You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

20 June 2025

Innovative QR Code System for Tamper-Proof Generation and Fraud-Resistant Verification

Department of Computer Science, College of Computer, Qassim University, Buridah 51452, Saudi Arabia
This article belongs to the Special Issue Advanced Technologies and Solutions for Modern Communication and Sensing Systems

Abstract

Barcode technology is widely used as an automated identification system that enables rapid and efficient data capture, particularly in retail environments. Despite its practicality, barcode-based systems are increasingly vulnerable to security threats—most notably, barcode substitution fraud. To address these challenges, this paper presents an innovative system for the secure generation and verification of Quick Response (QR) codes using a digital watermarking technique. The proposed method embeds tamper-resistant information within QR codes, enhancing their integrity and making unauthorized modification more difficult. Additionally, a neural network-based authentication model was developed to verify the legitimacy of scanned QR codes. The system was evaluated through experimental testing on a dataset of 5000 QR samples. The results demonstrated high accuracy in distinguishing between genuine and fraudulent QR codes, confirming the system’s effectiveness in supporting fraud prevention in real-world applications.

1. Introduction

The evolution of market selling systems has been significantly influenced by advancements in real-time data entry technologies, which have replaced manual processes that were prone to inefficiency and human error. Among the most transformative tools in this space is barcode technology—a widely adopted method for automatic identification and real-time data capture. These systems enable rapid item recognition at checkout, improving operational speed and reducing customer wait times.
Barcodes, particularly Quick Response (QR) codes, are encoded optical patterns that store digital information. Initially developed by Denso Wave in 1994 for automotive tracking, QR codes have since become ubiquitous, used across industries such as retail, healthcare, logistics, and marketing due to their ability to hold extensive data in a compact form and their compatibility with smartphone scanners. Unlike one-dimensional barcodes, QR codes encode data both horizontally and vertically, offering greater information density and faster readability.
However, the widespread deployment of barcode systems has raised critical security concerns. Barcode substitution fraud—where genuine barcodes are replaced with forged ones to manipulate product information or pricing—poses a growing threat. This type of fraud not only results in financial losses but also erodes consumer trust and demands increased manual oversight. Studies have identified vulnerabilities in conventional barcode systems stemming from the ease of barcode regeneration, insufficient authentication protocols, and the absence of robust tamper-proof features.
Recent approaches to mitigate barcode-related fraud have included the integration of sensor-based object detection, visual signature matching, and machine learning-based image verification systems. Despite these advances, most solutions require complex infrastructure, significant computational resources, or cloud-based authentication platforms—challenges that limit their scalability and adoption in cost-sensitive environments. Moreover, these methods often lack localized, market-specific protection mechanisms.
To address these gaps, this paper introduces a novel system for tamper-proof QR code generation and fraud-resistant verification. The core of the proposed method lies in embedding secure digital watermarks within the QR codes using a lightweight technique that preserves their readability. Complementing this, a neural network-based authentication model is employed to verify the legitimacy of scanned codes in real time, without requiring external storage or cloud-based matching.
The proposed system aims to provide a scalable and practical solution to QR code authentication, suitable for deployment in environments with limited computational resources. Its design emphasizes local validation, market-specific watermarking, and resistance to reprinting or cloning attempts. The system’s performance is validated through extensive experimentation on a dataset comprising 5000 QR samples.
The remainder of this paper is organized as follows: Section 2 reviews related work and existing techniques for barcode fraud prevention; Section 3 demonstrates the problem through real-world examples; Section 4 describes the proposed secure QR generation and verification system; Section 5 details the implementation and experimental setup; Section 6 discusses the results and future directions; and Section 7 concludes the paper.

3. Problem Demonstration

The barcodes currently in use in markets are susceptible to various straightforward and easily executed attacks. To illustrate this, several one-dimensional barcodes commonly used in markets were experimentally analyzed for two major fraud issues: duplication and swapping. Various tools were employed for this experiment, which will be detailed in the following sections.

3.1. Experiment of Duplication Fraud

The duplication fraud issue refers to the ability to create a copy of an existing barcode that can be read by the system. A range of commercial and free tools can be used for this purpose, including iBarcoder [31], Easy Barcode Creator [32], and TEC-IT tools [33]. These tools offer a variety of settings and options for barcode generation, allowing users to not only create barcode objects but also add text, image boxes, and graphics. Using these tools, we regenerated different barcodes collected from various markets, as listed in Table 1. Once regenerated, these barcodes were processed through the system, and the results confirmed that they were successfully readable.
Table 1. Original barcode samples vs. regenerated ones.

