SlideShare a Scribd company logo
1 of 5
Download to read offline
Sharadchandra Chavan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.32-36
www.ijera.com 32 | P a g e
Novel Unique Technique for Generating Ticket Identifier Using
Image Texture Patterns
Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi
Puranik, Triloknath Tripathi
Asst.Professor Department of Information Technology Pimpri Chinchwad College of Engineering, Pune, India
Student Department of Information Technology Pimpri Chinchwad College of Engineering, Pune, India
Professor Department of Information Technology Pimpri Chinchwad College of Engineering, Pune, India
Student Department of Information Technology Pimpri Chinchwad College of Engineering, Pune, India
Student Department of Information Technology Pimpri Chinchwad College of Engineering, Pune, India
ABSTRACT
A paperless ticketing system with an application through which user can purchase a mobile ticket. Once the
purchasing information is provided, the mobile ticket can be sent to the respective users mobile. A new method
is introduced to generate tickets in which texture pattern is generated for digest provided by md5.
The ticket is sent in the format of image consisting of texture patterns. Ticket can be verified by ticket checker
using an application developed to verify genuine ticket. This system will be a revolution in the m-commerce
world.
Keywords- Mobile Ticket
I. INTRODUCTION
A system in which user can buy mobile
ticket by logging into the website. Ticket will be sent
on user's mobile in the form of a barcode. Ticket will
be encrypted in the barcode in which all his personal
details will be filled and it will be decoded when tc
will verify the ticket by which it will get
authenticated.
M- Ticket is a paperless ticketing system,
which enables user to buy tickets on mobile. These
are digital tickets which can be saved on the users
mobile. The functionalities of the system can be
accessed through a mobile application. This
application provides a user friendly graphical
interface on the users mobile. All the required details
of the purpose are securely sent to the admin server,
where these details are saved and used to create a
unique texture pattern. The texture pattern generated
is unique for each user and is sent to the respective
user mobile as ticket. The application uses internet
service to buy tickets. The ticket is sent in an image
format and can be saved in mobile. While verifying
the ticket, the ticket is to be sent to the ticket
checkers mobile phone. The application in the ticket
checkers mobile will verify the ticket for a user by
decoding the texture pattern.
II. RELATED WORK
Many event hosting, traveling organizations
are looking for a secure platform for distributing
tickets virtually. As virtual tickets will enable user to
buy tickets in few clicks and thus will eradicate the
efforts of manual ticket distribution and purchasing.
Also the money will be directly transferred to the
bank account of that organization making the
purchasing transaction more secure. SMS based
ticketing approach is used by many Indian travelling
agencies. Red Bus travelling agency has declared that
a sms containing details will be used as a digital
ticket. The sms will be sent by the agency to the users
mobile. Similar kind of ticketing system is used
IRCTC reservation in which the sms will be
considered as ticket. This sms contains travelling
information, unique number from which the
authenticity of the ticket is determined.
III. EXISTING SYSTEM
M- Ticket is a paperless ticketing system,
which enables user to buy tickets on mobile. These
are digital tickets which can be saved on the users
mobile. The functionalities of the system can be
accessed through a mobile application. This
application provides a user friendly graphical
interface on the users mobile. All the required details
of the purpose are securely sent to the admin server,
where these details are saved and used to create an
unique texture pattern. The texture pattern generated
is unique for each user and is sent to the respective
user mobile as ticket. The application uses internet
service to buy tickets. The ticket is sent in an image
format and can be saved in mobile. While verifying
the ticket, the ticket is to be sent to the ticket
checkers mobile phone. The application in the ticket
RESEARCH ARTICLE OPEN ACCESS
Sharadchandra Chavan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.32-36
www.ijera.com 33 | P a g e
checkers mobile will verify the ticket for a user by
decoding the texture pattern.
Masabi a fare collections agency is using
quick response codes as tickets. These tickets can be
sent directly to the user mobile. [1]The ticket nothing
but a virtual QR code is the user information with an
unique id. [2]These Q-R codes can be verified by an
application provided to the Ticket Checker. User
information is encrypted into a QR code. This
information is retrieved for verifying the user by
ticket checkers application.
Stadiums have introduced digital tickets for
avoiding the mess and black market of tickets. The
website of a national basketball team is providing the
facility of purchasing tickets on mobile. The seats can
be booked from the teams website , the website also
provides option of mobile banking for transferring
funds. Reward schemes and other promotional
packages are also effectively implemented through
this ticketing system.
Another fare collection agency Ticketmaster
has launched digital tickets, whereby users can
digitally transfer tickets to others at no cost, directly
from their Ticketmaster accounts online. The
platform, which digitizes every ticket, also
effectively deals with issues like ticket counterfeiting
and scalper fraud. Ticketmaster’s system uses
barcodes as tickets. While transferring tickets on
mobile a request is to be sent by the user. The request
is then processed by the systems server and
corresponding user’s barcode is invalidated and a
new barcode is sent to the users who wanted the
transfer done on his mobile. The service is provided
by the ticketmasters website and the user has to sign
up with it. An Application to provide this service has
been declared by the agency.
IV. PROPOSED SYSTEM
The working of the system is shown in the
following steps:-
1. The details of the purpose are sent through the
internet to the server by users through the
application.
2. The details are given as input to the image
signature generator software. An image signature
is produced.
3. The image signature is given input to the texture
pattern module, the texture pattern module refers
the pattern library and a unique identification
code is generated.
4. The unique identification code is sent to the user
mobile through internet.
