Digital Watermarking Method to Extract Watermarks from Printed Matters with Cell Phone by Using Finder Patterns and Alignment Pattern of QR Code

Author(s):  
Motoi Iwata ◽  
Kenji Yamanaka ◽  
Koichi Kise
Author(s):  
Apurva Patil ◽  
Komal Lonkar ◽  
Veda Kowale ◽  
Archana Kotangale

With the advent of technologies and multiple options available, it’s very essential to rethink and optimize the current manual process by utilizing technologies, like web, mobile together. At present mobile phones play a vital role in our day-to-day life, and it also became a mode of identity. Using the mobile and its geo tagging feature we can precisely locate and validate once presence. The inbuilt ability of mobile can be very well leveraged to modernize the current manual attendance system. QR Code scanning is one of such features of mobile phones that enables them to quickly capture and process the data. Smartphones can be used to speed up the process of taking attendance. This project ‘Multichannel Attendance Management system using QR Code and Location’ focuses on simplifying & solving the problem of manual process of taking attendance. The project proposes a system that is based on using a QR code. QR stands for ‘Quick Response’. They can be read quickly by a cell phone. It stores information such as the lecture number, date, name of the professor, etc, which is used in this proposed system.


2012 ◽  
Vol 591-593 ◽  
pp. 2564-2567
Author(s):  
Yang Su ◽  
Peng Han ◽  
Zhu Jun Jia ◽  
Shi Hua Liang

This paper proposes a digital watermarking algorithm based on two-way Arnold transformation and QR code. This algorithm uses the QR barcode as the watermark, and in its pretreatment process it uses the two-way Arnold transformation to broke up the QR code image into blocks which then coded and re-arranged in a specific order. Considering the role of Singular Value Decomposition in watermark embedding, here the watermark information is embedded into the low frequency coefficients of wavelet transform of the carrier image. Simulation results show that the algorithm is robust against attacks such as shearing, the JPEG compression and noise attacking.


Sign in / Sign up

Export Citation Format

Share Document