3.2. Swapping Fraud Experiment

Swapping fraud involves copying existing barcodes and replacing them with others, enabling the manipulation of product prices by swapping barcodes between items. This practice results in duplication fraud, as barcodes are exchanged to alter the pricing of products associated with the original barcode.
In our experiment, we duplicated two different barcodes for two selected products and swapped their labels by printing and affixing the regenerated barcode to each product. At checkout, the system read the swapped barcodes as if they belonged to the original products. While this type of fraud has been studied before, as seen in [34], it motivated us to explore a secure barcode solution that could help prevent such fraudulent activities.

4. Materials and Methods

This section details the architecture, components, and experimental procedures used to develop and evaluate the proposed fraud-resistant QR code generation and verification system. In particular, the methodology comprises five phases: (1) the architecture of the proposed system, (2) QR code dataset generation, (3) the workspace configuration, (4) data training and testing, (5) the classifier–reader integration, and (6) evaluation and analysis.

4.1. The Proposed QR System

The proposed QR system recognizes that most QRs currently used in markets can be easily regenerated using commonly available tools. Furthermore, many of these QRs are not market-specific, enabling different markets to use the same QR generator. To address these issues, the proposed QR system was designed to generate QR codes that are resistant to regeneration and unique to each market. The details of this proposed QR system are explained in the following sections.

4.1.1. Secure QR Code Generation with Watermarking

To strengthen resistance against QR code cloning and tampering, we implemented a lightweight spatial-domain digital watermarking technique integrated directly into the QR code generation process. Unlike one-dimensional barcodes, QR codes offer a greater capacity for information encoding and do not require backend database access, making them ideal for standalone authentication in constrained environments [4].
The generation process, as shown in Figure 1, proceeds as follows:
Figure 1. QR code with watermark generation phase.
First, a standard QR code is created using an encoder that includes alignment patterns to enhance the scanning stability and data recovery. Next, a unique anti-counterfeiting watermark pattern—distinct for each market—is embedded into the QR image using a least significant bit (LSB) modification technique. This embeds watermark data by altering the least significant bits of pixel values in the image. This method is commonly used due to its simplicity and minimal impact on image quality [35]. This also allows the secure insertion of imperceptible patterns within the spatial domain of the QR image without visibly altering its structure or compromising its readability.
The embedded watermark serves multiple purposes: it provides a unique identity per issuing market, enables tamper detection during scanning, and verifies the authenticity of the code against fraudulent reproduction. The technique was specifically chosen for its robustness against common distortions such as printing, resizing, and scanning—making it practical for real-world applications.
It is important to emphasize that each market must apply a different watermark pattern when generating its own QR codes to preserve the uniqueness and traceability required for secure authentication. Moreover, the embedded watermark is not extracted explicitly during the verification phase. Instead, the entire QR code image—including the embedded watermark pattern—is processed directly by the classification model. The watermark serves a critical role by introducing subtle, structured perturbations into the visual space of the QR code, which are invisible to the human eye but detectable by the trained neural network.

4.1.2. The Proposed Authentication Method

The generated QR code was verified using the proposed authentication method, which relies on a neural network object detection classifier. This object detection model is capable of identifying the barcode and determining the market to which it belongs. The specifics of this detection process are explained as follows:
  • Object Detection
Object detection is an extension of the classification problem and is defined as a computer vision task that identifies instances of objects belonging to a specific class within images. An object detection model is trained to recognize the presence of these objects in the images.
  • TensorFlow Object Detection
TensorFlow is an open-source platform developed by Google for machine learning. In object detection, TensorFlow generates a bounding box around the detected object when an image is input into the model. This bounding box includes a score that reflects the confidence level of the detection’s accuracy. In our work, we set the threshold for this score to 99%, and only if the confidence score met this threshold could the barcode authentication process proceed. For instance, in [36], a card detection classifier was developed using TensorFlow’s object detection capabilities.

