Hubbry Logo
QR codeQR codeMain
Open search
QR code
Community hub
QR code
logo
8 pages, 0 posts
0 subscribers
Be the first to start a discussion here.
Be the first to start a discussion here.
QR code
QR code
from Wikipedia

A QR code for the URL of the English Wikipedia Mobile main page
A QR code for the URL of the English Wikipedia Mobile main page

A QR code, short for quick-response code,[1] is a type of two-dimensional matrix barcode invented in 1994 by Masahiro Hara of the Japanese company Denso Wave for labelling automobile parts.[2][3] It features black squares on a white background with fiducial markers, readable by imaging devices like cameras, and processed using Reed–Solomon error correction until the image can be appropriately interpreted. The required data is then extracted from patterns that are present in both the horizontal and the vertical components of the QR image.[4]

Whereas a barcode is a machine-readable optical image that contains information specific to the labeled item, the QR code contains the data for a locator, an identifier, and web tracking. To store data efficiently, QR codes use four standardized modes of encoding: numeric, alphanumeric, byte or binary, and kanji.[5] Compared to standard UPC barcodes, the QR labeling system was applied beyond the automobile industry because of faster reading of the optical image and greater data-storage capacity in applications such as product tracking, item identification, time tracking, document management, and general marketing.[4]

History

[edit]
Demo of printing a QR code

The QR code system was invented in 1994, at the Denso Wave automotive products company in Japan.[6][7][8] The initial alternating-square design presented by the team of researchers, headed by Masahiro Hara, was influenced by the black counters and the white counters played on a Go board;[9] the pattern of the position detection markers was determined by finding the least-used sequence of alternating black-white areas on printed matter, which was found to be (1:1:3:1:1).[10][6] The functional purpose of the QR code system was to facilitate keeping track of the types and numbers of automobile parts, by replacing individually-scanned bar-code labels on each box of auto parts with a single label that contained the data of each label. The quadrangular configuration of the QR code system consolidated the data of the various bar-code labels with kanji, kana, and alphanumeric codes printed onto a single label.[11][10][6]

Adoption

[edit]
A QR code being painted on the side of a building
QR codes can be displayed on buildings, such as this one being painted in Cape Town.

During June 2011, 14 million American mobile users scanned a QR code or a barcode. Some 58% of those users scanned a QR or barcode from their homes, while 39% scanned from retail stores; 53% of the 14 million users were men between the ages of 18 and 34.[12]

In 2022, 89 million people in the United States scanned a QR code using their mobile devices, up by 26 percent compared to 2020. The majority of QR code users used them to make payments or to access product and menu information.[13]

In September 2020, a survey found that 18.8 percent of consumers in the United States and the United Kingdom strongly agreed that they had noticed an increase in QR code use since the then-active COVID-19-related restrictions had begun several months prior.[14]

As of 2024, QR codes are used in a much broader context, including both commercial tracking applications and convenience-oriented applications aimed at mobile phone users (termed mobile tagging). QR codes may be used to display text to the user, to open a webpage on the user's device, to add a vCard contact to the user's device, to open a Uniform Resource Identifier (URI), to connect to a wireless network, or to compose an email or text message. There are a great many QR code generators available as software or as online tools that are either free or require a paid subscription.[15] The QR code has become one of the most-used types of two-dimensional code.[16]

Standards

[edit]
Structure of a QR code (version 7), highlighting functional elements

Several standards cover the encoding of data as QR codes:[17]

  • October 1997 – AIM (Association for Automatic Identification and Mobility) International[18]
  • January 1999 – JIS X 0510
  • June 2000 – ISO/IEC 18004:2000 Information technology – Automatic identification and data capture techniques – Bar code symbology – QR code (now withdrawn)
    Defines QR code models 1 and 2 symbols.
  • 1 September 2006 – ISO/IEC 18004:2006 Information technology – Automatic identification and data capture techniques – QR Code 2005 bar code symbology specification (now withdrawn)[19]
    Defines QR code 2005 symbols, an extension of QR code model 2. Does not specify how to read QR code model 1 symbols, or require this for compliance.
  • 1 February 2015 – ISO/IEC 18004:2015 Information – Automatic identification and data capture techniques – QR Code barcode symbology specification (now withdrawn)
    Renames the QR Code 2005 symbol to QR Code and adds clarification to some procedures and minor corrections. It was withdrawn and updated to 18004:2024 in August 2024, which optimizes encoding efficiency, improves error correction, and refines structured append functionality.[20]
  • May 2022 – ISO/IEC 23941:2022 Information technology – Automatic identification and data capture techniques – Rectangular Micro QR Code (rMQR) bar code symbology specification[21]
    Defines the requirements for Micro QR Code.
  • August 2024 – ISO/IEC 18004:2024 Information technology — Automatic identification and data capture techniques — QR code bar code symbology specification

At the application layer, there is some variation between most of the implementations. Japan's NTT DoCoMo has established de facto standards for the encoding of URLs, contact information, and several other data types.[22] The open-source "ZXing" project maintains a list of QR code data types.[23]

Uses

[edit]
A QR code printed on the packaging of a cola can, linking directly to the Pepsi website so not requiring the user to manually enter the web address

QR codes have become common in consumer advertising. Typically, a smartphone is used as a QR code scanner, displaying the code and converting it to some useful form (such as a standard URL for a website, thereby obviating the need for a user to type it into a Web browser).

QR codes have become a focus of advertising strategy to provide a way to access a brand's website more quickly than by manually entering a URL.[24][25] Beyond mere convenience to the consumer, the importance of this capability is the belief that it increases the conversion rate: the chance that contact with the advertisement will convert to a sale. It coaxes interested prospects further down the conversion funnel with little delay or effort, bringing the viewer to the advertiser's website immediately, whereas a longer and more targeted sales pitch may lose the viewer's interest.

Although initially used to track parts in vehicle manufacturing, QR codes are used over a much wider range of applications. These include commercial tracking, warehouse stock control, entertainment and transport ticketing, product and loyalty marketing, and in-store product labeling.[citation needed] Examples of marketing include where a company's discounted and percent discount can be captured using a QR code decoder that is a mobile app, or storing a company's information such as address and related information alongside its alpha-numeric text data as can be seen in telephone directory yellow pages.[citation needed]

QR codes may appear in very public places such as this large billboard in Japan; this one links to the sagasou.mobi website

They can also be used to store personal information for organizations. An example of this is the Philippines National Bureau of Investigation (NBI) where NBI clearances now come with a QR code. Many of these applications target mobile-phone users (via mobile tagging). Users may receive text, add a vCard contact to their device, open a URL, or compose an e-mail or text message after scanning QR codes. They can generate and print their own QR codes for others to scan and use by visiting one of several pay or free QR code-generating sites or apps. Google had an API, now deprecated, to generate QR codes,[26] and apps for scanning QR codes can be found on nearly all smartphone devices.[27]

QR codes have been used and printed on train tickets in China since 2010.[28]

QR codes storing addresses and URLs may appear in magazines, on signs, on buses, on business cards, or on almost any object about which users might want information. Users with a camera phone equipped with the correct reader application can scan the image of the QR code to display text and contact information, connect to a wireless network, or open a web page in the phone's browser. This act of linking from physical world objects is termed hardlinking or object hyperlinking. QR codes also may be linked to a location to track where a code has been scanned. Either the application that scans the QR code retrieves the geo information by using GPS and cell tower triangulation (aGPS) or the URL encoded in the QR code itself is associated with a location. In 2008, a Japanese stonemason announced plans to engrave QR codes on gravestones, allowing visitors to view information about the deceased, and family members to keep track of visits.[29] Psychologist Richard Wiseman was one of the first authors to include QR codes in a book, in Paranormality: Why We See What Isn't There (2011).[30] Microsoft Office and LibreOffice have a functionality to insert QR code into documents.[31][32]

QR codes have been incorporated into currency. In June 2011, The Royal Dutch Mint (Koninklijke Nederlandse Munt) issued the world's first official coin with a QR code to celebrate the centenary of its current building and premises. The coin can be scanned by a smartphone and originally linked to a special website with content about the historical event and design of the coin.[33] In 2014, the Central Bank of Nigeria issued a 100-naira banknote to commemorate its centennial, the first banknote to incorporate a QR code in its design. When scanned with an internet-enabled mobile device, the code goes to a website that tells the centenary story of Nigeria.[34]

In 2015, the Central Bank of the Russian Federation issued a 100-rubles note to commemorate the annexation of Crimea by the Russian Federation.[35] It contains a QR code into its design, and when scanned with an internet-enabled mobile device, the code goes to a website that details the historical and technical background of the commemorative note. In 2017, the Bank of Ghana issued a 5-cedis banknote to commemorate 60 years of central banking in Ghana. It contains a QR code in its design which, when scanned with an internet-enabled mobile device, goes to the official Bank of Ghana website.

In September 2016, the Reserve Bank of India (RBI) launched the eponymously named BharatQR, a common QR code jointly developed by all the four major card payment companies – National Payments Corporation of India that runs RuPay cards along with Mastercard, Visa, and American Express. It will also have the capability of accepting payments on the Unified Payments Interface (UPI) platform.[36][37]

Augmented reality

[edit]

QR codes are used in some augmented reality systems to determine the positions of objects in 3-dimensional space.[11]

Mobile operating systems

[edit]

QR codes can be used on various mobile device operating systems. While initially requiring the installation and use of third-party apps, both Android and iOS (since iOS 11[38][39]) devices can now natively scan QR codes, without requiring an external app to be used.[40] The camera app can scan and display the kind of QR code along with the link. These devices support URL redirection, which allows QR codes to send metadata to existing applications on the device.

Virtual stores

[edit]

QR codes have been used to establish "virtual stores", where a gallery of product information and QR codes is presented to the customer, e.g. on a train station wall. The customers scan the QR codes, and the products are delivered to their homes. This use started in South Korea,[41] and Argentina,[42] but is currently expanding globally.[43] Walmart, Procter & Gamble and Woolworths have already adopted the Virtual Store concept.[44]

QR code payment

[edit]

QR codes can be used to store bank account information or credit card information, or they can be specifically designed to work with particular payment provider applications. There are several trial applications of QR code payments across the world.[45][46] In developing countries including China,[47][48] India[49] QR code payment is a very popular and convenient method of making payments. Since Alipay designed a QR code payment method in 2011,[50] mobile payment has been quickly adopted in China. As of 2018, around 83% of all payments were made via mobile payment.[51]

In November 2012, QR code payments were deployed on a larger scale in the Czech Republic when an open format for payment information exchange – a Short Payment Descriptor – was introduced and endorsed by the Czech Banking Association as the official local solution for QR payments.[52][53] In 2013, the European Payment Council provided guidelines for the EPC QR code enabling SCT initiation within the Eurozone.

