Filters








4,909 Hits in 6.7 sec

Wavefront Correction of Violet Laser Diode and Color Micro-marking on Plastic Surface

Hiroyasu UETA, Yoshio MAESHIMA, Yutaka TSUJIMOTO, Keiu TOKUMURA, Takahisa JITSUNO
2008 The Review of Laser Engineering  
The corrected light was precisely focused and used to irradiate a dye or pigment that was applied to a plastic surface.  ...  We report herein the development of a unit to precisely focus VLD light and the use of this unit, together with dyes and pigments, to create color micro-markings on a plastic plate.  ...  However, conventional laser markers are expensive and it is usually difficult to procure the desired number of markers.  ... 
doi:10.2184/lsj.36.1180 fatcat:4zyq2lpbpff47okejku76mj5ja

Error-resilient image coding (ERIC) with smart-IDCT error concealment technique for wireless multimedia transmission

Yew-San Lee, Keng-Khai Ong, Chen-Yi Lee
2003 IEEE transactions on circuits and systems for video technology (Print)  
Because of low complexity and latency properties, it is very suitable for wireless mobile applications.  ...  Additionally, a novel post-processing error concealment scheme is presented to retain low-frequency information and discard suspicious high-frequency information.  ...  ACKNOWLEDGMENT The authors would like to thank the reviewers for their comments and suggestions.  ... 
doi:10.1109/tcsvt.2002.808430 fatcat:3r6gfd2chfhd3il4yfb6iq5eoe

CodeFace: a deep learning printer-proof steganography for Face Portraits

Farhad Sadmand, Iurii Medvedev, Nuno Goncalves
2021 IEEE Access  
Extensive experiments were performed with real printed documents and smartphone cameras.  ...  messages from physically printed facial photos of Identity Documents (IDs) and Machine-Readable Travel Documents (MRTDs), is addressed in this paper.  ...  The use of deep learning in steganography brought a disruptive change in its capabilities and applications.  ... 
doi:10.1109/access.2021.3132581 fatcat:as7voyru5vagdjnb4uoxqinnwa

HideOut

Karl D. D. Willis, Takaaki Shiratori, Moshe Mahler
2013 Proceedings of the 7th International Conference on Tangible, Embedded and Embodied Interaction - TEI '13  
HideOut is a mobile projector-based system that uses hidden markers (c,f) to map projected imagery onto tangible objects and surfaces (b,e) such as storybooks (a) and board games (d).  ...  HideOut uses a device mounted camera to detect hidden markers applied with infrared-absorbing ink.  ...  We use Spectre 340, diluted at a ratio of 0.5 ml ink to 10 ml solvent, and apply it to a cream-colored paper to match the ink hue.  ... 
doi:10.1145/2460625.2460682 dblp:conf/tei/WillisSM13 fatcat:3ewpmrblffaktfxhxssqjfnhqq

Performance Evaluation of Mixed Reality Display for Guidance during Transcatheter Cardiac Mapping and Ablation

Michael K. Southworth, Jennifer N. Avari Silva, Walter M Blume, George F Van Hare, Aarti S Dalal, Jonathan R. Silva
2020 IEEE Journal of Translational Engineering in Health and Medicine  
Verifying off the shelf mixed reality hardware for specific clinical use can accelerate the adoption of this transformative technology and provide novel visualization, understanding, and control of clinically  ...  display for intraprocedural, real-time use in electrophysiology procedures.  ...  application, and should be validated through use.  ... 
doi:10.1109/jtehm.2020.3007031 pmid:32742821 pmcid:PMC7390021 fatcat:t22avnc3hna53ifue27toy2c5u

Error-resilient coding in JPEG-2000 and MPEG-4

I. Moccagatta, S. Soudagar, J. Liang, H. Chen
2000 IEEE Journal on Selected Areas in Communications  
multimedia applications and services.  ...  The rapid growth of mobile communications and the widespread access to information via the Internet have resulted in a strong demand for robust transmission of compressed image and video data for various  ...  hard work and contributions.  ... 
doi:10.1109/49.848245 fatcat:isuqqxutljezbg6kiazxt2cmje

Distributed Steganography in PDF Files—Secrets Hidden in Modified Pages

Katarzyna Koptyra, Marek R. Ogiela
2020 Entropy  
This paper shows how to diffuse a message and hide it in multiple PDF files. Presented method uses dereferenced objects and secret splitting or sharing algorithms.  ...  It is applicable to various types of PDF files, including text documents, presentations, scanned images etc.  ...  The resistance to joining PDF documents varies depending on the software used. It was tested with two applications: pdftk and pdfmerge.  ... 
doi:10.3390/e22060600 pmid:33286372 fatcat:shrsykgthngp7ds3hgobsaizeu

Unobtrusive ambulatory EEG using a smartphone and flexible printed electrodes around the ear

