SlideShare a Scribd company logo
Enviar búsqueda
Cargar
Advanced smart credential cum unique identification and recognition system
Denunciar
Compartir
IAEME Publication
Journal Publishing en Journal Publication
Seguir
•
1 recomendación
•
103 vistas
Advanced smart credential cum unique identification and recognition system
•
1 recomendación
•
103 vistas
IAEME Publication
Journal Publishing en Journal Publication
Seguir
Denunciar
Compartir
Advanced smart credential cum unique identification and recognition system
1 de 8
Descargar ahora
Recomendados
Adding barcode to report (cr) por
Adding barcode to report (cr)
Hwang Waisen
1K vistas
•
10 diapositivas
Creation of automatic identification and data capture infrastructure via data... por
Creation of automatic identification and data capture infrastructure via data...
IAEME Publication
379 vistas
•
8 diapositivas
Creation of automatic identification and data por
Creation of automatic identification and data
IAEME Publication
357 vistas
•
8 diapositivas
Bar code technology por
Bar code technology
bhupathi vikas
11.8K vistas
•
15 diapositivas
Barcode & qr code por
Barcode & qr code
Coder Tech
1.3K vistas
•
15 diapositivas
Product Recognition using Label and Barcodes por
Product Recognition using Label and Barcodes
IRJET Journal
48 vistas
•
9 diapositivas
Más contenido relacionado
La actualidad más candente
Automatic data capture por
Automatic data capture
Lavakush Verma
2.4K vistas
•
22 diapositivas
Bar code-technology in tire industry por
Bar code-technology in tire industry
hemanth102030
2.9K vistas
•
35 diapositivas
Your Resource Guide For Communicating With Bar Code Symbologies por
Your Resource Guide For Communicating With Bar Code Symbologies
Stallion Group
1.1K vistas
•
37 diapositivas
vrushabh sahare barcoding presentation por
vrushabh sahare barcoding presentation
Akash Maurya
773 vistas
•
23 diapositivas
Presentation on barcode por
Presentation on barcode
Sp97744
2.1K vistas
•
38 diapositivas
Barcode & smart cards por
Barcode & smart cards
Muhammad Ali
2.7K vistas
•
29 diapositivas
La actualidad más candente
(19)
Automatic data capture por Lavakush Verma
Automatic data capture
Lavakush Verma
•
2.4K vistas
Bar code-technology in tire industry por hemanth102030
Bar code-technology in tire industry
hemanth102030
•
2.9K vistas
Your Resource Guide For Communicating With Bar Code Symbologies por Stallion Group
Your Resource Guide For Communicating With Bar Code Symbologies
Stallion Group
•
1.1K vistas
vrushabh sahare barcoding presentation por Akash Maurya
vrushabh sahare barcoding presentation
Akash Maurya
•
773 vistas
Presentation on barcode por Sp97744
Presentation on barcode
Sp97744
•
2.1K vistas
Barcode & smart cards por Muhammad Ali
Barcode & smart cards
Muhammad Ali
•
2.7K vistas
Barcodes (WHW) What ? How ? Why ? por Arie Terner
Barcodes (WHW) What ? How ? Why ?
Arie Terner
•
771 vistas
Barcodes por Mahendra Pratap Singh
Barcodes
Mahendra Pratap Singh
•
26.8K vistas
Barcode In Retail Presentation por guest561f62
Barcode In Retail Presentation
guest561f62
•
10.4K vistas
Bar code- Techlogogy : Seminar PPT por Badshah34
Bar code- Techlogogy : Seminar PPT
Badshah34
•
2K vistas
BAR CODE AND R.F.I.D. por Gauri Agrawal
BAR CODE AND R.F.I.D.
