Content uploaded by Omar Ismael Al-Sanjary
Author content
All content in this area was uploaded by Omar Ismael Al-Sanjary on Oct 28, 2020
Content may be subject to copyright.
Reserve Parking and Authentication of Guest Using
QR Code
Ahmed Abdullah Ahmed*1, Omar Ismael Al-Sanjary2, Saranya Kaeswaren2
1Faculty of Engineering & Science, Qaiwan International University/Raparin, Sulaymaniyah, Kurdistan Region-Iraq
2Faculty of Information Science & Engineering, Management & Science University, 40100 Shah Alam, Malaysia
* Corresponding author: ahmed.abdullah@kti.edu.krd
Abstract— In the current world permeated by the use of
technology, parking appears to be an issue that has not been
given serious consideration. This paper developed and
proposed an online digital parking application, with the help of
Quick Response (QR) code for the reduction of workforce in
parking areas. In Android technology, every compatible device
can read QR codes and scan them to provide considerable
information. The QR code is scanned by the system for the
details of the user for authorized entrance. Following such
scan, the user is allotted a parking space on the basis of
availability, and upon leaving the allotted space, it will remain
an empty slot to be allotted to the next user. This can mitigate
human effort through the use of simple software and
hardware, while ensuring authorization and safety to users.
Keywords: QR code, android app, parking system, android
studio, and authentication.
I. INTRODUCTION
A parking lot or a car park is generally described as a
spacious empty area, intended for parking of vehicles and in
majority of countries, where cars are the primary
transportation mode, parking lots are important features of
cities and suburban regions. In modern parking lots,
technologies are used to assist motorists and drivers to find
empty spaces through parking guidance and information
systems, after which the vehicles are retrieved – such is a
convenient traveling and daily experience. The benefits of
modern car parks include adaptive lighting, sensors, Indoor
Positioning System (IPS) and even mobile payment
alternatives.
In the same way, car parks in shopping malls are fitted
with cameras one each slot to keep track of total occupancy
and to determine where lost cars are located. In relation to
this, there are several online booking technologies that assist
drivers search for long-term parking in an automated way,
while facilitating cost-savings for those who book ahead of
time. Real time inventory management checking technology
is used to display available parking lots, categorized by price
and distance from the target destination. Thus, such modern
online booking technology assists guests to determine
parking spaces conveniently and easily. They facilitate easy
parking for the guest rather than having them go around and
around looking for an empty parking slot. This may be
resolved through the increase of the number of parking
spaces but such solution calls for significant investment and
construction, and also extra spaces block traffic and
inhabitants of the area.
Thus, this paper proposes an application that provides
easier and more convenient solution. The project involves
creating a system/application for parking, with the primary
idea of enabling guests find parking areas expediently
without hassle. Guests need to ensure that they have the app
in their device for logging in, filling up parking details and
time periods, after which, a QR code is sent to their email for
confirmation. They can proceed to scan the QR code upon
reaching the parking area for authentication and entry.
II. RELATED WORKS
The present study examines several smart parking
systems that can assist drivers to park their vehicles and
provides a discussion of their weaknesses. The focus is
placed on designing and proposing a new smart parking
system that could resolve the tedious search of drivers for
vacant parking spaces in parking lots.
In a related study [1], the aim was to furnish a dynamic
solution of the concept of parking guidance system via the
internet, through the use of current techniques. The system
improves the parking system existing components in
colleges, running on mobile phone platform and providing a
visual display of available lots. The primary requirements
included GPS, QR code scanner, and mobile web map. The
study examined six parking spaces in the College of
Engineering and published it on the web map server to be
made available for drivers [28].
Moreover, in another study, [2] proposed a solution to
parking issues, using Geographic Information System (GIS),
where all the activities are reflected in the database. The
system involved the publication of a Web Server Application
Programming Interface (API) over the internet, whereby the
driver can access it through an application.
Moving on to another work in this area, [3] proposed the
Ease Parking Application, to be integrated into the system
between hardware of parking sensor and software of mobile
application. The application had three major functions
namely, displaying information on available parking, setting
parking ID and location, and user information. It also
displayed the building map and the plan for each floor
highlighting the parking availability. For parking location,
the user has to set the parking ID through manual keying-in
or QR code reader, then the parking location can be accessed
from any place in the building.
