A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,

Slides:



Advertisements
Similar presentations
QR Code Recognition Based On Image Processing
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 Template-Based Classification Method for Chinese Character Recognition Presenter: Tienwei Tsai Department of Informaiton Management, Chihlee Institute.
Presented by Tienwei Tsai July, 2005
1 Iterative Multimodel Subimage Binarization for Handwritten Character Segmentation Author: Amer Dawoud and Mohamed S. Kamel Source: IEEE TRANSACTIONS.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
2005/12/021 Content-Based Image Retrieval Using Grey Relational Analysis Dept. of Computer Engineering Tatung University Presenter: Tienwei Tsai ( 蔡殿偉.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, May 2012 Kyungmin Lim, Seongwan Kim, Jaeho Lee, Daehyun Pak and Sangyoun Lee, Member, IEEE 報告者:劉冠宇.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
Author : Sang Hwa Lee, Junyeong Choi, and Jong-Il Park
An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining Presented by C.C. Chang Dept. of Computer Science and Information.
A Novel 2D-to-3D Conversion System Using Edge Information
JPEG Compressed Image Retrieval via Statistical Features
(k, n)-Image Reversible Data Hiding
Image camouflage by reversible image transformation
Source: IEEE Transactions on Information Forensics and Security, Vol
Picode: A New Picture-Embedding 2D Barcode
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
Implementation on video object segmentation algorithm
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source: arXiv preprint arXiv:  (2018)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Improved joint reversible data hiding in encrypted images
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Reversible Data Hiding in JPEG Images
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Source: Pattern Recognition Letters 29 (2008)
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
An Algorithm for Removable Visible Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
A Fast No Search Fractal Image Coding Method
Hidden Digital Watermarks in Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Presentation transcript:

A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology, Vol. 25, No. 4, pp. 688-700, 2015. Authors: Lee Ya-Lin, Tsai Wen-Hsiang Speaker: Huang Peng-Cheng Date: 11/9/2018

Outline Introduction Proposed Scheme Experiment Results Conclustion

Introduction(1/2) What is the signal rich art using for? Exchange the information The techniques for signal-rich-art communication Barcodes (1-D barcode, QR code, PDF417, Data matrix code) Data hiding (watermarking)

Introduction(2/2)

Proposed Scheme(1/12) Major steps of two phases of proposed method

Proposed Scheme(2/12). 1. Generation of Signal-Rich-Art Code Image. A Proposed Scheme(2/12) 1. Generation of Signal-Rich-Art Code Image A. Pattern Image Creation(1/2)

Proposed Scheme(3/12). 1. Generation of Signal-Rich-Art Code Image. A Proposed Scheme(3/12) 1. Generation of Signal-Rich-Art Code Image A. Pattern Image Creation(2/2)

Proposed Scheme(4/12). 1. Generation of Signal-Rich-Art Code Image. B Proposed Scheme(4/12) 1. Generation of Signal-Rich-Art Code Image B. Block Luminance Modulation (1/3) NB, Nw Ti Sort Bi q1' q2' q3' q4' q5' q6' q7' q8' q9' q10' q11' q12' q13' q14' q15' q16' e.g. T4 NB=4, Nw=12 Sort 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Proposed Scheme(5/12). 1. Generation of Signal-Rich-Art Code Image. B Proposed Scheme(5/12) 1. Generation of Signal-Rich-Art Code Image B. Block Luminance Modulation (2/3) = 1 4 1+2+3+4 = 1 12 5+…+16

Proposed Scheme(6/12). 1. Generation of Signal-Rich-Art Code Image. B Proposed Scheme(6/12) 1. Generation of Signal-Rich-Art Code Image B. Block Luminance Modulation (3/3)

Proposed Scheme(7/12). 2. Message Extraction. A Proposed Scheme(7/12) 2. Message Extraction A. Localization of Signal-Rich-Art Code Image and Inverse Perspective Transform(1/1)

Proposed Scheme(8/12). 2. Message Extraction. B Proposed Scheme(8/12) 2. Message Extraction B. Block Number Identification and Block Segmentation (1/2) (1)Compute the gradient value of each pixel. (3) Find the candidate splitting lines (2)guess the number NS of unit blocks in the horizontal or vertical direction (4) Find the largest nj which get the close to the largest AGnj, as the desired number Ns. Where L is the side length of the capture image

Proposed Scheme(9/12). 2. Message Extraction. B Proposed Scheme(9/12) 2. Message Extraction B. Block Number Identification and Block Segmentation (2/2)

Proposed Scheme(10/12). 2. Message Extraction. C Proposed Scheme(10/12) 2. Message Extraction C. Binarization and Recognition of Pattern Blocks(1/3) (1) Binarize the image using Moment-preserving threshold technique (2) Calculate the feature of the black for each block 𝑏𝑓 𝑘𝑗 = 1, 𝑤ℎ𝑒𝑛 𝑡ℎ𝑒 𝑢𝑛𝑖𝑡 𝑏𝑙𝑜𝑐𝑘 𝑖𝑠 𝑏𝑙𝑎𝑐𝑘 0, 𝑤ℎ𝑒𝑛 𝑡ℎ𝑒 𝑢𝑛𝑖𝑡 𝑏𝑙𝑜𝑐𝑘 𝑖𝑠 𝑤ℎ𝑖𝑡𝑒 For code pattern For pattern block (3) Find out the minimum absolute distance between the object with eight code pattern

Proposed Scheme(11/12). 2. Message Extraction. C Proposed Scheme(11/12) 2. Message Extraction C. Binarization and Recognition of Pattern Blocks(2/3) Suppose that

Proposed Scheme(12/12). 2. Message Extraction. C Proposed Scheme(12/12) 2. Message Extraction C. Binarization and Recognition of Pattern Blocks(3/3)

Experiment Results(1/7)

Experiment Results(2/7)

Experiment Results(3/7) the metric of mean structural similarity (MSSIM)

Experiment Results(4/7)

Experiment Results(5/7)

Experiment Results(6/7)

Experiment Results(7/7)

Conclusion a better visual appearance the message data extraction accuracy is higher the data extraction speed is higher