Gauri Agrawal
•
323 vistas
Contact Bar Code Readers por adil529
Contact Bar Code Readers
adil529
•
1.5K vistas
Dwarakseminar1 por Cgdwarakanath Chinnagaddam
Dwarakseminar1
Cgdwarakanath Chinnagaddam
•
1.1K vistas
Regulatory aspect of barcode technology por DeveshDRA
Regulatory aspect of barcode technology
DeveshDRA
•
4.3K vistas
Barcode presentation 2013 por JASON WOODHOUSE
Barcode presentation 2013
JASON WOODHOUSE
•
20.6K vistas
Bar codes and its type with different scanner and its application por Akshay Shelake
Bar codes and its type with different scanner and its application
Akshay Shelake
•
2.6K vistas
Barcodes por Hammaduddin
Barcodes
Hammaduddin
•
995 vistas
seminar-on-barcodes por alibefkani
seminar-on-barcodes
alibefkani
•
4.4K vistas
Barcode scanner and printer ppt por Niks Adhiya
Barcode scanner and printer ppt
Niks Adhiya
•
812 vistas
Destacado
The machine learning method regarding efficient soft computing and ict using svm por
The machine learning method regarding efficient soft computing and ict using svm
IAEME Publication
200 vistas
•
7 diapositivas
As difer[1]. por
As difer[1].
Artes 100 Fronteiras
346 vistas
•
13 diapositivas
Os animais por
Os animais
aasf
259 vistas
•
6 diapositivas
Elegance por
Elegance
Elegance Parfums
249 vistas
•
12 diapositivas
Fórmula Truck 2013 - Patrocínio Adalberto Jardim por
Fórmula Truck 2013 - Patrocínio Adalberto Jardim
truckracing
949 vistas
•
16 diapositivas
Fundamentos de análisis por
Fundamentos de análisis
elicamargoalze
783 vistas
•
15 diapositivas
Destacado
(20)
The machine learning method regarding efficient soft computing and ict using svm por IAEME Publication
The machine learning method regarding efficient soft computing and ict using svm
IAEME Publication
•
200 vistas
As difer[1]. por Artes 100 Fronteiras
As difer[1].
Artes 100 Fronteiras
•
346 vistas
Os animais por aasf
Os animais
aasf
•
259 vistas
Elegance por Elegance Parfums
Elegance
Elegance Parfums
•
249 vistas
Fórmula Truck 2013 - Patrocínio Adalberto Jardim por truckracing
Fórmula Truck 2013 - Patrocínio Adalberto Jardim
truckracing
•
949 vistas
Fundamentos de análisis por elicamargoalze
Fundamentos de análisis
elicamargoalze
•
783 vistas
Coragem de mulher sonoro (1) por Artes 100 Fronteiras
Coragem de mulher sonoro (1)
Artes 100 Fronteiras
•
95 vistas
Us ascii''tailndia por Artes 100 Fronteiras
Us ascii''tailndia
Artes 100 Fronteiras
•
181 vistas
Mandriva linux a por Juan Viellard Muñoz
Mandriva linux a
Juan Viellard Muñoz
•
345 vistas
Palacio domabahce em estambul1 por Artes 100 Fronteiras
Palacio domabahce em estambul1
Artes 100 Fronteiras
•
390 vistas
Chineses por Artes 100 Fronteiras
Chineses
Artes 100 Fronteiras
•
314 vistas
Nativo Web 1.0 presentacion por nativoweb
Nativo Web 1.0 presentacion
nativoweb
•
349 vistas
Qué es la dieta mediterránea curso escuela2.0 por marialuisalaradavila
Qué es la dieta mediterránea curso escuela2.0
marialuisalaradavila
•
88 vistas
Presentación Málaga Tatiana Jiménez 2ºB. por tatiana3
Presentación Málaga Tatiana Jiménez 2ºB.
tatiana3
•
431 vistas
Nuevos PLV´s automáticos por José Luis Heras
Nuevos PLV´s automáticos
José Luis Heras
•
352 vistas
4esposas 100309145710-phpapp02 por Artes 100 Fronteiras
4esposas 100309145710-phpapp02
Artes 100 Fronteiras
•
142 vistas
Chineses por Artes 100 Fronteiras
Chineses
Artes 100 Fronteiras
•
332 vistas
Power point moda por ceroes
Power point moda
ceroes
•
667 vistas
Sopre as cinzas por Artes 100 Fronteiras
Sopre as cinzas
Artes 100 Fronteiras
•
120 vistas
Promises in JavaScript por Revath S Kumar
Promises in JavaScript
Revath S Kumar
•
1.3K vistas
Similar a Advanced smart credential cum unique identification and recognition system
Creation of automatic identification and data capture infrastructure via data... por
Creation of automatic identification and data capture infrastructure via data...
