Project Report
Project Report
Project Report
1. INTRODUCTION
Quick Response (QR) codes are versatile. A piece of long multilingual text, a
linked URL, an automated SMS message, a business card or just about any
information can be embedded into the two-dimensional barcode. Coupled with
moderate equipped mobile devices, QR Codes can connect the users to the information
quickly and easily. In this paper, we explore how QR codes can be used in education.
The low technical barrier of creating and reading QR codes allows innovative
educators to incorporate them into their educational endeavors. The operations to
retrieve or store QR codes are incredibly simple and quick, and with mobile devices,
make them the ideal educational tools for teaching and learning.
Now mobile phones can implement many new kinds of applications such as taking
photos, and movie shooting by using embedded camera devices. So mobile phones
with embedded camera devices can be used to recognize the barcode.
This project proposes the use of QR codes more innovatively by deploying various
modules for various purposes. It also provides a module for encryption in order to
make QR code more secure and safe.
2. LITERATURE REVIEW
2.1 What Is Qr Code?
Fig. No. 4 Multiple-barcode, 2-D stacked barcode and 2-D matrix code
Because 2-D matrix codes contain information in both the horizontal and
vertical direction, they met the need for high data density and small size, yet further
improvements were still to follow, including those introduced by the QR Code. The
following image summarizes the features and characteristics of some typical 2-D
codes.
The QR Code modules perform several functions: Some contain the actual
data itself, while others are grouped into various function patterns that improve
reading performance and allow symbol alignment, error correction and distortion
compensation. The timing pattern lets the scanning device know the size of the
symbol. There is also a required “quiet zone,” a four- module wide buffer area
containing no data, to ensure that surrounding text or markings are not mistaken for
QR Code data.
Conventional 2-D matrix codes required a considerable amount of time to be
spent searching a symbol’s code to determine its angle of orientation, position (x and
y coordinates) and size. To address this problem, the QR Code was designed with
special position-detection patterns located in three corners of each symbol. The
patterns have a symmetrical scan-line ratio of 1:1:3: 1:1, which allows them to be
scanned from any direction within a full 360 degrees. In addition, the positional
relationship of the patterns allows quick access to the relevant angle, position and
size information contained in the code’s periphery.
As a result, the QR Code does not require lengthy code searching, enabling
reading speeds 20 times faster than those of conventional matrix codes. Also,
searching the position detection patterns can be performed by the scanning
hardware, further increasing overall speed by allowing image reading and data
processing to be carried out simultaneously.
3.1 QR Code Symbol Versions
QR Codes can be generated in 40 different symbol versions, from 21 x 21
modules (version 1) to 177 x 177 modules (version 40). Each higher symbol version
has 4 additional modules per side (16 additional modules per symbol), and can
contain a proportionally larger amount of data. The maximum amount of data that can
be contained by a given symbol is determined by its version, type of characters and
error-correction level.
4. TYPES OF QR CODES
4.1 URL: These are the codes that redirect the user to a website. As soon the code is
scanned, the phone browser will open and load the company website. Company can put
URL QR codes on their promotional materials so that their customers who are looking
for more information can land on their website.
4.2 meCard: Containing contact details, these codes automatically save information
in a user’s phone address book. This saves users from the hassle of entering the
information manually and from making input mistakes. These codes are very useful
in an event such as conventions, conferences, and seminars where there is a need to
exchange business card.
4.3 vCard: A vCard QR code can store more data than meCard QR code, like a
salutation, job title, mobile number, work details, address, zip code, and country. Such
information is useful if a person is working on a global level and needs to share more
information about to consumers.
4.4 Calendar Event: Usually found on invitation cards and movie or concert tickets,
these codes have information regarding the event date, time, and location. They can
also hold event descriptions. These codes also have an option to automatically save
the event in the phone’s calendar.
4.5 Email: When scanned, email QR codes will have an email address to provide.
Email QR codes can also open email composition window on a user’s phone, with the
email address field already filled in. These codes can prompt users to send an email.
