Fig 1 - uploaded by Amin Motahari
Content may be subject to copyright.
An illustration of transmission of data between two handheld camera- phones using a sequence of 2D barcodes. 

An illustration of transmission of data between two handheld camera- phones using a sequence of 2D barcodes. 

Source publication
Article
Full-text available
The concept of 2-D barcodes is of great relevance for use in wireless data transmission between handheld electronic devices. In a typical setup, any file on a cell phone, for example, can be transferred to a second cell phone through a series of images on the LCD which are then captured and decoded through the camera of the second cell phone. In th...

Contexts in source publication

Context 1
... readers one could contemplate that re- placement of the paper with LCD may open another promising front for broader applications of 2D barcodes as a mean of data transfer. Moreover unlike the static paper, the LCD may dis- play time-varying barcodes for the eventual transfer of streams of data to the receiving electronic device(s) as depicted in Fig. ...
Context 2
... function which shifts the image. To asses only the effect of camera motion it is supposed that the received image is ideally located and registered at the receiver end. So by shifting the image half the induced camera motion, the processed image would be at the exact same lo- cation of the transmitted image but is blurred due to motion. Fig. 10 shows the effect of linear motion with and without the translation portion. Thus the following centralized transfer func- tion is used to simulate the camera motion ...
Context 3
... is in the vertical direction, then errors may emerge. On the other hand, if the movement is horizontal it is not going to change the phase differences of elements in two consecutive rows, thus no error is generated (the errors, if any, in that case will be due to amplitude attenuation). Exact vertical movement has slightly less error rate in Fig. 13 due to the fact that the first row is modulated horizontally and vertical move- ment has minimal effect on ...
Context 4
... in practical data transmission scenarios frame to frame relative movement of camera and LCD may be consid- ered uniformly distributed over different angles, it is safe to average the BER over where . This result is shown in Fig. 14 for image. This is where DPSK modulated OFDM shows its promising capabilities in mitigating aggressive relative movements be- tween transmitter and receiver. Moreover it should be noted that in Fig. 14, PAM modulation is using about 5 dB more average power than OFDM and DPSK methods. This is due to the fact that the peak and average power ...
Context 5
... camera and LCD may be consid- ered uniformly distributed over different angles, it is safe to average the BER over where . This result is shown in Fig. 14 for image. This is where DPSK modulated OFDM shows its promising capabilities in mitigating aggressive relative movements be- tween transmitter and receiver. Moreover it should be noted that in Fig. 14, PAM modulation is using about 5 dB more average power than OFDM and DPSK methods. This is due to the fact that the peak and average power of PAM are the same, and the full intensity range of LCD is utilized. As any practical system would use full power of the LCD, this type of comparison between the three methods is meaningful. Should ...
Context 6
... to the fact that the peak and average power of PAM are the same, and the full intensity range of LCD is utilized. As any practical system would use full power of the LCD, this type of comparison between the three methods is meaningful. Should the SNR for all three methods be the same, BER performance for PAM would be worse than what is shown in Fig. ...

Similar publications

Article
Full-text available
The tremendous progress in embedded systems helped in the design and implementation of complex compact equipment. This progress may help in the idea of having radar on a chip. In this paper, a design and implementation of a signal processor and display algorithm for Linear Frequency Modulated Continuous Wave (LFMCW) radar on single Field Programmab...

