Q-R Code Combined with Designed Mark

Q-R Code Combined with Designed Mark

Jun Sasaki (I wate Prefectural University, Japan), Hiroaki Shimomukai (Gingatsushin Co. Ltd., Japan) and Yutaka Funyu (I wate Prefectural University, Japan)
DOI: 10.4018/978-1-59904-762-1.ch009
OnDemand PDF Download:
$37.50

Abstract

The mobile Internet has been used widely in Japan. If we use a cellular phone with the Quick Response (Q-R) code reader function (a two-dimensional code developed by Denso-Wave Corporation), we can very easily access a Web site. However, though the existence of Q-R code reader function in the cellular phone is well-known, not many people use the function. The reason is that the Q-R code is not intuitive because it was developed to be read by machines. Our idea to solve the problem is to combine the Q-R code with a designed particular picture or graphic. We propose a method to produce the designed Q-R code and we develop its production system. This chapter describes the proposed method, the production system, and evaluation results using some designed Q-R codes produced by the system.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgment
Hideyasu Sasaki
Chapter 1
Hideyasu Sasaki, Yasushi Kiyoki
In this chapter, we present a formulation for protecting digital library as intellectual property, especially image digital library. The entire... Sample PDF
Digital Library Protection Using Patent of Retrieval Process
$37.50
Chapter 2
Richard A. Spinello, Herman T. Tavani
This chapter presents some foundational concepts and issues in intellectual property. We begin by defining intellectual objects, which we contrast... Sample PDF
Intellectual Property Rights: From Theory to Practical Implementation
$37.50
Chapter 3
Shiguo Lian
The principal concern of this chapter is to provide those in the multimedia or content protection community with an overview of multimedia content... Sample PDF
Multimedia Encryption Technology for Content Protection
$37.50
Chapter 4
Mirko Luca Lobina, Luigi Atzori, Davide Mula
Many audio watermarking techniques presented in the last years make use of masking and psychological models derived from signal processing. Such a... Sample PDF
Masking Models and Watermarking: A Discussion on Methods and Effectiveness
$37.50
Chapter 5
Kensuke Naoe, Yoshiyasu Takefuji
In this chapter, we propose a new information hiding and extracting method without embedding any information into the target content by using a... Sample PDF
Damageless Watermark Extraction Using Nonlinear Feature Extraction Scheme Trained on Frequency Domain
$37.50
Chapter 6
Mauro Barni, Franco Bartolini, Alessia De Rosa
The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has... Sample PDF
Perceptual Data Hiding in Still Images
$37.50
Chapter 7
Yuh-Jzer Joung, Shi-Cho Cha
We propose a new technical and legal approach, called online personal data licensing (OPDL), for responding to concerns about the privacy of... Sample PDF
Online Personal Data Licensing: Regulating Abuse of Personal Data in Cyberspace
$37.50
Chapter 8
Giaime Ginesu, Mirko Luca Lobina, Daniele D. Giusto
Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties... Sample PDF
Property Protection and User Authentication in IP Networks Through Challenge-Response Mechanisms: Present, Past, and Future Trends
$37.50
Chapter 9
Jun Sasaki, Hiroaki Shimomukai, Yutaka Funyu
The mobile Internet has been used widely in Japan. If we use a cellular phone with the Quick Response (Q-R) code reader function (a two-dimensional... Sample PDF
Q-R Code Combined with Designed Mark
$37.50
Chapter 10
Kimihito Ito, Yuzuru Tanaka
Web applications, which are computer programs ported to the Web, allow end-users to use various remote services and tools through their Web... Sample PDF
Visual Environment for DOM-Based Wrapping and Client-Side Linkage of Web Applications
$37.50
Chapter 11
Ruo Ando, Yoshiyasu Takefuji
Code division multiple access (CDMA) is widely used because of its effectiveness to send multiple signal and confidentiality of career signal. We... Sample PDF
Symbolic Computation for DS-CDMA Code Acquisition Using First Order Logic
$37.50
Chapter 12
Yoshiyasu Takefuji, Koichiro Shoji, Takashi Nozaki
In this chapter, we present a device-driver-based computer that realizes the reduction of mode (domain or vertical) switching overheads between user... Sample PDF
Device Driver-Based Computer in Broadband Age
$37.50
Chapter 13
Natalie Pang
In recent years, impacts of information and communication technologies, market enclosures, and the struggle to retain public goods have had... Sample PDF
Cultivating Communities Through the Knowledge Commons: The Case of Open Content Licenses
$37.50
Chapter 14
Suliman Al-Hawamdeh, Shubert Foo
Until recently, digital libraries have provided free access to either limited resources owned by an organization or information available in the... Sample PDF
E-Commerce and Digital Libraries
$37.50
Chapter 15
Knut Blind, Nikolaus Thumm
This chapter presents the first attempt at analyzing the relationship between strategies to protect intellectual property rights and their impact on... Sample PDF
Intellectual Property Protection and Standardization
$37.50
Chapter 16
Marc Rysman, Tim Simcoe
This chapter uses citations to patents disclosed in the standard setting process to measure the technological significance of voluntary standard... Sample PDF
The Performance of Standard Setting Organizations: Using Patent Data for Evaluation
$37.50
Chapter 17
Aura Aoininen
Multiple cases have been reported in which patents have posed dilemmas in the context of cooperative standard setting. Problems have come to the... Sample PDF
Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem or a Red Herring?
$37.50
Chapter 18
Davide Mula, Mirko Luca Lobina
Nowadays the Web page is one of the most common medium used by people, institutions, and companies to promote themselves, to share knowledge, and to... Sample PDF
Legal Protection of the Web Page as a Database
$37.50
Chapter 19
Merrill Warkentin, Mark B. Schmidt, Ernest Bekkering
In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered... Sample PDF
Steganography and Steganalysis
$37.50
Chapter 20
Irene Kafeza, Eleanna Kafeza
The Grid environment is rapidly emerging as the dominant paradigm for wide-area-distributed application systems. The multimedia applications demand... Sample PDF
Intellectual Property Protection in Multimedia Grids
$37.50
Chapter 21
Ruo Ando, Yoshiyasu Takefuji
With the rapid advance in digital network, digital libraries, and particularly WWW (World Wide Web) services, we can retrieve many kinds of images... Sample PDF
Secure Image Archiving Using Novel Digital Watermarking Techniques
$37.50
About the Contributors