In 2017, Singapore created a task force including government agencies such as the Monetary Authority of Singapore and Infocomm Media Development Authority to spearhead a system for e-payments using standardized QR code specifications. These specific dimensions are specialized for Singapore.[54]

The e-payment system, Singapore Quick Response Code (SGQR), essentially merges various QR codes into one label that can be used by both parties in the payment system. This allows for various banking apps to facilitate payments between multiple customers and a merchant that displays a single QR code. The SGQR scheme is co-owned by MAS and IMDA.[55] A single SGQR label contains e-payments and combines multiple payment options. People making purchases can scan the code and see which payment options the merchant accepts.[55]

Website login

[edit]

QR codes can be used to log into websites: a QR code is shown on the login page on a computer screen, and when a registered user scans it with a verified smartphone, they will automatically be logged in. Authentication is performed by the smartphone, which contacts the server. Google deployed such a login scheme in 2012.[56]

Mobile ticket

[edit]

There is a system whereby a QR code can be displayed on a device such as a smartphone and used as an admission ticket.[57][58] Its use is common for J1 League and Nippon Professional Baseball tickets in Japan.[59][60] In some cases, rights can be transferred via the Internet. In Latvia, QR codes can be scanned in Riga public transport to validate Rīgas Satiksme e-tickets.[61]

A sign with a QR code that links to a drinks menu

Restaurant ordering

[edit]

Restaurants can present a QR code near the front door or at the table allowing guests to view an online menu, or even redirect them to an online ordering website or app, allowing them to order or possibly pay for their meal without having to use a cashier or waiter. QR codes can also link to daily or weekly specials that are not printed on the standardized menus,[62] and enable the establishment to update the entire menu without needing to print copies. At table-serve restaurants, QR codes enable guests to order and pay for their meals without a waiter involved – the QR code contains the table number so servers know where to bring the food.[63] This application has grown especially since the need for social distancing during the 2020 COVID-19 pandemic prompted reduced contact between service staff and customers.[63]

Joining a Wi‑Fi network

[edit]
A QR code to automatically join a Wi‑Fi network

By specifying the SSID, encryption type, password/passphrase, and if the SSID is hidden or not, mobile device users can quickly scan and join networks without having to manually enter the data.[64] A MeCard-like format is supported by Android and iOS 11+.[65]

  • Common format: WIFI:S:<SSID>;T:<WEP|WPA|nopass>;P:<PASSWORD>;H:<true|false|blank>;;
  • Sample: WIFI:S:MySSID;T:WPA;P:MyPassW0rd;;

Funerary use

[edit]
QR code tile next to the grave of Wing Commander Adrian Warburton at Durnbach War Cemetery in Gmund am Tegernsee, Germany. The code links to his Wikipedia entry.

A QR code can link to an obituary and can be placed on a headstone. In 2008, Ishinokoe in Yamanashi Prefecture, Japan began to sell tombstones with QR codes produced by IT DeSign, where the code leads to a virtual grave site of the deceased.[66][67][68] Other companies, such as Wisconsin-based Interactive Headstones, have also begun implementing QR codes into tombstones.[69] In 2014, the Jewish Cemetery of La Paz in Uruguay began implementing QR codes for tombstones.[70]

Electronic authentication

[edit]

QR codes can be used to generate time-based one-time passwords for electronic authentication.

Loyalty programs

[edit]

QR codes have been used by various retail outlets that have loyalty programs. Sometimes these programs are accessed with an app that is loaded onto a phone and includes a process triggered by a QR code scan. The QR codes for loyalty programs tend to be found printed on the receipt for a purchase or on the products themselves. Users in these schemes collect award points by scanning a code.

Counterfeit detection

[edit]

Serialised QR codes have been used by brands[71] and governments[72] to let consumers, retailers and distributors verify the authenticity of the products and help with detecting counterfeit products, as part of a brand protection program.[73] However, the security level of a regular QR code is limited since QR codes printed on original products are easily reproduced on fake products, even though the analysis of data generated as a result of QR code scanning can be used to detect counterfeiting and illicit activity.[74] A higher security level can be attained by embedding a digital watermark or copy detection pattern into the image of the QR code. This makes the QR code more secure against counterfeiting attempts; products that display a code which is counterfeit, although valid as a QR code, can be detected by scanning the secure QR code with the appropriate app.[75]

The treaty regulating apostilles (documents bearing a seal of authenticity), has been updated to allow the issuance of digital apostilles by countries; a digital apostille is a PDF document with a cryptographic signature containing a QR code for a canonical URL of the original document, allowing users to verify the apostille from a printed version of the document.

Product tracing

[edit]

Different studies have been conducted to assess the effectiveness of QR codes as a means of conveying labelling information and their use as part of a food traceability system. In a field experiment, it was found that when provided free access to a smartphone with a QR code scanning app, 52.6% of participants would use it to access labelling information.[76] A study made in South Korea showed that consumers appreciate QR code used in food traceability system, as they provide detailed information about food, as well as information that helps them in their purchasing decision.[77] If QR codes are serialised, consumers can access a web page showing the supply chain for each ingredient, as well as information specific to each related batch, including meat processors and manufacturers, which helps address the concerns they have about the origin of their food.[78]

COVID-19 pandemic

[edit]
Two QR codes that link to German contact tracing app check-ins during the COVID-19 pandemic

After the COVID-19 pandemic began spreading, QR codes began to be used as a "touchless" system to display information, show menus, or provide updated consumer information, especially in the hospitality industry. Restaurants replaced paper or laminated plastic menus with QR code decals on the table, which opened an online version of the menu. This prevented the need to dispose of single-use paper menus, or institute cleaning and sanitizing procedures for permanent menus after each use.[79] Local television stations have also begun to utilize codes on local newscasts to allow viewers quicker access to stories or information involving the pandemic, including testing and immunization scheduling websites, or for links within stories mentioned in the newscasts overall.

In Australia, patrons were required to scan QR codes at shops, clubs, supermarkets, and other service and retail establishments on entry to assist contact tracing. Singapore, Taiwan, the United Kingdom, and New Zealand used similar systems.[80]

QR codes are also present on COVID-19 vaccination certificates in places such as Canada and the EU (EU Digital COVID certificate), where they can be scanned to verify the information on the certificate.[81]

Design

[edit]

Unlike the older, one-dimensional barcodes that were designed to be mechanically scanned by a narrow beam of light, a QR code is detected by a two-dimensional digital image sensor and then digitally analyzed by a programmed processor. The processor locates the three finder patterns, each consisting of three superimposed concentric squares of differing contrast at the upper left, upper right and lower left corners of the QR code image,[82] using a smaller square (or multiple squares) near the fourth corner to normalize the image for size, orientation, and angle of viewing. The small dots throughout the QR code are then converted to binary numbers and validated with an error-correcting algorithm.

Information capacity

[edit]

The amount of data that can be represented by a QR code symbol depends on the data type (mode, or input character set), version (1, ..., 40, indicating the overall dimensions of the symbol, i.e. 4 × version number + 17 dots on each side), and error correction level. The maximum storage capacities occur for version 40 and error correction level L (low), denoted by 40-L:[16][83]

Maximum character storage capacity (40-L)
Character refers to individual values of the input mode (data type).
Input mode Max. characters Bits/char. Possible characters, default encoding
Numeric only 7,089 313 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Alphanumeric 4,296 512 0–9, A–Z (upper-case only), space, $, %, *, +, -, ., /, :
Binary/byte 2,953 8 ISO/IEC 8859-1
Kanji/kana 1,817 13 Shift JIS X 0208

Here are some samples of QR codes:

Error correction

[edit]
Damaged but still decodable QR code, link to http://en.m.wikipedia.org
Example of a QR code with artistic embellishment that will still scan correctly thanks to error correction. When scanned, the code directs users to the artist's personal website.

QR codes use Reed–Solomon error correction over the finite field or GF(28), the elements of which are encoded as bytes of 8 bits; the byte with a standard numerical value encodes the field element where is taken to be a primitive element satisfying . The primitive polynomial is , corresponding to the polynomial number 285, with initial root = 0 to obtain generator polynomials.

The Reed–Solomon code uses one of 37 different polynomials over , with degrees ranging from 7 to 68, depending on how many error correction bytes the code adds. It is implied by the form of Reed–Solomon used (systematic BCH view) that these polynomials are all on the form . However, the rules for selecting the degree are specific to the QR standard.

For example, the generator polynomial used for the Version 1 QR code (21×21), when 7 error correction bytes are used, is: .

This is obtained by multiplying the first seven terms: .

The same may also be expressed using decimal coefficients (over ), as: .

The highest power of in the polynomial (the degree , of the polynomial) determines the number of error correction bytes. In this case, the degree is 7.

When discussing the Reed–Solomon code phase there is some risk for confusion, in that the QR ISO/IEC standard uses the term codeword for the elements of , which with respect to the Reed–Solomon code are symbols, whereas it uses the term block for what with respect to the Reed–Solomon code are the codewords. The number of data versus error correction bytes within each block depends on (i) the version (side length) of the QR symbol and (ii) the error correction level, of which there are four. The higher the error correction level, the less the storage capacity. The following table lists the approximate error correction capability at each of the four levels:

Level L (Low) 7% of data bytes can be restored.
Level M (Medium) 15% of data bytes can be restored.
Level Q (Quartile)[84] 25% of data bytes can be restored.
Level H (High) 30% of data bytes can be restored.

In larger QR symbols, the message is broken up into several Reed–Solomon code blocks. The block size is chosen so that no attempt is made at correcting more than 15 errors per block; this limits the complexity of the decoding algorithm. The code blocks are then interleaved together, making it less likely that localized damage to a QR symbol will overwhelm the capacity of any single block.

The Version 1 QR symbol with level L error correction, for example, consists of a single error correction block with a total of 26 code bytes (made of 19 message bytes and seven error correction bytes). It can correct up to 2 byte errors. Hence, this code is known as a (26,19,2) error correction code over GF(28) . It is also sometimes represented in short, as a (26,19) code.

