Source: arXiv preprint arXiv:  (2018)

Slides:



Advertisements
Similar presentations
Leveraging Stereopsis for Saliency Analysis
Advertisements

Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
1 Abstract This paper presents a novel modification to the classical Competitive Learning (CL) by adding a dynamic branching mechanism to neural networks.
Robust Object Segmentation Using Adaptive Thresholding Xiaxi Huang and Nikolaos V. Boulgouris International Conference on Image Processing 2007.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
Speaker: Chi-Yu Hsu Advisor: Prof. Jian-Jung Ding Leveraging Stereopsis for Saliency Analysis, CVPR 2012.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
1 Iterative Multimodel Subimage Binarization for Handwritten Character Segmentation Author: Amer Dawoud and Mohamed S. Kamel Source: IEEE TRANSACTIONS.
1 A Gradient Based Predictive Coding for Lossless Image Compression Source: IEICE Transactions on Information and Systems, Vol. E89-D, No. 7, July 2006.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Shadow Detection in Remotely Sensed Images Based on Self-Adaptive Feature Selection Jiahang Liu, Tao Fang, and Deren Li IEEE TRANSACTIONS ON GEOSCIENCE.
Authors: Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang Adviser: 席家年 Speaker: 黃敏虔 Date:2010/05/18 received July 29, 2006; revised April 24,2007;
ARTcode: Preserve Art and Code In Any Image Zhe Yang, Yuting Bao, Chuhao Luo, Xingya Zhao, Siyu Zhu, Chunyi Peng, Yunxin Liu, Xinbing Wang (Shanghai Jiao.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Der-Chyuan Lou and Jiang-Lung Liu,
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
A New Classification Mechanism for Retinal Images
Face recognition using improved local texture pattern
Saliency detection Donghun Yeo CV Lab..
Source: IEEE Transactions on Information Forensics and Security, Vol
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Source : Signal Processing, Volume 133, April 2017, Pages
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
A new two-level QR code with visual cryptography scheme
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Source: Signal Processing 109 (2015) 317–333
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
Hiding Data in a Color Palette Image with Hybrid Strategies
A Novel Latin Square-based Secret Sharing for M2M Communications
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source: Information Sciences, 2018, accpeted.
Reduction of blocking artifacts in DCT-coded images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: IEEE Access, Vol. 6, Dec. 2017, pp
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Dynamic embedding strategy of VQ-based information hiding approach
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Speaker: YI-JIA HUANG Date: 2011/12/08 Authors: C. N
Chair Professor Chin-Chen Chang Feng Chia University
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
An Algorithm for Compression of Bilevel Images
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
A new chaotic algorithm for image encryption
Digital Watermarking for Image Authentication with Localization
Source: Pattern Recognition Letters 29 (2008)
Novel Multiple Spatial Watermarking Technique in Color Images
Source: IEEE Transactions on Circuits and Systems,
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
An Iterative Method for Lossless Data Embedding in BMP Images
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

ART-UP: A Novel Method for Generating Scanning-robust Aesthetic QR codes Source: arXiv preprint arXiv:1803.02280 (2018) Authors: Xu, Mingliang, Qingfeng Li, Jianwei Niu, Xiting Liu, Weiwei Xu, Pei Lv, and Bing Zhou Speaker: Huang Peng-Cheng Date: 1/11/2019

Outline Introduction QR Code Scanning Proposed scheme Experimental results Conclusions Comments

Introduction(1/1)

QR Code Scanning(1/2) Decoding Algorithm Mackintosh, A., Martin, A., Brown, B., Brunschen, C. and Switkin, D., 2009. Zxing, open source library to read 1D/2D barcodes. 2012. https://code, google, com/p/zxing.

QR Code Scanning(2/2) Scanning Error Analysis. 8*8 5*5 hybrid local block averaging method

Proposed scheme (1/8)

Proposed scheme (2/8) -- Binary Aesthetic QR Codes (1/2) Visual Saliency Optimization Module-Based Binarization Edge and Sal are the results of edge detection and visual saliency respectively for image I. Heu defines some heuristic rules, the values of λ1, λ2, and λ3 are determined to be 0.67, 0.23 and 0.10 respectively

Proposed scheme (3/8) -- Binary Aesthetic QR Codes (2/2) Codewords Adjustment

Proposed scheme (4/8) -- Grayscale Aesthetic QR Codes (1/3) Module-based Scanning Probability Estimation C. Probability of Correctly Scanning a Module A. Thresholding Error Estimation B. Sampling Error Estimation

Proposed scheme (5/8) -- Grayscale Aesthetic QR Codes (2/3) Luminance Adjustment A. Luminance Modification Algorithm

Proposed scheme (6/8) -- Grayscale Aesthetic QR Codes (3/3) B. Threshold Estimation Algorithm

Proposed scheme (7/8) -- Color Aesthetic QR Codes (1/1)

Proposed scheme (8/8) -- Parameter Analysis (1/1)

Experimental results (1/3)

Experimental results (2/3) --Visual Effects(1/1)

Experimental results (3/3) --Scanning Robustness(1/1)

Conclusions Strong robustness.

Comments