Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241000179-7.doi: 10.11896/jsjkx.241000179

• Image Processing & Multimedia Technology • Previous Articles     Next Articles

Research on High-robustness Encoding and Localization Methods Based on Damaged QR Dode

KANG Bohan1, GAO Wanlin2, JIA Jingdun2,3   

  1. 1 China Ordins Group Co.,Ltd.,Beijing 100089,China
    2 College of Information and Electrical Engineering,China Agricultural University,Beijing 100083,China
    3 Corch High Technology Industry Development Center,Ministry of Science and Technology,Beijing 100036,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    China North Industries Group Corporation Limited Youth Innovation Project:Research on Distributed Swarm Intelligence Data Sharing Model and Sharing Strategy under Digital Supply Chain.

Abstract: With the popularization of mobile devices and the development of the IOT,QR code has become widely used as a convenient and efficient means of data transmission.However,QR code is susceptible to wear and corrosion during prolonged usage.In particular,damage such as corner loss can lead to the failure of the position detection module and the format information encoding module,making it difficult for users to decode QR code with traditional software.To cope with the problem,this paper proposes improved algorithms for the center position and edge corner detection area,made successful for localization by the decoder system when parts of the QR code’s position detection area are missing.Additionally,this paper introduces a novel structure for format version information to replace the functionality of the traditional structure of QR code.Experimental results demonstrate that the proposed methods can enhance more robustness in decoding than the conventional method with the corner loss of QR code,thereby possessing high significance in practical application.

Key words: QR code, Damaged QR code, Graph structure, Location method, Encoding method, Robustness

CLC Number: 

