QR Code Based Digiti QR Code Based Digitized ...

57 downloads 265892 Views 120KB Size Report
ich will scan the QR Code on the digital. Android app [24] will decode the QR ng connects to the website and retrieves opy of the certificate along the student.
IJRCSIT I ISSN No.: 2319-5010 I Vol. 2 I Issue 2 I February 2014 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

QR Code Based Digitized Marksheet System Mr. Madhav V. Dahigonde *, Mr.Vinod J.Kadam# Abstract – Today’s world is the digital world and most of the data are stored in digital format. Therefore, it is necessary to optimize these data and preserve them in an eco-friendly manner. This paper presents a innovative method to digitize the academic transcript i.e. mark-sheets, and embed the digital format in the mark-sheet itself in the form of encrypted QR Codetm, so that the digital data can not be retrieved by any unauthorized user. In this way, we can save a lot of digital space, which is necessary to save those digital academic records of each student. In this new marksheet system, the digital data, which is embedded in the marksheet in form of encrypted QR Code, can only be retrieved and decrypted using our own webapplication, which is hosted over network. This new mark-sheet system introduces a new generation of digital academic transcripts which will be useful in universities. Key words – result, digitized mark-sheet, QR Code, encryption, 2D Bar code I. INTRODUCTION Now-a-days, due to ever increasing computerized data, it is vital to optimize these data and preserve them in an ecofriendly manner. [1] In this paper, we present a method to digitize the educational marksheet and embed the digital format in the mark-sheet itself in the form of encrypted QR Code [11], so that the digital data cannot be retrieved by any unauthorized user. In this way, we can save a lot of digital space, which was necessary to save those digital academic records of each student. The student Mark sheet or Certificates will now be printed along with a QR Code print. The verifier will be having a application on his android device which will scan the QR Code on the digital certificates. The Android app [24] will decode the QR Code and according connects to the website and retrieves the true/original copy of the certificate along the student photo registered with the certificate. On receiving the copy the verifier can easily detect the submitted copy is true or fake.

*Department of Information Technology, Dr.B.A.Tech. University,Lonere,(M.S.).India

A QR code (abbreviated from Quick Response code) is a type of matrix-barcode (or two-dimensional bar code). [22] QR Codes were introduced by the Japanese corporation Denso Wave Incorporated [12]. Originally it was designed to be used to track parts in the vehicle manufacturing industry, but its use has since grown tremendously. [16]QR Codes are increasing their popularity as they appear in more places in the urban environment. Apart from marketing, QR Codes have been also adopted indifferent areas such as the on-line payments. The use of QR codes is license-free. A bar code contains data in one direction only but QR Code contains information in both the vertical and horizontal directions therefore QR Code can hold considerably greater information than a bar code. [17] These Quick Response (QR) codes are versatile. In this new mark-sheet system, we embed a QR code in the mark sheet which encodes the mark details of the student, grades obtained, student’s name, roll number, year, semester etc. So any HR or any employer who needs to verify the correctness of the mark sheet can just take his mobile phone and use the QR code reader application which is available for free of cost and scan the code. If the student or alumni wants to see his marks digitally or wants to send his own academic data to any other educational institute in digital format, then he has to just scan the QR Code, decrypt the data and send the information. [1] This system can easily be implemented and it is virtually impossible to alter the QR code that is embedded within a mark sheet. So it increases the complexity of the forgery process and hence it is computationally secure as per the laws of security. The system ensured several layers of security to the document. It will be printed on an ecofriendly paper that cannot be torn.

Fig. 1 QR code structure[20]

[email protected] #

Assistant Professor, Department of Information Technology, Dr.B.A.Tech. University, Lonere [email protected]

In the above figure, the three prominent boxes in the corners of each code indicate the location of the image (so it can be centered by the image parser). Another smaller box in the lower-right aligns the image. The rest of the

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------International Journal of Research in Computer Science and Information Technology (IJRCSIT) 120

IJRCSIT I ISSN No.: 2319-5010 I Vol. 2 I Issue 2 I February 2014 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

blocks indicate the information specific to the international standards and finally the identifying data contained within the code. [14][20] II. SYSTEM DESIGN SYSTEM ARCHITECTURE The College administrator updates the information on the server. This information carries the details of Students, their marks and academic certificates. Official and students on demand can download these digital certificates. The server when on demand patches the Encoded QR CODE on the digital certificate. This QR CODE contains the digital ID of the certificate and the data is encrypted and encoded in the QR CODE.