4.6 Phone Number: This code is used to encode a phone number so when a phone
scans it, it will produce a number on its home screen. This encourages users to call
the advertiser, rather than continue searching. This type of QR code is especially
useful for pizza delivery and similar services
4.7 SMS: This type of QR code prompts an SMS message from the user’s phone,
automatically addressing and composing the text message. An SMS QR code is best
used for subscription services.
4.8 GPS Map Coordinates: Information regarding the location of a particular place
or an object is stored using latitude and longitude coordinates and can be displayed on
a smartphone. This code can also provide directions.
4.9 Social media: Use this code to get a person to like a Facebook page or retweet on
Twitter. You can also use this code to share information on social networking
websites.
4.10 Plain Text: This code displays a text message to the code’s scanner, and is useful
for communicating short messages.
4.11 YouTube Video: Embedding a YouTube video in your QR code directs users to
promotional or how-to videos about your company.
4.12 LinkedIn Share: Creating a QR Code for LinkedIn lets clients and customers
find your profile easily on this popular business networking site.
4.13 FourSquare Venue: You can create a QR code to capitalize on the popularity
for the FourSquare app, which entices customers to check in at your location and tell
their friends.
6. READING QR CODES
6.1 High-speed reading:
Faster scanning and the ability to scan barcodes from a distance increase operator
efficiency. Look for devices with advanced CCD scanning technology, which enables
even high-density or poorly printed barcodes to be read at high speed and from a
distance.
6.2 Ease of use:
Lightweight, ergonomic designs, featuring large display screens and easy-to-
hold grips, reduce operator fatigue, a key factor in productivity.
6.3 Durability:
In the field, hand-held scanners and terminals are vulnerable to harsh
environments and rough handling, including being bumped or dropped. Devices
featuring rugged, drop-resistant construction and resistance to water and dust protect
your equipment investment.
6.4 Long battery life:
Scanners are available with power-saving features that result in longer operating
time, eliminating frequent, time-consuming battery changes.
6.5 Experience and reputation of the manufacturer:
Look for a manufacturer that has established itself as an industry leader and
innovator, and whose products have stood the test of time.
7. ENCRYPTION
Encryption is the conversion of data into a form, called a ciphertext, that
cannot be easily understood by unauthorized people. Decryption is the process of
converting encrypted data back into its original form, so it can be understood. The
use of encryption/decryption is as old as the art of communication. In wartime, a
cipher, often incorrectly called a code, can be employed to keep the enemy from
obtaining the contents of transmissions. (Technically, a code is a means of
representing a signal without the intent of keeping it secret; examples are Morse code
and ASCII.) Simple ciphers include the substitution of letters for numbers, the
rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting
the sideband frequencies. More complex ciphers work according to sophisticated
computer algorithms that rearrange the data bits in digital signals.
In order to easily recover the contents of an encrypted signal, the correct
decryption key is required. The key is an algorithm that undoes the work of the
encryption algorithm. Alternatively, a computer can be used in an attempt to break
the cipher. The more complex the encryption algorithm, the more difficult it becomes
to eavesdrop on the communications without access to the key.
Encryption/decryption is especially important in wireless communications. This is
because wireless circuits are easier to tap than their hard-wired counterparts.
Nevertheless, encryption/decryption is a good idea when carrying out any kind of
sensitive transaction, such as a credit-card purchase online, or the discussion of a
company secret between different departments in the organization. The stronger the
cipher -- that is, the harder it is for unauthorized people to break it -- the better, in
general. However, as the strength of encryption/decryption increases, so does the
cost.
In recent years, a controversy has arisen over so-called strong encryption. This
refers to ciphers that are essentially unbreakable without the decryption keys. While
most companies and their customers view it as a means of keeping secrets and
minimizing fraud, some governments view strong encryption as a potential vehicle
by which terrorists might evade authorities. These governments, including that of the
United States, want to set up a key- escrow arrangement. This means everyone who
uses a cipher would be required to provide the government with a copy of the key.
