Conference Paper

Evaluation of Barcode Decoding Performance using ZXING Library

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Dalam pembangunan aplikasi berbasis QR Code, terdapat banyak library atau pustaka yang bisa digunakan, salah satunya adalah Library ZXing. (Scheuermann, 2012) Berdasarkan permasalahan diatas, penulis akan membangun suatu aplikasi yang mengimplementasikan teknologi dari QR Code untuk menampilkan detail informasi hewan layak qurban yang akan dibeli oleh konsumen. Dengan alasan inilah penulis menyusun penelitian dengan judul "Rancang Bangun Mobile Verifikator Hewan Layak Qurban Menggunakan QR Code Berbasis Library Zxing". ...
Article
Full-text available
Menjelang hari raya qurban, aktivitas jual beli binatang ternak seperti sapi dan kambing biasanya mengalami peningkatan drastis. Dalam pelaksanaanya, hewan ternak harus memenuhi kriteria dan syarat tertentu untuk dijadikan hewan qurban. Umumnya, pemilihan hewan qurban dilakukan oleh konsumen dengan mendatangi pasar hewan atau peternakan dan bertanya langsung kepada pedagang seputar kriteria hewan yang layak untuk dijadikan qurban. Dalam pelaksanaannya, proses tanya jawab ini memerlukan waktu yang relatif lama. Proses jual beli tersebut dinilai kurang efisien dan terdapat kemungkinan terjadi human error yang nantinya akan merugikan pihak terkait baik konsumen maupun pedagang. Untuk itu dibutuhkan suatu sistem verifikator hewan layak qurban berbasis android yang dapat menampilkan informasi rinci data hewan dan memperbaharui rekam jejak hewan. Hasil akhir dari penelitian ini adalah Aplikasi Mobile Verifikator Hewan Layak Qurban.
... The suggested approach ratifies the concept to reduce the use of mobile data while sharing of text or other files over the internet. In [4], the author explains valid and generic software environment is introduced which offers the possibility to evaluate and compare different Optical Transmission Patterns (OTPs). This framework generates a huge library of evaluation images applying synthetically all distortions one should expect for a real-world application. ...
... • Cloud: backend less. • ZXing [9]. ...
... All the QR codes have been initially used with redundancy code at 7%, while recently we are using WR codes with redundancy at 30%. They are more robust as to lack of visibility and corruption [17].  In presence of very low 3GS signal level, which makes impossible the usage of voice phone call for emergency communication, the Mobile Emergency tool was able to send the emergency alarm and receive some instructions. ...
... Initially, the QR codes consisted of 7% redundancy, increased to 30% recently. They are more robust due to lack of visibility and corruption [16]. ...
Article
Full-text available
Background: Hospitals are vulnerable to natural disasters, man-made disasters, and mass causalities events. Within a short time, hospitals must provide care to large numbers of casualties in any damaged infrastructure, despite great personnel risk, inadequate communications, and limited resources. Communications are one of the most common challenges and drawbacks during in-hospital emergencies. Emergency difficulties in communicating with personnel and other agencies are mentioned in literature. At the moment of emergency inception and in the earliest emergency phases, the data regarding the true nature of the incidents are often inaccurate. The real needs and conditions are not yet clear, hospital personnel are neither efficiently coordinated nor informed on the real available resources. Information and communication technology solutions in health care turned out to have a great positive impact both on daily working practice and situations. Objective: The objective of this paper was to find a solution that addresses the aspects of communicating among medical personnel, formalizing the modalities and protocols and the information to guide the medical personnel during emergency conditions with a support of a Central Station (command center) to cope with emergency management and best practice network to produce and distribute intelligent content made available in the mobile devices of the medical personnel. The aim was to reduce the time needed to react and to cope with emergency organization, while facilitating communications. Methods: The solution has been realized by formalizing the scenarios, extracting, and identifying the requirements by using formal methods based on unified modeling language (UML). The system and was developed using mobile programming under iOS Apple and PHP: Hypertext Preprocessor My Structured Query Language (PHP MySQL). Formal questionnaires and time sheets were used for testing and validation, and a control group was used in order to estimate the reduction of time needed to cope with emergency cases. First, we have tested the usability and the functionalities of the solution proposed, then a real trial was performed to assess the reduction in communication time and the efficiency of the solution with respect to a case without Mobile Emergency tools. Results: The solution was based on the development of a mobile emergency application and corresponding server device to cope with emergencies and facilitate all the related activities and communications, such as marking the position, contacting people, and recovering the exits information. The solution has been successfully tested within the Careggi Hospital, the largest medical infrastructure in Florence and Tuscany area in Italy, thus demonstrating the validity of the identified modalities, procedures, and the reduction in the time needed to cope with the emergency conditions. The trial was not registered as the test was conducted in realistic but simulated emergency conditions. Conclusions: By analyzing the requirements for developing a mobile app, and specifically the functionalities, codes, and design of the Mobile Emergency app, we have revealed the real advantages of using mobile emergency solutions compared to other more traditional solutions to effectively handle emergency situations in hospital settings.