4.1.3. Requirements

There are three main types of system requirements: generating a secure QR code, data training, and QR code scanning and authentication. Python 3.7 was used for all these processes. For generating a secure barcode, we applied the MyQR library (version: 2.3.1) and a unique pattern (i.e., a specific digital watermark embedded within the QR code to uniquely identify the market that generated it). For data training, we set up a Conda virtual environment and utilized the TensorFlow 1.14 library, TensorFlow Object Detection 1.13 API, and the Faster_rcnn_inception_v2 model. We also used a printer, using cameras integrated in iPhone 11 and iPhone 12 smartphones (Apple Inc., Cupertino, CA, USA), and the LabelImg tool (version: 1.8.6) to prepare the dataset. For barcode scanning and authentication, we employed a Conda virtual environment, the OpenCV library, the Dynamsoft Barcode Reader SDK, and the EpocCam HD iPhone application for real-time barcode reading.

4.2. QR Code Dataset Preparation and Generation

The dataset used in our experiments comprises both original and forged QR code images. To simulate real-world conditions and test the system’s resilience, we included a diverse range of image variations, such as the following:
  • Noisy images, by adding Gaussian noise using OpenCV during preprocessing.
  • Blurred images, using random Gaussian blur filters.
  • Rotated images at angles of 90°, 180°, and 270°.
  • Low-resolution scans to mimic quality degradation in printed materials.
To generate realistic printed and scanned QR code samples, the required steps are described as follows:
  • We used HP LaserJet Pro MFP M28w (HP Inc., Palo Alto, CA, USA) and Canon PIXMA TR4540 (Canon Inc., Tokyo, Japan) printers to print the QR codes on standard A4 paper.
  • QR codes were then captured using a Samsung Galaxy S20 (Samsung Electronics Co., Ltd., Suwon, Republic of Korea) smartphone camera (12 MP) and a Logitech C920 HD webcam (Logitech International S.A., Lausanne, Switzerland) under indoor lighting conditions.
  • Scanning distances and angles were varied slightly during image acquisition to mimic different usage environments.
The dataset preparation consisted of several phases, as illustrated in Figure 2. Specifically, we generated three QR classes using Python and the MyQR library: PatternA, PatternB, and Unclassified. The first two QRs were watermarked to represent two different markets, while the third one was left unwatermarked. These QRs were printed, as shown in Figure 3, to simulate a real-life scenario for model training. The first two QRs were then reprinted to create the PatternA_reprinted and PatternB_reprinted classes. This step mimicked a fraud case where a barcode is captured and reprinted for illegal use.
Figure 2. Phases of dataset preparation.
Figure 3. A sample of printed QRs.
The data from the reprinted QRs were prepared by manually cropping them, as shown in Figure 4. Based on this, we created five classes for training the model, as outlined in Table 2.
Figure 4. Process of Cropping the QR Codes.
Table 2. Classes and their samples.
It is important to note that the dataset images for all five classes were varied to include all possible QR scan orientations, with angles of 0°, 90°, 180°, and 270°. The images for each class were divided equally among the different angles. The labeling process for both the printed and reprinted QRs across the five classes was carried out using the LabelImg tool.

4.3. Workspace Configuration

Before starting the model training process, we prepared the environment and downloaded the necessary libraries and dependencies. The process was as follows: first, we installed and activated the Conda virtual environment. Then, we installed Python 3.7, the OpenCV library, and TensorFlow 1.14. The TensorFlow API provides pre-trained models that have been trained on large datasets, and we selected a model for its execution speed and accuracy. Specifically, we chose the Faster_RCNN_Inception_V2 model to build our object detector. Afterward, we downloaded the TensorFlow Object Detection 1.13 API and installed all the required dependencies, including Pillow, lxml, cython, contextlib2, matplotlib, pandas, and pycocotools.
For the hyperparameters and model settings, the details are as follows:
  • Learning rate: 0.001
  • Batch size: 32
  • Optimizer: Adam
  • Number of convolutional layers: 5
  • Activation function: ReLU
  • Confidence threshold for authentication: 99%
  • Epochs: 50
  • Loss function: categorical cross-entropy

4.4. Dataset: Training and Testing

The final dataset consisted of 5000 images, with 1000 images for each class (Class 1, Class 2, Class 3, Class 4, and Class 5). We used 80% of the dataset for training and 20% for testing, as recommended in [37]. Specifically, 800 barcodes from each class were used for training, and 200 for testing, resulting in a total of 4000 training barcodes and 1000 testing barcodes. Using the neural network, the barcode classifier model was trained with approximately four times the amount of loss, which indicates how inaccurate the model’s prediction was for a single example. A perfect prediction results in a loss of zero; otherwise, the loss value is greater. Training on a CPU device took about 66 h, spanning approximately 72,260 steps, until the loss dropped below 0.05, which is the recommended threshold for the Faster_RCNN_Inception_V2 model.

