SlideShare a Scribd company logo
YOGI VEMANAUNIVERSITY
KADAPA
PiCode : a New Picture-Embedding 2D Barcode
PRESENTED BY:
A NAGA DINESH
mca 6th sem
0011509017
 Human readable information is provided before the barcode is successfully
decoded. This paper proposes a new picture-embedding 2D barcode, called
PiCode, which mitigates these two limitations by equipping a scannable 2D
barcode with a picturesque appearance. PiCode is designed with careful
considerations on both the perceptual quality of the embedded image and the
decoding robustness of the encoded message. Comparisons with existing
beautified 2D barcodes show that PiCode achieves one of the best perceptual
quality for the embedded image, and maintains a better trade-off between
image quality and decoding robustness in various application conditions.
PiCode has been implemented in Matlab on a PC and some key building
blocks have also been ported to Android and iOS platforms. Its practicality for
real-world applications have been successfully demonstrated.
ABSTRACT:
MODULE DESCRIPTION
 New Picture-Embedding.
 QR Code.
 2D Barcode.
 Embedding Image System.
New Picture Embedding System
 Appearance of a conventional 2D barcode pattern is often too obtrusive for
integrating into an aesthetically designed advertisement. Besides, no human
readable information is provided before the barcode is successfully decoded.
This paper proposes a new picture-embedding 2D barcode, called PiCode,
which mitigates these two limitations by equipping a scannable 2D barcode
with a picturesque appearance. PiCode is designed with careful
considerations on both the perceptual quality of the embedded image and the
decoding robustness of the encoded message. Comparisons with existing
beautified 2D barcodes show that PiCode achieves one of the best perceptual
quality for the embedded image, and maintains a better trade-off between
image quality and decoding robustness in various application conditions.
New Picture-Embedding
QR CODE
QR Code
QR code is an invention of Denso Wave Inc. and has been included in the
ISO standard.It was created for industrial applications, such as auto-
identification and tracking of electronic parts Its pattern is in black and
white, and consists of some large fixed patterns which are designed to
guarantee detection and decoding robustness. QR code contains three
squarish finder patterns located at the top left, top right and bottom left
corners, respectively, an alternating black and white timing pattern between
adjacent finder patterns, as well as a smaller squarish alignment pattern at the
bottom right region For the high capacity there are more fixed patterns
located in the interior region of the barcode.
 Instead of considering dedicated encryption algorithms tailored to the
scenario of encrypted-domain data hiding, we here stick to the conventional
stream cipher applied in the standard format. That is, the cipher text is
generated by bitwise XOR in the plaintext with the key stream. If not
otherwise specified, the widely used stream cipher AES in the CTR mode is
assumed. The resulting data hiding paradigm over encrypted domain could
be more practically useful because of two reasons:
 stream cipher used in the standard format is still one of the most popular and
reliable encryption tools.
 large number of data have already been encrypted using stream cipher in
standard way.
Embedded Image
Such fixed patterns are only present in QR codes with a storage being greater
than 196 bytes. This is because as the barcode capacity increases, the module
alignment accuracy becomes more critical and the fixed patterns can be utilized
to improve module alignment.
 This paper proposes a new picture-embedding 2D barcode, called PiCode,
which mitigates these two limitations by equipping a scannable 2D barcode
with a picturesque appearance. PiCode is designed with careful
considerations on both the perceptual quality of the embedded image and the
decoding robustness of the encoded message. Comparisons with existing
beautified 2D barcodes show that PiCode achieves one of the best perceptual
quality for the embedded image, and maintains a better trade-off between
image quality and decoding robustness in various application conditions.
PiCode has been implemented in Matlab on a PC and some key building
blocks have also been ported to Android and iOS platforms. Its practicality
for real-world applications have been successfully demonstrated
2D Barcode
ARCHITECTURE
 The three squarish finder patterns are usually kept intact by the beautifying
process since they are pivotal in the QR code detection process. The
obtrusive appearance of such finder patterns pose a strong limitation on the
achievable perceptual quality of the embedded picture. Similarly, the timing
and alignment patterns in the interior region of the high capacity QR code
severely affects the perceptual quality. On the other hand, suppressing these
patterns without taking a sufficient remedial measure, as in QR Image , leads
to degradation in the decoding performance.
EXISTING SYSTEM
PROPOSED SYSTEM
 In this section, the proposed PiCode system is described with an emphasis on
the novel aspects of the encoding and decoding algorithms. For the encoding
part, the details of the modulation scheme will be presented to illustrate how
PiCode preserves the perceptual quality of the embedded image while
minimizing the interference of the latter incurred on the modulation
waveform. For the decoding part, the algorithms for performing corner
detection, module alignment and demodulation will be described.
 This paper has designed a novel picturesque 2D barcode, named the PiCode.
Comparing with existing beautified QR codes, it provides one of the best
perceptual quality in preserving the aesthetic appearance of the embedded
image, while maintains the decoding robustness. It is achieved by the design
of barcode pattern and better decoding algorithms. The PiCode is designed
with less obtrusive fixed patterns to avoid distortions on the embedded
image, and a modulation scheme which represents the data bit value
adaptively with the embedded image intensity.
CONCLUSION
Thank You