Due to error correction, it is possible to create artistic QR codes with embellishments to make them more readable or attractive to the human eye, and to incorporate colors, logos, and other features into the QR code block; the embellishments are treated as errors, but the codes still scan correctly.[85][86]

It is also possible to design artistic QR codes without reducing the error correction capacity by manipulating the underlying mathematical constructs.[87][88] Image processing algorithms are also used to reduce errors in QR-code.[89]

Encoding

[edit]

Format information and masking

[edit]

The format information records two things: the error correction level and the mask pattern used for the symbol. Masking is used to break up patterns in the data area that might confuse a scanner, such as large blank areas or misleading features that look like the locator marks. The mask patterns are defined on a grid that is repeated as necessary to cover the whole symbol. Modules corresponding to the dark areas of the mask are inverted. The 5-bit format information is protected from errors with a BCH code, and two complete copies are included in each QR symbol.[4] A (15,5) triple error-correcting BCH code over GF(24) is used, having the generator polynomial . It can correct at most 3 bit-errors out of the 5 data bits. There are a total of 15 bits in this BCH code (10 bits are added for error correction). This 15-bit code is itself X-ORed with a fixed 15-bit mask pattern (101010000010010) to prevent an all-zero string.

Error correction bytes

[edit]

To obtain the error correction (EC) bytes for a message "www.wikipedia.org", the following procedure may be carried out:

The message is 17 bytes long, hence it can be encoded using a (26,19,2) Reed-Solomon code to fit in a Ver1 (21×21) symbol, which has a maximum capacity of 19 bytes (for L level error correction).

The generator polynomial specified for the (26,19,2) code, is: , which may also be written in the form of a matrix of decimal coefficients:

[1 127 122 154 164 11 68 117]

The 17-byte long message "www.wikipedia.org" as hexadecimal coefficients (ASCII values), denoted by M1 through M17 is:

[77 77 77 2E 77 69 6B 69 70 65 64 69 61 2E 6F 72 67]

The encoding mode is "Byte encoding". Hence the 'Enc' field is [0100] (4 bits). The length of the above message is 17 bytes hence 'Len' field is [00010001] (8 bits). The 'End' field is End of message marker [0000] (4 bits).

The message code word (without EC bytes) is of the form:

['Enc' 'Len' w w w . w i k i p e d i a . o r g 'End']

Substituting the hexadecimal values, it can be expressed as:

[4 11 77 77 77 2E 77 69 6B 69 70 65 64 69 61 2E 6F 72 67 0]

This is rearranged as 19-byte blocks of 8 bits each:

[41 17 77 77 72 E7 76 96 B6 97 06 56 46 96 12 E6 F7 26 70]

Using the procedure for Reed-Solomon systematic encoding, the 7 EC bytes obtained (E1 through E7, as shown in the symbol) which are the coefficients (in decimal) of the remainder after polynomial division are:

[174 173 239 6 151 143 37]

or in hexadecimal values:

[AE AD EF 06 97 8F 25]

These 7 EC bytes are then appended to the 19-byte message. The resulting coded message has 26 bytes (in hexadecimal):

[41 17 77 77 72 E7 76 96 B6 97 06 56 46 96 12 E6 F7 26 70 AE AD EF 06 97 8F 25]

Note: The bit values shown in the Ver1 QR symbol below do not match with the above values, as the symbol has been masked using a mask pattern (001).

Message placement

[edit]

The message dataset is placed from right to left in a zigzag pattern, as shown below. In larger symbols, this is complicated by the presence of the alignment patterns and the use of multiple interleaved error-correction blocks.

The general structure of a QR encoding is as a sequence of 4 bit indicators with payload length dependent on the indicator mode (e.g. byte encoding payload length is dependent on the first byte).[90]

Mode indicator Description Typical structure '[ type : sizes in bits ]'
1 = 0b0001 Numeric [0001 : 4] [ Character Count Indicator : variable ] [ Data Bit Stream : 313 × charcount ]
2 = 0b0010 Alphanumeric [0010 : 4] [ Character Count Indicator : variable ] [ Data Bit Stream : 512 × charcount ]
4 = 0b0100 Byte encoding [0100 : 4] [ Character Count Indicator : variable ] [ Data Bit Stream : 8 × charcount ]
8 = 0b1000 Kanji encoding [1000 : 4] [ Character Count Indicator : variable ] [ Data Bit Stream : 13 × charcount ]
3 = 0b0011 Structured append [0011 : 4] [ Symbol Position : 4 ] [ Total Symbols: 4 ] [ Parity : 8 ]
7 = 0b0111 ECI [0111 : 4] [ ECI Assignment number : variable ]
5 = 0b0101 FNC1 in first position [0101 : 4] [ Numeric/Alphanumeric/Byte/Kanji payload : variable ]
9 = 0b1001 FNC1 in second position [1001 : 4] [ Application Indicator : 8 ] [ Numeric/Alphanumeric/Byte/Kanji payload : variable ]
0 = 0b0000 End of message [0000 : 4]
Note:
  • Character Count Indicator depends on how many modules are in a QR code (Symbol Version).
  • ECI Assignment number Size:
    • 8 × 1 bits if ECI Assignment Bitstream starts with '0'
    • 8 × 2 bits if ECI Assignment Bitstream starts with '10'
    • 8 × 3 bits if ECI Assignment Bitstream starts with '110'

Four-bit indicators are used to select the encoding mode and convey other information.

Encoding modes
Indicator Meaning
0001 Numeric encoding (10 bits per 3 digits)
0010 Alphanumeric encoding (11 bits per 2 characters)
0100 Byte encoding (8 bits per character)
1000 Kanji encoding (13 bits per character)
0011 Structured append (used to split a message across multiple QR symbols)
0111 Extended Channel Interpretation (select alternate character set or encoding)
0101 FNC1 in first position (see Code 128 for more information)
1001 FNC1 in second position
0000 End of message (Terminator)

Encoding modes can be mixed as needed within a QR symbol. (e.g., a url with a long string of alphanumeric characters )

[ Mode Indicator][ Mode bitstream ] --> [ Mode Indicator][ Mode bitstream ] --> etc... --> [ 0000 End of message (Terminator) ]

After every indicator that selects an encoding mode is a length field that tells how many characters are encoded in that mode. The number of bits in the length field depends on the encoding and the symbol version.

Number of bits in a length field (Character Count Indicator)
Encoding Ver. 1–9 10–26 27–40
Numeric 10 12 14
Alphanumeric 9 11 13
Byte 8 16 16
Kanji 8 10 12

Alphanumeric encoding mode stores a message more compactly than the byte mode can, but cannot store lower-case letters and has only a limited selection of punctuation marks, which are sufficient for rudimentary web addresses. Two characters are coded in an 11-bit value by this formula:

V = 45 × C1 + C2

This has the exception that the last character in an alphanumeric string with an odd length is read as a 6-bit value instead.

Alphanumeric character codes
Code Character Code Character Code Character Code Character Code Character
00 0 09 9 18 I 27 R 36 Space
01 1 10 A 19 J 28 S 37 $
02 2 11 B 20 K 29 T 38 %
03 3 12 C 21 L 30 U 39 *
04 4 13 D 22 M 31 V 40 +
05 5 14 E 23 N 32 W 41 -
06 6 15 F 24 O 33 X 42 .
07 7 16 G 25 P 34 Y 43 /
08 8 17 H 26 Q 35 Z 44 :

Decoding example

[edit]

The following images offer more information about the QR code.

Variants

[edit]

Model 1

[edit]

Model 1 QR code is an older version of the specification. It is visually similar to the widely seen model 2 codes, but lacks alignment patterns. Differences are in the bottom right corner, and in the midsections of the bottom and right edges are additional functional regions.

Micro QR code

[edit]

Micro QR code is a smaller version of the QR code standard for applications where symbol size is limited. There are four different versions (sizes) of Micro QR codes: the smallest is 11×11 modules; the largest can hold 35 numeric characters,[91] or 21 ASCII alphanumeric characters, or 15 bytes (120 bits).

Rectangular Micro QR Code

[edit]

Rectangular Micro QR Code (also known as rMQR Code) is a two-dimensional (2D) matrix barcode invented and standardized in 2022 by Denso Wave as ISO/IEC 23941. rMQR Code is designed as a rectangular variation of the QR code and has the same parameters and applications as original QR codes; however, rMQR Code is more suitable for rectangular areas, and has a difference between width and height up to 19 in the R7x139 version.

iQR code

[edit]

iQR code is an alternative to existing square QR codes developed by Denso Wave. iQR codes can be created in square or rectangular formations; this is intended for situations where a longer and narrower rectangular shape is more suitable, such as on cylindrical objects. iQR codes can fit the same amount of information in 30% less space. There are 61 versions of square iQR codes, and 15 versions of rectangular codes. For squares, the minimum size is 9 × 9 modules; rectangles have a minimum of 19 × 5 modules. iQR codes add error correction level S, which allows for 50% error correction.[92] iQR Codes had not been given an ISO/IEC specification as of 2015, and only proprietary Denso Wave products could create or read iQR codes.[93]

Secure QR code

[edit]

Secure Quick Response Code (SQRC) is a QR code that contains a "private data" segment after the terminator instead of the specified filler bytes "ec 11".[94] This private data segment must be deciphered with an encryption key. This can be used to store private information and to manage a company's internal information.[95]

Frame QR

[edit]

Frame QR is a variant of the QR code standard which arranges the code in a frame around a central empty area. It is intended to be used in applications where an image, artwork, or branding is desired to be part of the code. It is a completely separate variant and is unrelated to the use of the standard QR code's error correction to insert artwork. As a variant, some QR code readers are unable to read Frame QR.[96]

HCC2D

[edit]

Researchers have proposed a new High Capacity Colored 2-Dimensional (HCC2D) Code, which builds upon a QR code basis for preserving the QR robustness to distortions and uses colors for increasing data density (as of 2014 it is still in the prototyping phase). The HCC2D code specification is described in details in Querini et al. (2011),[97] while techniques for color classification of HCC2D code cells are described in detail in Querini and Italiano (2014),[98] which is an extended version of Querini and Italiano (2013).[99]

Introducing colors into QR codes requires addressing additional issues. In particular, during QR code reading only the brightness information is taken into account, while HCC2D codes have to cope with chromatic distortions during the decoding phase. In order to ensure adaptation to chromatic distortions that arise in each scanned code, HCC2D codes make use of an additional field: the Color Palette Pattern. This is because color cells of a Color Palette Pattern are supposed to be distorted in the same way as color cells of the Encoding Region. Replicated color palettes are used for training machine-learning classifiers.