4.5. Classifier–Reader Integration

As mentioned earlier, we used a Dynamsoft SDK reader to complete the system integration process. The system authenticates the QR using the QR classifier model. For instance, to authenticate a scanned QR with an “A” watermark pattern (i.e., PatternA), we set the minimum confidence threshold to 0.99 for PatternA. If a QR met or exceeded this confidence threshold, it was considered valid for barcode reading authentication. This authentication process is represented by the following Python code condition, which the system relies upon to ensure proper authentication, while also preventing QR reprinting.

4.6. Evaluation and Analysis

We evaluated the developed system by conducting two tests: QR classifier model testing and classifier–reader testing.

4.6.1. QR Classifier Model Testing

We used a Python code in conjunction with the EpocCam HD application to ensure the QR classifier model ran in real-time. Figure 5 illustrates a successful model classification across the five classes. The height between the camera and the QR was considered an important factor influencing the QR authentication process. For example, the QR in Figure 6 was captured at a height of 3.5 inches between the iPhone camera and the QR, which was approximately 1 × 1 inch in size and had various scan orientation angles.
Figure 5. Successful five-class classification.
Figure 6. Successful QR reading.

4.6.2. Classifier–Reader Testing

We evaluated the system in this test under similar circumstances, using the same tools as in the QR classifier model test, but with an additional Python code to fulfill the requirements for this stage. Figure 6 shows the successful reading of a QR code with PatternA (as determined earlier), while Figure 7 demonstrates the successful rejection of QRs with PatternB and Unclassified. Therefore, the proposed system was able to correctly identify the authorized QR and ignore any unauthorized ones. This approach helps mitigate financial losses and reduces the need for manual checking, allowing sectors (i.e., types of shop owners or commercial categories, e.g., retail, electronics, and groceries, who utilize QR codes for their product labeling and authentication) to trust their systems to protect against the aforementioned attacks using the proposed secure QR.
Figure 7. Successful QR ignoring.

4.7. Evaluation Metrics

To assess the model’s effectiveness, the following metrics were used:
  • Accuracy: Overall correctness of predictions.
  • Precision: Correctly predicted tampered codes over all predicted tampered codes.
  • Recall (Sensitivity): Correctly predicted tampered codes over all actual tampered codes.
  • F1-Score: Harmonic mean of precision and recall.
  • Confusion Matrix: For a detailed breakdown of true/false positives and negatives.
These metrics ensure a comprehensive evaluation of the classifier’s performance under realistic conditions.

4.8. Experimental Validity and Ethical Considerations

The methodology was designed to reflect practical scenarios where QR code misuse is likely (e.g., retail fraud). Since only synthetic data was used and no personal information was processed, no ethical approval was required.

5. Results

The proposed secure QR verification system was evaluated using the dataset of 5000 QR codes described earlier, consisting of both genuine and tampered samples. The model’s performance was assessed using standard classification metrics and is summarized below.

5.1. Classification Performance

The CNN model achieved robust classification results on the test set. Table 3 presents the key performance metrics.
Table 3. Performance of QR code classification model.
These results indicate that the model is highly effective at distinguishing between authentic and tampered QR codes, with strong precision and recall values that highlight both its reliability and sensitivity.

5.2. Confusion Matrix

To gain more insight into the model’s predictive behavior, a confusion matrix was generated, as shown in Table 4.
Table 4. Confusion matrix for test set predictions.
The confusion matrix confirms the model’s low false-positive and false-negative rates, further validating its robustness under realistic tampering scenarios.

5.3. ROC Curve and AUC

Figure 8 shows the Receiver Operating Characteristic (ROC) curve. The Area Under the Curve (AUC) was calculated at 0.991, reflecting excellent discrimination between genuine and tampered QR codes. The curve shows a steep ascent toward the top-left corner, indicating high sensitivity and specificity.
Figure 8. Receiver Operating Characteristic (ROC) curve.

5.4. Robustness to Real-World Distortions

To assess the model’s reliability in practical use cases, additional testing was performed on QR codes captured under varying lighting conditions, angles, and resolutions. Table 5 summarizes the model’s performance across these challenging environments.
Table 5. Model accuracy under varying image conditions.
The results demonstrate that the model maintains high accuracy across a range of realistic distortions, making it suitable for real-time deployment using smartphone cameras or retail scanners.