5. Whenever a m-ticket is asked by a ticket checker
the user is supposed to show the saved ticket on
its mobile.
6. The ticket is transferred to the TC’s mobile
through Bluetooth, The ticket is decoded and
sent to the server with unique name of the user.
7. In the server details of the unique name of user
are saved and again a unique identification code
is generated. The unique identification codes are
compared.
8. The result of comparison is sent to the TC’s
mobile through internet.
9. In this way the authenticity of ticket is
determined.
Fig 1. Image Signature Generator.
Fig 2.Texture Pattern Generator
Sharadchandra Chavan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.32-36
www.ijera.com 34 | P a g e
Fig 3.Characters and Texture patterns mapping
4.1 MD5 Algorithm
MD5 was developed by Ron Rivest [3] to
generate secure signatures on internet.MD5 a
message digest algorithm is a cryptographic hash
function which generates a 128 bit hash string for any
given message as input. MD5 is used in various
application to generate hash function or message
digest. One of the vital properties of md5 is that it
always produces unique string for an input.
For any random block of data a
cryptographic hash function produces a fixed size
string. The fixed size string is also known as hash
value. Any inadvertent or intentional change to input
string will change the hash value. As this function is
used in cryptographic operations the input is
generally a message. The hash value is also known
as message digest.
Hash value or the message digest can be
obtained using easily by md5. For two different
messages there will be no two different digests
generated. Retaining the message of a given hash is
not possible. It is impossible to produce a message
that has a given hash.
The MD5 algorithm provides security with
respect to various aspects. Essential information
security properties like authentication and
confidentiality can be applied to any data by using
MD5. The MD5 can be used to determine forged
data, to individually spot data, to index data in hash
tables, checksums to recognize accidental data
corruption. In this application md5 is used to deduce
a hash value that is used to generate a unique texture
pattern. The hash value deduced is used as image
signature. The image signature contains the unique
number so for each and every user the image
signature is unique.
In the proposed system md5 algorithm plays
a crucial role in generating the message. For any
given information the md5 algorithm will produce its
message digest. The Md5 algorithm uses 256
characters to generate 16 character message digest.
Now for each character a unique matrix is already
generated and kept in the pattern library. The 16
character string is taken by the mapper, for each
character corresponding texture pattern is generated.
This pattern are arranged in a 4X4 matrix. The
allocation is in horizontal way.
4.2 Generating Texture Pattern
A simple matrix multiplication is used to
generate these image texture patterns. A 16x16
matrix with ones and zeroes is used to generate 256
matrices. The reason of generating only 256 matrices
is that the md5 algorithm generates digest from a set
of 256 characters. So each matrix is mapped into an
excel sheet. The numbers are not mapped directly
instead a color is assigned to the number black is
assigned for all the ones and white is assigned for all
the zeroes. In this way 256 excel sheets are generated
with black and white patterns. These patterns are
assigned to all the 256 characters used by md5.
Finally the digest produced contains only 16
characters which are arranged in a 4x4 matrix.
Instead of characters the texture patterns are inserted
in horizontal way.
4.3 Pattern Library
The pattern library consists of set of all the
characters which will be used each time the message
digest is generated. For each character a particular
image pattern is allocated, the image pattern is
different for every character in the set.
Fig 4.Pattern Library
Sharadchandra Chavan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.32-36
www.ijera.com 35 | P a g e
The mapper maps each character from the
message digest string into the pattern library. Then
pattern of each character is placed in the 4x4 matrix.
Pattern of first character in [1][1] block of matrix,
pattern of second in [1][2] block of matrix and so on.
The matrix is filled in horizontal way. Fig 5.Horizontal Method
For eg the the 16 character string or message
digest is ABCDEFGHIJKLMNOP. Then its
corresponding matrix with pattern for each character
will be as shown in the figure.
Fig 6.Placment of texture patterns for alphabet
4.4 Code Verification
The code is sent to the checkers mobile with
the unique id. The checkers mobile communicates
with the server and sends unique id to the server. The
details of the sent ids are acquired and a message
digest is generated.
On the basis of that message digest a unique texture
pattern is developed. The unique texture pattern sent
by the checker is compared with the newly generated
texture pattern and the result is sent to the checkers
mobile.
Fig 7.Working of System
4.5 Results and Experimentation
The unique identification code being
generated can be used as an alternative to the existing
quick response code and barcodes. The texture
pattern generated cannot be same for any given user
as for each user a unique code is given. That unique
code is used as the message to generate the image
signature.
V. CONCLUSION
As current system for purchasing tickets is
time consuming and less efficient. We are
introducing an application to purchase tickets on and
in mobile with implementation of an efficient
security algorithm.
The application would reduce time
consumption, eliminate cost of sales, no problem of
lost tickets. Hence the system will be a user friendly
platform to purchase tickets in a secured way.
VI. ADVANTAGES OF PROPOSED
SYSTEM
1. No use of paper tickets.
2. Application is secured and not vulnerable to
attacks.
3. Tickets can be placed anytime anywhere.
4. The application would reduce time.
5. consumption, eliminate cost of sales, no
problem of lost tickets
REFERENCES
[1] SD-EQR: A New Technique To Use QR
CodesTM in Cryptography. Use of QR
Sharadchandra Chavan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.32-36
www.ijera.com 36 | P a g e
CodesTM In Data Hiding and Securing
Somdip Dey (Author),Department of
Computer Science,St. Xavier’s College
[Autonomous] Kolkata, India.
[2] Automatic Recognition Algorithm of Quick
Response Code Based on Embedded
System,Yue Liu Department of
Information Science and Engineering, Jinan
University, Mingjun Liu Department of
Information Science and Engineering, Jinan
University,Jinan, China Jinan, China.
[3] The MD5 Umang Beri, University of
Rochester