Citations

... LITERATURE SURVEY Amin Motahari and Malek Adjouadi, have proposed a new propaganda for information modulation in 2-D barcodes, in which its efficiency can be estimated by specific methods of modulation of barcode. In this, OFDM modulation along with DPSK is used over adjacent frequency domain elements [10]. Stefan C. Katzenbeisser proposed that the area of cover image should be greater than that of area of message image, so the data could be hidden in cover image without any issue. ...
Article
Medical images require proper attention during the information embedding since the information which is to be embedded should not disturb the image quality. The remedy for the distortion caused by embedding data into medical images can be overcome by using lossless data hiding techniques. QR Code are consisting of relevant medical information that can be retrieved easily. In the present, information security become vital asset at the communication services, thereby concealing of information become a dilemma. For this issue, we employ a method known as Steganography in which the data is concealed in a medium like text, image etc., and appears to be normal, without affecting the quality of the hidden medium. Watermarking enables the protection of data format which is embedded with other data format and provides ownership access to the end user in unrecognizable format. Both steganography and watermarking techniques employ greater security to the information which can be embedded within a data format of any type.
... With the strength of high information capacity and ease of use, QR code has been widely used in a variety of scenarios, such as information delivering [17,18], product information tracking [20], mobile payment [15], product marketing [3] and e-ticketing [4]. However, as an ISO international standard, the QR code encoding process and decoding process is opened as public property, thus it is easy to decode a QR code then forge a new QR code with the same QR code public message. ...
Article
Full-text available
QR code is an important means for delivering information which has been widely used in our daily life. As an ISO international standard, the QR code encoding and decoding process are disclosed publicly, thus it is easy to decode a QR code then forge a new QR code with the same QR code public message. It can lead to the problems of information forgery and ease the spreading of fake news. To overcome this weakness, we propose a simple and efficient QR code authentication mechanism to embed the authentication information in the padding region of QR code based on the characteristics of Sudoku and Reed-Solomon code. Different from the previous scheme, the proposed scheme embeds the authentication information without consuming the QR code error correction capacity and is able to achieve a higher embedding capacity. Experimental results show that the proposed scheme has high security, low power consumption and is robust to common QR code attacks.
... This makes an imperfect selection of ROI corresponding to the LEA and increases BER. Hence, there is a need for the proper design of LEA and a reliable detection technique to overcome these problems [17][18][19]. In this proposed work, the finder and alignment pattern of the QR has been emulated to design LEA. ...
Article
Full-text available
Line of sight (LoS) and security are the fundamental requirement for any secure visual MIMO communication based vehicular networks. Uneven speed, irregular terrains, and uncertain appearance of obstacles disgrace LoS between the visual multiple-input multiple-output (MIMO) transmitter and receiver. This paper proposes optimal tracking techniques to maintain LoS using a novel quick response (QR) inspired light emitting array (LEA) pattern. Automatic geometric transformation of the QR code in conjunction with the particle filter is used to track the dynamically varying LEA position. In addition to that, an adaptive threshold technique (ATT) has been proposed to minimize error caused by ambient light variations and interferences. A novel key generation algorithm is also proposed to improve the security of the visual MIMO communication system. It utilizes a customized linear feedback shift register (LFSR) and synthetic color image to generate a stronger key. The randomness test demonstrates the robustness of the proposed key generation technique with a minimal probability value of 0.1223 (>0.01). Simulation and real-time studies have been carried out in the presence of geometric distortions, and the bit error rate (BER) performance is evaluated. Results illustrate that the proposed techniques make the visual MIMO system more secure and reliable for vehicular networks.
... Digital media content distribution has achieved rapid growth recently [1]. The contents are distributed in various ways, such as 2D Barcodes [2], Watermark [3], Digital Rights Management (DRM) [1], [4] and so on. However, the platform-independent distribution system being able to share digital contents on the Internet with high robustness is not realized. ...
... However, the platform-independent distribution system being able to share digital contents on the Internet with high robustness is not realized. In [2], the contents are distributed by device-todevice transmission, so that it is not an appropriate method for sharing them. In [3], Reversible Data Hiding (RDH) using the watermark scheme is proposed but the embedded data get damaged on JPEG Compression. ...
... The existing codemarks make connection of digital contents with printed advertisements. It has high robustness on the offline world or the device to device transmission [2]. However, when codemark embedded images are uploaded typically on Facebook, they are resized and compressed for the fast response. ...
Article