Decryption keys would be stored in a supposedly secure place, used only by
authorities, and used only if backed up by a court order. Opponents of this scheme
argue that criminals could hack into the key-escrow database and illegally obtain,
steal, or alter the keys. Supporters claim that while this is a possibility, implementing
the key escrow scheme would be better than doing nothing to prevent criminals from
freely using encryption/decryption.
7.1 Encryption in QR codes
When we talk about Encrypted Code, we do not mean that the code itself (e.g.
QR Code) is encrypted, but, instead, a part of the URL where the code is pointing is
encrypted.
The Encrypted Codes feature can be used to hide or encrypt sensitive parts of
the target URL of your code or to prevent users from manipulating parts of the URL,
e.g. changing the values of parameters.
This can be of relevance in the following use cases:
1. Contests
2. Games
3. Voting
4. Security applications
5. Prevent crawling of sensitive data
Encrypted Codes are standard Dynamic Link Codes and therefore manageable,
trackable and editable like all other System Codes.
The contact data is stored in a database and accessible by providing the contact ID.
Without encryption, the URL for recalling this contact data would probably look
something like this:
http://www.somesite.com/contactpage.php?contactid=12345
The problem with that approach is that someone could easily try contact IDs
other than the given ID of 12345 and collect the contact information that is associated
with those other IDs. That’s certainly something the BeeTagg Contact application
has to prevent, and it can do so by using Encrypted Codes.
8. IMPLEMENTATION OF QR CODE
Here's a step-by-step guide on how to generate QR codes using Python:
8.1 Install Required Libraries: First, you need to install the necessary libraries. For
generating QR codes, you'll need the qr code library. You can install it using pip:
• Version: The version parameter determines the size of the QR code. Higher
versions allow for more data to be encoded but result in larger QR codes.
• Error Correction Level: This parameter determines the level of error correction.
There are four levels available: ERROR_CORRECT_L, ERROR_CORRECT_M,
ERROR_CORRECT_Q, and ERROR_CORRECT_H. Higher error correction
levels provide greater resilience to damage or distortion but result in denser QR
codes.
• Box Size: The box size determines the size of each module (black or white square)
in the QR code.
• Border: The border parameter specifies the number of modules around the edge of
the QR code.
8.4 Add Data to the QR Code: Use the add_data () method to add the data that you
want to encode into the QR code.
9. OUTCOMES OF QR CODE
</head>
<body>
<section>
<ul class="main-menu">
<li> <a class="navbar-link1" href="#home"
class="active">Home</a></li>
<li> <a class="navbar-link1"href="#about">About</a></li>
<li> <a class="navbar-link1"href="
computer_science.html">Computer Science Department</a></li>
<li> <a class="navbar-link1"href=" #Gallery">Gallery</a></li>
<li> <a class="navbar-link1"href=" #contact">Contact</a></li>
</ul>
</div>
<div class="college-info">
<img src="download.jpg" alt="College Logo" width="850"
height="300" > <br><br><br><br>
</div>
<section class="a">
<h4><b><i>WELCOME TO THE MAULANA AZAD COLLEGE OF ARTS, SCIENCE &
COMMERCE — AURANGABAD</i></b></h4><br>
</section>
<div class="container">
<div class="item">
<h2>Founder</h2>
<img src="Founder.jpg" alt="founder" >
<p><b> DR. RAFIQ ZAKARIA</b></p>
<p>Founder of Maulana Azad Educational Trust
</p>
</div>
<div class="item">
<h2>Chairman</h2><br<br>
<img src="Chairman.jpg" alt="'founder">
</p>
</div>
</section>
<section id="about">
<h2>About Us</h2> <p>
The city of Aurangabad with a glorious past was in deep slumber
before the
late Honorable Dr. Rafiq Zakaria (Ex. Minister and Member of
Parliament)
discovered it. Among many other plans, he envisioned a centre of
higher
learning at the site of this legendary base of learning at Rauza
Bagh,
Aurangabad. Maulana Azad College of Arts, Science & Commerce is the
first
institution on the campus which was started in June 1963. The
College is
situated in the large and beautiful campus with its Mughal
architecture and
beautifully laid gardens. Today there are two separate campuses
running
</p>
<p>
Maulana Azad College has become a first symbol of quality education
as the
National Assessment & Accreditation Council (NAAC) has granted Grade
“A” (2004) which is re-acriditated in Sept. 2015 and the college is
ISO 9001:2008 Certified College of the region. The College has the
distinction of being the first institution to have been accredited
as
Grade "A" by NAAC. The college is selected by UGC for potential for
excellence from 2016. This makes the Maulana Azad College very proud
indeed and places on it great responsibility to carry forward a
great
tradition established nearly five decades ago. This is the legacy
that
students will carry forward with them.
