SlideShare a Scribd company logo
1 of 18
Download to read offline
YOGI VEMANAUNIVERSITY
KADAPA
PiCode : a New Picture-Embedding 2D Barcode
PRESENTED BY:
A NAGA DINESH
mca 6th sem
0011509017
pi code (picture embedding)
 Human readable information is provided before the barcode is successfully
decoded. This paper proposes a new picture-embedding 2D barcode, called
PiCode, which mitigates these two limitations by equipping a scannable 2D
barcode with a picturesque appearance. PiCode is designed with careful
considerations on both the perceptual quality of the embedded image and the
decoding robustness of the encoded message. Comparisons with existing
beautified 2D barcodes show that PiCode achieves one of the best perceptual
quality for the embedded image, and maintains a better trade-off between
image quality and decoding robustness in various application conditions.
PiCode has been implemented in Matlab on a PC and some key building
blocks have also been ported to Android and iOS platforms. Its practicality for
real-world applications have been successfully demonstrated.
ABSTRACT:
MODULE DESCRIPTION
 New Picture-Embedding.
 QR Code.
 2D Barcode.
 Embedding Image System.
New Picture Embedding System
 Appearance of a conventional 2D barcode pattern is often too obtrusive for
integrating into an aesthetically designed advertisement. Besides, no human
readable information is provided before the barcode is successfully decoded.
This paper proposes a new picture-embedding 2D barcode, called PiCode,
which mitigates these two limitations by equipping a scannable 2D barcode
with a picturesque appearance. PiCode is designed with careful
considerations on both the perceptual quality of the embedded image and the
decoding robustness of the encoded message. Comparisons with existing
beautified 2D barcodes show that PiCode achieves one of the best perceptual
quality for the embedded image, and maintains a better trade-off between
image quality and decoding robustness in various application conditions.
New Picture-Embedding
QR CODE
QR Code
QR code is an invention of Denso Wave Inc. and has been included in the
ISO standard.It was created for industrial applications, such as auto-
identification and tracking of electronic parts Its pattern is in black and
white, and consists of some large fixed patterns which are designed to
guarantee detection and decoding robustness. QR code contains three
squarish finder patterns located at the top left, top right and bottom left
corners, respectively, an alternating black and white timing pattern between
adjacent finder patterns, as well as a smaller squarish alignment pattern at the
bottom right region For the high capacity there are more fixed patterns
located in the interior region of the barcode.
 Instead of considering dedicated encryption algorithms tailored to the
scenario of encrypted-domain data hiding, we here stick to the conventional
stream cipher applied in the standard format. That is, the cipher text is
generated by bitwise XOR in the plaintext with the key stream. If not
otherwise specified, the widely used stream cipher AES in the CTR mode is
assumed. The resulting data hiding paradigm over encrypted domain could
be more practically useful because of two reasons:
 stream cipher used in the standard format is still one of the most popular and
reliable encryption tools.
 large number of data have already been encrypted using stream cipher in
standard way.
Embedded Image
Such fixed patterns are only present in QR codes with a storage being greater
than 196 bytes. This is because as the barcode capacity increases, the module
alignment accuracy becomes more critical and the fixed patterns can be utilized
to improve module alignment.
pi code (picture embedding)
 This paper proposes a new picture-embedding 2D barcode, called PiCode,
which mitigates these two limitations by equipping a scannable 2D barcode
with a picturesque appearance. PiCode is designed with careful
considerations on both the perceptual quality of the embedded image and the
decoding robustness of the encoded message. Comparisons with existing
beautified 2D barcodes show that PiCode achieves one of the best perceptual
quality for the embedded image, and maintains a better trade-off between
image quality and decoding robustness in various application conditions.
PiCode has been implemented in Matlab on a PC and some key building
blocks have also been ported to Android and iOS platforms. Its practicality
for real-world applications have been successfully demonstrated
2D Barcode
ARCHITECTURE
 The three squarish finder patterns are usually kept intact by the beautifying
process since they are pivotal in the QR code detection process. The
obtrusive appearance of such finder patterns pose a strong limitation on the
achievable perceptual quality of the embedded picture. Similarly, the timing
and alignment patterns in the interior region of the high capacity QR code
severely affects the perceptual quality. On the other hand, suppressing these
patterns without taking a sufficient remedial measure, as in QR Image , leads
to degradation in the decoding performance.
EXISTING SYSTEM
PROPOSED SYSTEM
 In this section, the proposed PiCode system is described with an emphasis on
the novel aspects of the encoding and decoding algorithms. For the encoding
part, the details of the modulation scheme will be presented to illustrate how
PiCode preserves the perceptual quality of the embedded image while
minimizing the interference of the latter incurred on the modulation
waveform. For the decoding part, the algorithms for performing corner
detection, module alignment and demodulation will be described.
pi code (picture embedding)
 This paper has designed a novel picturesque 2D barcode, named the PiCode.
Comparing with existing beautified QR codes, it provides one of the best
perceptual quality in preserving the aesthetic appearance of the embedded
image, while maintains the decoding robustness. It is achieved by the design
of barcode pattern and better decoding algorithms. The PiCode is designed
with less obtrusive fixed patterns to avoid distortions on the embedded
image, and a modulation scheme which represents the data bit value
adaptively with the embedded image intensity.
CONCLUSION
Thank You

