Font Size: a A A

Realizatio And Aplication In The Students ID Management System Of The PDF417 Decoding Algorithm

Posted on:2011-05-14Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2218330338965261Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Bar code technology came into existence in the 1940s, which is the most economical and practical automatic identification technology. Bar code technology has been developing very rapidly almost since they were invented, and has been widely applied in various industries. With the development of science and technology, one dimensional bar code can not adapt to the needs of social development due to the limit of information capacity and the dependency on being used with database. Therefore, the two-dimensional barcode emerge at a historic moment. Two-dimensional barcode has the advantages of large capacity of information,coding range widely,good capability of confidentiality and anti-counterfeit,high reliability of decode,strong ability of fixed error,easy to manufacture and low cost,variable of barcode symbols shape, and many other advantages.PDF417 2d barcode is invented by Dr. Wang YinJing who is Chinese in the United States. PDF is the first letter from three words of "Portable Data files", meaning:"portable data files." Barcode enjoyed an immediate acceptance since they were invented, and widely applied both at home and abroad.Proceeding from the background of the research that many criminal gangs manufacture and sell fake student's identity card which cause huge economic losses to the country and railway departments in recent years, this paper analyzes the management pattern of the current college student's identity card, and points out the problems existing in the management. The purpose of this study is applying the advanced technology of PDF417 2d barcode to anti-counterfeit management of student's identity card, which can been used to improve security and reliability of certificate itself, to prevent forgery, don't leaves an opportunity given by criminals. At the same time, allowing network access for information, sharing of information, timely and accurately inspecting, thus this is greatly improve the management efficiency. This paper does a useful research which makes the image processing combined with the management of student's ID card.The content of this paper as follows:1.Introducing the origin, characteristics, standardization actuality and development trends of PDF417 2d barcode. At the same time, this paper pointed out the research background, content and significance.2. We discuss the design principle, work flow and advantage of PDF417 2d barcode that is applying to student's ID management system, and introduce the settings of CxImage development kit and development environment.3.Discussing the symbols structure, properties, coding rules of PDF417 2d barcode in detail, and mainly introduces coding of Reed - Solomon error control code.4.Detailed analysis and research on the image processing and decode process of PDF417 2d barcode, including the Reed Solomon error control code. Collecting barcode symbol image and dividing decoding into two parts according to the characteristics of image collection: first, preprocessing barcode images collected with the appropriate pretreatment methods, including binaryzation, Hough changes and rotating orientation; second, detection and localization of barcode area, including the boundary detection, barcode positioning, filtering de-noising. And then restoring the original information from the barcode. according to the inverse of compression coding.5.Mainly for the student to design the coding and decoding information of system design, based on VC+ + 6.0 platform developed software, software is versatile, can be arbitrary number, letters, hybrid coding and decoding characters. We show the application of the ordinary coded, the student's id code, the id decoding and photo image decoding through the software.
Keywords/Search Tags:two-dimensional barcode, PDF417, student's identity card, anti-fake, algorithm
PDF Full Text Request
Related items