{"title":"The multi-QR codes extraction method in illegible image based on contour tracing","authors":"Qiaoling Liu, Xiaochao Li, Mei Zou, Jun Zhou","doi":"10.1109/ASID.2011.5967414","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967414","url":null,"abstract":"In this paper, a multi-QR codes extraction method in illegible images is proposed. This method utilizes the contour tracing and corner detection technique for identification of key corner points, and then locates the potential code region by the finder pattern. The timing patterns are used to confirm a real code region. Moreover, image pre-processing procedures are merged in order to reduce the time and memory consumption. We test our method on images taken by embedded camera device under different environment, such as normal illumination, highlight spot and inadequate illumination. The results show that the method is fast for multi-QR-code extraction and practical for a digital camera with embedded DSP capable of performing advanced image processing algorithms on the fly.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127370198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xin Wang, Yinghao Liao, Huiqing Liu, Zhujun Guo, Caiqin Yi
{"title":"A new computational verb image interpolation algorithm","authors":"Xin Wang, Yinghao Liao, Huiqing Liu, Zhujun Guo, Caiqin Yi","doi":"10.1109/ASID.2011.5967430","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967430","url":null,"abstract":"In this paper, a new image interpolation algorithm based on computational verb theory is proposed. The algorithm improves previous results by increasing the number of verb templates and enlarging the size of scanning windows. Experiments show that edge effect, PSNR, and clarity get improved in the new algorithm comparing to the previous one.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131185365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 14bit 10MSps low power pipelined ADC with 0.99pJ/step FOM","authors":"Ting Li, Fule Li, Chun Zhang, Zhihua Wang","doi":"10.1109/ASID.2011.5967438","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967438","url":null,"abstract":"A 14bit 10MS/s pipelined ADC in 0.18um CMOS process is presented. The amplifier sharing, the SHA removing and scaling down techniques are used for low power. Employing the PCEA (passive capacitor error averaging) technique, the mismatch of the capacitance can effectively overcome. The prototype ADC was fabricated in a 3.3V CMOS process. With a 15.5 MHz input signal, the ADC achieves 82.3dB SFDR and 11.5bit ENOB at 10MS/s. With a 2.4 MHz input signal, the ADC achieves 83.9dB SFDR and 11.75bit ENOB at 10MS/s. The power consumption is 34.2mW at 2.8V supply including output drivers. The chip occupies 2.1*2.1mm2, including pads.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"17 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113976366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qianqian Lei, Min Lin, M. Peng, Zhiming Chen, Yin Shi
{"title":"A CMOS low power, wide dynamic range RSSI with integrated AGC loop","authors":"Qianqian Lei, Min Lin, M. Peng, Zhiming Chen, Yin Shi","doi":"10.1109/ASID.2011.5967444","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967444","url":null,"abstract":"A low voltage low power CMOS limiter and received signal strength indicator (RSSI) with integrated automatic gain control (AGC) loop are designed using TSMC 0.13um CMOS technology. The limiter uses six-stage amplifier architecture for minimum power consideration achieves 56dB gain and 17MHz bandwidth. The RSSI has a dynamic range more than 60dB, and the RSSI linearity error is within ±0.5dB for an input power from −65dBm to −8dBm. The RSSI output voltage is from 0.2V to 1V and the slope of the curve is 14.28mV/dB. The RSSI with integrated AGC loop draws 1.5 mA (I and Q paths) from a 1.2V single supply, including limiters, RSSI and comparators.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational verb color image interpolation","authors":"Huiqing Liu, Yinghao Liao, Tao Yang","doi":"10.1109/ASID.2011.5967418","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967418","url":null,"abstract":"In computational verb(CV) image processing, the evolving function of a spatial verb denotes the changes of gray-values along spatial coordinates. The spatial configurations and the changes of the brightness function as two kinds of the evolving functions of spatial verbs. In our previous work, gray level profiles and contour shapes were used to construct edge models for describing edges of image, and then, achieved the CV interpolation algorithm by using computational verb similarities. In this paper, CV interpolation will be extended to color images, make up the current lack of effective edge detection algorithm and interpolation algorithm for color images. Experiments show that, CV interpolation algorithm has good performance for color images, in the case of a fixed magnification, high resolution image quality is better than other algorithms.