IAEME Publication
180 vistas
•
8 diapositivas
Barcode Technology ppt por
Barcode Technology ppt
VyakhayaYadav
96 vistas
•
30 diapositivas
IRJET - Color Qr Code por
IRJET - Color Qr Code
IRJET Journal
35 vistas
•
6 diapositivas
QR Codes seminar por
QR Codes seminar
Umsh23
8.2K vistas
•
14 diapositivas
20320130406009 por
20320130406009
IAEME Publication
226 vistas
•
14 diapositivas
Barcode technology por
Barcode technology
Subhash Vadadoriya
73.6K vistas
•
18 diapositivas
Similar a Advanced smart credential cum unique identification and recognition system
(20)
Creation of automatic identification and data capture infrastructure via data... por IAEME Publication
Creation of automatic identification and data capture infrastructure via data...
IAEME Publication
•
180 vistas
Barcode Technology ppt por VyakhayaYadav
Barcode Technology ppt
VyakhayaYadav
•
96 vistas
IRJET - Color Qr Code por IRJET Journal
IRJET - Color Qr Code
IRJET Journal
•
35 vistas
QR Codes seminar por Umsh23
QR Codes seminar
Umsh23
•
8.2K vistas
20320130406009 por IAEME Publication
20320130406009
IAEME Publication
•
226 vistas
Barcode technology por Subhash Vadadoriya
Barcode technology
Subhash Vadadoriya
•
73.6K vistas
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code por IRJET Journal
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET Journal
•
20 vistas
Limitations of Barcode and QR code Scanner por IRJET Journal
Limitations of Barcode and QR code Scanner
IRJET Journal
•
7 vistas
BARCODE TECHNOLOGY.pptx por SuchithraThallapally
BARCODE TECHNOLOGY.pptx
SuchithraThallapally
•
72 vistas
Qr codes vs. barcodes in inventory tracking por MRPeasy
Qr codes vs. barcodes in inventory tracking
MRPeasy
•
256 vistas
Use of QR Code: A Step Towards Development in India por IRJET Journal
Use of QR Code: A Step Towards Development in India
IRJET Journal
•
54 vistas
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-... por IRJET Journal
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET Journal
•
12 vistas
Barcode history and Future por Maruf Alom
Barcode history and Future
Maruf Alom
•
1.7K vistas
Qr codes por niyaj ahmed
Qr codes
niyaj ahmed
•
2.6K vistas
What is the significance of the QR Code Maintenance App for Your Business- He... por Techugo
What is the significance of the QR Code Maintenance App for Your Business- He...
Techugo
•
13 vistas
Implementation of 2D Optimal Barcode (QR Code) for Images por Editor IJCATR
Implementation of 2D Optimal Barcode (QR Code) for Images
Editor IJCATR
•
608 vistas
Qr codes por jaiksolanki
Qr codes
jaiksolanki
•
480 vistas
The Definitive Guide to Barcoding por ADCBarcode
The Definitive Guide to Barcoding
ADCBarcode
•
442 vistas
Silchar paper final por Kishor Satpathy
Silchar paper final
Kishor Satpathy
•
581 vistas
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C... por IRJET Journal
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...
IRJET Journal
•
20 vistas
Más de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf por
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
53 vistas
•
12 diapositivas
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-... por
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
36 vistas
•
14 diapositivas
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS por
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
169 vistas
•
7 diapositivas
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS por
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
27 vistas
•
8 diapositivas
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS por
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
66 vistas
•
8 diapositivas
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS por
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
253 vistas
•
7 diapositivas
Más de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf por IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
•
53 vistas
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-... por IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
•
36 vistas
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS por IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
•
169 vistas
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS por IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
•
27 vistas
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS por IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
•
66 vistas
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS por IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
•
253 vistas
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO por IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
•
101 vistas
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG... por IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
•
53 vistas
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY por IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
•
10 vistas
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO... por IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
•
18 vistas
GANDHI ON NON-VIOLENT POLICE por IAEME Publication
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
•
10 vistas
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED... por IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
•
181 vistas
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE... por IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
•
11 vistas
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD... por IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
•
57 vistas
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS... por IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
•
31 vistas
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL... por IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
•
24 vistas
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ... por IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
•
233 vistas
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET... por IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
•
17 vistas
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF... por IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
•
66 vistas
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT por IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
•
86 vistas
Advanced smart credential cum unique identification and recognition system
1.