More Related Content

What's hot

AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
 
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET Journal
 
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMFinger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMIOSR Journals
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...cscpconf
 
Multipurpose Student Smart Card
Multipurpose Student Smart CardMultipurpose Student Smart Card
Multipurpose Student Smart Cardijtsrd
 
Train ticket authenication project
Train ticket authenication projectTrain ticket authenication project
Train ticket authenication projectsomanathkambar
 
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureIOSR Journals
 
IRJET - Service Base Application
IRJET - Service Base ApplicationIRJET - Service Base Application
IRJET - Service Base ApplicationIRJET Journal
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET Journal
 
Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...IRJET Journal
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET Journal
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsIRJET Journal
 
IRJET- RFID based Bus Ticket Generation System
IRJET- RFID based Bus Ticket Generation SystemIRJET- RFID based Bus Ticket Generation System
IRJET- RFID based Bus Ticket Generation SystemIRJET Journal
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
IRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET Journal
 

What's hot (20)

AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - review
 
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using Microcontroller
 
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMFinger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSM
 
F0423134
F0423134F0423134
F0423134
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
 
Multipurpose Student Smart Card
Multipurpose Student Smart CardMultipurpose Student Smart Card
Multipurpose Student Smart Card
 
Train ticket authenication project
Train ticket authenication projectTrain ticket authenication project
Train ticket authenication project
 
