals:
Priyanka Kishor Trimbake , Anuradha Narendra Nawathe "Using Two Level QR Code System For Providing Security To Important Data " Iconic Research And Engineering Journals Volume 1 Issue 6 2017 Page 81-84

IEEE:
Priyanka Kishor Trimbake , Anuradha Narendra Nawathe "Using Two Level QR Code System For Providing Security To Important Data " Iconic Research And Engineering Journals, 1(6)