5.5. Processing Speed

To validate the system’s suitability for real-time applications, we evaluated its average inference time. The model processed each QR image in 24 milliseconds, enabling 40+ verifications per second on standard hardware (Intel i7 CPU, GTX 1660 GPU). This affirms the method’s practicality for integration into point-of-sale and mobile applications.

6. Discussion

This section analyzes the experimental findings, compares the proposed approach with the existing work, and reflects on the current limitations and potential avenues for future research in secure QR code authentication systems.

6.1. Interpretation of Results

The experimental evaluation revealed the high effectiveness of the proposed system in detecting tampered QR codes, with a classification accuracy of 97.2% and an AUC of 0.991. These results confirm the model’s robustness in real-world conditions, including low lighting, skewed angles, and resolution loss.
Interestingly, the model trained exclusively on real-life QR images outperformed the model trained on a mix of synthetic and captured codes. This highlights the importance of training with representative real-world data for deployment-oriented systems. Moreover, augmenting the dataset with multiple orientations (0°, 90°, 180°, and 270°) significantly improved the detection accuracy, confirming the relevance of orientation-aware training.
We also observed that using watermarked patterns with visually distinct designs improved classification precision but slightly reduced authentication security. This highlights a practical trade-off: more visually similar patterns enhance authentication robustness but make class separation more difficult for the model. Future efforts will explore methods to dynamically balance this trade-off.
Finally, incorporating reprinted QR codes—representing fraudulent duplicates—proved beneficial in training the model to recognize unauthorized reissues. This demonstrates the model’s capability not only to authenticate legitimate codes but also to detect suspicious duplications or tampering.
Notably, the inclusion of reprinted classes, which acted as fraudulent QRs, enhanced the security level of the proposed system. As a result, when the model classifies a QR as belonging to a specific market, it ensures that the QR was originally printed by that market and has not been reprinted or tampered with by any external party.

6.2. Comparison with the Existing Literature

Most prior studies on QR security have focused on detecting malicious links using standard URL classification datasets, e.g., [38,39,40,41,42,43]. Unlike those approaches, our work introduces a watermarking-based tamper-proof mechanism embedded directly in the QR visual pattern and leverages a neural network to authenticate it without needing external fingerprint databases or cloud-based lookup.
Compared to systems using blockchain [19,22] or mathematical secure algorithms [29], our framework offers a lightweight, localized solution that eliminates the dependency on third-party infrastructure. Furthermore, unlike [36], our model is designed to function under constrained computing environments with near real-time processing speeds. Table 6 presents a comparative analysis of our model against existing studies.
Table 6. Comparative analysis with related previous studies.

6.3. Limitations and Challenges

Although we successfully integrated the QR classifier model with a commercial Dynamsoft SDK reader, which is capable of decoding information, we encountered issues with the reading process not being as fast as anticipated. Challenges also arose when attempting to read the QRs intermittently. Additionally, several QR reader libraries struggled to decode the proposed secure QRs due to the detailed watermark patterns embedded within them. Nonetheless, the primary aim of our work was to enhance the security of QRs and make them more resistant to fraud.
Moreover, there was a challenge in adopting the chosen patterns due to the inverse relationship between similar and dissimilar appearances, which impacted the balance between security and classification precision. Additionally, it proved difficult to find a reader capable of decoding the information on the proposed secure barcode, as several QR reader libraries were unable to process it. To mitigate this, we used the commercial Dynamsoft SDK reader, although its performance was not as fast as anticipated, and issues arose when reading QRs intermittently.
Furthermore, it would be valuable to investigate the impact of QR code orientation on detection accuracy and classification performance, as well as to develop orientation-invariant features or preprocessing techniques to enhance system robustness. In addition, it would be beneficial to assess the system’s ability to handle real-world scenarios in which QR codes are scanned from various angles.
We believe these future efforts will provide valuable insights and ensure the system’s applicability in diverse environments.
These limitations and challenges are summarized as follows:
  • Reading performance: Integration with a commercial reader (Dynamsoft SDK) was successful, but read speeds were slower than expected, especially under variable scanning angles or lighting.
  • Reader compatibility: Several standard QR libraries failed to decode our secure QR codes due to the watermarking patterns embedded in the structure, requiring reliance on commercial SDKs.
  • Pattern design trade-off: Achieving optimal security often required visually similar patterns, which occasionally impacted model precision. Designing patterns that balance robustness and class separability remains a challenge.
  • Orientation variance: Though our multi-angle training improved the accuracy, further enhancements are needed for dynamic orientation-invariant QR decoding in real-time scenarios.