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
 
IRJET - Service Base Application
IRJET - Service Base ApplicationIRJET - Service Base Application
IRJET - Service Base Application
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
IRJET- RFID based Bus Ticket Generation System
IRJET- RFID based Bus Ticket Generation SystemIRJET- RFID based Bus Ticket Generation System
IRJET- RFID based Bus Ticket Generation System
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
IRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment System
 
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTINGA DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
 

Viewers also liked

有趣的發現
有趣的發現有趣的發現
有趣的發現Jaing Lai
 
健康天書
健康天書健康天書
健康天書Jaing Lai
 
Apresentação inclusão ei
Apresentação inclusão eiApresentação inclusão ei
Apresentação inclusão eiRonaldo Obaski
 
在心靈最微妙的地方
在心靈最微妙的地方在心靈最微妙的地方
在心靈最微妙的地方Jaing Lai
 
把憂鬱留在沙灘上
把憂鬱留在沙灘上把憂鬱留在沙灘上
把憂鬱留在沙灘上Jaing Lai
 
Las primeras civilizaciones
Las primeras civilizacionesLas primeras civilizaciones
Las primeras civilizacionesAlejandro Peña
 
Apresentacao Milennium!
Apresentacao Milennium!Apresentacao Milennium!
Apresentacao Milennium!Erick Batista
 
Arquivos universitarios
Arquivos universitariosArquivos universitarios
Arquivos universitariosChris Macedo
 
高雅的鳥照片Great birdpicture
高雅的鳥照片Great birdpicture高雅的鳥照片Great birdpicture
高雅的鳥照片Great birdpictureJaing Lai
 
EducacióN Socio Ambiental1
EducacióN Socio Ambiental1EducacióN Socio Ambiental1
EducacióN Socio Ambiental1guest88d57e
 
PresentacióN6
PresentacióN6PresentacióN6
PresentacióN6hiramnvp
 
美不勝收
美不勝收美不勝收
美不勝收Jaing Lai
 

Viewers also liked (20)

Af04507190194
Af04507190194Af04507190194
Af04507190194
 
有趣的發現
有趣的發現有趣的發現
有趣的發現
 
健康天書
健康天書健康天書
健康天書
 
Geografia fisica
Geografia fisicaGeografia fisica
Geografia fisica
 
C045071117
C045071117C045071117
C045071117
 
Apresentação inclusão ei
Apresentação inclusão eiApresentação inclusão ei
Apresentação inclusão ei
 
在心靈最微妙的地方
在心靈最微妙的地方在心靈最微妙的地方
在心靈最微妙的地方
 
把憂鬱留在沙灘上
把憂鬱留在沙灘上把憂鬱留在沙灘上
把憂鬱留在沙灘上
 
D045071825
D045071825D045071825
D045071825
 
Las primeras civilizaciones
Las primeras civilizacionesLas primeras civilizaciones
Las primeras civilizaciones
 
I045075155
I045075155I045075155
I045075155
 
Apresentacao Milennium!
Apresentacao Milennium!Apresentacao Milennium!
Apresentacao Milennium!
 
Eye cach
Eye cachEye cach
Eye cach
 
Frango congelado
Frango congeladoFrango congelado
Frango congelado
 
Arquivos universitarios
Arquivos universitariosArquivos universitarios
Arquivos universitarios
 
G045073740
G045073740G045073740
G045073740
 
高雅的鳥照片Great birdpicture
高雅的鳥照片Great birdpicture高雅的鳥照片Great birdpicture
高雅的鳥照片Great birdpicture
 
EducacióN Socio Ambiental1
EducacióN Socio Ambiental1EducacióN Socio Ambiental1
EducacióN Socio Ambiental1
 
PresentacióN6
PresentacióN6PresentacióN6
PresentacióN6
 
美不勝收
美不勝收美不勝收
美不勝收
 

Similar to G45023236

A Review On QR-Code Based Ticket Booking System
A Review On QR-Code Based Ticket Booking SystemA Review On QR-Code Based Ticket Booking System
A Review On QR-Code Based Ticket Booking SystemJoe Andelija
 
Foolproof Ticketing System Management for Bus
Foolproof Ticketing System Management for BusFoolproof Ticketing System Management for Bus
Foolproof Ticketing System Management for BusIRJET Journal
 