</p>
<p>Mrs. Fatma Zakaria is now leading the mission of the founder Dr.
Rafiq
Zakaria by putting in efforts to maintain the quality of education
and
training. She is now Chairman of Maulana Azad Educational Trust and
President of Maulana Azad Education Society</p>
</p>
<p>It also offers through its postgraduate and research centre
various postgraduate program
like MA, M.Com, M.Sc., MPM, MMS etc. the college got recognition
as a research centre for
Ph.D. program in subject of Chemistry, Geology, English, Hindi,
Urdu, Zoology, Botany,
Mathematics, Commerce & Management Science..
</p>
</section>
<section id="Gallery">
<h2> Gallery</h2>
<div class="gallery-container">
<img src="download (1).jpg" alt="CS Gallery image 1" class="gallery-
image" width="400" height="300">
<img src="download (3).jpg" alt="CS Gallery image 2" class="gallery-
image" width="400" height="300">
<img src="WhatsApp Image 2024-02-20 at 12.59.15_0f30ded9.jpg"
alt="CS Gallery image 2" class="gallery-image" width="400" height="300" >
<img src="WhatsApp Image 2024-02-20 at 12.59.16_352dd940.jpg"
alt="CS Gallery image 2" class="gallery-image" width="400" height="300" >
</div>
</section>
</body>
</html>
body {
font-family: Arial, sans-serif;
margin: 10;
padding-right: 5%;
background-color:aqua; /* Light gray background color */
}
h1{
text-align: center;
}
.container{
display: flex;
}
.item{
flex: 1;
padding: 50px;
}
.item img {
max-width: 100%;
height: auto;
}
.About{
font-family: 'Franklin Gothic Medium', 'Arial Narrow', Arial, sans-
serif;
background-color: white;
text-decoration: none;
}
header {
font-family: Arial, sans-serif;
margin: 0;
background-color: white;
color: #fff;
padding: 20px;
}
.college-info {
font-family: 'Franklin Gothic Medium', 'Arial Narrow', Arial, sans-
serif;
display: down;
align-items: center;
background-color: aqua;
}
.college-logo {
width: 500px;
height: auto;
margin-inline: 20px;
}
.side-logo {
width: 50px;
height: auto;
position: absolute;
top: 20px;
left: 20px;
}
section {
padding: 20px;
background-color:white; /* White background color for sections */
margin-bottom: 20px;
}
.Gallary{
background-color: black;
}
.main-menu{
list-style: none;
float: right;
margin-top: 20px;
}
.main-menu a {
font-weight: 500;
color: #3a3a3a;
font-size: 20px;
text-decoration: none;
.main-menu li {
float: left;
.a{
text-align: center;
}
/* Responsive layout using media queries */
@media screen and (min-width:768px){
header{
padding: 30px;
}
main{
padding: 30px;
}
}
@media screen and(min-width:1024px) {
header{
padding: 40px;
}
main{
padding: 40px;
}
}
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-
scale=1.0">
<title> computer Science Department </title>
<link rel="stylesheet" href="styles.css">
<style>
body{
background-image: url('download.jpeg');
background-repeat: no-repeat;
background-attachment: fixed;
background-size: cover;
}
</style>
</head>
<body>
<header>
<div class="container">
<section id="main-menu">
</div>
</div>
</section>
<section class="a">
<h4><b><i>WELCOME TO THE COMPUTER SCIENCE DEPARTMENT
</i></b></h4>
</section>
<section id="department">
<div class="department">
<img src="WhatsApp Image 2024-02-18 at
22.16.20_808e07b1.jpg" alt="Computer Science Department"
class="department-image" id="cs-image" width="850"
height="500">
<h3><b><i>Computer Science Department</i></b></h3><br><br>
</div>
</section>
<section id="about">
<h1> <b>About</b> </h1>
<div class="about">
<p>Computer Science Department in Maulana
Azad College is established in the year 1992.