More Related Content

What's hot

IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET Journal
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminar
Umsh23
 
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Jishnu Mandal
 
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.
RobbySahoo
 
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
Pank Jes
 
Qr codes
Qr codesQr codes
Qr codes
Ellinamama
 
Qr codes
Qr codesQr codes
Qr codes
niyaj ahmed
 

What's hot (7)

IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminar
 
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
 
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.
 
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
 
Qr codes
Qr codesQr codes
Qr codes
 
Qr codes
Qr codesQr codes
Qr codes
 

Similar to pi code (picture embedding)

A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
IRJET Journal
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET Journal
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
IRJET Journal
 
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCBarcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
yeswanthkrishna2005
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET Journal
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
Editor IJCATR
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
Likan Patra
 
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code Scanner
IRJET Journal
 
IRJET- Two Layer QR Code with Picture Embedding
IRJET-  	  Two Layer QR Code with Picture EmbeddingIRJET-  	  Two Layer QR Code with Picture Embedding
IRJET- Two Layer QR Code with Picture Embedding
IRJET Journal
 
2 d barcode scanner kx 2500
2 d barcode scanner kx 25002 d barcode scanner kx 2500
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)
Tejas Lalwani
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET Journal
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPT
Badshah34
 
Qr code in education
Qr code in educationQr code in education
Qr code in education
Vasil Dimitrov
 
Working of barcode reader
Working of barcode readerWorking of barcode reader
Working of barcode reader
Unitedworld School Of Business
 
Mobile Scan Codes
Mobile Scan CodesMobile Scan Codes
Mobile Scan Codes
Jim Gay
 
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwt
IAEME Publication
 
Qr codes web
Qr codes webQr codes web
Qr codes web
Simran Gupta
 
Presentation on QR code.
Presentation on QR code.Presentation on QR code.
Presentation on QR code.
RakibulIslam268
 

Similar to pi code (picture embedding) (20)

A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCBarcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
Barcode Detection GCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code Scanner
 
IRJET- Two Layer QR Code with Picture Embedding
IRJET-  	  Two Layer QR Code with Picture EmbeddingIRJET-  	  Two Layer QR Code with Picture Embedding
IRJET- Two Layer QR Code with Picture Embedding
 
2 d barcode scanner kx 2500
2 d barcode scanner kx 25002 d barcode scanner kx 2500
2 d barcode scanner kx 2500
 
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPT
 
Qr code in education
Qr code in educationQr code in education
Qr code in education
 
Working of barcode reader
Working of barcode readerWorking of barcode reader
Working of barcode reader
 
Mobile Scan Codes
Mobile Scan CodesMobile Scan Codes
Mobile Scan Codes
 
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwt
 
Qr codes web
Qr codes webQr codes web
Qr codes web
 
Presentation on QR code.
Presentation on QR code.Presentation on QR code.
Presentation on QR code.
 