Maxartists Ppt V2.2
Maxartists Ppt V2.2Maxartists Ppt V2.2
Maxartists Ppt V2.2ajin_thomas
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AIijtsrd
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415Shubham Jadhav
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Face Recognition Using ML in Public Transports
Face Recognition Using ML in Public TransportsFace Recognition Using ML in Public Transports
Face Recognition Using ML in Public Transportsijtsrd
 
Android Suburban Railway Ticketing
Android Suburban Railway TicketingAndroid Suburban Railway Ticketing
Android Suburban Railway TicketingIRJET Journal
 
IRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET Journal
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGIRJET Journal
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET Journal
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...IRJET Journal
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe RegionIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 

Similar to G45023236 (20)

A Review On QR-Code Based Ticket Booking System
A Review On QR-Code Based Ticket Booking SystemA Review On QR-Code Based Ticket Booking System
A Review On QR-Code Based Ticket Booking System
 
Foolproof Ticketing System Management for Bus
Foolproof Ticketing System Management for BusFoolproof Ticketing System Management for Bus
Foolproof Ticketing System Management for Bus
 
Maxartists Ppt V2.2
Maxartists Ppt V2.2Maxartists Ppt V2.2
Maxartists Ppt V2.2
 
ANDROID SUB-URBAN RAILWAY TICKETING USING GPS AS TICKET CHECKER
ANDROID SUB-URBAN RAILWAY TICKETING USING GPS AS TICKET CHECKERANDROID SUB-URBAN RAILWAY TICKETING USING GPS AS TICKET CHECKER
ANDROID SUB-URBAN RAILWAY TICKETING USING GPS AS TICKET CHECKER
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AI
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
 
F1802024245
F1802024245F1802024245
F1802024245
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
D0351022026
D0351022026D0351022026
D0351022026
 
Face Recognition Using ML in Public Transports
Face Recognition Using ML in Public TransportsFace Recognition Using ML in Public Transports
Face Recognition Using ML in Public Transports
 
Android Suburban Railway Ticketing
Android Suburban Railway TicketingAndroid Suburban Railway Ticketing
Android Suburban Railway Ticketing
 
IRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using Blockchain
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
EZ-PASS
EZ-PASSEZ-PASS
EZ-PASS
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