Fig. 2 QR code based digitized marksheet system

The official who is a registered user of the system can scan the digital Certificate for getting the right information of the certificate. The mobile contains an application which can scan the QR CODE on the certificate. The user needs to enter the authentication PIN which is given to him during the registration. This PIN is send to the Server along with the IMEI (International Mobile Equipment Identification) which the server authenticates the User and check whether the application is running on the same registered Mobile. On validating and if found a valid user the server provides an acknowledgement to the Mobile application which further activates the camera for scanning the QR Code. The user now shoots the QR CODE which is printed on the certificate. The mobile application then decodes the contents of the QR CODE and finds the Document Digital ID. This digital ID is further encrypted using the user PIN and is send to the server. The server then decodes the contents and send the all the required information to the user on him mobile application. The Mobile apps show the information that should be there on the certificate. The user can visually validate the contents and can determine the fake information on the certificate.

This information help the user to find out the produced certificate is fake or not. III. METHODS USED The major of the system work is mainly focused on QR CODE. Encrypted QR codes, which are not very common, have a few implementations. An Android app [24] manages encryption and decryption of QR codes using the DES algorithm (56 bits). We first make a string of data bits to create a QR Code. [11][3][4][5] Encrypted message string contains the original data that we are going to encode, plus some information bits. These information bits will give type information of QR code to Decoder. After generating this string of bits, error correction code word is generated by using it. QR Codes use ReedSolomon Error Correction technique [10]. Almost all twodimensional bar codes such as PDF-417, MaxiCode, Datamatrix, QR Code, and Aztec Code use Reed–Solomon error correction to allow correct reading even if a portion of the bar code is damaged. In coding theory, Reed– Solomon (RS) codes are non-binary cyclic error-correcting codes invented by Irving S. Reed and Gustave Solomon. They described a systematic way of building codes that could detect and correct multiple random symbol errors. By adding t check symbols to the data, an RS code can detect any combination of up to t erroneous symbols, or correct up to ⌊t/2⌋ symbols. As an erasure code, it can correct up to t known erasures, or it can detect and correct combinations of errors and erasures. Furthermore, RS codes are suitable as multiple-burst bit-error correcting codes, since a sequence of b + 1 consecutive bit errors can affect at most two symbols of size b. The choice of t is up to the designer of the code, and may be selected within wide limits. [19][20] Now string of bits and corresponding error correction code word are ready for use. There are eight mask patterns that can be used to change the outputted matrix. Each mask pattern changes the bits according to their Coordinates in the QR matrix. The purpose of a mask pattern is to make the QR code easier for a QR scanner to read. Each mask pattern uses a formula to determine whether or not to change the color of the current bit.Each mask generates a different QR code. After generate the eight different QR codes internally, calculate a penalty score according to the rules defined in the QR code standard. Then the result is the QR code that has the best score. [21][25] If the total size of the encrypted string is more than 1,264 characters then generate two separate QR codes for first 1,264 characters and remaining characters respectively. Hence, we can create many QR codes as per our need and according to size of the encrypted string. The steps of method are given below: Step1: Encryption of Data

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------International Journal of Research in Computer Science and Information Technology (IJRCSIT) 121

IJRCSIT I ISSN No.: 2319-5010 I Vol. 2 I Issue 2 I February 2014 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Step 2: Error correction generation Step 3: Encoding Architectural Point of view the mobile user scans the QR Code which is printed on the certificate. The user Mobile should be a registered mobile this means that no other QR CODE service will work on our system as the data is encoded and will be decoded only when the Mobile that is used to scan the QR CODE is registered and authenticated. The decoded data is the digital document and is send to the server for information retrieval. The server retrieves the information from the database for the unique Digital ID and the information is synchronized and is send to the user Mobile. The user can now easily detect the data he received and the information printed on the certificate. IV. MOBILE PHONE QR CODE ENCODING AND DECODING SCHEME ENCODING AND DECODING QR Code encoding and decoding [12][13] National standards GB/T 18284-2000 "Quick Response Code" is based and the minimum encoded version compatible with the data is selected.[15] QR CODE COLLECTION AND PREPROCESSING Decoding data from a given code is the inverse process of encoding. Meanwhile, compared with images captured by special barcode reader, images acquired in natural environment have shadows and blurring defocus defects. If images are not of high quality, it is impossible to decode the code accurately or completely. Therefore, preprocess the image in the consideration of image problem caused by capture. Preprocessing of mobile phone QR Code follows the following steps: convert the colorful image to gray scale image, median filtering, binarization, image location, rotation, perspective transformation and interpolation. Here conversion is done by weighted mean. After median filtering, bimodal image method is adopted to choose threshold for binarization. Then locate and rotate the image.[18] V. QR CODE PREPROCESSING SCHEME IMAGE LOCALIZATION There are lots of methods to extract the edge of QR Code image[6][7][9][10]. Basic idea of edge extraction is to enhance local edge taking advantage of edge enhancement operator and extract edge points using preset threshold. To gain the rotation angle of QR image, horizontal part of Sobel operator is used to convolute with the image. Horizontal edge image is gained using threshold. Edge detection result is shown in Figure 1 right. Adopt Hough transform to the horizontal edge image so as to calculate the rotation angle θ. ROTATION

