Qr Code Detection Algorithm
-
Upload
kamal-sharma -
Category
Documents
-
view
86 -
download
7
description
Transcript of Qr Code Detection Algorithm
Quick Response [ QR] Code Detection Algorithm
Kamal Kumar Sharma
Computer Science and Engineering
Amity School of Engineering and Technology
ABSTRACT:
This paper shows new algorithms and the implementations of image reorganization for EAN/QR
barcodes in mobile phones. The mobile phone system used here consists of a camera, mobile
application processor, digital signal processor (DSP), and display device, and the source image is
captured by the embedded camera device.
The introduced algorithm is based on the code area found by four corners detection for 2D barcode
and spiral scanning for 1D barcode using the embedded DSP. This algorithm is robust for practical
situations and the DSP has god enough performance for the real-time recognition of the codes.
Current mobile phones implement various new kinds of applications such as taking photos, and
movie shooting by using embedded camera devices and this progress also depends on the camera
device technology.
The camera device and application processor are necessary hardware components for this system.
The application processor is needed to implement the camera interface, LCD controller, DSP for
image processing, and application host CPU for real-time computations.
The processing flow is as follows:
1. Execute the barcode reader application
2. Capture from embedded camera device
3. Process the image in DSP
4. Decode the code
5. Display the results
Analysis And Research Of System Security Based On Android
Kamal Kumar Sharma
Computer Science and Engineering
Amity School of Engineering and Technology
ABSTRACT:
Android is a smart mobile terminal operating platform core on Linux. But due to its open-source
software and programmable framework character, it leads the Android system vulnerable to get virus
attacks. This paper has deeply researched from the Linux system security mechanism, Android-
specific security mechanisms and other protection mechanisms. And on this basis, Android devices
have achieved closely guarded on normal state. So that attackers cannot use the kernel module or
core library to get highest access permission and be attacked. Meanwhile, to further strengthen the
security of Android devices, it enables them to properly handle the high-risk threat. This paper also
strengthened intrusion detection system (HIDS) based on the host in order to detect malicious
software and strengthen the Android system-level access control.