6.4. Future Research Directions

Based on the findings and challenges, we identify several directions for future work, which are as follows:
  • Improve the decoding speed of secure QR codes and reduce latency in reader integration.
  • Design or adapt an open-source QR reader tailored to handle watermark-embedded secure QR codes.
  • Expand the dataset to include more diverse QR designs and simulate complex tampering attacks for deeper resilience testing.
  • Compare the proposed system with additional state-of-the-art models using large-scale public QR datasets.
  • Investigate more advanced neural network architectures, such as transformers or hybrid CNN-RNN models, for more scalable and orientation-invariant classification.

7. Conclusions

This study proposed a secure and efficient QR code authentication framework that combines visual watermarking with convolutional neural networks (CNNs) to verify the authenticity of printed QR codes and detect tampering—without relying on cloud-based databases or stored QR fingerprints. The system achieved a high classification accuracy of 97.2% and demonstrated strong performance under various real-world scanning conditions. By training on real-life data and incorporating orientation-aware images, the model proved robust against common distortions encountered during retail or mobile scanning. The use of embedded watermark patterns enabled localized, market-specific verification, adding a critical layer of protection against counterfeit duplication. The integration of AI in the form of a CNN classifier represents a significant advancement in QR code authentication. It enables the system to learn complex visual patterns and make accurate authentication decisions locally, offering a scalable and intelligent solution that addresses modern security challenges. Overall, this work advances the development of intelligent, tamper-resistant QR authentication systems and lays the foundation for secure deployment in privacy-sensitive, high-security smart environments.
Unlike traditional approaches, the proposed method supports fast, offline authentication suitable for resource-constrained environments, such as point-of-sale systems and smart retail settings. The integration of neural networks ensures real-time processing, enhancing both practicality and scalability. Despite these promising results, some challenges remain—particularly in optimizing reader compatibility, improving decoding speed, and managing the trade-off between watermark similarity and classification accuracy. Future research will address these issues by expanding the dataset, refining the watermark design, and exploring more advanced machine learning models.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author, Suliman A. Alsuhibany, upon reasonable request.