Set the center of QR Code image as reference. To begin with, the axis of center should be figured out. Since QR Code has position detection patterns located at the three corners of the symbol, search the whole image to find structures which resemble the position detection patterns. Calculate the average length of the QR image and determine the correct coordinates of the four corner. Detect the image edge using sobel operator, obtain the contour of the image and extract QR Code image from the original image removing irrelevant part[6][7][10]. We assume that the original QR Code’s center is not altered. Then use the rotation angle θ obtained previously and rotate the image applying the universal equation :

 x1  cos  y1   sin    

sin    x0  cos   y 0

while x0 ,y0 are pixel coordinates of the original image, x1 ,y1 are corresponding pixel coordinates after rotation, and rotation angle θ is positive counterclockwise and negative clockwise. PERSPECTIVE TRANSFORMATION AND INTERPOLATION If the plane which the camera lies in is parallel to the QR Code image, bilinear transformation can be adopted. However, real situation can be quite different from this assumption. When acquire QR Code image, the plane in which camera lies may not be parallel to QR image [6][7][9][10][23] which result in foreshortening effect. Then perspective transformation can be adopted. Since output image pixels are usually mapped to input image in non-integer position, which is located between the four input pixels, interpolation should be applied to decide the pixel value. We can calculate the coefficient of bilinear transformation according to the original and corrected coordinates of the four corners. Then apply the bilinear transformation to the image to correct the image. We adopt the method which map the output image pixel to the input image and calculate the value using bilinear interpolation method. It is simple and easy to implement, meanwhile it avoid the situation in which pixels are mapped out of image boundary. VI. SYSTEM IMPLEMENTATION This system is to be implemented on the platform of Java SDK 7. The student information stored on the web is retrieved and printed in a digital form. The digital ID which is unique for every student in encode in QR Code and the QR Code image is printed in the digital certificate. After decoding the QR Code the system retrieves the Digital ID and the student information. This information is displayed on the Android Phone. This information needs to be cross checked visually.

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------International Journal of Research in Computer Science and Information Technology (IJRCSIT) 122

IJRCSIT I ISSN No.: 2319-5010 I Vol. 2 I Issue 2 I February 2014 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

VII. REFERENCES [1] Somdip Dey,"New Generation of Digital Academic-Transcripts using encrypted QR CodeTM "IEEE 2013 International Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing (iMac4s 2013), Kerala, India, March 2013

[18] Nitu Mujumdar, Pooja Shinde, Karishma Thigale, Sanjay Agrawal,"Application Of Smart Phone QR Code And Fingerprint For Anti- Counterfeiting"International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 4, April - 2013ISSN: 2278-0181

[2]

Somdip Dey, ”SD-EQR: A New Technique To Use QR CodesTM in Cryptography”, Proceedings of “1st International Conference on Emerging Trends in Computer and Information Technology (ICETCIT 2012)”, Coimbatore, India, pp. 11-21.

[19] Immink, K. A. S. (1994), "Reed–Solomon Codes and the Compact Disc", in Wicker, Stephen B.; Bhargava, Vijay K., Reed–Solomon Codes and Their Applications, IEEE Press, ISBN 978-0-7803-10254

[3]

N. Johnson and S. Jajodia, “Steganaly- sis: The investigation of hidden information”, Proc. Of the 1998 IEEE Information Technology Conference, 1998.

[20]

http://en.wikipedia.org/wiki/Reed%E2%80%93Solomon_error_ correction (Retrieved 2014-01-02)

[21]

[4]

Anti-counterfeit system based on mobile phone QR code and fingerprint Shiyang Liu Department of Electronic Information and Engineering, China Geosciences(Wuhan) National Anti-counterfeit Engineering Lab, HuaZhong University of Science and Technology Wuhan, China

http://its.fd.cvut.cz/courses/identification-systems/lectures/idfs2012-qr-code-suplement.pdf (Retrieved 2014-01-02.)