Accessible QR (AQR)

[edit]

Accessible QR (AQR) is a type of QR code that combines a standard QR code with a dot-dash pattern positioned around one corner of the code to provide product information for people who are blind and partially sighted. The codes, announce product categories and product details such as instructions, ingredients, safety warnings, and recycling information. The data is structured for the needs of users who are blind or partially sighted and offers larger text or audio output. It can read QR codes from a metre away, activating the smartphone's accessibility features like VoiceOver to announce product details.

tQR

[edit]

tQR (also known as tQR code) is a QR code specially designed for rail transport to distinguish between the different opening and closing positions of platform screen doors, which vary depending on rolling stock.[100] The initial "t" stands for "toughness" and "train".[101] It has an outer frame, and its main feature is that it can be restored even if up to 50% of data bytes is missing.[100] It was jointly developed by Denso Wave and the Tokyo Metropolitan Bureau of Transportation.[100][102] It is stuck to the outside of the doors of rolling stock and stores the train composition number and the car number. The tQR reader installed on the platform detects the position of tQR, which allows it to detect the opening and closing of doors and the movement of rolling stock. If it is easily readable, it could be exploited for mischiefs, so it is not compatible with existing QR codes and cannot be read by standard cameras on smartphones or other devices.[103]

License

[edit]

The use of QR code technology is freely licensed as long as users follow the standards for QR code documented with JIS or ISO/IEC. Non-standardized codes may require special licensing.[104]

Denso Wave owns a number of patents on QR code technology, but has chosen to exercise them in a limited fashion.[104] In order to promote widespread usage of the technology Denso Wave chose to waive its rights to a key patent in its possession for standardized codes only.[17] In the US, the granted QR code patent, 5726435, expired on March 14, 2015. In Japan, the corresponding patent, 2938338, expired on March 14, 2014. The European Patent Office granted patent 0672994 to Denso Wave, which was then validated into French, UK, and German patents, all of which expired in March 2015.[105]

The text QR Code itself is a registered trademark and wordmark of Denso Wave Incorporated.[106] In UK, the trademark is registered as E921775, the term QR Code, with a filing date of 3 September 1998.[107] The UK version of the trademark is based on the Kabushiki Kaisha Denso (DENSO CORPORATION) trademark, filed as Trademark 000921775, the term QR Code, on 3 September 1998 and registered on 16 December 1999 with the European Union OHIM (Office for Harmonization in the Internal Market).[108] The U.S. Trademark for the term QR Code is Trademark 2435991 and was filed on 29 September 1998 with an amended registration date of 13 March 2001, assigned to Denso Corporation.[109] In South Korea, trademark application filed on 18 November 2011 was refused on 20 March 2012, because the Korean Intellectual Property Office viewed that the phrase was genericized among South Korean people to refer to matrix barcodes in general.[110]

Risks

[edit]

The only context in which common QR codes can carry executable data is the URL data type. These URLs may host JavaScript code, which can be used to exploit vulnerabilities in applications on the host system, such as the reader, the web browser, or the image viewer, since a reader will typically send the data to the application associated with the data type used by the QR code.

In the case of no software exploits, malicious QR codes combined with a permissive reader can still put a computer's contents and user's privacy at risk. This practice is known as "attagging", a portmanteau of "attack tagging".[111] They are easily created and can be affixed over legitimate QR codes.[112][failed verification][113] On a smartphone, the reader's permissions may allow use of the camera, full Internet access, read/write contact data, GPS, read browser history, read/write local storage, and global system changes.[114][115][116][improper synthesis?]

Risks include linking to dangerous web sites with browser exploits, enabling the microphone/camera/GPS, and then streaming those feeds to a remote server, analysis of sensitive data (passwords, files, contacts, transactions),[117] and sending email/SMS/IM messages or packets for DDoS as part of a botnet, corrupting privacy settings, stealing identity,[118] and even containing malicious logic themselves such as JavaScript[119] or a virus.[120][121] These actions could occur in the background while the user is only seeing the reader opening a seemingly harmless web page.[122] In Russia, a malicious QR code caused phones that scanned it to send premium texts at a fee of $6 each.[111] QR codes have also been linked to scams in which stickers are placed on parking meters and other devices, posing as quick payment options, as seen in Austin, San Antonio and Boston, among other cities across the United States and Australia.[123][124][125]

See also

[edit]

References

[edit]

Bibliography

[edit]
[edit]
Revisions and contributorsEdit on WikipediaRead on Wikipedia
from Grokipedia
A QR code, short for Quick Response code, is a two-dimensional matrix composed of black modules arranged in a square grid on a white background, designed to encode and store data for rapid optical scanning by devices such as smartphones. Developed in 1994 by at Denso Wave, a Japanese automotive technology firm and subsidiary of , it was initially created to track parts more efficiently during than traditional one-dimensional barcodes, offering tenfold greater storage capacity and omnidirectional readability. The symbology incorporates three large square finder patterns for alignment and Reed-Solomon error-correcting codes that enable decoding even when up to 30 percent of the code is damaged or obscured, depending on the selected error correction level (L, M, Q, or H). QR codes support encoding of numeric, alphanumeric, byte/binary, and data modes, with symbol versions ranging from 21×21 modules () to 177×177 modules (Version 40), allowing maximum capacities of up to 7,089 numeric digits, 4,296 alphanumeric characters, or 2,953 bytes at the lowest error correction level. Standardized internationally as ISO/IEC 18004, QR codes have evolved from industrial applications to widespread use in consumer contexts including payments, marketing, and information access. As of 2025 and continuing into 2026, major smartphones running iOS and Android feature built-in QR code scanning in their default Camera apps without requiring third-party applications, significantly enhancing accessibility and everyday consumer use.

History

Invention and Early Development

The QR code, a two-dimensional matrix , was developed in 1994 by Denso Wave Incorporated, a of Denso Corporation affiliated with , to enable faster and more reliable tracking of automotive parts during manufacturing. Traditional one-dimensional were limited to about 20 alphanumeric characters and required precise linear scanning, which proved inefficient in flexible production lines where parts were often dirty or scanned at angles. The name "QR" denotes "Quick Response," reflecting the primary design goal of high-speed readability exceeding that of prior codes by over tenfold. Development originated in 1992 when manufacturing divisions requested improvements to barcode systems, prompting Masahiro Hara, an engineer specializing in barcode scanners and image processing, to lead a two-person team. Hara addressed key constraints by creating a square grid layout with position detection patterns—large squares in three corners featuring a nested black-to-white module ratio of 1:1:3:1:1—for omnidirectional detection across 360 degrees without needing rotation. This structure, combined with alignment patterns and timing coordinates, allowed robust positioning even under distortion or partial occlusion. The code's capacity reached approximately 7,000 numeric digits or supported and characters, enabling encoding of complex identifiers like part numbers and serial data. Integrated Reed-Solomon error correction provided resilience against up to 30% from damage or dirt, a critical advancement for industrial environments. Initial deployment focused on Denso's internal automotive , where it streamlined and assembly processes by reducing scan times and errors.

Adoption in Japan

The QR code was initially adopted in Japan within the automotive manufacturing sector following its invention in 1994 by Denso Wave, a subsidiary of Denso Corporation, to track vehicle parts more efficiently than traditional barcodes. This industrial application addressed the need for rapid scanning and high data capacity in factory environments, where parts required detailed information such as serial numbers and specifications. By making the QR code specification publicly available and royalty-free, Denso Wave encouraged broader implementation across logistics and supply chain operations in Japan during the late 1990s. Consumer adoption accelerated in the early , driven by Japan's early proliferation of camera-equipped mobile phones, which integrated QR code reading capabilities by around 2002. These devices enabled seamless access to URLs, electronic tickets, and product details encoded in QR codes printed on advertisements, magazines, and public signage, marking a shift from industrial to everyday use. This integration aligned with Japan's advanced mobile infrastructure, where feature phones dominated and supported quick-response functionalities for marketing and . By 2002, QR codes had achieved widespread public usage in , appearing on billboards, train tickets, and vending machines to facilitate payments and content delivery. Their proliferation was further boosted by non-proprietary licensing, allowing companies to embed QR readers in devices without legal barriers, contrasting with more restricted technologies. In subsequent years, extended to contactless payments; for instance, QR-based systems gained traction after 2018 with services like , reflecting a market response to cashless initiatives amid Japan's traditionally high cash usage. This evolution underscored QR codes' role in Japan's , from manufacturing efficiency to ubiquitous consumer interfacing.

Global Standardization and Expansion

Following its initial adoption within Japan's automotive sector and subsequent integration into consumer applications via camera-equipped mobile phones around 2002, QR code technology underwent formal internationalization to facilitate broader implementation. Denso Wave, the developer, actively pursued global standards, achieving registration with the Association for Automatic Identification and Mobility (AIM) International in October 1997, followed by (JIS X 0510) approval in January 1999, and culminating in ISO/IEC 18004 ratification in June 2000. This ISO standard defined the symbology's characteristics, including data encoding, error correction, and printing tolerances, enabling consistent across manufacturers and regions. To accelerate diffusion beyond proprietary control, Denso Wave adopted a policy, relinquishing enforcement and permitting unrestricted use without licensing fees, a deliberate strategy to prioritize societal benefit over revenue extraction. This openness contrasted with licensed barcodes like DataMatrix, fostering industrial uptake in , pharmaceuticals, and worldwide by the mid-2000s, where QR codes' higher capacity—up to 7,089 numeric characters versus 2,335 for —provided advantages in tracking. Public expansion lagged industrial applications until smartphone proliferation; by 2010, dedicated scanning apps on and Android platforms reduced barriers, spurring marketing uses such as event ticketing and product information links in and . Adoption intensified during the from 2020, with contactless implementations for menus, payments, and health passes driving usage; surveys indicated 90% familiarity in the UK by 2021, alongside billions of annual scans globally. By 2025, projections estimated over 2.9 billion users worldwide, reflecting entrenched roles in digital payments (e.g., in and ) and augmented reality integrations, though vulnerabilities to counterfeiting prompted ongoing enhancements like dynamic codes.