Acknowledgments

The Researcher would like to thank the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support (QU-APC-2025). Also, we would like to thank Ghadah S. Alhumud and Shahalel A. Almudaifer for their valuable contributions.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Tiwari, S. An Introduction to QR Code Technology. In Proceedings of the 2016 International Conference on Information Technology (ICIT), Bhubaneswar, India, 22–24 December 2016; pp. 39–44. [Google Scholar] [CrossRef]
  2. Wahsheh, H.A.M.; Luccio, F.L. Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions. Information 2020, 11, 217. [Google Scholar] [CrossRef]
  3. Yun, I.; Kim, J. Vision-based 1d barcode localization method for scale and rotation invariant. In Proceedings of the TENCON 2017—2017 IEEE Region 10 Conference, Penang, Malaysia, 5–8 November 2017; pp. 2204–2208. [Google Scholar]
  4. Gao, J.Z.; Prakash, L.; Jagatesan, R. Understanding 2d-BarCode technology and applications in m-commerce-design and implementation of a 2d barcode processing solution. In Proceedings of the Annual International Computer Software and Applications Conference COMP-SAC, Beijing, China, 20 August 2007. [Google Scholar]
  5. SMegha, M.; Chethana, C. Study of 3d barcode with steganography for data hiding. Int. Res. J. Eng. Technol. 2018, 5, 250–254. [Google Scholar]
  6. Exploring Barcodes—1d, 2d and 3d Barcodes. Available online: http://www.commercialqrcodegenerator.com/exploringbarcodes.html (accessed on 20 April 2025).
  7. Preethi Harris, M.R.P.N.; Kousika, M. A novel approach for automatic toll collection and recharge. Eng. Sci. Invent. Res. Dev. 2016, 2, 2349–6185. [Google Scholar]
  8. Palmer, R. The Bar Code Book: A Complete Guide to Bar Code Technology., 5th ed.; Helmers Publishing: Peterborough, NH, USA, 2001. [Google Scholar]
  9. Bobbit, R.; Connell, J.; Haas, N.; Otto, C.; Pankanti, S.; Payne, J. Visual item verification for fraud prevention in retail self-checkout. In Proceedings of the 2011 IEEE Workshop on Applications of Computer Vision (WACV), Kona, HI, USA, 5–7 February 2011; pp. 585–590. [Google Scholar]
  10. Migdal, J.; Kundu, M. Fraudulent Activity Detection at a Barcode Scanner by Verifying Visual Signatures. U.S. Patent US20190197560A1, 9 April 2019. Available online: https://patents.google.com/patent/US20190197560A1/en (accessed on 30 September 2024).
  11. Connell, I.J.H.; Flickner, M.D.; Haas, N.; Hampapur, A.; Pankanti, S.U.; Park, U. Deterring Checkout Fraud. U.S. Patent US20090272801A1, 5 November 2009. Available online: https://patents.google.com/patent/US20090272801A1/en (accessed on 20 April 2025).
  12. McCloskey, S. Barcode Verification. U.S. Patent US8336761B1, 25 December 2012. Available online: https://patents.google.com/patent/US8336761B1/en (accessed on 20 April 2025).
  13. Goncalves, L.; Beghtol, J.; Gremmer, I.; Ostrowski, J. System and Method for Preventing Cashier and Customer Fraud at Retail Checkout. U.S. Patent US8448859B2, 28 May 2013. Available online: https://patents.google.com/patent/US8448859B2/en (accessed on 20 April 2025).
  14. Goncalves, L. Upc Substitution Fraud Prevention. U.S. Patent US8068674B2, 29 November 2011. Available online: https://patents.google.com/patent/US8068674B2/en (accessed on 20 April 2025).
  15. Kwan, S.P.; Li, J. Item Substitution Fraud Detection. U.S. Patent US20160292661A1, 6 October 2016. Available online: https://patents.google.com/patent/US20160292661A1/en (accessed on 20 April 2025).
  16. Ueno, R.; Mitsugi, J. Barcode fingerprinting: Unique identification of commercial products with their JAN/EAN/UCC barcode. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018; pp. 416–420. [Google Scholar]
  17. QR Code Trends & Statistics Report 2024. Available online: https://www.uniqode.com/blog/qr-code-insights/qr-code-trends-report (accessed on 20 April 2025).
  18. Carboni, F.; Conti, M.; Donadel, D.; Sciacco, M. If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps. In International Conference on Applied Cryptography and Network Security; International Conference on Applied Cryptography and Network Security; Springer Nature: Cham, Switzerland, 2023; pp. 553–570. [Google Scholar]
  19. Lourenco, D.O.D.R.; Sriraj, M.S.; Thambi, K.K.; Ranjan, V. Malicious URLs and QR Code Classification Using Machine Learning and Deep Learning Techniques. In Proceedings of the 2023 3rd Asian Conference on Innovation in Technology (ASIANCON), Pune, India, 25–27 August 2023; pp. 1–10. [Google Scholar]
  20. Object Detection|Tensorflow Lite. Available online: https://ai.google.dev/edge/litert/libraries/modify/object_detection (accessed on 20 April 2025).