The Department Runs the course MSc.Computer Science.
The strength of the students in the department is
around 150.
The Lab is equipped with 40 updated
computers and the high speed broad band
internet connection. All the computers are
over the network</p>
<p>
The faculty members are experienced and well-
qualified, often actively engaged
in research and industry collaborations. Students
have access to modern laboratories
equipped with the latest technologies and software
tools to support their learning
and research endeavors. Additionally, the department
organizes seminars, workshops,
and industrial visits to expose students to real-
world applications and emerging
trends in the field.</p>
</p>
<p>Computer science emerged as an independent discipline
in the early 1960s,
although the electronic digital computer that is the
object of its study was
invented some two decades earlier. The roots of
computer science lie primarily
in the related fields of mathematics, electrical
engineering, physics, and
management information systems.
</p>
<p>Mathematics is the source of two key concepts in the
development
of the computer—the idea that all information can be
represented as as sequences of zeros and ones and
the abstract notion of a“stored program.” In the
binary number system, numbers are
</p>
<h1>Mission and Vision</h1>
<p>To produce highly qualified and motivated
graduates through a rigorous curriculum of
theory and application that develops the ability
to solve problems, individually and in
teams.<br><br>
<section id="resources">
<h1><b>Student Resources</b></h1>
<h1>Syllabus</h1>
<p>Here is a Syllabus link for 1st year and 2nd year...Click on
Syllabus and view it</p>
<a
href="http://www.bamu.ac.in/Department_of_Computer_Science/M%20Sc-CS-NEP-
final-Dept-23-24.pdf"> Syllabus</a>
<h1>Notes</h1>
<p>Here is a links to download lecture notes or study
materials.</p>
<a
href="https://classroom.google.com/c/NjY2NzUxNTYwNDAw?cjc=z5h2rgg">
Notes</a>
</section>
<section id="gallery">
<h1> <b>Gallery</b></h1>
<div class="gallery-container">
<img src="images (1).jpg" alt="CS Gallery image 1"
class="gallery-image" >
<img src="download (2).jpg" alt="CS Gallery image 2"
class="gallery-image" >
<video width="320" height="240" controls>
<source src="WhatsApp Video 2024-04-17 at
20.05.31_05b8593d.mp4" type="video/mp4">
<source src="WhatsApp Video 2024-04-17 at
20.12.36_b3b408df.mp4" type="video/mp4">
</video>
<video width="320" height="240" controls>
<source src="WhatsApp Video 2024-04-17 at
20.12.36_b3b408df.mp4" type="video/mp4">
</video>
</div>
</section>
</div>
</header>
<footer>
<p>© MAULANA AZAD COLLEGE, Department OF computer
science</p>
</footer>
<script src="script.js"></script>
</body>
</html>
body {
margin: 0;
padding: 0;
font-family: Arial, sans-serif;
/* background-image: url("")
/* background-size: cover;
background-repeat: no-repeat;
background-position: center;*/
/* background-color: aqua; */
}
container {
width: 90%; /* Set a maximum width for your content */
max-width: 1200px; /* Adjust this value based on your design needs */
margin: 0 auto; /* Center the container */
padding: 20px;
}
header {
text-align: center;
margin-bottom: 20px;
}
.main-menu{
list-style: none;