INTERNATIONALComputer EngineeringCOMPUTER ENGINEERING
International Journal of JOURNAL OF and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), pp. 97-104 IJCET © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2012): 3.9580 (Calculated by GISI) ©IAEME www.jifactor.com ADVANCED SMART CREDENTIAL CUM UNIQUE IDENTIFICATION AND RECOGNITION SYSTEM. (ASCUIRS) Mr.Lokesh S. Khedekar 1 , Dr.A.S.Alvi 2 PRMIT&R,Badnera,Amravati,India,lokeshkhedekar@gmail.com 1 PRMIT&R,Badnera,Amravati,India,abrar_alvi@rediffmail.com 2 ABSTRACT Today barcode system is very popular to identifying a unique product. Many organizations are using this technique for identifying a unique product. Tracking these items has historically been done by the use of bar-code technologies, which suffer from lack of efficiency, robustness, difficulty in automation, inability to have secure or dynamic data, etc., whereas the 2D Data matrix has the ability to overcome several of these limitations over barcode This paper presents a comparative basis for the Advanced Smart Credential cum Unique Identification and Recognition System via 2D Data matrix versus other technologies such as barcode and QR code. Keywords: Barcode, Data Matrix, Encoding, QR Code, SCUIRS. I. INTRODUCTION This proposed paper is related with the implementation of a product that will combine the power of graphical representation and the power of random numbers and characters for a unique ID. Combination of both Unique ID and Unique image will help a user to identify the product from other products and store its information accordingly. ASCUIRS will not only give you a complete solution to product identification but can facilitate you with one more option. ASCUIRS will also act like a Security system. The basic idea behind the designing of ASCUIRS is to use the feature of Unique numbers combined with unique images and form a unique combination that will help in recognizing the product or a user or any item in inventory. 1.1 Existing Systems 1.1.1 Barcode System 97
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME There are a variety of methods you can use to print BarCode [1]. We recommend the lowest cost alternative to get started – a barcode font. Barcode fonts give you an inexpensive and flexible way to print labels quickly with high resolution and a low initial investment. The location barcode is important because the goal of the inventory system is to know not only what you have, but to be able to tell accurately where it all is. You can get creative with the location barcode. The first barcode was developed by Bernard Silver and Norman Joseph Woodland in the late 1940’s and early 1950’s. The first commercial use of barcodes was by the RCA/Kroger system installed in Cincinnati on the call of the National Association of Food Chains (NAFC). However it was not widely used until the Universal Product Code (UPC) [2] was introduced into America and adopted by the U.S. Supermarket Ad Hoc Committee. Today’s barcodes have two forms: one dimensional (1D) barcode and two dimensional (2D) barcode [3][4]. The 1D barcodes use bars and gaps to encode identification information such as serial numbers. The 2D barcodes [5] consist of more complicated patterns and may encode up to 4K bytes of data. Figure 1 shows the 1D barcodes. Although 1D is the more prevalent barcode used in daily life. Figure 1. 1D Barcode and 2D Barcode Figure 2 illustrates a basic barcode system. Barcodes are read or scanned by a barcode reader and the reader is connected to a computer. The operator has to physically align/point the barcode reader with/to the barcode to read the identification information. The software running on the computer processes the identification information picked up by the scanner. Programmable Logic Controller (PLC) is usually used to control the scanner in more automated process such as production line. The primary scanning technology for barcode is LED (Light-Emitting Diode). More advanced scanning such as CCD (Charge-Coupled Device), Laser, and Imager are used in industry automatic processing. Figure 2 Basic Barcode System 2D Barcode System 98
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME Barcodes can be printed from most printers. 1D barcodes usually have coded readable ID printed along with the barcode. Barcodes can be read by barcode scanners which we see at a typical Point of Sale (POS) in retail stores. The barcode can be printed from any black/white printer. Since the barcode can be directly printed on an object or on paper label, the cost for a barcode is typically less than 1 cent [6]. Disadvantage of Barcode System: Barcodes are graphic images featuring a series of lines or bars, of varying thickness, positioned parallel to each other in such a way that a scanner passed along the image will translate their thickness and spacing with relation to each other as a series of numbers or code. This code is then interpreted by customized software to produce pricing and stocking information in an effort to assist in the automation of the retail sales and stocking processes. It is a very efficient and effective system, but, like any other method of tracking inventory, it is not foolproof. Pricing Discrepancies and Scanning Problems When discounts apply to bar-coded merchandise, store employees may forget to code in the discount price. This, in turn, can lead to confusion and delays at the