III. AUTHENTICATION TECHNIQUES
Schematic code methods like that proposed in [4], which is
Datamatrix QR codes, involve easy print image and scan
procedure, where print image and scan procedure provide
invisible alterations to a copy. In case the image is
written/printed, the pixel values will be changed, and this
idea was extensively used for the detection of original QR or
forged. It assists data authentication and authentication of
duplicates. Moreover, there are several methods that the idea
of sensitivity towards patterns and scan procedure has been
utilized, with some for the purpose of digital authentication
or duplicate authentication [5]. In relation to this, a
reproduction detection design or CDP is referred to as an
optimum entropy copyproduced using secret password key.
Based on the application and system, CDP is combined with
random image that has expressive data (e.g., stamp, logo and
barcode). The verification result depends on the contrast of
pixel values in image and printed CDP. Another method is
used for detecting fake data through textured copy [6], with
the textured copy having a visual letter. The system is useful
for the detection of real or fake data. Textured copy, in this
case, comprises of many patterns and sequences. The
technique of pattern recognition largely depends on the
amount of correlation found in authentication request.
Meanwhile, extra authentication application can be
conducted through symmetrical distortion in pattern and
image process [7]. This encapsulates pre-processing
procedure involving copy, discovery of symmetrical
distortion and alteration process – with the last one based on
the achievement of exploration of points.
IV. PROPOSED METHOD
The proposed study was suggested to be suitable for
commercial areas for employees working in the area. One of
the advantages is the clarification of issues linked to the
implementation, synchronization, load balancing (e.g.,
communication, overhead and reservation) as the reservation
authority was fitted in each parking lot
Fig. 1. The algorithm of the system
This study used the AGILE development methodology to
develop the system. Such method is simple and easy to
understand when developing an application. The next figure
displays AGILE method, with its six development steps
(requirements, plan, design, develop, release, and track &
monitor).
Fig. 2. Displays AGILE method, with its six development steps
The entire steps are achieved after which they are tested and
the whole system flow is displayed in the following flow
chart.
Fig. 3. Displays guests book their parking
The figure depicts the way the guests book their parking
spaces for a specific time and day. They first need to log into
the application and complete their sign in details, after
which, they can book a parking space or sing in to view the
QR code that was earlier booked
Fig. 3. Booking the data and lots
After the selection of parking date and completion of
personal details, a QR code is stored in one of the application
tabs for the guests to retrieve on the date of booking. This is
scanned by the parking lot security guard. But after the guest
has entered the parking lot, the QR code cannot be reused in
the same day or any other day after.
An identity authentication method is integrated for the
implementation of admission control for staff attempting to
attach to the network. Authenticated operators can be
attached to the system and for the authorization of guests to
the network, they can access the innovativeness exhibition
room, wherein managers can provide QR code and the guests
can be admitted through the network via QR code scanning.
The system enables 1) public QR code verification, 2)
organize visitor’s account policy for public QR codes
generation, 3) generate and transfer public QR code, pattern
and post it in public zones that visitors can have scanned by
the system, 4) modify the authentication and verification
success sheets; following the verification of the pass, the
public QR code is skimmed and the verification success
sheet is automatically displayed, 5) organize a gateway sheet
push rule to provide the customized verification sheet to
guests, and 6) improve visitor authorization consequences
and authorization instructions to appropriate access consent
to guests following the confirmation of their validity
V. SYSTEM DESIGN AND INTERFACE
The system is designed in such a way that the guest needs
to login through the login screen – with first time users
requested to sign up. After completing the signup details, the
user can move on to the login screen, and after logging in, a
calendar for the selective preferred data for booking of a
parking space appears. After the date selection, memos and
remarks can be left for the system to take note.
The QR code reader application is built on a smart
reserve parking system, implementing reservation service,
using data details to generate QR code algorithm. The
architecture of the system design (refer to Figure 1) proposes
a three component-scheme in the smart reserve parking
model: counting user, admin and security management
system. The application illustrates the parking lot based on
the designated area, with the corresponding value, category
and time. Data is obtained by the user of the parking lot area
and the designated period. The unique QR code of the user is
generated by the management system, wherein the individual
user’s details are encoded, to be authenticated by the system.
Every user reservation data is updated to display and
pinpoint the empty and reserved slots. Moreover, the security
management system determines each user through arbitrary
production of unique QR code and it scans the QR code
through a scanner to authenticate the details. The system is
time-effective eradicating the need to relay messages
between user and security management system for
authentication.