float: right;
margin-top: 20px;
font-family: Cambria, Cochin, Georgia, Times, 'Times New Roman', serif;
font-size: medium;
}
.main-menu a {
font-weight: 500;
color: #3a3a3a;
font-size: 30px;
text-decoration: none;
}
.main-menu ul{
list-style-type: none;
}
.main-menu li{
float: left;
padding: 12px 15px;
}
.a{
text-align: center;
font-size: 80px;
}
section {
padding: 20px;
/* background-color: #fff; */
/* White background color for sections */
margin-bottom: 20px;
}
.About{
font-family: 'Courier New', Courier, monospace;
//
line-gap-override: 1.15S;
}
.department{
margin-top: 20px;
}
.faculty{
margin-top: 20px;
}
.teacher {
text-align: center;
margin-bottom: 20px;
}
.teacher img {
width: 100px;
height: auto;
border-radius: 50%; /* Rounded corners for teacher images */
}
.teacher h3 {
margin-top: 10px;
margin-bottom: 5px;
}
.teacher p {
margin: 0;
}
#resources h3 {
margin-top: 20px;
}
.gallery-container {
display: flex;
flex-wrap: wrap;
justify-content: space-between;
}
.gallery-image {
width: 300 ;
height: 200;/* Adjust image width based on your design */
margin-bottom: 30px;
border-radius: 5px; /* Rounded corners for gallery images */
}
}
}
/* Footer Styles */
footer {
background-color: #333333;
color: #ffffff;
text-align: center;
padding: 20px;
}
14. CONCLUSION
In general, we believe that QR codes have great potential in business media.
Some possibilities are there are many creative ideas waiting for us to explore. We
examine outlined the dangers of possible malicious attacks utilizing manipulated QR
Codes.
Since QR Codes gain increasing popularity through their use for marketing
purposes, we expect that this kind of attack will receive more and more attention by
the hacking community in the future. This paper will present some security conscious
of the mobile phone’s users.
REFERENCES
[1] H. S. Al-Khalifa. Utilizing q code and mobile phones for blinds and visually
impaired people. In ICCHP, pages 1065{1069, 2008.
[2] A. Alapetite. Dynamic 2d-barcodes for multi-device web session migration
including mobile phones. Personal and Ubiquitous Computing, 14(1):45{52, 2010.
[3] R. Bose and D. Ray-Chaudhuri. On a class of error correcting binary group
codes*. Information and control, 3(1):68{79, 1960.
[4] M. Canadi, W. H• opken, and M. Fuchs. Application of qr codes in online
travel distribution. In ENTER, pages 137{148, 2010.
[5] J. Gao, V. Kulkarni, H. Ranavat, L. Chang, and H. Mei. A 2d barcode-based
mobile payment system. In MUE, pages 320{329, 2009.
[6] J. Z. Gao, L. Prakash, and R. Jagatesan. Understanding 2d-barcode technology
and applications in m-commerce - design and implementation of a 2d barcode
processing solution. In COMPSAC (2), pages 49{56, 2007.
[7] J. Z. Gao, H. Veeraragavathatham, S. Savanur, and J. Xia. A 2d-barcode based
mobile advertising solution. In SEKE, pages 466{472, 2009.
[8] A. Hocquenghem. Codes correcteurs d^a_A _Zerreurs. Chi_res, 2(147-156):4,
1959.
[9] Y.-P. Huang, Y.-T. Chang, and F. E. Sandnes. Ubiquitous information transfer
across different platforms by qr codes. J. Mobile Multimedia, 6(1):3{14, 2010.
[10] ISO 16022:2006. Data Matrix bar code symbology speci_cation. ISO,
Geneva, Switzerland. SA, 2006. IEEE Computer Society.