Standards

ISO and International Standards

The QR Code symbology is specified in the ISO/IEC 18004, which was first approved in June 2000. This standard outlines the core requirements for QR Code implementation, including symbology characteristics such as matrix layout, finder patterns, and alignment structures; data character encoding methods for numeric, alphanumeric, byte/binary, and Kanji modes; symbol formats and dimensions across 40 versions; error correction using Reed-Solomon codes at four levels (L, M, Q, H); and a reference decoding algorithm to ensure reliable scanning. The standard encompasses both legacy QR Code Model 1 (limited to version 14 with basic error correction) and the predominant Model 2 (up to version 40 with enhanced capacity and alignment patterns for larger sizes), promoting while favoring Model 2 for new applications due to its superior data density and robustness. It also incorporates the Micro QR Code variant from the second edition onward, a compact format with fewer modules (11x11 to 17x17) and a single finder pattern, suitable for space-constrained uses like small labels. ISO/IEC 18004 has undergone revisions to address evolving needs: the 2006 edition (second) integrated Micro QR Code and refined encoding for better efficiency; the 2015 edition (third) consolidated specifications and improved verification guidelines; and the edition (fourth) introduced optimizations in encoding, enhanced error correction capabilities, and refinements to structured append features for linking multiple symbols. These updates maintain across devices while adapting to higher data demands, with the standard purchasable from ISO for detailed technical implementation. Related international efforts include adoption by bodies like AIM International for barcode guidelines and for supply chain applications, but ISO/IEC 18004 remains the foundational reference for global QR Code compliance. In , where QR Code originated, complementary national standards such as JIS X 0500 (for standard QR Code) and JIS X 0510 (for Micro QR Code) align closely with ISO specifications, facilitating early domestic adoption before full internationalization. A distinct extension, the Rectangular Micro QR Code (rMQR), is covered under ISO/IEC 23941:2022, supporting elongated formats for narrow printing surfaces like receipts.

Capacity and Compatibility Specifications

QR Codes are defined in 40 versions, ranging from Version 1 (21×21 modules) to Version 40 (177×177 modules), with each subsequent version increasing the side length by 4 modules to accommodate greater data density. The data capacity of a QR Code symbol varies according to its version, the encoding mode (numeric, alphanumeric, byte/binary, or ), and the selected error correction level, which trades usable data space for to enable recovery from damage or occlusion. Error correction is implemented using Reed-Solomon codes at four levels: Level L (approximately 7% ), Level M (15%), Level Q (25%), and Level H (30%), allowing the symbol to remain readable despite partial destruction or poor printing. Higher correction levels reduce effective capacity; for instance, in Version 40 (the largest standard size), Level L supports up to 7,089 numeric characters, while Level H drops to about 3,273 in the same mode. The following table summarizes maximum capacities for Version 40 across encoding modes and error correction levels, based on the ISO/IEC 18004 specification for Model 2 symbols:
Encoding ModeLevel LLevel MLevel QLevel H
Numeric7,0895,5964,5763,273
Alphanumeric4,2963,3912,7731,983
Byte/Binary2,9532,3301,9061,363
Kanji1,8171,4331,172838
Compatibility is governed by ISO/IEC 18004, which standardizes QR Code Model 2 symbols—the predominant format—as fully interoperable with compliant reading systems, including provisions for version detection via finder patterns and format information encoding the correction level and pattern. Model 1, an earlier variant limited to 14 without alignment patterns for high- recognition, is deprecated for open systems due to reduced under and lacks full compatibility with modern Model 2 readers, restricting it to legacy closed environments. Standard Model 2 QR Codes ensure across , as scanners detect the version from quiet zone margins and embedded indicators, supporting seamless decoding from upward without requiring version-specific hardware.

Design

Module Structure and Patterns

A QR code symbol comprises a square grid of black and white modules, with sizes ranging from 21×21 modules in to 177×177 modules in Version 40. The modules form fixed patterns for detection and variable areas for data encoding, adhering to the ISO/IEC 18004 standard. These patterns ensure reliable scanning by providing reference points for position, orientation, and size determination. The three finder patterns, positioned at the top-left, top-right, and bottom-left corners, enable initial detection of the symbol's location and coarse alignment. Each finder pattern consists of a 7×7 array of modules structured as nested squares: a central dark block surrounded by a 1-module frame and an outer 5×5 dark frame, allowing scanners to identify the from multiple angles due to its concentric design. A separator pattern of light modules borders each finder to distinguish it from adjacent areas. Timing patterns, consisting of alternating dark and light modules, extend horizontally between the top-left and top-right finder patterns and vertically between the top-left and bottom-left finder patterns. These lines assist scanners in determining the exact number of modules per side and establishing the grid's . Alignment patterns, present in versions 2 and larger, are smaller square markers distributed across the symbol to compensate for warping or in larger codes. Each alignment pattern features a 5×5 dark block with a 1-module light frame and an outer light border, positioned according to version-specific tables to normalize the module grid. Versions exceeding 45 modules include multiple such patterns for enhanced correction. Format information areas, located adjacent to the finder patterns (specifically, below the top-left and top-right finders, and to the right of the bottom-left finder), encode the error correction level and used. These 15-bit fields include BCH error correction for redundancy and are mirrored in protected positions to ensure readability. For versions 7 through 40, version information modules appear in the bottom-left (above the alignment ) and top-right (below the finder pattern) areas, encoding an 18-bit BCH-coded value indicating the symbol version. The entire symbol is enclosed by a quiet zone, a minimum 4-module-wide border of light modules that isolates the QR code from surrounding elements, facilitating accurate by scanners. This margin prevents interference and is essential for compliance with scanning specifications. The remaining modules in the central area store encoded data interleaved with Reed-Solomon error correction codewords.

Data Encoding Process

The data encoding process in QR codes converts input information into a compact binary bitstream, optimized for the selected version's capacity and correction level. This begins with mode selection, where the input data determines the encoding scheme: numeric for digit sequences (0-9), alphanumeric for digits plus uppercase letters (A-Z) and symbols ($%*+-./: space), byte for arbitrary ISO-8859-1 characters, or for double-byte characters. Mode choice prioritizes efficiency, as numeric mode maximizes capacity (up to 7,089 characters in version 40, low error correction) over byte mode (up to 2,953 characters). A mode indicator precedes the data, using 4 bits for versions 1-9 (0001 binary for numeric, 0010 for alphanumeric, 0100 for byte, 1000 for Kanji), extending to 8 or 12 bits in larger versions to accommodate extended modes. This is followed by a character count indicator, whose bit length varies by version and mode (e.g., 10 bits for numeric in versions 1-9, up to 16 bits in version 40). Data encoding then maps input to bits per mode rules:
  • Numeric: Digits grouped in threes, each group converted to a 10-bit binary value (000 to 999 fits 10 bits); remainders encoded as 4-bit (one digit) or 7-bit (two digits) values.
  • Alphanumeric: Character pairs mapped to a 45x45 table (11 bits per pair, as log2(452)=11\lceil \log_2(45^2) \rceil = 11); single trailing character uses 6 bits.
  • Byte: Direct 8 bits per character.
  • Kanji: Each character to 13 bits after subtracting 0x8140/0xa1a0 offsets and multiplying by appropriate factors.
A terminator of 0-4 zero bits follows, truncated if capacity limits it. then fills to the codeword count: bits grouped into 8-bit codewords, appending alternating patterns 11101100 (236 ) and 00010001 (17 ) until complete. This yields a fixed-length of 8-bit codewords, ready for division into blocks and Reed-Solomon error correction in subsequent steps. Multiple mode switches are possible via repeated indicators, though single-mode use predominates for most applications.

Error Correction and Reed-Solomon Codes

QR codes employ Reed-Solomon codes, a class of non-binary cyclic error-correcting codes, to detect and correct errors arising from physical damage, dirt, or poor printing. These codes operate over the GF(256), where each symbol consists of 8 bits, enabling correction of symbol-level errors rather than individual bits. The redundancy introduced by parity symbols allows scanners to reconstruct missing or corrupted data, ensuring readability even when up to 30% of the code is obscured, depending on the selected level. Four error correction levels are specified: L (approximately 7% of codewords recoverable), M (15%), Q (25%), and H (30%). Higher levels allocate more modules to parity data, reducing the effective information capacity but enhancing robustness against , such as in industrial settings or printed media exposed to wear. The level is encoded in the code's format information, allowing decoders to apply the appropriate correction parameters. During encoding, binary data is first converted to a sequence of GF(256) symbols via BCH or other preprocessing, then divided into multiple blocks to distribute s and improve burst correction. For each block, a Reed-Solomon encoder computes parity symbols using a generator polynomial derived from the primitive element α of GF(256), defined by the x8+x4+x3+x2+1=0x^8 + x^4 + x^3 + x^2 + 1 = 0. The code is RS(n, k), where n is the total symbols per block (data plus parity), k is data symbols, and the number of parity symbols 2t = n - k permits correction of up to t erroneous symbols per block via decoding and locator polynomials. Interleaving of codewords across blocks further mitigates consecutive errors, as a single burst affects only one symbol per block, which can be corrected independently if within the t limit. This mechanism, standardized in ISO/IEC 18004, enables QR codes to achieve higher reliability than one-dimensional barcodes, which lack comparable redundancy. In practice, level H codes have demonstrated recovery from severe damage, such as partial burning or heavy soiling, as tested in early development by Denso Wave.