[5]

Somdip Dey, Kalyan Mondal, Joyshree Nath, Asoke Nath,"Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm", IJMECS, vol.4, no.6, pp. 59-67, 2012.

[6]

Somdip Dey, “SD-EI: A Cryptographic Technique To Encrypt Images”, Proceedings of “The International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012)”, held at Kuala Lumpur, Malaysia, 2012, pp. 28-32.

[7]

Somdip Dey, “An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES”, International Journal of CyberSecurity and Digital Forensics (IJCSDF) 1(2), pp. 82-88.

[8]

[9]

Somdip Dey, “SD-AEI: An advanced encryption technique for images”, 2012 IEEE Second International Conference on Digital Information Processing and Communications (ICDIPC), pp. 69-74. Somdip Dey, Asoke Nath, “Modern Encryption Standard (MES) Version-I: An Advanced Cryptographic Method”, Proceedings of IEEE 2nd World Congress on Information and Communication Technologies (WICT- 2012), pp. 242-247.

[10] Somdip Dey, “SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit- Manipulation to Exclude Repetition from a Message to be Encrypted”, Journal: Computing Research Repository - CoRR, vol. abs/1205.4279, 2012. [11] Reed and G. Solomon, “Polynomial codes over certain finite fields”, Journal of the Society for Industrial and Applied Mathematics, 8(2):300–304, 1960. [12] Cryptography and Network Security, William Stallings, Prentice Hall of India. [13] Cryptography & Network Security, Behrouz A. Forouzan, Tata McGraw Hill Book Company. [14] Jimmy Rogers,What Are QR Codes? Digitize your World & Back Again (online) http://www.makeuseof.com 27th October, 2008 [15] Yue Liu,Mingjun Liu,Automatic Recognition Algorithm of Quick Response Code Based on Embedded System,Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA'06) 0-7695-2528-8/06 [16] http://www.whatisaqrcode.co.uk/ (Retrieved 2014-01-02) [17]

A. Sankara Narayanan,QR Codes and Security Solutions,International Journal of Computer Science and Telecommunications [Volume 3, Issue 7, July 2012]

[22] Vinod J. Kadam, S.P.Vaidya, “Bar Code Technology for Library SWOT analysis, Strategies, Survey, Cross-case analysis and Application: A Case study of Dr.Babasaheb Ambedkar Technological University”, International Conference on Science and Technology (ICST-2K14),2014,Pune.[accepted] [23] V.B.Nikam,Vinod kadam,B.B.Meshram“Image Compression Using Partitioning Around Medoids Clustering Algorithm”IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011.ISSN 1694-0814 [24] V.J.kadam,Taj Mohammad A. Raheman,Ajinkya Ajagekar,Sushant B. Patil “Shoulder Shuffling Free Graphical Locker for Android Graphical Pattern Lock with Text Support for Android Devices” International Journal of Advanced Research in Computer Science, Volume 4, No. 3, March 2013 (Special Issue) ISSN 0976 – 5697 [25] Kulkarni, S. B., et. al., Iris data encryption based on Aztec Symbology. Evolving Systems, Volume 4, ISSUE 3, pp 203-217, Springer Berlin Heidelberg 2013,

AUTHORS Mr. Madahv V. Dahigonde is currently a student of Information Technoloy Department of Dr.Babasaheb Ambedkar Technological University, Lonere,Tal-mangaon,Dist-Raigad (Maharashtra State), India. His research interest is Mobile computing and Distributed system. He has published many papers in different conferences. Prof. Vinod J. Kadam was born in 1981. He received B.E. degree in Information Technology in 2003 from Shivaji University, Kolhapur. He has also completed M.tech. in Information Technology in 2005. He joined as lecturer in Information Technology in Dr.Babasaheb Ambedkar Technological University,Lonere in August 2004. His area of interest is mobile computing and distributed Systm. Presently he is working as a Assistant Professor, Department of Information Technology, Dr.Babasaheb Ambedkar Technological University,Lonere ,India. He is having 10 years of teaching experience. He has till now 05 journal publications in his credit. He has attended and presented 5 papers in International and more than 20 papers in National conferences.

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------International Journal of Research in Computer Science and Information Technology (IJRCSIT) 123