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129277814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power distribution network design of current-steering, nyquist rate DA converters","authors":"Yuhan Gao, Lintao Liu, Ru-Zhang Li","doi":"10.1109/ASID.2011.5967453","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967453","url":null,"abstract":"Power delivery is the fundament of all integrated circuit. In most case, the quality of power/ground signal defines the performance or even the function of circuit. Power distribution network varies hierarchically in printed circuit board, package level and on-chip level according to its distribution in space. The complexity of the whole power distribution network restrains its accurate analyze with the corresponding circuit. This paper presents an efficient and accurate methodology which links the on-chip and off-chip designs together. To validate this methodology, a 12bits 500MHz current-steering, nyquist rate DA converter is designed. Good agreement between simulation and measurement is achieved by this methodology within an error of ±5%.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129554720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Composite spiral antenna with π snowflake fractal PBG structure designed for modern RFID system","authors":"B. Lin, Minghe Lin, Jianhua Zhou, B. You","doi":"10.1109/ASID.2011.5967421","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967421","url":null,"abstract":"Utilizing the advantages of planar equiangular spiral antennas and Archimedean spiral antennas, a composite spiral antenna structure were designed and simulated. Due to the in-phase reflection and photon localization characteristic of PBG structure, the antenna radiation performance could be improved and the bandwidth be broaden. Considering engineering processes, the influences of the substrate's thickness and dielectric constant, and also different materials on whichRFID tags to be sticked, on the performances of the designed antenna are particularly studied. We also made an antenna sample and measured it. The results show that this antenna has large performance redundancy, good resonant frequency stability and adaptability in high dielectric constant environmental.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"2129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Yuan, Jing Yang, Jianpei Zhang, S. Lan, Junwei Zhang
{"title":"Evolution of privacy-preserving data publishing","authors":"Y. Yuan, Jing Yang, Jianpei Zhang, S. Lan, Junwei Zhang","doi":"10.1109/ASID.2011.5967410","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967410","url":null,"abstract":"To achieve privacy protection better in data publishing, data must be sanitized before release. Research on protecting individual privacy and data confidentiality has received contributions from many fields. In order to grasp the development of privacy preserving data publishing, we discussed the evolution of this theme, focused on privacy mechanism, data utility and its metrics. The privacy mechanism, such as k-anonymity, l-diversity and t-closeness, provides formal safety guarantees and data utility preserve useful information while publishing data. Meantime, we discussed social network privacy and location based service. Finally, we made a conclusion with respect to privacy preserving data publishing, and given further research directions.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G.S. Prasanth Ganesh, B. Balaji, T.A. Srinivasa Varadhan
{"title":"Anti-theft tracking system for automobiles (AutoGSM)","authors":"G.S. Prasanth Ganesh, B. Balaji, T.A. Srinivasa Varadhan","doi":"10.1109/ASID.2011.5967406","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967406","url":null,"abstract":"Technology achieves success only when it meets every stratum of people. Apart from the various GPS tracking devices this paper introduces a first of its kind vehicle tracking system that works only using GSM technology, which would be the cheapest source of vehicle tracking anti-theft system. It is a small kit that consists of a GSM module and several other components. The system can be switched ON by an SMS from the owner, which in turn instructs the microcontroller to turn OFF the vehicle, receive information about the vehicle's current location or more. Once this is done, the microcontroller stimulates the GSM module to forward the details of the nearest Base Station to the owner's mobile via text message. The microcontroller which receives the delivery messages through the GSM module evaluates the time gap between successive messages to determine the exact location of the vehicle in a given area. The enviable advantage of this system is that it helps the owner in tracking the vehicle at a greater pace, and reduces the complexities comparing other system, besides being a cheapest alternative for anti-theft system as well.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"562 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116904086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo-yue Zhang, Mudan Zhou, Yi Zhou, Zhibin Chen, Yunying Huang
{"title":"The application of level-cross inductor to current-carrying lead intelligent vehicle","authors":"Bo-yue Zhang, Mudan Zhou, Yi Zhou, Zhibin Chen, Yunying Huang","doi":"10.1109/ASID.2011.5967429","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967429","url":null,"abstract":"An arrangement of sensor and the corresponding mathematic model was proposed for the informational solution of trace line,the purpose is to make the smart car on the automatic tracking carrying conductor. Meanwhile, the experiment proves the correctness of the model and achieves the high precision. The distribution of magnetic field was simulated in order to assist the design of vehicle control algorithm.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125342738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}