Masking and Readability Optimization

Masking in QR codes involves applying one of eight predefined patterns to invert specific and correction modules, thereby disrupting uniform regions of black or white that could hinder scanner detection and improving overall contrast balance for reliable reading under varied conditions. This step occurs after encoding and correction placement but excludes fixed functional patterns like finders, timing, and alignment markers. Each mask pattern is defined by a condition evaluated at each module's row index ii and column index jj; if true, the module's color is inverted via XOR operation. The eight patterns follow these rules:
PatternInversion Condition
0(i+j)mod2=0(i + j) \mod 2 = 0
1imod2=0i \mod 2 = 0
2jmod3=0j \mod 3 = 0
3(i+j)mod3=0(i + j) \mod 3 = 0
4i/2+j/3mod2=0\lfloor i/2 \rfloor + \lfloor j/3 \rfloor \mod 2 = 0
5(i×jmod2)+(i×jmod3)=0(i \times j \mod 2) + (i \times j \mod 3) = 0
6((i×jmod2)+(i×jmod3))mod2=0((i \times j \mod 2) + (i \times j \mod 3)) \mod 2 = 0
7((i+jmod2)+(i×jmod3))mod2=0((i + j \mod 2) + (i \times j \mod 3)) \mod 2 = 0
Mask selection evaluates all eight candidates by computing a composite penalty score across four rules, favoring patterns that minimize scanning artifacts such as elongated runs, clustered blocks, finder-like illusions in data areas, or disproportionate dark module density. The lowest-scoring pattern is chosen, with its 3-bit identifier (0–7) encoded alongside the error correction level in the format information bits near each finder pattern. Penalty Rule 1 tallies horizontal and vertical sequences of five or more consecutive identical modules, assigning 3 points per such run plus 1 point for each module exceeding five in length, to discourage linear monotony that scanners may misinterpret as edges or voids. Rule 2 adds 3 points per 2×2 block of uniform color—counting overlaps independently—to penalize dense, square-like clusters that reduce edge contrast essential for module boundary detection. Rule 3 applies a 40-point penalty per instance of a data-area subpattern approximating a finder pattern, defined as a 7×7 region with a dark center row/column of five modules flanked by single light modules, extended by four surrounding light modules, preventing false structural interpretations by decoders. Rule 4 addresses global balance: with MM as the number of maskable modules and BB as post-mask dark modules, compute (B×100/M)50/5| (B \times 100 / M) - 50 | / 5, floor the absolute value, and multiply by 10, yielding increments of 10 points for every 5% deviation from 50% dark density to promote even distribution resilient to or partial occlusion. This systematic optimization, rooted in empirical scanner behavior analysis by Denso Wave, enhances decode success rates across print media, digital displays, and degraded surfaces without altering encoded .

Capacity and Variants

Information Capacity Limits

The information capacity of QR codes is constrained by the symbol version, encoding mode, and correction level, with maximum storage achieved in version 40 at the lowest error correction. QR code versions range from 1 (21×21 modules) to 40 (177×177 modules), where larger versions accommodate more at the expense of physical size. modes include numeric (highest density, 3.33 bits per character), alphanumeric (5.5 bits per character), byte/binary (8 bits per character), and (13.25 bits per character), with numeric mode yielding the greatest capacity for digit-only content. Error correction employs Reed-Solomon codes at four levels: (approximately 7% ), (15%), (25%), and H (30%), where higher levels allocate more codewords to , reducing usable data capacity. For version 40 at level , maximum capacities are 7,089 numeric characters, 4,296 alphanumeric characters, 2,953 bytes, and 1,817 characters, equivalent to roughly 23,624 bits of . At level H, capacities drop significantly, such as to approximately 1,852 alphanumeric characters in practical encodings.
Data ModeLevel L (Version 40)Level H (Version 40, approx.)
Numeric7,089 characters3,597 characters
Alphanumeric4,296 characters2,237 characters
Byte2,953 bytes1,527 bytes
1,817 characters923 characters
These limits reflect the fixed overhead for finder patterns, alignment patterns, timing patterns, and format information, which consume a substantial portion of smaller versions, further restricting capacity in versions 1–9. Actual capacity may vary slightly due to masking patterns selected for optimization, which influence final placement without altering the theoretical bounds.

Standard and Micro Variants

Standard QR codes, defined in ISO/IEC 18004, comprise 40 square versions differentiated by grid size and data capacity. Version 1 measures 21×21 modules, with each higher version expanding by 4 modules per side, culminating in Version 40 at 177×177 modules. This incremental scaling enables progressive increases in storable data while maintaining three finder patterns for detection, timing patterns, and alignment patterns in larger versions to ensure scannability across sizes. Micro QR codes serve as a reduced-footprint alternative within the same ISO/IEC 18004 framework, optimized for applications where space constraints preclude standard versions. They feature four versions—M1 through M4—with grid dimensions of 11×11, 13×13, 15×15, and 17×17 modules, respectively, achieved by adding 2 modules per side per version increment. Distinguishing them from standard variants, Micro QR codes employ a single finder pattern positioned at one corner, eliminating two of the three large squares to minimize area usage, alongside simplified timing and format information structures. This design supports lower maximum capacities—up to 35 numeric characters in M4 at Level L error correction—prioritizing compactness over volume, such as in fine print or tiny labels. Both variants utilize Reed-Solomon error correction at levels L (7%), M (15%), Q (25%), or H (30%), with Micro QR codes omitting Level H in smaller versions to balance density and robustness. Standard versions accommodate up to 1,817 bytes in binary mode at Version 40 with Level L, vastly exceeding Micro QR limits, reflecting their roles: standards for general high-capacity encoding and Micro for constrained embedding. Compatibility requires scanners supporting the respective symbology identifiers embedded in format information.

Advanced and Specialized Variants

iQR Code, developed by Denso Wave, extends the QR Code family with support for both square and rectangular modules, enabling a broader range of sizes from as small as 9×9 modules to 422×422 modules. This variant achieves up to 80% higher data density than standard QR Codes at equivalent sizes, allowing storage of approximately 40,000 numeric characters in its largest configuration, compared to about 7,000 for Version 40 QR Codes. It incorporates error correction capabilities up to 50% restorability, surpassing the 30% maximum of standard QR Codes, and facilitates applications on curved surfaces due to rectangular flexibility. Unlike ISO-standardized QR variants, iQR remains a extension optimized for high-capacity needs in and data-intensive labeling. Rectangular Micro QR Code (rMQR), standardized as ISO/IEC 23941 and released by Denso Wave in May 2022, addresses space constraints in elongated areas such as product edges or margins. This variant supports capacities up to 361 numeric characters, 219 alphanumeric characters, or 92 characters, exceeding QR limits while maintaining rapid omnidirectional scanning akin to standard QR Codes. Its rectangular structure—typically longer in one dimension—enhances traceability in and supply chains by replacing linear barcodes without sacrificing readability or requiring larger print areas. As an open ISO standard, rMQR promotes global adoption for efficient information encoding in compact, non-square formats. SQRC (Secure QR Code), a Denso Wave innovation, embeds both public and encrypted private data layers within a standard-appearing QR matrix, restricting private access to readers equipped with a specific cryptographic key. This dual-layer design prevents unauthorized scanning of sensitive information, supporting applications like anti-forgery transaction monitoring, venue , and internal . SQRC maintains compatibility with conventional QR scanners for public data while adding security not inherent in base QR specifications, though its nature limits widespread without licensed tools. FrameQR, another Denso Wave extension, incorporates a designated "canvas" region surrounding the core data modules, permitting integration of , text, or images without compromising scannability. This variant preserves essential finder patterns and error correction of standard QR Codes, enabling aesthetic enhancements for promotional materials, product , and branding where visual appeal intersects with functionality. FrameQR's design balances decorative freedom with reliable decoding, though embedded elements must adhere to module spacing guidelines to avoid error rates exceeding the Reed-Solomon thresholds. As a trademarked format, it targets and verification uses rather than pure data capacity expansion. Artistic AI-generated QR codes emerged in mid-2023 as a novel application of generative artificial intelligence. These QR codes are produced using diffusion models such as Stable Diffusion, conditioned via ControlNet on a base QR code pattern typically configured with high error correction (Level H, providing 30% data restorability). This approach allows complex artistic imagery—such as landscapes, portraits, or abstract patterns—to be integrated directly into the module structure while preserving scannability by leveraging the error correction capacity to tolerate modifications. Unlike FrameQR, which overlays graphics in a separate canvas area without altering core modules, AI-generated variants modify the data modules themselves to form the desired visual design. Various online tools and open-source implementations enable users to create these codes from a destination URL and style prompt, with applications in marketing campaigns, event invitations, product packaging, and social media where aesthetic appeal enhances functional utility.

Applications

Payment and Financial Uses

QR codes facilitate financial transactions by encoding payment details such as identifiers, amounts, and account information, allowing users to initiate transfers via mobile apps after scanning. In -presented mode, a static or dynamic QR code displayed by the seller is scanned by the buyer's device to authorize ; conversely, customer-presented mode involves the buyer displaying their QR code for the to scan. This dual-mode approach enables low-cost, infrastructure-light implementations, requiring only a printed or digital code and a camera, which contrasts with hardware-dependent systems like NFC terminals. Adoption surged in starting in 2011, when introduced QR-based payments in , followed by Pay's integration of similar functionality. By 2016, QR codes underpinned over $1.65 trillion in annual transactions in , representing 85% of mobile payments by 2020. In , the (UPI) incorporated QR codes prominently after its 2016 launch, driving widespread use; UPI processed 20 billion transactions worth ₹25 trillion (approximately $293 billion USD) in August 2025 alone, accounting for 85% of India's digital payments. QR-enabled UPI infrastructure grew 91.5% year-over-year to 657.9 million codes in 2024-25. Globally, the QR payments market reached $12.2 billion in 2024, with projections for a of 18.7% through 2034, fueled by penetration in emerging markets and post-pandemic contactless preferences. dominates, with , , and Southeast Asian nations like and leading adoption rates exceeding 80% in urban retail. In contrast, and lag, though usage rose approximately 30% in 2025 in countries like the , , and , where about 55% of businesses now accept QR payments, often via apps like or . 's QR transaction value stood at $1.6 billion in 2021, with slower but accelerating growth due to efforts amid fragmented national systems. Beyond retail, QR codes support transfers, remittances, and invoice payments in financial apps, reducing intermediation costs through direct linkages to accounts or digital wallets. Their efficacy stems from high data capacity and error correction, enabling secure encoding of dynamic elements like timestamps to mitigate replay attacks, though vulnerabilities persist in unverified scans.

