Efficient QR Code Beautification With High Quality Visual Content

Slides:



Advertisements
Similar presentations
Packet Video Error Concealment With Auto Regressive Model Yongbing Zhang, Xinguang Xiang, Debin Zhao, Siwe Ma, Student Member, IEEE, and Wen Gao, Fellow,
Advertisements

QR Code Recognition Based On Image Processing
Forward Error Correction Demystified Presented by Sunrise Telecom Broadband … a step ahead.
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Doc.: IEEE /0227r0 Submission Nov 2006 Wu Yu-Chun, Huawei HisiSlide 1 Beacon Sync Frame Proposal for the IEEE P Wireless RANs Date:
COEN 180 Erasure Correcting, Error Detecting, and Error Correcting Codes.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
ADVANTAGE of GENERATOR MATRIX:
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Information Theory Linear Block Codes Jalal Al Roumy.
Error Detection and Correction
Sense making in linear algebra Lee Peng Yee Bangkok
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
Error Control Coding. Purpose To detect and correct error(s) that is introduced during transmission of digital signal.
Doc.: IEEE /0022r0 Submission January 2007 Wu Yu-Chun, Huawei HisiSlide 1 Enhanced Beacon Sync Frame for the IEEE P Wireless RANs.
Channel Coding and Error Control 1. Outline Introduction Linear Block Codes Cyclic Codes Cyclic Redundancy Check (CRC) Convolutional Codes Turbo Codes.
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
ARTcode: Preserve Art and Code In Any Image Zhe Yang, Yuting Bao, Chuhao Luo, Xingya Zhao, Siyu Zhu, Chunyi Peng, Yunxin Liu, Xinbing Wang (Shanghai Jiao.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Palette Partition Based Data Hiding for Color Images
DATA COMMUNICATION AND NETWORKINGS
A Secret Information Hiding Scheme Based on Switching Tree Coding
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Source: IEEE Transactions on Information Forensics and Security, Vol
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Nov 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Choice of BCH codes for IEEE q Date.
FEC on Sync Frame for the
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
A new two-level QR code with visual cryptography scheme
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
QR Code Authentication with Embedded Message Authentication Code
Scalable Speech Coding for IP Networks: Beyond iLBC
Information Redundancy Fault Tolerant Computing
Source: arXiv preprint arXiv:  (2018)
IV. Convolutional Codes
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
A Novel Latin Square-based Secret Sharing for M2M Communications
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Backward Compatible PHY Feasibility
Enhanced Beacon Sync Frame for the
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Speaker: YI-JIA HUANG Date: 2011/12/08 Authors: C. N
Partial reversible data hiding scheme using (7, 4) hamming code
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Source: Signal Processing: Image Communication 16 (2001) pp
Partial reversible data hiding scheme using (7, 4) hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Authors: A. Rasmussen, A. Kragelund, M. Berger, H. Wessing, S. Ruepp
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
Error Correction Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
IV. Convolutional Codes
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

Efficient QR Code Beautification With High Quality Visual Content Source: IEEE Transactions on Multimedia 17.9 (2015): 1515-1524. Authors: Shih-Syun Lin, Min-Chun Hu, Chien-Han Lee,and Tong- Yee Lee Speaker: Peng-Cheng Huang Date: 12/2/2018

Outline Introduction Related Work Proposed Scheme Experimental Results Conclusions

Introduction(1/3) msn.iecs.fcu.edu.tw The stander QR code usually looks like random black-and–white patterns. You can not find anything out even if you stare it all day. Actually , this QR code contain the URL of our laboratory. But if we add some aesthetic elements to make the original QR code looks like this one, and this one . I think these QR codes are much more attractive than original one. msn.iecs.fcu.edu.tw

Intrudoction(2/3) n-bits RS code. This is a n bits RS code, including m bits for message bits, p bits for padding bits, and t bits for parity bits. Parity bit used for detecting and correcting errors during scanning the QR code. The function pattern used for improving the reading performance. n-bits RS code.

Intrudoction(3/3) Two kinds of variations to beautify the QR code in the past few years , many researcher have tried to beautify the QR code by adding aesthetic elements or visual content . The are two kind of methods to beautify the QR code : changing the shape/color of modules and embedding a picture into the QR code. Here are some examples. Two kinds of variations to beautify the QR code

Related Work: Reed-Solomon Code(1/3) Background: Reed-Solomon encoded messages can be XOR'ed Reed-Solomon coding m + p = k t Where demotes the bit stream exclusive-or(XOR) operation. Reed-Solomon coding k1 t1 Reed-Solomon coding k2 t2 Reed-Solomon coding k1 ⊕ k2 t1 ⊕ t2  ⊕ means XOR

Related Work – Russ Cox’s Method(2/3) Controls bits(16 bits)=message(2bits)+pad(14bits) Parity bits:16 bits QR code data: 1 0 1 1 0 0 1 0 1 1 1 1 0 1 0 0 1 1 1 0 0 1 0 0 0 0 1 1 1 0 0 1 Image data: 1 0 0 1 1 0 1 0 0 1 1 0 0 1 0 0 1 1 1 0 0 1 0 0 1 0 1 1 1 1 0 1 Basis set of the entire vector space of valid Reed-Solomon blocks.

Related Work – Russ Cox’s Method(3/3) QR code data: 1 0 1 1 0 0 1 0 1 1 1 1 0 1 0 0 1 1 1 0 0 1 0 0 0 0 1 1 1 0 0 1 Image data: 1 0 0 1 0 0 1 0 1 1 1 1 0 1 0 0 1 1 1 0 0 1 0 0 1 1 0 0 1 1 0 1 Controls bits :16 bits Parity bits:16 bits

Proposed Scheme(1/5) The flowchart of the proposed QR code beautifier we propose a two-stage approach to generate QR code with high quality visual content. In the first stage, a baseline QR code with reliable decodability but poor visual quality is first synthesized based on the Gauss-Jordane limination procedure. In the second stage, a rendering mechanism is designed to improve the visual quality while avoiding affecting the decodability of the QRcode. The experimental results show that the proposed method substantially enhances the appearance of the QR code and the processing complexity is near real-time. The flowchart of the proposed QR code beautifier

Proposed Scheme – Baseline QR Code Synthesis(2/5) Example: three 5-bits RS codes with k = 3 and t = 2 : RS2 = RS1  ⊕ RS2 K4,K5,k6 can be generated by applying XOR operations on the RS blocks of the basis set

Proposed Scheme -- Baseline QR Code Synthesis(3/5) (a) Illustration of how an RS decodable bit stream is placed onto a 2D QR code. (b) The new bit stream obtained by changing positions of control bits and the corresponding 2D QR code. Border & Central

Proposed Scheme – QR Code Rendering(4/5)

Proposed Scheme – QR Code Rendering(5/5) where

Results:Visual quality and time complexity(1/8) each of them has limitations in terms of the size constraint of the embedded picture, visual quality of the generated QR code, or computational complexity Visualead halftone Lin[9] This paper

The influence of α value(2/8)

Correctness of QR code decoding(3/8)

The influence of image size and QR code size(4/8)

The influence of ρx and ρy(5/8)

The influence of error correction level(6/8)

The influence of message length(7/8)

The influence of lighting condition and viewing angle(8/8)

Conclusions The experimental results show that: the proposed method outperforms the existing works considering the appearance of the QR code the processing complexity is near real-time. In this work, we propose an efficient two-stage approach to generate QR codes with high quality visual content. A decodable baseline QR code with poor visual quality is first synthesized based on the Gauss-Jordan elimination procedure and then a rendering mechanism is designed to improve the visual quality while avoid affecting the decodability of the QR code.