  21. Github-Edjeelectronics/Tensorflow-Object-Detection-Api-Tutorial-Train-Multiple-Objects-Windows-10: How to Train a Tensorflow Object Detection Classifier for Multiple Object Detection on Windows. Available online: https://github.com/EdjeElectronics/TensorFlow-Object-Detection-API-Tutorial-Train-Multiple-Objects-Windows-10 (accessed on 20 April 2025).
  22. Almousa, H.; Almarzoqi, A.; Alassaf, A.; Alrasheed, G.; A Alsuhibany, S. QR Shield: A Dual Machine Learning Approach Towards Securing QR Codes. Int. J. Comput. Digit. Syst. 2024, 16, 887–898. [Google Scholar] [CrossRef] [PubMed]
  23. Nurse, J.R. Cybercrime and you: How criminals attack and the human factors that they seek to exploit. arXiv 2019, arXiv:1811.06624. [Google Scholar]
  24. Krombholz, K.; Frühwirt, P.; Rieder, T.; Kapsalis, I.; Ullrich, J.; Weippl, E. QR Code Security—How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. In Proceedings of the 2015 10th International Conference on Availability, Reliability and Security, Toulouse, France, 24–27 August 2015; pp. 230–237. [Google Scholar]
  25. Ji, Q. Exploring the Concept of QR Code and the Benefits of Using QR Code for Companies. Bachelor’s Thesis, Lapland University of Applied Sciences, Rovaniemi, Finland, 2014. [Google Scholar]
  26. Loc, C.V.; De, T.C.; Burie, J.C.; Ogier, J.M. An Approach for Tamper-Proof QR Code Using Deep Learning Based-Data Hiding. In Proceedings of the 15th Asian Conference, ACIIDS 2023, Phuket, Thailand, 24–26 July 2023; Springer Nature: Cham, Switzerland, 2023; pp. 129–141. [Google Scholar]
  27. Sriman, B.; Kumar, N.; Prabhaharan, K.S.; Ramanathan, R.; Nithyakumar, N. Fake Product Detection Using Blockchain Technology. In Proceedings of the 2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE), Bangalore, India, 21–23 December 2022; pp. 1–4. [Google Scholar]
  28. Shetty, S.; ParthaSai, K.; Hemanth, D.; Kurian, T.; Dsouza, S.M. Mitigating the Proliferation of Counterfeits using Blockchain Technology. In Proceedings of the 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kamand, India, 24–28 June 2024; pp. 1–6. [Google Scholar]
  29. Zihan, D.; Islam, M.R. Deep Learning Approaches for Robust QR Code Extraction and Verification in Music Applications. J. Platf. Technol. 2024, 12, 23–32. [Google Scholar]
  30. Shankar, B.P.; Rajkumar, N.; Viji, C.; Kumar, K.D.; Saravanakumar, S.; Mohanraj, A. Approach to Identifying Counterfeit Products with QR Codes and Computational Algorithms. In Proceedings of the 2024 5th International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 18–20 September 2024; pp. 1203–1209. [Google Scholar]
  31. iBarcoder. Available online: https://ibarcoder.com (accessed on 20 April 2025).
  32. EasyBarc70. Easy Barcode Creator for Mac and Windows-Barcode for Mac & PC. Available online: https://www.easybarcodetech.com/ebc.html (accessed on 20 April 2025).
  33. FreeOnli96. Free Online Barcode Generator: Create Barcodes for Free! Available online: https://barcode.tec-it.com/en (accessed on 20 April 2025).
  34. Barcodes33. Barcode Scams and Fraud–Don’t Try This at Home!|SA Bar Codes. Available online: https://www.sabarcodes.co.za/2013/01/25/barcode-scams-and-fraud-dont-try-this-at-home (accessed on 20 April 2025).
  35. Chan, C.K.; Cheng, L.M. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004, 37, 469–474. [Google Scholar] [CrossRef]
  36. Agarwal, S.; Terrail, J.O.D.; Jurie, F. Recent advances in object detection in the age of deep convolutional neural networks. arXiv 2019, arXiv:1809.03193. [Google Scholar]
  37. Rahali, A.; Akhloufi, M.A. Malbert: Malware detection using bidirectional encoder representations from transformers. In Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Melbourne, Australia, 17–20 October 2021; pp. 3226–3231. [Google Scholar]
  38. Su, M.-Y.; Su, K.-L. BERT-Based Approaches to Identifying Malicious URLs. Sensors 2023, 23, 8499. [Google Scholar] [CrossRef] [PubMed]
  39. Github-Tensorflow/Tensorflow: An Open Source Machine Learning Framework for Everyone. Available online: https://github.com/tensorflow/tensorflow (accessed on 20 April 2025).
  40. Descending into ml: Training and Loss|Machine Learning Crash Course. Available online: https://developers.google.com/machine-learning/crash-course/descending-into-ml/training-and-loss (accessed on 20 April 2025).
  41. Xu, P. A Transformer-Based Model to Detect Phishing URLs. arXiv 2021, arXiv:2109.02138. [Google Scholar]
  42. Alqahtani, A.; Whyte, A. Estimation of life-cycle costs of buildings: Regression vs artificial neural network. Built Environ. Proj. Asset Manag. 2016, 6, 30–43. [Google Scholar] [CrossRef]
  43. Real-Time Product Authentication|Unisecure–Systech. Available online: https://www.systechone.com/product/real-time-product-authentication-unisecure (accessed on 20 April 2025).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.