Marketing and Information Access

QR codes enable marketers to bridge physical and digital realms by embedding scannable links in advertisements, directing users to websites, videos, or exclusive offers upon smartphone scanning. Commonly integrated into s, ads, and packaging, they drive consumer engagement by providing immediate access to dynamic content without requiring manual entry. For instance, Coca-Cola's campaigns placed QR codes on bottles to unlock concert ticket giveaways and interactive experiences, boosting participation rates through gamified promotions. Recent advancements include AI-generated artistic QR codes, which utilize generative AI models such as Stable Diffusion combined with ControlNet to integrate complex artistic imagery directly into the code's module structure while preserving scannability through high error correction levels (typically 30%). These codes enhance visual appeal in marketing campaigns, product packaging, and event invitations by seamlessly blending graphic design with functional data encoding, thereby increasing user engagement. In , QR codes support trackable interactions, allowing businesses to measure scan volumes, geographic data, and conversion metrics for campaign optimization. Empirical data indicates high-intent , with 59% of users scanning daily and 95% of enterprises leveraging them for first-party insights. Global scans exceeded 1 trillion in 2025, reflecting widespread adoption fueled by penetration, projected at 99.5 million U.S. users by that year. Studies on print media show QR codes enhance pull-based communication, increasing response rates by simplifying access to supplemental information, though effectiveness depends on clear placement and user familiarity. For information access, QR codes streamline retrieval of contextual data in public spaces, such as real-time transit schedules at bus stops or subway stations via quick scans. In venues like museums or events, they deliver exhibits or agendas without printed guides, reducing clutter while enabling personalized content delivery. Contactless applications surged post-2020, with menus and product details accessed via codes on tables or shelves, minimizing physical handling and supporting protocols; however, reception to QR code menus remains mixed, as restaurants benefit from reduced printing costs and real-time updates, while empirical studies link perceived inconvenience to diminished customer loyalty compared to traditional menus. Usage grew 22% globally by 2025, driven by these practical integrations that prioritize efficiency over traditional signage.

Supply Chain and Authentication

QR codes enable precise tracking and in by embedding unique serial numbers or data that can be scanned at multiple points, from to end-user delivery, providing visibility into product origins, routes, and status. This real-time monitoring supports inventory management by automating data capture, which reduces manual entry errors and can improve by up to 30%. In , 43% of businesses deploy QR codes for shipment tracking, while 39% apply them to optimize inventory processes, facilitating quicker verification of deliveries and asset locations. For instance, dairy producer Friso affixes unique QR codes to the base of tins, allowing consumers and stakeholders to trace the product's journey from to shelf via a linked database. Such implementations extend to sectors like pharmaceuticals, where regulatory requirements for —such as the U.S. Drug Security Act—leverage QR codes for lot-level tracking to prevent diversion or tampering, encoding details like batch numbers and expiration dates. In authentication applications, QR codes combat counterfeiting by serving as verifiable identifiers tied to secure backends, where scans query databases to confirm product legitimacy against recorded serial data. Secure variants, including dynamic or encrypted QR codes, generate unique responses per scan or incorporate anti-copy features like texture-hidden elements, alerting brands to duplicate scans indicative of fakes. Platforms like Scantrust enable real-time counterfeit detection by monitoring scan anomalies, such as multiple validations from one code, which has proven effective in industries vulnerable to , including and . However, conventional static QR codes remain susceptible to replication, as counterfeiters can photograph and reprint them without altering , necessitating advanced like or integration with for immutable verification. Despite these vulnerabilities, adoption persists due to cost-effectiveness and scalability; for example, serialized QR solutions provide supply chain transparency while enabling consumer-facing authenticity checks, reducing losses from fakes estimated in billions annually across global markets.

Health and Emergency Response

QR codes have been integrated into healthcare systems to facilitate rapid access to patient-specific , such as scanning packaging to retrieve dosage instructions, side effects, and multilingual guides, thereby reducing errors and enhancing adherence. In clinical settings, they enable inventory management for medical supplies, allowing staff to track expiration dates and locations via scans integrated with software systems. Additionally, QR codes on patient-facing materials, like discharge summaries or educational resources, direct users to , improving engagement without requiring extensive printing or navigation. In emergency medical response, QR codes embedded in wearable devices, such as bracelets or necklaces from providers like MedicAlert, grant instant access to critical data including allergies, medications, emergency contacts, and upon scanning with a . These dynamic codes link to secure online profiles that can be updated remotely, ensuring information remains current even if the wearer is incapacitated, and have been credited with expediting treatment in real-world scenarios by bypassing verbal delays. Studies and user reports indicate that paramedics increasingly utilize these scans, though adoption varies by training and equipment availability. During the , QR codes played a central role in protocols worldwide; for instance, in the , venues displayed codes that patrons scanned to log entry times and details, enabling health authorities to notify exposed individuals within hours of a positive case detection. Similar systems in and other regions used venue-specific QR codes tied to government apps, logging over millions of check-ins daily by mid-2020 and supporting automated alerts while minimizing manual errors. These implementations demonstrated QR codes' capacity for scalable, low-cost , though they relied on voluntary compliance and penetration, with efficacy tied to rapid follow-up by teams. In broader disaster management, QR codes aid by tagging relief supplies for real-time tracking, as seen in systems where codes on crates direct scanners to manifests, reducing duplication and ensuring equitable distribution during events like hurricanes or earthquakes. They also provide on-site access to evacuation maps, protocols, and survivor registries at recovery centers, with post-disaster scans linking to aid application forms as utilized in U.S. responses since 2011. In building safety, QR codes on doors or walls transmit precise location data to rescuers when scanned by trapped individuals, integrating with apps to alert fire services automatically. Such applications underscore QR codes' resilience in low-connectivity environments due to offline caching capabilities in many readers.

Adoption and Impact

Global Usage Statistics

Global QR code adoption has expanded rapidly, driven by smartphone penetration and contactless applications. In 2024, approximately 86.66% of smartphone users worldwide had scanned a QR code at least once in their lifetime, with 36.40% scanning at least one per week. This equates to broad , as smartphone users numbered 4.88 billion globally in 2024, comprising 60.42% of the . Scanning volumes reflect this penetration, with global QR code scans rising 433% from to reach 41.77 million tracked instances by mid-2025, though aggregate figures across platforms likely exceed billions monthly given decentralized usage. Usage growth accelerated 323% between 2021 and 2024, correlating with increased digital interactions in , payments, and information access. Regionally, the dominates, capturing 44% of worldwide scans as of 2024, followed by and . In , 61.5% of the population scanned QR codes monthly in 2024, securing third place globally. QR code creation volumes rose 43% in 2023 alone, underscoring sustained momentum. Market indicators affirm usage trends, with the global QR codes sector valued at USD 13.04 billion in 2025 and projected to expand at a 17.03% CAGR through 2030. These figures derive from industry analytics firms and generator platforms, which may emphasize promotional applications but align on directional growth from empirical scan data.

Economic and Market Growth

The global QR codes market reached a valuation of USD 13.04 billion in , driven primarily by expanded applications in payments, , and , with projections indicating growth at a (CAGR) of 17.03% to USD 28.64 billion by 2030. This expansion reflects QR codes' role in enabling rapid data exchange via smartphones, which numbered over 6.8 billion devices worldwide by mid-2025, facilitating seamless integration into digital ecosystems. Within this, the QR code payments segment has exhibited particularly robust growth, with the market sized at USD 12.54 billion in 2024 and forecasted to reach USD 61.73 billion by 2033, achieving a CAGR of 20.0% amid rising adoption of mobile wallets and contactless transactions in regions like , where QR-based systems dominate retail. Global transaction volumes processed through QR codes surpassed $2.4 trillion in 2022 and are expected to exceed $3.0 trillion by the end of 2025, underscoring the technology's contribution to financial efficiency by reducing cash-handling costs and enabling micro-transactions at scale. Businesses have increasingly leveraged QR codes for enhancement, with 62% of surveyed enterprises projecting higher in 2025 attributable to QR-focused strategies such as dynamic linking for and inventory tracking. This economic uplift stems from QR codes' low implementation barriers—generation costs under $0.01 per code—and their measurable impact on conversion rates, which studies indicate can rise by 20-30% in retail settings through direct access to product details or promotions. Overall, the technology's market maturation has lowered operational frictions across sectors, fostering incremental GDP contributions via accelerated commerce, though sustained growth depends on addressing standards across platforms. QR codes have seen increasing integration with (AI) for enhanced generation, personalization, and analytics capabilities. AI-powered generators analyze user data to create customized QR codes that adapt content based on scan context, such as or device type, improving engagement rates in applications. This integration allows for real-time modifications to encoded , shifting from static to dynamic QR codes that update destinations or payloads post-creation without reprinting. Dynamic QR codes represent a key advancement, enabling trackable scans and editable links, which facilitate and performance metrics collection directly tied to individual codes. Unlike traditional static variants, these leverage cloud-based redirection services to alter targets, supporting up to millions of scans per code while maintaining error correction integrity across levels L (7%), M (15%), Q (25%), and H (30%). Adoption of dynamic formats has grown alongside native QR code scanning features in smartphones, with AI enhancing detection by flagging anomalous scan patterns in high-volume transactions. Blockchain technology integrates with QR codes to provide tamper-proof verification and supply chain traceability, embedding hashed data that links to immutable ledgers for authenticity checks. This combination ensures encoded information cannot be altered without detection, as blockchain's cryptographic consensus verifies QR payloads against distributed records, reducing counterfeiting risks in industries like pharmaceuticals and . Such systems often pair QR scans with smart contracts, automating actions like ownership transfers upon validation. Near-field communication (NFC) complements QR codes in hybrid solutions, where QR provides visual, long-range scanning for broad access while NFC enables secure, proximity-based data exchange for sensitive operations like payments. In business cards and product tags, QR-NFC pairings allow fallback scanning methods, with QR handling initial contact info transfer and NFC securing encrypted credentials, though QR's optical nature makes it more versatile in low-power scenarios. Emerging trends include (AR) overlays triggered by QR scans, where mobile apps render 3D models or interactive layers atop scanned surfaces, expanding uses in and retail. A significant development driving broader adoption has been the standardization of native QR code scanning in major smartphone operating systems, eliminating the need for third-party apps on current models as of 2025 and continuing into 2026. On iOS (iPhone and iPad), the Camera app automatically detects QR codes when pointed at them, displaying a prompt to access the linked content, while users can add a dedicated Code Scanner control to the Control Center for direct access. Android devices provide built-in options including the Camera app, Quick Settings tile, Google Lens, and Circle to Search for on-screen codes, with a redesigned user interface for the built-in scanner rolled out in 2025 that features updated visuals and enhanced sharing options. These native capabilities have significantly contributed to the seamless integration and increased everyday use of QR codes. By 2025, AI-driven QR scanners incorporate to correct distortions in real-time, boosting readability for larger versions (up to 177x177 modules) even under poor lighting or partial occlusion. Security enhancements, such as AI-monitored tamper detection, embed forensic markers in QR patterns, making unauthorized edits detectable via pattern analysis rather than relying solely on Reed-Solomon error correction. These developments prioritize causal reliability, ensuring QR functionality persists amid physical wear or digital threats through layered redundancies.