The main purpose of Codemark is to distribute digital contents using offline media. Due to the main purpose of Codemark, Codemark cannot be used on digital images. It has high robustness on only printed images. This paper presents a new color code called Robust Index Code (RIC for short), which has high robustness on JPEG Compression and Resize targeting digital images. RIC embeds a remote database index to digital images so that users can reach to any digital contents. Experimental results, using our implemented RIC encoder and decoder, have shown high robustness on JPEG Comp. and Resize of the proposed codemark. The embedded database indexes can be extracted 100% on compressed images to 30%. In conclusion, it is able to store all the type of digital products by embedding indexes into digital images to access database, which means it makes a Superdistribution system with digital images realized. Therefore RIC has the potential for new Internet image services, since all the images encoded by RIC are possible to access original products anywhere.
... It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications. [1]. Ching-yin Law& Simon So illustrate the usage of QR codes in education. ...
... The better performance is achieved by using more effective modulation schemes. The general idea is to use inverse Fourier transform of data like OFDM to modulate LCD pixels studied in [2]. DWT have much more advantages over the Fourier transform as in [6]. ...
... We use LCD of a digital signage system as a transmitter for the VLC systems. LCD-IS VLC system is proposed in [5]; however, in that case, the information signal is perceptible. We must embed the signal imperceptibly to avoid reducing the quality of the advertising content. ...
... Transmission of data between two mobile devices through a series of 2D QR codes is studied in [5],achieving bit rates of under 10 kbps. Further idea is developed in [4], in which a monitor of computer data like OFDM to modulate LCD pixels studied in [2]. DWT have much more advantages over the fourier transform as in [6]. ...
... Especially in the context of pervasive computing, several different technologies have been investigated including both acoustic [3] and visible light communications (VLC) [4]. The latter has recently gained momentum [5][6][7] due to the availability of suitable processing capabilities and hardware components on off-the-shelf mobile devices, i.e., a display with a large amount of dots per inch and highresolution cameras [8]. This scenario is somewhat similar to the software-defined radio paradigm. ...
... Some approaches focused on the theoretical performance of VLC systems. Motahari and Adjouadi [7] presented a solution jointly based on OFDM and differential phase shift keying (DPSK), called DPSK-OFDM. The proposed scheme is shown to be tolerant to relative movements of the camera and capable of a higher throughput than PixNet through simulations. ...
... Different from [5,7,10], we do not propose any encoding nor modulation schemes for visible light communications. Instead, we leverage QR codes and focus on building a reliable transmission service on top of them. ...
Conference Paper
Wireless technologies such as WiFi and Bluetooth are widely used for mobile data communications. However, these technologies are affected by interference resulting from shared access to unlicensed frequency bands. Visible light communication is an alternative means for data exchange over an optical channel. It has several advantages over currently used radio-based technologies, including a full-duplex channel and limited interference from other sources. We designed and implemented a system for bidirectional visible light communications between smartphones. Specifically, our solution employs dynamically changing Quick Response (QR) codes shown on the display of one mobile phone to encode the data and the front-facing camera of another phone to receive the data. We devised a supporting communication protocol for reliable communications and realized a file exchange application. Moreover, we carried out an experimental evaluation of our system with focus on communication performance and power consumption. The obtained results show that our solution is reliable and comparable with existing radiobased schemes from the user perspective
Article
Full-text available
In this paper, for overcoming the drawbacks of the prior approaches, such as low generality, high cost, and high overhead, we propose a Low-Cost Anti-Copying (LCAC) 2D barcode by exploiting the difference between the noise characteristics of legal and illegal channels. An embedding strategy is proposed, and for a variant of it, we also make the corresponding analysis. For accurately evaluating the performance of our approach, a theoretical model of the noise in an illegal channel is established by using a generalized Gaussian distribution. By comparing with the experimental results based on various printers, scanners, and a mobile phone, it can be found that the sample histogram and curve fitting of the theoretical model match well, so it can be concluded that the theoretical model works well. For evaluating the security of the proposed LCAC code, besides the direct-copying (DC) attack, the improved version, which is the synthesized-copying (SC) attack, is also considered in this paper. Based on the theoretical model, we build a prediction function to optimize the parameters of our approach. The parameters optimization incorporates the covertness requirement, the robustness requirement and a tradeoff between the production cost and the cost of illegally-copying attacks together. The experimental results show that the proposed LCAC code with two printers and two scanners can detect the DC attack effectively and resist the SC attack up to the access of 14 legal copies.