Conference Paper
In this paper we present CamTalk, a novel bidirectional communications framework using front-facing cameras and displays of smartphones. In the CamTalk framework, two smartphones exchange information via barcodes: information is encoded into barcodes that are displayed on the screen of the origin device, and those barcodes are captured by the front-facing camera of the destination device and decoded; Both devices can send and receive barcodes at the same time. The general design of data transmission enables CamTalk to support a wide range of applications. More importantly, CamTalk’s communications channels are short-range, highly directional, fully observational, and immune to electromagnetic interference, which makes CamTalk very appealing for secure communications and bootstrapping security applications. We have implemented CamTalk on the Android platform and conducted extensive experiments to evaluate its performance on both Android smartphones and tablets. Our experimental results demonstrate the efficacy of CamTalk in short-range wireless communications.
Conference Paper
Barcodes have survived the shift from paper to screen. Printed boarding passes and paper advertisements are substituted by mobile applications and digital billboards where barcodes remain key to exchange small amounts of information in a quick, uncomplicated way. The move to digital media opens up new opportunities for dynamic usage scenarios involving barcodes. In this paper, we explore how 2D barcodes can increase the awareness of machines in an analog world where information is primarily visualized for humans. Moreover, we exploit displays and cameras as virtual networks to transfer data using 2D barcode slideshows. Hence we address two problems conventional barcodes cope with: a constrained data capacity and a lack of semantics in the data it contains.
Book
Full-text available
Due to increase in the scale and sophistication of cyber crimes conducted through the communication networks, it is imperative for the research community to ensure protection of data disseminated through these networks. Online information assets are further threatened because of increasing trend towards adoption of cloud computing and virtualisation. The stakeholders need to be aware of the potential threats to the information assets and critical infrastructure and how to mitigate and eliminate these threats. In past nine years, SecureComm has emerged as a leading international forum that covers all aspects of information and communications security with particular emphasis on security in communication and networking. SecureComm also serves as a venue for learning about the emerging trends in security and privacy research, giving participants the opportunity to network with experts in the field. The strategic objectives of the SecureComm are to provide a common platform for the security and privacy experts in academia, industry, and government as well as practitioners, standards developers and policy makers in order to engage in discussions about the common goals to explore important research directions in the field. This year the SecureComm is held in Australia for the first time ever. This coincides with one of the 15 recently announced Australian government Strategic Research Priorities in Cyber Security ‘Securing Australia’s place in a changing world. In SecureComm 2013, 70 high quality papers were submitted from over 15 countries. Unfortunately, the acceptance rate set for this conference did not allow us to accept all papers with relevant merits. In this respect, special thanks to the Technical Program Committee members for handling of the challenging task and selecting 21 outstanding papers with significant contribution to the field to be included in the proceedings. The 21 accepted papers can be broadly classified into the following themes: - Security & Privacy in Mobile, Sensor, and Ad Hoc Networks - Malware, Botnets, and Distributed Denial of Service - Security for emerging technologies: VoIP, peer-to-peer, and Cloud Computing - Encryption and Key Management - Security in Software and Machine Learning - Network and System Security Model - Security and Privacy in Pervasive and Ubiquitous Computing In addition to the paper presented at the conference, we also had following four exciting keynote speakers: - Mike Holm, Operations Manager, AusCERT (Computer Emergency Response Team in Australia) - James Turner, Chair, AISA (Australian Information Security Association) Advocacy Group - Mark Goudie, Regional Manager – Investigations, Dell SecureWorks - Jiankun Hu, Professor and Research Director Cyber Security Lab, Australian Defence Force Academy Finally, we are very grateful to the NSW Government for their sponsorship; as well as European Alliance for Innovation (EAI); and Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST) for allowing the SecureComm 2013 to be held in Australia. We also thank the Local Organizing Committee and its many members and volunteers for their support. A special thank goes to Erica Polini, EAI Conference Manager and Elisa Mendini, EAI Venue Manager & Conference Coordinator for their utmost professionalism in managing the administrative aspects of the conference. Last but not least, our gratitude goes to the Steering Committee members, in particular to Peng Liu, for his continuous supervision to make SecureComm a very successful event.