Furthermore, a related study [17] used QR Code (Rapid
Response Code), launched in 1994 by the Denso
Corporation. With over 40 versions of the QR Code
generator, and over four levels of error alteration, the
maximum representation size (current version) can include
7089 numeric information/4296 alphanumeric information
[17]. In this regard, the highest error alteration level enables
a 30% retrieval of representation code words, with the QR
Code having several progressive features enumerated as
follows [17];
1. High size information encryption – QR code scanner
possesses high-sized information encoding, with
maximum representation of 7089 letterings, compared to
the 2710 letterings of PDF417.
2. High-sensitive interpretation fitted with Charge Coupled
Device (CCD) interpretation, which enables the
identification of more QR Codes representations per
second, compared to PDF417 with the same volume of
data.
3. Readable from any way from 360 degree – in this regard,
the QR Code generator consists of a matrix 2D barcode
that can be read from anywhere in a 360 degree angle
while the PDF417 2D barcode is difficult to be read in
the same way.
The following are the phases of QR Code Generator
algorithm encoding and decoding:
a. Algorithm QR Encode
PHASE 1: Start
PHASE 2: Input the source file(infilled) or Text.
PHASE 3: Call GenSig(infile)
PHASE 4: Compress 'suepk','sig' and 'infile' into 'test.zip'
file
PHASE 5: Create an empty string data
PHASE 6: Convert 'test.zip' into string and store in 'data'
PHASE 7: Input the image format and resolution of the QR
Code to be generated
PHASE 8: Input Error Correction Level
PHASE 9: Using zxing[1] library method convert 'data' into
a BitMatrix object 'bitmatrix'
PHASE 10: Write bitmatrix to an image
PHASE 11: End BitMatrix represents a 2D matrix of bits.
QR Code Decoding
b. Algorithm QR Decode
PHASE 1: Start
PHASE 2: Input QR Code image
PHASE 3: Construct a Binary Bitmap object 'bitmap' from
source image
PHASE 4: Using zxing library method decode the 'bitmap'
and store it in the object 'result'
PHASE 5: Convert 'result' into string and write it to
'result.zip'.
PHASE 6: Extract result.zip
PHASE 7: If requested by user call VerSig('supek','sig',infile)
PHASE 6: End
VI. CONCLUSIONS
The creation and application of the system comes on quite
handy for parking guests as it fits their convenience. The
project process provided a learning experience, with skills
and knowledge being clarified for the creation of application.
Specifically, the QR code technology has been extensive
used as a technology in day-to-day life. Within such
technology, algorithms are integrated in real time data
processing used in parking-related technologies, self-parking
vehicles, speech parking, sensor-based parking and robotic
parking to enhance daily lives. This study proposed a system
that could enhance the lifestyle of individuals, particularly
those with vehicles. Online car parking application could
benefit drivers as they can book their parking slots ahead of
time. Universities should leverage this idea as it provides
countless advantages to the users.
ACKNOWLEDGMENT
We would like to thank the anonymous reviewers whose
comments have improved this paper and those who assisted
or participated in this research.
REFERENCES
[1] Muhammad, K., Ahmad, J., Sajjad, M., & Zubair, M. (2015).
Secure image steganography using cryptography and image
transposition. arXiv preprint arXiv:1510.04413.
[2] Chandramouli, R., &Memon, N. (2001, October). Analysis of
LSB based image steganography techniques. In Proceedings
2001 International Conference on Image Processing (Cat. No.
01CH37205) (Vol. 3, pp. 1019-1022). IEEE.
[3] Silman, J., 2001. Steganography and steganalysis: an
overview. Sans Institute, 3, pp.61-76.
[4] Jamil, T., 1999. Steganography: the art of hiding information in
plain sight. IEEE potentials, 18(1), pp.10-12.
[5] Wang, H. and Wang, S., 2004. Cyber warfare: steganography
vs. steganalysis. Communications of the ACM, 47(10), pp.76-82.
[6] Anderson, R.J. and Petitcolas, F.A., 1998. On the limits of
steganography. IEEE Journal on selected areas in
communications, 16(4), pp.474-481.
[7] Vembrina, Y., 2006. Spread Spectrum Steganograpy. Bandung:
Sekolah Teknik Elektro dan Informatika.
[8] Artz, D., 2001. Digital steganography: hiding data within
data. IEEE Internet computing, 5(3), pp.75-80.