More from Naga Dinesh

internet and intra net
internet and intra netinternet and intra net
internet and intra net
Naga Dinesh
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
Naga Dinesh
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
Naga Dinesh
 
Firewall
FirewallFirewall
Firewall
Naga Dinesh
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
Naga Dinesh
 
Tera data
Tera dataTera data
Tera data
Naga Dinesh
 
Selenium ppt
Selenium pptSelenium ppt
Selenium ppt
Naga Dinesh
 
pillcam
pillcampillcam
pillcam
Naga Dinesh
 
team viewer
team viewerteam viewer
team viewer
Naga Dinesh
 
Haptic tech
Haptic techHaptic tech
Haptic tech
Naga Dinesh
 
Growth hacking
Growth hackingGrowth hacking
Growth hacking
Naga Dinesh
 
Gifi
GifiGifi
Anjular js
Anjular jsAnjular js
Anjular js
Naga Dinesh
 
brain chip
 brain chip brain chip
brain chip
Naga Dinesh
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
Naga Dinesh
 
mobilejammer
mobilejammermobilejammer
mobilejammer
Naga Dinesh
 
29.skinput technology
29.skinput technology29.skinput technology
29.skinput technology
Naga Dinesh
 
5 g technology
5 g technology5 g technology
5 g technology
Naga Dinesh
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
Naga Dinesh
 
23.rainbowtechnology
23.rainbowtechnology23.rainbowtechnology
23.rainbowtechnology
Naga Dinesh
 

More from Naga Dinesh (20)

internet and intra net
internet and intra netinternet and intra net
internet and intra net
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 
Firewall
FirewallFirewall
Firewall
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Tera data
Tera dataTera data
Tera data
 
Selenium ppt
Selenium pptSelenium ppt
Selenium ppt
 
pillcam
pillcampillcam
pillcam
 
team viewer
team viewerteam viewer
team viewer
 
Haptic tech
Haptic techHaptic tech
Haptic tech
 
Growth hacking
Growth hackingGrowth hacking
Growth hacking
 
Gifi
GifiGifi
Gifi
 
Anjular js
Anjular jsAnjular js
Anjular js
 
brain chip
 brain chip brain chip
brain chip
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
29.skinput technology
29.skinput technology29.skinput technology
29.skinput technology
 
5 g technology
5 g technology5 g technology
5 g technology
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
23.rainbowtechnology
23.rainbowtechnology23.rainbowtechnology
23.rainbowtechnology
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 

pi code (picture embedding)

