CFP last date
20 January 2025
Reseach Article

QR Code Implementation in Photo I-Card for Photo and Text Credentials using .NET

Published on July 2015 by Sharu Goel, Ajay Kumar Singh
Innovations in Computing and Information Technology (Cognition 2015)
Foundation of Computer Science USA
COGNITION2015 - Number 2
July 2015
Authors: Sharu Goel, Ajay Kumar Singh
6bdc9a93-c56b-46cb-aeea-5160a1fb47f4

Sharu Goel, Ajay Kumar Singh . QR Code Implementation in Photo I-Card for Photo and Text Credentials using .NET. Innovations in Computing and Information Technology (Cognition 2015). COGNITION2015, 2 (July 2015), 20-24.

@article{
author = { Sharu Goel, Ajay Kumar Singh },
title = { QR Code Implementation in Photo I-Card for Photo and Text Credentials using .NET },
journal = { Innovations in Computing and Information Technology (Cognition 2015) },
issue_date = { July 2015 },
volume = { COGNITION2015 },
number = { 2 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 20-24 },
numpages = 5,
url = { /proceedings/cognition2015/number2/21895-2129/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Innovations in Computing and Information Technology (Cognition 2015)
%A Sharu Goel
%A Ajay Kumar Singh
%T QR Code Implementation in Photo I-Card for Photo and Text Credentials using .NET
%J Innovations in Computing and Information Technology (Cognition 2015)
%@ 0975-8887
%V COGNITION2015
%N 2
%P 20-24
%D 2015
%I International Journal of Computer Applications
Abstract

Barcode are used for storing the different type of data. Today different type of barcode is used for different purpose. In market lots of barcode are available. There are three type of barcode i. e. one dimensional barcode (1D), two dimensional barcode (2D) and three dimensional barcode (3D). In this paper we provide a secure and optimal approach for implementing quick response code in two dimensional barcode. Quick response code is 2D barcode. Now days, it is used for security purpose. Now a day's QR code is used for publically to save the information. But our main purpose is that information will be secured which are stored in QR code. So we use AES algorithm to encrypt the data. But the maximum capacity of QR code is 3KB. So store the more information we compressed the data or image using compression algorithm and after that create QR code. So we use AES algorithm to encrypt the data and use the lossy compression to compress the image. In this paper, we consider I-Card System for a private secret agency as a real case scenario i. e. implementation of our work.

References
  1. Atul kumar Sharma and Suneeta Agarwal, "A New approach for secure baggage management at airport using encrypted two dimensional barcode", Proc. of the second International conference on Advances in computing, control and communication (CCN) pp. 34-38, 2012.
  2. Sharu Goel and Ajay kr. Singh "A secure and optimal QR code", International Journal of Engineering Research & Management Technology(IJEMRT), Vol. 1, No. 5, October 2014.
  3. Xiaofei Feng, Herong Zheng, "Design and Realization of 2D Color Barcode with High Compression Ratio", International Conference On Computer Design And Appliations, Vol. 1, 2010.
  4. Kapil Kumar, Prateek Sharma and Ajay Kumar Singh, "Effect on Range of Bluetooth Class 1 Adapter using External Omni Antenna," International Journal of Computer Science and Communication (IJCSC), ISSN: 0973-7391, Vol. 3, No. 1, pp. 107-110, Jan. -June. 2012.
  5. Kapil Kumar, Prateek Sharma and Ajay Kumar Singh, "Configuring the System to Share Internet from Single User to Multi-user with Single Internet Dongle," International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Vol. 2, Issue 4, pp. 32-35, 5th Sept. 2012
  6. Alan Kaminsky, Michael Kurdziel, and Stanislaw Radziszowski, "An overview of cryptanalysis research for the Advanced Encryption Standard," MILCOM 2010, San Jose, CA, USA, November 2, 2010.
  7. Abhas Tandon, Rahul Sharma, Sankalp Sodhiya, P. M. Durai Raj Vincent, "QR Code based secure OTP distribution," International Journal of Engineering and Technology (IJET), Vol. 5, No. 3, July 2013.
  8. Sourabh Kumar Choudhary, Rohini Temkar, Nilesh Raj Bhatta, "QR Code Based Secure OTP Distribution", International Journal of Information Science and Intelligent System, Vol. 2, No. 4, 2013.
  9. Sharu goel and Ajay kr. Singh "cost minimization by QR code compression", International Journal of Computer Trends and Technology, Vol. 15, No. 4, pp 157-161 Sep. 2014.
  10. Saurabh Yadav and Ajay Kumar Singh, "A Biometric Traits Based Authentication System for Indian Voting System," International Journal of Computer Application (IJCA), Vol. 65, No. 15, pp. 159-162, March 2013.
  11. Dong Liu, Xiaoyan Sun, Feng Wu, Shipeng Li, and Ya-Qin Zhang, "Image Compression with Edge-Based Inpainting", IEEE Transcations on circuits and system for video technology, Vol. 17, No. 10, October 2007.
  12. Dr. E. Kannan and G. Murugan, "Lossless Image Compression Algorithm for Transmitting Over Low Bandwidth Line", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 2, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Qr Code Data Compression Lossless Compression Aes Algorithm