[9] Pandya, M. and Jani, A., 2018. A Hybrid Approach for Secure
Message Communication and Color Image
Watermarking. Elixir Int. J. Digit. Process, 1(114), p.4.
[10] Bauer, F.L., 2002. Decrypted secrets: methods and maxims of
cryptology. Springer Science & Business Media.
[11] Luo, W., Huang, F. and Huang, J., 2010. Edge adaptive image
steganography based on LSB matching revisited. IEEE
Transactions on information forensics and security, 5(2),
pp.201-214.
[12] Muhammad, K., Ahmad, J., Rho, S. and Baik, S.W., 2017.
Image steganography for authenticity of visual contents in social
networks. Multimedia Tools and Applications, 76(18),
pp.18985-19004.
[13] Bailey, K. and Curran, K., 2006. An evaluation of image-based
steganography methods. Multimedia Tools and
Applications, 30(1), pp.55-88.
[14] Muhammad, K., Ahmad, J., Rehman, N.U., Jan, Z. and Qureshi,
R.J., 2015. A secure cyclic steganographic technique for color
images using randomization. arXiv preprint arXiv:1502.07808.
[15] Karim, S.M., Rahman, M.S. and Hossain, M.I., 2011,
December. A new approach for LSB based image
steganography using secret key. In 14th international
conference on computer and information technology (ICCIT
2011) (pp. 286-291). IEEE.
[16] Morkel, T., Eloff, J.H. and Olivier, M.S., 2005, June. An
overview of image steganography. In ISSA (pp. 1-11).
[17] Pund-Dange, S., 2018. Steganography: A Survey. In Cyber
Security (pp. 327-333). Springer, Singapore.
[18] Xiao Steganography 2.6.1, 2006/7, (<http://xiao-
steganography.en.softonic.com/>)
[19] Sloan, T. and Hernandez-Castro, J., 2018. Dismantling
OpenPuff PDF steganography. Digital Investigation, 25, pp.90-
96.
[20] Vaidya, S., 2017. OpenStego. Retrieved from OpenStego
website: https://www. openstego. com/features. html.
[21] Mike Williams. (2011).SteganographX Plus
https://www.downloadcrew.com/article/6634steganographx_plus
[22] Viceconti, M., Zannoni, C., Testi, D., Petrone, M., Perticoni, S.,
Quadrani, P., Taddei, F., Imboden, S. and Clapworthy, G., 2007.
The multimod application framework: a rapid application
development tool for computer aided medicine. Computer
methods and programs in biomedicine, 85(2), pp.138-151.
[23] Al-Sanjary, O. I., Ahmed, A. A., Jaharadak, A. A. B., Ali, M.
A., & Zangana, H. M. (2018, April). Detection clone an object
movement using an optical flow approach. In 2018 IEEE
Symposium on Computer Applications & Industrial Electronics
(ISCAIE) (pp. 388-394). IEEE.
[24] Al-Sanjary, O. I., Ghazali, N., Ahmed, A. A., & Sulong, G.
(2017, April). Semi-automatic Methods in Video Forgery
Detection Based on Multi-view Dimension. In International
Conference of Reliable Information and Communication
Technology (pp. 378-388). Springer, Cham.
[25] Al-Sanjary, O. I., Ahmed, A. A., Ahmad, H. B., Ali, M. A.,
Mohammed, M. N., Abdullah, M. I., & Ishak, Z. B. (2018,
December). Deleting Object in Video Copy-Move Forgery
Detection Based on Optical Flow Concept. In 2018 IEEE
Conference on Systems, Process and Control (ICSPC) (pp. 33-
38). IEEE.
[26] Al-Sanjary, O. I., & Sulong, G. (2015). Detection of video
forgery: A review of literature. Journal of Theoretical &
Applied Information Technology, 74(2).
[27] Ahmed, A. A., Al-Tamimi, M. S., Al-Sanjary, O. I., & Sulong,
G. (2017, April). Classification of arabic writer based on
clustering techniques. In International Conference of Reliable
Information and Communication Technology (pp. 48-58).
Springer, Cham.
[28] Ishak, Z., Rajendran, N., Al-Sanjary, O. I., & Razali, N. A. M.
(2020, February). Secure Biometric Lock System for Files and
Applications: A Review. In 2020 16th IEEE International
Colloquium on Signal Processing & Its Applications
(CSPA) (pp. 23-28). IEEE.