checkout counter, inconveniencing the customer, the checkout clerk, and other customers waiting in line. If a barcode can't be scanned, for any reason, the clerk must then read the corresponding numeric code and enter it manually. Because clerks have become used to scanning barcodes quickly and automatically, without any additional effort on their part, their lack of practice in manual code entries may potentially cause them to be slow and/or inaccurate in entering the information, further delaying the checkout process. Label Damage Barcodes that are printed on a torn section of packaging, or that have been smeared, smudged or otherwise damaged, will present additional scanning problems. If the corresponding numeric code is also illegible due to damage, the checkout process can be significantly delayed while another package of the same merchandise is located and brought to the checkout counter for scanning. Financial and Equipment Costs For businesses that are not already equipped for barcode checkout, the cost of the equipment necessary to implement the new system can be prohibitive. Other delays can occur in training employees to adapt to new equipment, and expensive printers must be purchased to print coded labels for any merchandise that doesn't come prepackaged with a barcode already on it. Dot matrix and ink jet printers, for example, are generally incapable of printing finely- detailed barcodes. 1.1.2 QR Code QR Code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode (or two-dimensional code) first designed for the automotive industry. The QR barcode [7] is a two dimensional symbol developed by Denso Wave in 1994. More recently, the system has become popular outside the industry due to its fast readability and large storage capacity compared to standard UPC barcodes. The code consists of black modules (square dots) arranged in a square pattern on a white background. The information encoded can be made up of four standardized kinds ("modes") of data (numeric, alphanumeric, byte/binary, Kanji), or through supported extensions, virtually any kind of data. 99
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME The code contains information in both the x-axis and y-axis, whereas traditional barcodes contain data in one direction only. The outer range is the quiet zone. The upper-left, upper- right, and left bottom square areas of QR code [8] are used for position detection and pattern separators for positioning. Figure 3 depicts basic block diagram of QR Code scanning with any image capturing device. Figure 3 QR Code Advantage of QR codes There is no need to write vital details down. A simple scan captures the desired information. QR Codes can be used to store addresses and URLs that can appear in magazines, on signs, buses, business cards or just about any product that users might need information about. Disadvantages of QR codes Users must be equipped with a camera phone and the correct reader software that can scan the image of the QR Code. Currently only Smartphone’s are technically equipped to do this. Many users that have mobile phones that have cameras are unable to get QR reading software for their phones. II. GENERAL STRUCTURE 2-D bar code consists of a certain white and black geometric modules that alternately arrange in the vertical and horizontal directions according to certain rules see Figure, and it is a symbol with large capacity for storing information. As the 2-D bar code with smallest size in the world, data matrix code is widely applied to electronic product components. 2-Dbar code recognition technology shows great commercial value, and at present, most COTS (commercial of the shell) recognition algorithms are proprietary and protected by patents, so the 2-D bar code recognition technology is in a great demand for researching. Figure Data matrix structure shows the principle of a Data matrix barcode. The image shows an annotated Data matrix where the finder and synchronization patterns have been highlighted. 100
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME Figure 4.Data Matrix III. PROBLEM DEFINITION When user will store the product information the unique ID will be generated. This Unique ID will be Tier 1 identification for the product information. Entering this Unique ID as an Input to our Selective algorithm will generate a unique Image for that particular ID. This Unique image will act as Tier 2 identification for product information. This image will be hash mapped to the User Unique ID and both will be used to identify product information. When identifiers are used solely within a database, their generation should be left to the database itself. 3.1 ASCUIRS Working To generate a unique image from a unique ID and to map the image to a specific item in an inventory. When user will store information about a product or person a unique ID will be generated. This Unique ID will be Tier 1 identification for the User or Object. Entering this Unique ID as an Input to our Selective algorithm will generate a unique Image for that particular ID. This Unique image will act as Tier 2 identification for User or Object. This image will be hash mapped to the User Unique ID and both will be used to identify an object. 3.2 Proposed Dataflow Diagram Figure 5.Dataflow Diagram 101