  • 1. YOGI VEMANAUNIVERSITY KADAPA PiCode : a New Picture-Embedding 2D Barcode PRESENTED BY: A NAGA DINESH mca 6th sem 0011509017
  • 2.
  • 3.  Human readable information is provided before the barcode is successfully decoded. This paper proposes a new picture-embedding 2D barcode, called PiCode, which mitigates these two limitations by equipping a scannable 2D barcode with a picturesque appearance. PiCode is designed with careful considerations on both the perceptual quality of the embedded image and the decoding robustness of the encoded message. Comparisons with existing beautified 2D barcodes show that PiCode achieves one of the best perceptual quality for the embedded image, and maintains a better trade-off between image quality and decoding robustness in various application conditions. PiCode has been implemented in Matlab on a PC and some key building blocks have also been ported to Android and iOS platforms. Its practicality for real-world applications have been successfully demonstrated. ABSTRACT:
  • 4. MODULE DESCRIPTION  New Picture-Embedding.  QR Code.  2D Barcode.  Embedding Image System.
  • 6.  Appearance of a conventional 2D barcode pattern is often too obtrusive for integrating into an aesthetically designed advertisement. Besides, no human readable information is provided before the barcode is successfully decoded. This paper proposes a new picture-embedding 2D barcode, called PiCode, which mitigates these two limitations by equipping a scannable 2D barcode with a picturesque appearance. PiCode is designed with careful considerations on both the perceptual quality of the embedded image and the decoding robustness of the encoded message. Comparisons with existing beautified 2D barcodes show that PiCode achieves one of the best perceptual quality for the embedded image, and maintains a better trade-off between image quality and decoding robustness in various application conditions. New Picture-Embedding
  • 8. QR Code QR code is an invention of Denso Wave Inc. and has been included in the ISO standard.It was created for industrial applications, such as auto- identification and tracking of electronic parts Its pattern is in black and white, and consists of some large fixed patterns which are designed to guarantee detection and decoding robustness. QR code contains three squarish finder patterns located at the top left, top right and bottom left corners, respectively, an alternating black and white timing pattern between adjacent finder patterns, as well as a smaller squarish alignment pattern at the bottom right region For the high capacity there are more fixed patterns located in the interior region of the barcode.
  • 9.  Instead of considering dedicated encryption algorithms tailored to the scenario of encrypted-domain data hiding, we here stick to the conventional stream cipher applied in the standard format. That is, the cipher text is generated by bitwise XOR in the plaintext with the key stream. If not otherwise specified, the widely used stream cipher AES in the CTR mode is assumed. The resulting data hiding paradigm over encrypted domain could be more practically useful because of two reasons:  stream cipher used in the standard format is still one of the most popular and reliable encryption tools.  large number of data have already been encrypted using stream cipher in standard way. Embedded Image
  • 10. Such fixed patterns are only present in QR codes with a storage being greater than 196 bytes. This is because as the barcode capacity increases, the module alignment accuracy becomes more critical and the fixed patterns can be utilized to improve module alignment.
  • 11.
  • 12.  This paper proposes a new picture-embedding 2D barcode, called PiCode, which mitigates these two limitations by equipping a scannable 2D barcode with a picturesque appearance. PiCode is designed with careful considerations on both the perceptual quality of the embedded image and the decoding robustness of the encoded message. Comparisons with existing beautified 2D barcodes show that PiCode achieves one of the best perceptual quality for the embedded image, and maintains a better trade-off between image quality and decoding robustness in various application conditions. PiCode has been implemented in Matlab on a PC and some key building blocks have also been ported to Android and iOS platforms. Its practicality for real-world applications have been successfully demonstrated 2D Barcode
  • 14.  The three squarish finder patterns are usually kept intact by the beautifying process since they are pivotal in the QR code detection process. The obtrusive appearance of such finder patterns pose a strong limitation on the achievable perceptual quality of the embedded picture. Similarly, the timing and alignment patterns in the interior region of the high capacity QR code severely affects the perceptual quality. On the other hand, suppressing these patterns without taking a sufficient remedial measure, as in QR Image , leads to degradation in the decoding performance. EXISTING SYSTEM
  • 15. PROPOSED SYSTEM  In this section, the proposed PiCode system is described with an emphasis on the novel aspects of the encoding and decoding algorithms. For the encoding part, the details of the modulation scheme will be presented to illustrate how PiCode preserves the perceptual quality of the embedded image while minimizing the interference of the latter incurred on the modulation waveform. For the decoding part, the algorithms for performing corner detection, module alignment and demodulation will be described.
  • 16.
  • 17.  This paper has designed a novel picturesque 2D barcode, named the PiCode. Comparing with existing beautified QR codes, it provides one of the best perceptual quality in preserving the aesthetic appearance of the embedded image, while maintains the decoding robustness. It is achieved by the design of barcode pattern and better decoding algorithms. The PiCode is designed with less obtrusive fixed patterns to avoid distortions on the embedded image, and a modulation scheme which represents the data bit value adaptively with the embedded image intensity. CONCLUSION