Pervasive 2D Barcodes for Camera Phone Applications

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information management system using 2D barcodes and cell phone technology

One of the challenging problems of pervasive computing is to link a physical object with digital information because many of the pervasive computing applications require manual inputs or complex image processing to obtain information related to a real object. The use of 2D barcodes eliminates such excess processing to acquire the needed information. The 2D barcodes have high capacity to store d...

متن کامل

Security Issues for 2D Barcodes Ticketing Systems

The paper presents a solution for endcoding/decoding access to the subway public transportation systems. First part of the paper is dedicated through section one and two to the most used 2D barcodes used in the market – QR and DataMatrix. The sample for DataMatrix is author propietary and the QR sample is from the QR standard [2]. The section three presents MMS and Digital Rights Management top...

متن کامل

2D Color Barcodes for Mobile Phones

We propose a new high capacity color barcode, named HCC2D (High Capacity Colored 2-Dimensional), which use colors to increase the barcode data density. The introduction and recognition of colored modules poses some new and non-trivial computer vision challenges, such as handling the color distortions introduced by the hardware equipment that realizes the Print&Scan process. We developed a proto...

متن کامل

Camera Phone Bans Expected

Camera phone sales are expected to surge. Gartner, an IT research and advisory firm, predicts that sales will nearly double this year, from 80 million in 2003 to 150 million in 2004. The Zelos Group of Oyster Bay, N.Y., predicts that one-third of cell phone users will have camera phones in 2008. Most users will have phone cameras with VGA resolution clarity or less, according to Zelos Group. Bu...

متن کامل

Authenticating Visual Cryptography Shares Using 2D Barcodes

One of the problems pertinent with many visual cryptography (VC) schemes is that of authentication. VC provides a way of sharing secrets between a number of participants. The secrets are in the form of an image that is encoded into multiple pieces known as shares. When these shares are physically superimposed, the secret can be instantly observed. A known problem is that of authentication. How ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Pervasive Computing

سال: 2007

ISSN: 1536-1268

DOI: 10.1109/mprv.2007.80