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME • GUI: Graphical User Interface will be used to gather information regarding the inventory from the user. GUI will consist of components to take inventory information and details from the user, components to save, edit, retrieve (searching) and delete the information. GUI will also contain a separate module for Unique ID (generated by the database and encrypted by selective algorithm) passing to generate an unique data matrix image. • Selective algorithm for Unique ID encryption: This algorithm will be a modified version of 56 bit key DES algorithm. The selective algorithm will be used to encrypt the unique ID before been passed on for conversion into data matrix image. • Selective algorithm for unique image The algorithm will encode the pre encrypted Unique ID and a data matrix will be generated that will be used for printing or publishing as required by the user. • Storage of Unique ID: Database will store inventory information and details and a Unique ID will be generated and associated with every record. This Unique ID will act as Tier 1 identification for the record. • Web server process and retrieval: A portal will be established which will contain the GUI and the entire process of storage of Data and retrieval along with data matrix image generation and publishing process. IV. PROPOSED SYSTEM • Web Portal:Web portal will contain a module that will take an input from the client which will be a data matrix image. • Data inventory: Tables, relations related to items will be stored in data inventory. Data inventory is nothing but a set of tables that will contain records about items and its detailed information. • Database: Information entered by the administrator will be stored in the database. This information will be stored in the form of a tuple. Each tuple will have a unique ID associated with it. • Unique ID: This will be a 16 bit ID generated by the database (MySQL) and it will be used to identify the tuple in case of searching. • Unique ID passed to (selective) algorithm: The algorithm will encrypt the Unique ID generated by database (MySQL). This encrypted key or string will be further passed on to another selective algorithm to create a unique image (i.e. Data Matrix image). 102
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME • Unique image ready to publish: Unique image created by the selective algorithm can be either published or printed by the administrator. • Capturing unique image: The image i.e. published or printed by the administrator can be captured by the user and sent back to the web portal through an HTTP response. • Clipping: Since the captured image will vary in size, it needs to be clipped and exact Data Matrix needs to be extracted out of the captured image. Clipping will help to extract the exact image and pass it on to the web portal. Figure 6.Proposed System. 103
8.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME • Uploading of Image: An FTP request to the server will carry the clipped image that will be used to map with the database to find the related record or information. • Sending information back to client: If mapping returns a record, then it will be sent back to the client (i.e. browser of phone or computer system) and this will complete the process. V. CONCLUSION Using this image through scanner or mobile phone camera we can decompile product’s information. The product’s information can be accessed anywhere if the database is stored and accessed through a web server. This ensures portability and security since the unique number will only be known to the organization. Organization will be using a unique image to access their product information or person or object. A new algorithm is proposed here which is a hybrid model for data hiding in data matrix and provides decoding algorithm which is independent of image orientation in any direction and de noising is one of the main advantages of this. It runs at 640×480 resolution for real time scenarios. For practical implementation dimensions of data matrix image is 420×420 includes finder pattern of 10×10 ad size of squares is 20×20.This proposed system provides an accuracy of 97.6%. REFERENCES [1] On The Creation of Automatic Identification and Data Capture Infrastructure via RFID Xiaoyong Su, Chi-Cheng Chu, B.S. Prabhu, RajitGadhUniversity of California, Los Angeles UCLA-WINMEC RFID Lab http://winmec.ucla.edu/rfid420 Westwood Plaza, UCLA, Los Angeles, CA 90095 [2] GS1 US, The Universal Product Code, http://www.uc-council.org/upc_background.html [3] Multi-color 2D datamatrix codeswith poorly readable colors Urška Bogataj1, Tadeja Muck, BrankaLozo ,ArjanaŽitnik. [4] YongyueYang ,Guang Zhu and Peng Wang, “Reading system for 2D code based on machine vision”, ICEMI ,2009 [5] Zhi Liu, HerongZhengWenting Cai, “ Research on Two- Dimensional code positioning approach based on Convex hull algorithm”, International Conference on Digital Image Processing, 2009 [6] J. Abernethy, Widener Liberary: Book Identification – Bar Codes & RFID, An Engineering Science 96 Report, M17, 1995, http://www.deas.harvard.edu/courses/es96/spring1995/barcodes_rfid/abernethy.html [7] Wen-Yuan Chen, Jing-Wein Wang; “Nested image steganography scheme using QR- barcode technique” Optical Engineering 48_5, 057004 _May 2009_Vol. 48(5). [8] Wakahara, Toshihiko; Yamamoto, Noriyasu; “Image Processing of 2-Dimensional Barcode”, Conference on Network-Based Information Systems (NBiS), 2011 14th International. 104
Descargar ahora