Picode: A New Picture-Embedding 2D Barcode

Slides:



Advertisements
Similar presentations
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Ai-mei Huang And Truong Nguyen IEEE, WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS. (WOWMOM), 2008 IEEE, WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS.
Multiple Image Watermarking Applied to Health Information Management
1 A Gradient Based Predictive Coding for Lossless Image Compression Source: IEICE Transactions on Information and Systems, Vol. E89-D, No. 7, July 2006.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
MPEG4 Fine Grained Scalable Multi-Resolution Layered Video Encoding Authors from: University of Georgia Speaker: Chang-Kuan Lin.
COMPARATIVE STUDY OF HEVC and H.264 INTRA FRAME CODING AND JPEG2000 BY Under the Guidance of Harshdeep Brahmasury Jain Dr. K. R. RAO ID MS Electrical.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Scalable Speech Coding for IP Networks: Beyond iLBC
Der-Chyuan Lou and Jiang-Lung Liu,
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Image camouflage by reversible image transformation
Source: IEEE Transactions on Information Forensics and Security, Vol
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
A new two-level QR code with visual cryptography scheme
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Scalable Speech Coding for IP Networks: Beyond iLBC
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Source: arXiv preprint arXiv:  (2018)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
A Novel Latin Square-based Secret Sharing for M2M Communications
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Source: Energies, Vol. 10, No. 12, November 2017
Dynamic embedding strategy of VQ-based information hiding approach
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
Source : Journal of Visual Communication and Image Representation, vol
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
Source: Pattern Recognition Letters 29 (2008)
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
An Algorithm for Removable Visible Watermarking
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
An imperceptible spatial domain color image watermarking scheme
A Fast No Search Fractal Image Coding Method
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Multi-Modal Multi-Scale Deep Learning for Large-Scale Image Annotation
Source : Digital Signal Processing. Vol. 73, pp , Feb
An Efficient Spatial Prediction-Based Image Compression Scheme
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Picode: A New Picture-Embedding 2D Barcode Source: IEEE Transactions on Image Processing, Vol. 25, No. 8, 2016. Authors: Chen Changsheng, Huang Wenjian, Zhou Baojian, Liu Chenchen, Mow Wai Ho Speaker: Huang Peng-Cheng Date: 9/20/2018

Outline Introduction Proposed Scheme Experiment Results Conclusion

Introduction(1/2)

Proposed Scheme(1/7) The block diagrams of the PiCode encoding procedures.

Proposed Scheme(2/7) The block diagrams of the PiCode decoding procedures.

Proposed Scheme(3/7) 1. PiCode Encoding ∆𝐼= 100+0.1 25 ×25+ ∈ 0 / ∈ 1 =5∗25+ ∈ 0 / ∈ 1 𝑅=3 ∆𝐼 ∗3 𝑖𝑛𝑛𝑒𝑟 ∆𝐼 3 ∗12 (𝑜𝑢𝑡𝑒𝑟)

Proposed Scheme(4/7) 2. PiCode Decoding ----Coarse-fine corner detection

Proposed Scheme(5/7) 2. PiCode Decoding ---Module Alignment

Proposed Scheme(6/7) 2. PiCode Decoding

Proposed Scheme(7/7) 2. PiCode Decoding △1 and △2 are set as 50% and 150% of the median contrast of all modules in the barcode image, respectively.

Experiment Results(1/7) multi-scale structural similarity (MS-SSIM) metric A. Perceptual Quality

Experiment Results(2/7) B. Decoding Robustness

Experiment Results(3/7)

Experiment Results(4/7)

Experiment Results(5/7)

Experiment Results(6/7) C. Effect of Varying Embedding Intensity λ

Experiment Results(7/7) D. PC and Mobile Implementations

Conclusion it provides one of the best perceptual quality in preserving the aesthetic appearance of the embedded image, while maintains the decoding robustness.

comments Low reliability; Improving the Modulation process, for a better visual quality.