More Related Content

What's hot

IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminarUmsh23
 
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Jishnu Mandal
 
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.RobbySahoo
 
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Pank Jes
 

What's hot (7)

IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminar
 
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...Application of QR Codes in Academic Libraries: With Special Reference to Cent...
Application of QR Codes in Academic Libraries: With Special Reference to Cent...
 
QR CODES IN BUSINESS.
QR CODES IN BUSINESS.QR CODES IN BUSINESS.
QR CODES IN BUSINESS.
 
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
 
Qr codes
Qr codesQr codes
Qr codes
 
Qr codes
Qr codesQr codes
Qr codes
 

Similar to pi code (picture embedding)

A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...IRJET Journal
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr CodeIRJET Journal
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...IRJET Journal
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesEditor IJCATR
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Likan Patra
 
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerIRJET Journal
 
IRJET- Two Layer QR Code with Picture Embedding
IRJET-  	  Two Layer QR Code with Picture EmbeddingIRJET-  	  Two Layer QR Code with Picture Embedding
IRJET- Two Layer QR Code with Picture EmbeddingIRJET Journal
 
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)Tejas Lalwani
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalIRJET Journal
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBadshah34
 
Mobile Scan Codes
Mobile Scan CodesMobile Scan Codes
Mobile Scan CodesJim Gay
 
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET Journal
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtIAEME Publication
 
Presentation on QR code.
Presentation on QR code.Presentation on QR code.
Presentation on QR code.RakibulIslam268
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology pptNeeta Chavare
 

Similar to pi code (picture embedding) (20)

A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
Limitations of Barcode and QR code Scanner
Limitations of Barcode and QR code ScannerLimitations of Barcode and QR code Scanner
Limitations of Barcode and QR code Scanner
 
IRJET- Two Layer QR Code with Picture Embedding
IRJET-  	  Two Layer QR Code with Picture EmbeddingIRJET-  	  Two Layer QR Code with Picture Embedding
IRJET- Two Layer QR Code with Picture Embedding
 
2 d barcode scanner kx 2500
2 d barcode scanner kx 25002 d barcode scanner kx 2500
2 d barcode scanner kx 2500
 
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPT
 
Qr code in education
Qr code in educationQr code in education
Qr code in education
 
Working of barcode reader
Working of barcode readerWorking of barcode reader
Working of barcode reader
 
Mobile Scan Codes
Mobile Scan CodesMobile Scan Codes
Mobile Scan Codes
 
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwt
 
Qr codes web
Qr codes webQr codes web
Qr codes web
 
Presentation on QR code.
Presentation on QR code.Presentation on QR code.
Presentation on QR code.
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology ppt
 

More from Naga Dinesh

More from Naga Dinesh (20)

internet and intra net
internet and intra netinternet and intra net
internet and intra net
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 
Firewall
FirewallFirewall
Firewall
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Tera data
Tera dataTera data
Tera data
 
Selenium ppt
Selenium pptSelenium ppt
Selenium ppt
 
pillcam
pillcampillcam
pillcam
 
team viewer
team viewerteam viewer
team viewer
 
Haptic tech
Haptic techHaptic tech
Haptic tech
 
Growth hacking
Growth hackingGrowth hacking
Growth hacking
 
Gifi
GifiGifi
Gifi
 
Anjular js
Anjular jsAnjular js
Anjular js
 
brain chip
 brain chip brain chip
brain chip
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
29.skinput technology
29.skinput technology29.skinput technology
29.skinput technology
 
5 g technology
5 g technology5 g technology
5 g technology
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
23.rainbowtechnology
23.rainbowtechnology23.rainbowtechnology
23.rainbowtechnology
 

Recently uploaded

Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 

Recently uploaded (20)

Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 

pi code (picture embedding)