Risks and Security

Phishing and Quishing Vulnerabilities

Quishing, a portmanteau of "QR code" and "," refers to attacks that exploit QR codes to direct users to malicious websites or trigger harmful actions without revealing the underlying . Attackers generate QR codes linking to spoofed sites mimicking legitimate services, such as banking portals or government agencies, to harvest credentials, financial data, or install upon scanning. Unlike traditional , quishing obscures the destination until after scanning, leveraging user trust in QR codes as a convenient, visual medium for information access. This vulnerability stems from the inherent of QR codes, which encode data compactly without preview mechanisms on most scanning apps, enabling seamless redirection to domains. Attack vectors include physical overlays, where criminals affix malicious QR code stickers over legitimate ones on posters, parking meters, or public signage, tricking users into scanning fakes. Digital methods embed QR codes in emails, PDFs, or social media images, often bypassing spam filters that fail to analyze embedded visuals for threats. For instance, in the second half of 2023, approximately 27% of quishing attacks involved fraudulent multi-factor authentication notices directing users to bogus verification pages. Scanning such codes can initiate automatic malware downloads or prompt entry of sensitive information on counterfeit sites engineered to evade basic security checks. Incidents have escalated, with 8,878 quishing emails detected from June to August 2023 alone, peaking at 5,063 in August and surging 51% in September compared to prior months. Year-over-year, quishing attacks rose 25% as of , fueled by their deployment in physical spaces like fake cards or posters. Over 26 million individuals have been redirected to malicious sites via QR codes, with 73% of scanning without verifying the source or destination. Advanced techniques, observed since late , include nested QR codes (QR-in-QR) multiple layers of redirection and split QR codes requiring sequential scans to assemble a full malicious , complicating detection. These vulnerabilities exploit human factors, such as haste in public scanning or over-reliance on visual legitimacy, rather than technical flaws in QR encoding itself, which uses Reed-Solomon error correction but no built-in authentication. C-suite executives face 42 times more quishing attempts than average employees, targeting high-value access via tailored lures like executive alerts. relies on user caution, such as previewing URLs via camera apps before opening or employing security software that scans QR destinations, underscoring quishing's effectiveness in blending social engineering with QR ubiquity.

Malware and Exploitation Risks

QR codes pose risks of malware delivery when they encode uniform resource locators (URLs) directing scanners to compromised websites or direct download links for malicious payloads. Scanning such codes can trigger automatic downloads of trojans, , or via drive-by attacks, exploiting user trust in the visual simplicity of QR codes without visible indicators of harm. Unlike hyperlinks in s or texts, QR codes bypass many traditional email filters, enabling attackers to distribute through physical media like posters, stickers, or mailed documents. A documented exploitation vector involves QR codes embedded in phishing documents or emails, where scanning redirects to sites hosting malware droppers. For instance, in March 2024, attackers used a malicious QR code concealed within a PDF attachment to initiate a compensation scheme, leading victims through a fake to a page that harvested credentials and potentially installed additional . Similarly, by November 2024, physical letters containing QR codes were mailed to targets, upon scanning delivering the Coper banking trojan (also known as Octo2), which steals financial data and enables remote device control. These incidents highlight how QR codes facilitate propagation by evading digital security checks inherent to optical scanning. Exploitation extends to quishing variants, where QR codes lure users to fraudulent sites mimicking legitimate services, often resulting in alongside credential theft. Since late 2024, attackers have refined tactics in operations, incorporating QR codes in documents to redirect to malware-hosting domains, with observed increases in such campaigns targeting businesses and consumers. By July 2025, quishing attacks had reportedly affected tens of millions of , primarily through tampered public QR codes or deceptive placements in high-trust contexts like parking meters or event posters. Device compromise risks include , keylogging, and persistent access, as mobile operating systems may grant apps broad permissions upon . Attackers exploit QR code opacity—encoding up to thousands of characters without user preview—coupled with scanner app vulnerabilities, such as inadequate validation, to amplify reach. While QR codes themselves cannot execute code, they serve as vectors for browser exploits or app-based infections, particularly on undersecured mobile devices. Empirical data from cybersecurity reports indicate a surge in these threats post-2023, driven by QR code ubiquity in payments and contactless interactions, underscoring the causal link between widespread adoption and elevated exploitation incentives.

Privacy and Counterfeiting Concerns

QR codes, particularly dynamic variants, enable tracking of user scans by their providers, capturing such as scan (down to or level), , device type, and operating system without explicit user . This metadata collection occurs as the scanning device connects to a server to resolve the encoded , potentially integrating into broader analytics ecosystems that profile users across multiple interactions. Users often remain unaware of this , as no visible indicators disclose the extent of harvested, raising concerns over implicit in public deployments like advertisements or product packaging. Static QR codes, which encode fixed without server dependency, pose minimal direct risks beyond the content they link to, but their prevalence in privacy-sensitive contexts—such as contactless payments or event check-ins—can inadvertently expose users to endpoint vulnerabilities if the destination site employs , IP logging, or behavioral tracking. Empirical analysis of real-world scans indicates that dynamic codes amplify these issues, with providers prioritizing engagement metrics over minimization, though mechanisms are rare and ineffective against aggregated datasets. Counterfeiting QR codes exploits their open, easily generatable format, allowing malicious actors to produce replicas or overlays that mimic legitimate ones, directing users to fraudulent endpoints for data theft or . Common tactics include affixing stickers over authentic codes on , menus, or kiosks, as documented in incidents where scammers replaced official codes to reroute payments or harvest credentials. For instance, in October 2024, reports emerged of tampered QR codes in U.S. cities leading to unauthorized charges, while a Japanese victim lost approximately ¥106,000 (about $720 USD) in January 2025 after scanning a fake code on a flyer. The absence of built-in in QR codes—relying solely on visual and user verification—facilitates such forgeries, as generating a visually similar code encoding a malicious requires minimal technical expertise and free tools. This has contributed to a surge in related scams, with malicious QR codes comprising up to 26% of attacks involving redirects by mid-2025, often indistinguishable from genuine ones without manual inspection or secure scanning apps. Physical counterfeiting persists due to lax enforcement in public spaces, underscoring the causal link between the technology's simplicity and exploitation risks.

Mitigation and Best Practices

Users should verify the source of QR codes before scanning, restricting use to known and trusted entities such as official signage, from reputable brands, or communications from verified contacts. Scanning unsolicited or randomly encountered codes, particularly in public spaces or on flyers, increases exposure to malicious redirects. Secure scanning involves using the device's native camera application or reputable QR reader apps that display the decoded prior to redirection, allowing manual inspection for domain authenticity, indicators, and absence of suspicious parameters. Third-party apps without preview functionality or from unverified developers should be avoided to prevent inherent vulnerabilities. After decoding, users must confirm the destination matches expected legitimate sites and refrain from entering credentials or downloading files from prompted pages unless independently verified. Organizations implementing QR codes for or tracking should employ dynamic QR codes, which generate unique, time-limited or one-time-use links upon each scan, rendering copied static versions ineffective for counterfeiting or repeated exploitation. of payloads, , or integration with for verifiable further deters tampering and enables detection of duplicates through and backend validation. To address privacy concerns, QR code creators must minimize embedded data to essential elements only, avoiding unnecessary , and configure servers to log scans without retaining identifiable user details unless required for legitimate auditing. Endpoint protections, including updated antivirus software with real-time scanning and network filters blocking known malicious domains, provide additional layers against malware delivery via QR-induced downloads. Regular user training on quishing indicators—such as urgency in accompanying messages or mismatched branding—combined with simulated phishing exercises, has demonstrated effectiveness in reducing successful attacks by up to 50% in enterprise settings.

Licensing

Open Licensing Model

The QR Code specification, developed by Denso Wave Incorporated in 1994, was intentionally released as a publicly available standard to encourage broad adoption without financial barriers. Denso Wave, a subsidiary of Denso Corporation, holds multiple patents related to the QR Code technology, including foundational aspects of its encoding and error correction mechanisms. However, the company has explicitly chosen not to enforce these patents against users who adhere to the disclosed specification, effectively creating a royalty-free licensing model that permits free implementation, generation, and scanning of compliant QR Codes. This approach contrasts with proprietary barcode systems that often require licensing fees, as Denso Wave's policy prioritizes diffusion over revenue extraction from the core technology. The openness stems from Denso Wave's strategic vision: by making the full technical specifications accessible—later formalized as the ISO/IEC 18004 international standard in 2000— the company aimed to foster ecosystem growth in automotive parts tracking and beyond, where widespread interoperability would amplify value. Users are required to follow the exact specification to ensure compatibility and avoid infringing third-party intellectual property, but no formal license agreement or payment is mandated for basic QR Code operations. This model has enabled global proliferation, with billions of QR Codes generated annually across industries, without the legal entanglements that could stifle innovation. Notably, while the technology itself is freely usable, the term "QR Code" is a registered owned by Denso Wave, applicable to the word mark but not the visual pattern. This distinction allows generic references to "two-dimensional barcodes" but requires attribution to "QR Code" for official compliance, preserving branding while maintaining technical openness. The policy has faced no significant challenges, as Denso Wave has consistently refrained from litigation over standard implementations, reinforcing the model's effectiveness in promoting voluntary standardization over coercive enforcement.

Intellectual Property Considerations

DENSO WAVE Incorporated, the developer of the QR code standard since its invention in 1994, holds multiple on the but has explicitly chosen not to enforce royalty payments or licensing fees for its use, provided implementations adhere to the established standards defined in ISO/IEC 18004 and (JIS). This policy, announced upon the code's public release, promotes widespread adoption by eliminating financial barriers, contrasting with proprietary systems that often require paid licenses. The term "QR Code" is a registered owned by WAVE, requiring users to acknowledge this in publications, websites, or promotional materials—typically via a statement such as "QR Code is a registered of WAVE INCORPORATED"—to avoid potential claims. While the core encoding and decoding algorithms are freely implementable, deviations from the standard specifications may infringe on remaining s, particularly for custom variants that alter error correction, data capacity, or structural elements. No copyrights apply to the generation or scanning of standard QR codes, as the format is an open without restrictive licensing. Users embedding third-party trademarks or logos within QR code patterns risk separate conflicts if such modifications reduce scannability or mimic patented enhancements, though DENSO WAVE's non-enforcement stance on core patents mitigates broad risks for compliant applications. Overall, these considerations favor unrestricted commercial and non-commercial deployment, contributing to the technology's global proliferation without litigation over basic usage.

References

Add your contribution
Related Hubs
User Avatar
No comments yet.