G45023236

  • 1. Sharadchandra Chavan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.32-36 www.ijera.com 32 | P a g e Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath Tripathi Asst.Professor Department of Information Technology Pimpri Chinchwad College of Engineering, Pune, India Student Department of Information Technology Pimpri Chinchwad College of Engineering, Pune, India Professor Department of Information Technology Pimpri Chinchwad College of Engineering, Pune, India Student Department of Information Technology Pimpri Chinchwad College of Engineering, Pune, India Student Department of Information Technology Pimpri Chinchwad College of Engineering, Pune, India ABSTRACT A paperless ticketing system with an application through which user can purchase a mobile ticket. Once the purchasing information is provided, the mobile ticket can be sent to the respective users mobile. A new method is introduced to generate tickets in which texture pattern is generated for digest provided by md5. The ticket is sent in the format of image consisting of texture patterns. Ticket can be verified by ticket checker using an application developed to verify genuine ticket. This system will be a revolution in the m-commerce world. Keywords- Mobile Ticket I. INTRODUCTION A system in which user can buy mobile ticket by logging into the website. Ticket will be sent on user's mobile in the form of a barcode. Ticket will be encrypted in the barcode in which all his personal details will be filled and it will be decoded when tc will verify the ticket by which it will get authenticated. M- Ticket is a paperless ticketing system, which enables user to buy tickets on mobile. These are digital tickets which can be saved on the users mobile. The functionalities of the system can be accessed through a mobile application. This application provides a user friendly graphical interface on the users mobile. All the required details of the purpose are securely sent to the admin server, where these details are saved and used to create a unique texture pattern. The texture pattern generated is unique for each user and is sent to the respective user mobile as ticket. The application uses internet service to buy tickets. The ticket is sent in an image format and can be saved in mobile. While verifying the ticket, the ticket is to be sent to the ticket checkers mobile phone. The application in the ticket checkers mobile will verify the ticket for a user by decoding the texture pattern. II. RELATED WORK Many event hosting, traveling organizations are looking for a secure platform for distributing tickets virtually. As virtual tickets will enable user to buy tickets in few clicks and thus will eradicate the efforts of manual ticket distribution and purchasing. Also the money will be directly transferred to the bank account of that organization making the purchasing transaction more secure. SMS based ticketing approach is used by many Indian travelling agencies. Red Bus travelling agency has declared that a sms containing details will be used as a digital ticket. The sms will be sent by the agency to the users mobile. Similar kind of ticketing system is used IRCTC reservation in which the sms will be considered as ticket. This sms contains travelling information, unique number from which the authenticity of the ticket is determined. III. EXISTING SYSTEM M- Ticket is a paperless ticketing system, which enables user to buy tickets on mobile. These are digital tickets which can be saved on the users mobile. The functionalities of the system can be accessed through a mobile application. This application provides a user friendly graphical interface on the users mobile. All the required details of the purpose are securely sent to the admin server, where these details are saved and used to create an unique texture pattern. The texture pattern generated is unique for each user and is sent to the respective user mobile as ticket. The application uses internet service to buy tickets. The ticket is sent in an image format and can be saved in mobile. While verifying the ticket, the ticket is to be sent to the ticket checkers mobile phone. The application in the ticket RESEARCH ARTICLE OPEN ACCESS
  • 2. Sharadchandra Chavan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.32-36 www.ijera.com 33 | P a g e checkers mobile will verify the ticket for a user by decoding the texture pattern. Masabi a fare collections agency is using quick response codes as tickets. These tickets can be sent directly to the user mobile. [1]The ticket nothing but a virtual QR code is the user information with an unique id. [2]These Q-R codes can be verified by an application provided to the Ticket Checker. User information is encrypted into a QR code. This information is retrieved for verifying the user by ticket checkers application. Stadiums have introduced digital tickets for avoiding the mess and black market of tickets. The website of a national basketball team is providing the facility of purchasing tickets on mobile. The seats can be booked from the teams website , the website also provides option of mobile banking for transferring funds. Reward schemes and other promotional packages are also effectively implemented through this ticketing system. Another fare collection agency Ticketmaster has launched digital tickets, whereby users can digitally transfer tickets to others at no cost, directly from their Ticketmaster accounts online. The platform, which digitizes every ticket, also effectively deals with issues like ticket counterfeiting and scalper fraud. Ticketmaster’s system uses barcodes as tickets. While transferring tickets on mobile a request is to be sent by the user. The request is then processed by the systems server and corresponding user’s barcode is invalidated and a new barcode is sent to the users who wanted the transfer done on his mobile. The service is provided by the ticketmasters website and the user has to sign up with it. An Application to provide this service has been declared by the agency. IV. PROPOSED SYSTEM The working of the system is shown in the following steps:- 1. The details of the purpose are sent through the internet to the server by users through the application. 2. The details are given as input to the image signature generator software. An image signature is produced. 3. The image signature is given input to the texture pattern module, the texture pattern module refers the pattern library and a unique identification code is generated. 4. The unique identification code is sent to the user mobile through internet. 5. Whenever a m-ticket is asked by a ticket checker the user is supposed to show the saved ticket on its mobile. 6. The ticket is transferred to the TC’s mobile through Bluetooth, The ticket is decoded and sent to the server with unique name of the user. 7. In the server details of the unique name of user are saved and again a unique identification code is generated. The unique identification codes are compared. 8. The result of comparison is sent to the TC’s mobile through internet. 9. In this way the authenticity of ticket is determined. Fig 1. Image Signature Generator. Fig 2.Texture Pattern Generator