  • TP391
[1]TAO J,LUO Z H,WANG B S,et al.A Logistics Privacy Protection System Based on Quick-Response Barcodes Steganography[J].Journal of Cyber Security,2023,8(2):1-10.
[2]WANG T Q,ZHANG Y Z,DI Y L,et al.Research on strong robustness watermarking algorithm based on dynamic difference expansion[J].Chinese Journal of Network and Information Security,2023,9(5):150-165.
[3]ZHANG Y L,LI B.Agricultural product supply chain traceability system design based on master-slave alliance chain structure [J].Application Research of Computers,2022,39(6):1638-1644.
[4]AHAMED N N,VIGNESH R,ALAM T.Tracking and tracing the halal food supply chain management using blockchain,RFID,and QR code[J].Multimedia Tools and Applications,2023(83):48987-49012.
[5]QIN J,XU Z J,YANG Y,et al.Research on secure payment based on passive Internet of Things technology[J].Internet of Things Technology,2024,14(2):93-96.
[6]EREN B.QR code m-payment from a customer experience perspective[J].Journal of Financial Services Marketing,2024(29):106-121.
[7]TAVEERZD N,VONGPRADHIP S.Development of color-QR code for increasing capacity[C]//International Conference on Singal-Image Technology and Internet-Based Systems.2015:645-648.
[8]LUAN J N,ZHANG W,SUN W,et al.High-accuracy localization algorithm based on fusion of two-dimensional code vision and laser lidar[J].Journal of Computer Applications,2021,41(5):1484-1491.
[9]PENG L,WEN L,QIANG L,et al.Research on QR 2D-codegraphics correction algorithms based on morphological expansion closure and edge detection[J].Smart Innovation,Systems and Technologies,2020(180):197-209.
[10]GAO F,LINGHU Q J,GE Y S,et al.Location Method of Laser QR Code Based on Position Discrimination[J].Journal of Computer-Aided Design & Computer Graphics,2017,29(6):1060-1067.
[11]LIU Y,ZOU F M,CAI Q Q,et al.Modified deformation QR code correction and identification of YOLOv8n-Pose [J].Computer Systems & Applications.2024,33(12):141-152.
[12]DONG H,LIU H,LI M,et al.An Algorithm for the Recognition of Motion-Blurred QR Codes Based on Generative Adversarial Networks and Attention Mechanisms[J].International Journal of Computational Intelligence Systems,2024,17:83.
[13]LIU C,ZHENG H,WANG T Y.Functional patterns-relevant blind-deblurring method foranti-counterfeiting code images[J].Journal of Image and Graphics,2023,28(3):680-690.
[14]FENG W,FANG C.Stable localization algorithm of QR codebased on method of least squares[J].Application Research of Computers,2018,35(3):957-960.
[15]RIOUS G,SCARVELIS C,CHOKSI R,et al.Blind deblurring of barcodes via Kullback-Leibler divergence[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2021,43(1):77-88.
[16]XU C J,LIU Z,HE Z F,et al.Encoding pattern selection algorithm for character two-dimension code[J].Computer System Application,2013,22(4):69-73.
[17]KANG B H,JIA J D,GAO W L,et al.Research on improved characters encoding methods based on QR code[J].Chinese Journal of Electronics,2019,28(6):1170-1177.
[18]RAMALHO J,ANTONIO L,CORREIA S,et al.LuminescentQR codes for smart labeling and sensing[J].Optics & Laser Technology,2018(101):304-311.
[19]YUAN M Z,HAO F Z.Research and Implementation of Micro QR and QR Structured Appending Mode[J].Computer Technology and Development,2013,23(11):229-233.
[20]BAN S H,HAN Y J,FAN Y W,et al.QR Code Information Encryption Architecture Based on Mimic Defense[J].Journal of Chinese Computer Systems,2020,41(4):673-678.
[21]LIN P Y.Distributed secret sharing approach with cheater prevention based on QR code[J].IEEE Transactions on Industrial Informatics,2016,12(1):384-392.
[22]YIN X,HUANG W Q.Research on color QR code watermarking technology based on chaos theory[J].Journal on Communications,2018,39(7):50-58.
[23]LIU J Q,QU Y P,LYU Y H.Design of very short antipollution error correcting code based on global distance optimization[J].Journal of Computer Applications,2023,43(2):630-635.
[24]MSTAFA R.Reversible video steganography using quick re-sponse codes and modified elgamal cryptosystem[J].Computers,Materials and Continua,2022,72(2):000.
[25]GB/T 18284-2000.快速响应矩阵码[S].国家质量技术监督局,2000.
[1] LIU Wenfei, LIU Jiafei, WANG Qi, WU Jingli, LI Gaoshi. Component Reliability Analysis of Interconnected Networks Based on Star Graph [J]. Computer Science, 2025, 52(7): 295-306.
[2] YIN Wencui, XIE Ping, YE Chengxu, HAN Jiaxin, XIA Xing. Anomaly Detection of Multi-variable Time Series Data Based on Variational Graph Auto-encoders [J]. Computer Science, 2025, 52(6A): 240700124-8.
[3] WANG Liuyi, ZHOU Chun, ZENG Wenqiang, HE Xingxing, MENG Hua. High-frequency Feature Masking-based Adversarial Attack Algorithm [J]. Computer Science, 2025, 52(10): 374-381.
[4] XIONG Xi, DING Guangzheng, WANG Juan, ZHANG Shuai. DLSF:A Textual Adversarial Attack Method Based on Dual-level Semantic Filtering [J]. Computer Science, 2025, 52(10): 423-432.
[5] WANG Chundong, LI Quan, FU Haoran, HAO Qingbo. Face Anti-spoofing Method with Adversarial Robustness [J]. Computer Science, 2024, 51(6A): 230400022-7.
[6] LI Shasha, XING Hongjie. Robust Anomaly Detection Based on Adversarial Samples and AutoEncoder [J]. Computer Science, 2024, 51(5): 363-373.
[7] HAN Songyuan, WANG Hongxia, JIANG Ziyu. Robust and Multilayer Excel Document Watermarking for Source Tracing [J]. Computer Science, 2024, 51(5): 374-381.
[8] ZHANG Liying, SUN Haihang, SUN Yufa , SHI Bingbo. Review of Node Classification Methods Based on Graph Convolutional Neural Networks [J]. Computer Science, 2024, 51(4): 95-105.
[9] CHEN Jinyin, LI Xiao, JIN Haibo, CHEN Ruoxi, ZHENG Haibin, LI Hu. CheatKD:Knowledge Distillation Backdoor Attack Method Based on Poisoned Neuronal Assimilation [J]. Computer Science, 2024, 51(3): 351-359.
[10] SUN Shounan, WANG Jingbin, WU Renfei, YOU Changkai, KE Xifan, HUANG Hao. TMGAT:Graph Attention Network with Type Matching Constraint [J]. Computer Science, 2024, 51(3): 235-243.
[11] HUANG Changxi, ZHAO Chengxin, JIANG Xiaoteng, LING Hefei, LIU Hui. Screen-shooting Resilient DCT Domain Watermarking Method Based on Deep Learning [J]. Computer Science, 2024, 51(2): 343-351.
[12] SHAO Yunfei, SONG You, WANG Baohui. Study on Degree of Node Based Personalized Propagation of Neural Predictions forSocial Networks [J]. Computer Science, 2023, 50(4): 16-21.
[13] YAO Hongliang, YIN Zhiyuan, YANG Jing, YU Kui. Stock Market Trend Reasoning Algorithm Based on Game Dynamic Influence Diagram [J]. Computer Science, 2023, 50(11A): 221100039-7.
[14] ZHAO Zitian, ZHAN Wenhan, DUAN Hancong, WU Yue. Study on Adversarial Robustness of Deep Learning Models Based on SVD [J]. Computer Science, 2023, 50(10): 362-368.
[15] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!