  • 1. YOGI VEMANAUNIVERSITY KADAPA PiCode : a New Picture-Embedding 2D Barcode PRESENTED BY: A NAGA DINESH mca 6th sem 0011509017
  • 3.  Human readable information is provided before the barcode is successfully decoded. This paper proposes a new picture-embedding 2D barcode, called PiCode, which mitigates these two limitations by equipping a scannable 2D barcode with a picturesque appearance. PiCode is designed with careful considerations on both the perceptual quality of the embedded image and the decoding robustness of the encoded message. Comparisons with existing beautified 2D barcodes show that PiCode achieves one of the best perceptual quality for the embedded image, and maintains a better trade-off between image quality and decoding robustness in various application conditions. PiCode has been implemented in Matlab on a PC and some key building blocks have also been ported to Android and iOS platforms. Its practicality for real-world applications have been successfully demonstrated. ABSTRACT:
  • 4. MODULE DESCRIPTION  New Picture-Embedding.  QR Code.  2D Barcode.  Embedding Image System.
  • 6.  Appearance of a conventional 2D barcode pattern is often too obtrusive for integrating into an aesthetically designed advertisement. Besides, no human readable information is provided before the barcode is successfully decoded. This paper proposes a new picture-embedding 2D barcode, called PiCode, which mitigates these two limitations by equipping a scannable 2D barcode with a picturesque appearance. PiCode is designed with careful considerations on both the perceptual quality of the embedded image and the decoding robustness of the encoded message. Comparisons with existing beautified 2D barcodes show that PiCode achieves one of the best perceptual quality for the embedded image, and maintains a better trade-off between image quality and decoding robustness in various application conditions. New Picture-Embedding
  • 8. QR Code QR code is an invention of Denso Wave Inc. and has been included in the ISO standard.It was created for industrial applications, such as auto- identification and tracking of electronic parts Its pattern is in black and white, and consists of some large fixed patterns which are designed to guarantee detection and decoding robustness. QR code contains three squarish finder patterns located at the top left, top right and bottom left corners, respectively, an alternating black and white timing pattern between adjacent finder patterns, as well as a smaller squarish alignment pattern at the bottom right region For the high capacity there are more fixed patterns located in the interior region of the barcode.
  • 9.  Instead of considering dedicated encryption algorithms tailored to the scenario of encrypted-domain data hiding, we here stick to the conventional stream cipher applied in the standard format. That is, the cipher text is generated by bitwise XOR in the plaintext with the key stream. If not otherwise specified, the widely used stream cipher AES in the CTR mode is assumed. The resulting data hiding paradigm over encrypted domain could be more practically useful because of two reasons:  stream cipher used in the standard format is still one of the most popular and reliable encryption tools.  large number of data have already been encrypted using stream cipher in standard way. Embedded Image
  • 10. Such fixed patterns are only present in QR codes with a storage being greater than 196 bytes. This is because as the barcode capacity increases, the module alignment accuracy becomes more critical and the fixed patterns can be utilized to improve module alignment.
  • 12.  This paper proposes a new picture-embedding 2D barcode, called PiCode, which mitigates these two limitations by equipping a scannable 2D barcode with a picturesque appearance. PiCode is designed with careful considerations on both the perceptual quality of the embedded image and the decoding robustness of the encoded message. Comparisons with existing beautified 2D barcodes show that PiCode achieves one of the best perceptual quality for the embedded image, and maintains a better trade-off between image quality and decoding robustness in various application conditions. PiCode has been implemented in Matlab on a PC and some key building blocks have also been ported to Android and iOS platforms. Its practicality for real-world applications have been successfully demonstrated 2D Barcode
  • 14.  The three squarish finder patterns are usually kept intact by the beautifying process since they are pivotal in the QR code detection process. The obtrusive appearance of such finder patterns pose a strong limitation on the achievable perceptual quality of the embedded picture. Similarly, the timing and alignment patterns in the interior region of the high capacity QR code severely affects the perceptual quality. On the other hand, suppressing these patterns without taking a sufficient remedial measure, as in QR Image , leads to degradation in the decoding performance. EXISTING SYSTEM
  • 15. PROPOSED SYSTEM  In this section, the proposed PiCode system is described with an emphasis on the novel aspects of the encoding and decoding algorithms. For the encoding part, the details of the modulation scheme will be presented to illustrate how PiCode preserves the perceptual quality of the embedded image while minimizing the interference of the latter incurred on the modulation waveform. For the decoding part, the algorithms for performing corner detection, module alignment and demodulation will be described.
  • 17.  This paper has designed a novel picturesque 2D barcode, named the PiCode. Comparing with existing beautified QR codes, it provides one of the best perceptual quality in preserving the aesthetic appearance of the embedded image, while maintains the decoding robustness. It is achieved by the design of barcode pattern and better decoding algorithms. The PiCode is designed with less obtrusive fixed patterns to avoid distortions on the embedded image, and a modulation scheme which represents the data bit value adaptively with the embedded image intensity. CONCLUSION