Stefan Debener, Reiner Emkes, Maarten De Vos, Martin Bleichner
2015 Scientific Reports  
Using a smartphone for stimulus delivery and signal acquisition, resting EEG and auditory oddball data were collected in the morning and in the afternoon six to seven hours apart.  ...  Here we present a new type of EEG electrode designed to enable unobtrusive and concealed EEG acquisition.  ...  ., Oldenzaal, The Netherlands, for sharing their knowledge and supporting the design and production of the cEEGrid.  ... 
doi:10.1038/srep16743 pmid:26572314 pmcid:PMC4648079 fatcat:js34hurworbz5inie3ewpia66i

Printed embedded data graphical user interfaces

D.L. Hecht
2001 Computer  
Acknowledgments It is impossible to mention all the colleagues at Xerox who have contributed to this work. However, I want to thank Shilajeet Banerjee, Dan Bloomberg  ...  InfoPoint recognizes affixed IDs (visual markers) and alters its functionality according to the object in front of it.  ...  The synchronization frame uses one of each 15 row and column patterns, leaving about 400 bytes per square inch for data and error correction.  ... 
doi:10.1109/2.910893 fatcat:xyvsz5hfafaejj6p236d4igwfm

Hiding information using a checkered pattern

Rui Shogenji, Junji Ohtsubo
2009 Optical Review  
Visual cryptography is expected to have various applications since it has potential for visual decoding. However, there are still few practical applications.  ...  Superimposing a checkered pattern can also be considered as a kind of image sampling process, and a decoding experiment using an ordinary compact digital camera is presented. #  ...  Enlarging the printing size or using auxiliary markers can reduce alignment difficulty; 18) however, the contrast of the decoded image is reduced rapidly by shifting a few pixels from their correct position  ... 
doi:10.1007/s10043-009-0101-9 fatcat:rsspq6oakbbqlmcdgjwfbhuihq

A format-compliant configurable encryption framework for access control of video

Jiangtao Wen, M. Severa, Wenjun Zeng, M.H. Luttrell, Weiyin Jin
2002 IEEE transactions on circuits and systems for video technology (Print)  
making it especially suitable for wireless multimedia applications.  ...  We will describe the application of the new methods to the protection of MPEG-4 video content in the wireless environment, and illustrate how they are used to leverage established encryption algorithms  ...  It can be seen that with such an attack, the background colors are no longer random and the contours of two people in the scene can be easily seen. • MV: MVs in most video sequences also exhibit strong  ... 
doi:10.1109/tcsvt.2002.800321 fatcat:ysuvwagnlrg37etlfnvbuyini4

Authentication of Bi–Level QR Code with Dynamic Pattern Generation

2019 International Journal of Engineering and Advanced Technology  
This paper illustrates about a new Quick Response (QR) code to enhance data security with importance given to its wide use in information storage and authentication.  ...  It may be read with the aid of all standard application, without any restrict.  ...  If no longer, it can correct error the usage of those mistakes correction codewords.The information and error diagnostic code words produced in the previous step must be organized in the correct order.  ... 
doi:10.35940/ijeat.f1094.0886s219 fatcat:g4dotkpxprapvpjb5atfyr34qy

AirCode

Dingzeyu Li, Avinash S. Nair, Shree K. Nayar, Changxi Zheng
2017 Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology - UIST '17  
Meanwhile, the air pockets affect only the scattering light transport under the surface, and thus are hard to notice to our naked eyes.  ...  We demonstrate our tagging technique with applications for metadata embedding, robotic grasping, as well as conveying object affordances.  ...  We are grateful to Arthur Autz for the support on 3D printing facilities, Daniel Miau and Brian A.  ... 
doi:10.1145/3126594.3126635 dblp:conf/uist/LiNNZ17 fatcat:v54ypzi76jb3ta7m2iaqjmub2a

Multidimensional Information Encryption and Storage: When the Input Is Light

Senyang Liu, Xiaohu Liu, Jinying Yuan, Jie Bao
2021 Research  
Multidimensional information encryption and storage are an effective way to increase the security level and can protect it from counterfeiting and illegal decryption.  ...  Current approaches using single-dimension information can be easily cracked and imitated due to the lack of sufficient security.  ...  Acknowledgments This work was financially supported by the Beijing National Research Center for Information Science and Technology (BNR2019ZS01005) and Beijing Innovation Center for Future Chips, Tsinghua  ... 
doi:10.34133/2021/7897849 pmid:33623922 pmcid:PMC7877379 fatcat:d6gdkcesfjhnje74olfppbr2ou

DropLeaf: a precision farming smartphone application for measuring pesticide spraying methods [article]

Bruno Brandoli, Gabriel Spadon, Travis Esau, Patrick Hennessy, Andre C. P. L. Carvalho, Jose F. Rodrigues-Jr, Sihem Amer-Yahia
2020 arXiv   pre-print
Tests performed using DropLeaf demonstrated that, notwithstanding its versatility, it can estimate the pesticide spraying with high precision.  ...  Pesticide application has been heavily used in the cultivation of major crops, contributing to the increase of crop production over the past decades.  ...  CEPID CeMEAI grant 2013/07375-0); Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq) through grants 406550/2018-2, 305580/2017-5, and 05580/2017-5.  ... 
arXiv:2009.00453v1 fatcat:33mayw62ebggleee4xs4b57omy
« Previous Showing results 1 — 15 out of 4,909 results