  • 3. Sharadchandra Chavan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.32-36 www.ijera.com 34 | P a g e Fig 3.Characters and Texture patterns mapping 4.1 MD5 Algorithm MD5 was developed by Ron Rivest [3] to generate secure signatures on internet.MD5 a message digest algorithm is a cryptographic hash function which generates a 128 bit hash string for any given message as input. MD5 is used in various application to generate hash function or message digest. One of the vital properties of md5 is that it always produces unique string for an input. For any random block of data a cryptographic hash function produces a fixed size string. The fixed size string is also known as hash value. Any inadvertent or intentional change to input string will change the hash value. As this function is used in cryptographic operations the input is generally a message. The hash value is also known as message digest. Hash value or the message digest can be obtained using easily by md5. For two different messages there will be no two different digests generated. Retaining the message of a given hash is not possible. It is impossible to produce a message that has a given hash. The MD5 algorithm provides security with respect to various aspects. Essential information security properties like authentication and confidentiality can be applied to any data by using MD5. The MD5 can be used to determine forged data, to individually spot data, to index data in hash tables, checksums to recognize accidental data corruption. In this application md5 is used to deduce a hash value that is used to generate a unique texture pattern. The hash value deduced is used as image signature. The image signature contains the unique number so for each and every user the image signature is unique. In the proposed system md5 algorithm plays a crucial role in generating the message. For any given information the md5 algorithm will produce its message digest. The Md5 algorithm uses 256 characters to generate 16 character message digest. Now for each character a unique matrix is already generated and kept in the pattern library. The 16 character string is taken by the mapper, for each character corresponding texture pattern is generated. This pattern are arranged in a 4X4 matrix. The allocation is in horizontal way. 4.2 Generating Texture Pattern A simple matrix multiplication is used to generate these image texture patterns. A 16x16 matrix with ones and zeroes is used to generate 256 matrices. The reason of generating only 256 matrices is that the md5 algorithm generates digest from a set of 256 characters. So each matrix is mapped into an excel sheet. The numbers are not mapped directly instead a color is assigned to the number black is assigned for all the ones and white is assigned for all the zeroes. In this way 256 excel sheets are generated with black and white patterns. These patterns are assigned to all the 256 characters used by md5. Finally the digest produced contains only 16 characters which are arranged in a 4x4 matrix. Instead of characters the texture patterns are inserted in horizontal way. 4.3 Pattern Library The pattern library consists of set of all the characters which will be used each time the message digest is generated. For each character a particular image pattern is allocated, the image pattern is different for every character in the set. Fig 4.Pattern Library
  • 4. Sharadchandra Chavan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.32-36 www.ijera.com 35 | P a g e The mapper maps each character from the message digest string into the pattern library. Then pattern of each character is placed in the 4x4 matrix. Pattern of first character in [1][1] block of matrix, pattern of second in [1][2] block of matrix and so on. The matrix is filled in horizontal way. Fig 5.Horizontal Method For eg the the 16 character string or message digest is ABCDEFGHIJKLMNOP. Then its corresponding matrix with pattern for each character will be as shown in the figure. Fig 6.Placment of texture patterns for alphabet 4.4 Code Verification The code is sent to the checkers mobile with the unique id. The checkers mobile communicates with the server and sends unique id to the server. The details of the sent ids are acquired and a message digest is generated. On the basis of that message digest a unique texture pattern is developed. The unique texture pattern sent by the checker is compared with the newly generated texture pattern and the result is sent to the checkers mobile. Fig 7.Working of System 4.5 Results and Experimentation The unique identification code being generated can be used as an alternative to the existing quick response code and barcodes. The texture pattern generated cannot be same for any given user as for each user a unique code is given. That unique code is used as the message to generate the image signature. V. CONCLUSION As current system for purchasing tickets is time consuming and less efficient. We are introducing an application to purchase tickets on and in mobile with implementation of an efficient security algorithm. The application would reduce time consumption, eliminate cost of sales, no problem of lost tickets. Hence the system will be a user friendly platform to purchase tickets in a secured way. VI. ADVANTAGES OF PROPOSED SYSTEM 1. No use of paper tickets. 2. Application is secured and not vulnerable to attacks. 3. Tickets can be placed anytime anywhere. 4. The application would reduce time. 5. consumption, eliminate cost of sales, no problem of lost tickets REFERENCES [1] SD-EQR: A New Technique To Use QR CodesTM in Cryptography. Use of QR
  • 5. Sharadchandra Chavan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.32-36 www.ijera.com 36 | P a g e CodesTM In Data Hiding and Securing Somdip Dey (Author),Department of Computer Science,St. Xavier’s College [Autonomous] Kolkata, India. [2] Automatic Recognition Algorithm of Quick Response Code Based on Embedded System,Yue Liu Department of Information Science and Engineering, Jinan University, Mingjun Liu Department of Information Science and Engineering, Jinan University,Jinan, China Jinan, China. [3] The MD5 Umang Beri, University of Rochester