Conference Paper
Matrix codes enable a coupling between virtual and physical worlds for ubiquitous computing applications. With this paper, we propose a technique, which can be used to increase the amount of information contained in a matrix barcode in a backward compatible way. This enables applications to fully utilize the wide spread of QR Codes or Data Matrix Codes for service discovery or basic service, while being able to transmit much more information during one scan for advanced applications. We present the approach, explain difficulties in decoding typical camera images, a simulatory evaluation of decoding performance, and application examples.
Article
Full-text available
Over the last two decades free-space optical communication (FSO) has become more and more interesting as an adjunct or alternative to radio frequency communication. This article gives an overview of the challenges a system designer has to consider while implementing an FSO system. Typical gains and losses along the path from the transmitter through the medium to the receiver are introduced in this article. Detailed discussions of these topics can be found in this special issue of the Radioengineering Journal.
Conference Paper
Full-text available
Solid-state lighting is a rapidly developing field. White-light and other visible LEDs are becoming more efficient, have high reliability and can be incorporated into many lighting applications. Recent examples include car head-lights based on white LEDs, and LED illumination as an architectural feature. The prediction that general illumination will use white LEDs in the future has been made, due to the increased energy efficiency that such an approach may have. Such sources can also be modulated at high-speed, offering the possibility of using sources for simultaneous illumination and data communications. Such visible light communications (VLC) was pioneered in Japan, and there is now growing interest worldwide, including within bodies such as the Visible Light Communications Consortium (VLCC) and the Wireless World Research Forum (WWRF). In this paper we outline the basic components in these systems, review the state of the art and discuss some of the challenges and possibilities for this new wireless transmission technique.
Article
Full-text available
The CyberCode is a visual tagging system based on a 2Dbarcode technology and provides several features not provided by other tagging systems. CyberCode tags can be recognized by the low-cost CMOS or CCD cameras found in more and more mobile devices, and it can also be used to determine the 3D position of the tagged object as well as its ID number. This paper describes examples of augmented reality applications based on CyberCode, and discusses some key characteristics of tagging technologies that must be taken into account when designing augmented reality environments. KEYWORDS: Augmented reality, merging virtual and real, ID-aware interface, CyberCode. INTRODUCTION: ID-AWAREAUGMENTEDENVIRONMENTS In designing augmented reality systems, it is often essential to implement a tagging (ID) system to make a link between physical and digital spaces. Some examples of tagged IDs are barcodes [18, 11, 9, 6], radio-frequency (RF) tags [2, 23], resonant tags [13], and infrared IDs [22]. 1 Unl...
Conference Paper
Given the abundance of cameras and LCDs in today's environment, there exists an untapped opportunity for using these devices for communication. Specifically, cameras can tune to nearby LCDs and use them for network access. The key feature of these LCD-camera links is that they are highly directional and hence enable a form of interference-free wireless communication. This makes them an attractive technology for dense, high contention scenarios. The main challenge however, to enable such LCD-camera links is to maximize coverage, that is to deliver multiple Mb/s over multi-meter distances, independent of the view angle. To do so, these links need to address unique types of channel distortions, such as perspective distortion and blur. This paper explores this novel communication medium and presents PixNet, a system for transmitting information over LCD-camera links. PixNet generalizes the popular OFDM transmission algorithms to address the unique characteristics of the LCD-camera link which include perspective distortion, blur, and sensitivity to ambient light. We have built a prototype of PixNet using off-the-shelf LCDs and cameras. An extensive evaluation shows that a single PixNet link delivers data rates of up to 12 Mb/s at a distance of 10 meters, and works with view angles as wide as 120 degree°.
Article
In a previous study, we evaluated six 2D barcodes using eight criteria for standardization potential: omnidirectional symbol reading, support for low-resolution cameras, reading robustness under different lighting conditions, barcode reading distance, error correction capability, security, support for multiple character sets, and data capacity. We also considered the fidelity of the camera phone's captured image as a metric for gauging reading reliability. Here, we review the six 2D barcodes and then use an additional metric - a first-read rate - to quantitatively verify our earlier results and better gauge reading reliability.
Multi-format 1d/2d barcode image processing library with clients for android
  • Z Crossing
Z. Crossing. Multi-format 1d/2d barcode image processing library with clients for android, java. Website, 2012. Available online at http://code.google.com/p/zxing/ visited on March 23th 2012.
High capacity color barcodes (hccb)
  • G Jancke
G. Jancke. High capacity color barcodes (hccb).