二維條碼之研究
全文
(2) E-mail: lhchen@cc.nctu.edu.tw Fax: (03) 5721490 (:
(3)
(4) )
(5) !"#$% &'()*+,-./012 34/56789:;<=> ?@AB
(6) -./ CDE9FGHI/J
(7) 3K9L
(8) MNOP
(9) M/5J OP
(10) M2=/67QK
(11) RSB -./ TUE VWX YZ[ \]^_[ ` ab *+S7Bc 8-./d34E #$%&'()*+/8: !"ef*+g:hij#$ cklmnopEc Bqrsrtuvwxy z{|},~/@A:b 5 #$
(12) / >JBa/0 K9a@A[. (Keyword: 2D code, error correction,. data hiding, automatic data collection.) In the report, we have developed a 2D code system and put emphasis on three topics: security, error correction and reading problems. The system can encode English, Chinese and special characters. About security, a new idea is proposed. The input data is divided into two parts: general data and secret data. In order to achieve the security purpose, we hide the secret data in the 2D code pattern which contains the general data and some extra codes for error correction. In the part of error correction, the Reed-Solomon(RS) code with high error correction capability is chosen to recover errors. As to the design of the 2D code pattern, some reading problems are considered, these problems include broken, noise, rotation, projection distortion, scaling and unstable lighting conditions. Experimental results are given to show that the proposed system is robust for these reading problems. Besides, we also design a name-card management system.. !"#$%&.
(13) A 9 ^_]/7 ^_] ¡ ¢£\¤ ¥¦§¨©ª«£¢¬¥§®¦ -¯°±²;<³/d´µ; <
(14) ³±²/7¶·E¸¹º `/»¼/
(15) :²2
(16) _\½¬¢¾ _¬¬]¬[ \]¬¬_\¢]¿ÀV|ÁÂ
(17) Ã, ,B
(18) -./Ä{Å> ?ÆÇ@AÈÉÊYËÌÍη/| ÏbµÐ/gÑbÒ Ó bX:ÔÕSB
(19) -./Ö ×OPØ©ÙÚÛÜ,´Ý/Þ Ñ¸¹
(20) ²ßà/á: Câã-.OäSB. -./Ö×`×åyæç =/èéêrësìíîï/F F:VðñòK ()/´ã óÁ/´;< ³ô/:Câ¹õæç;<. [ Bö ÷øùúûü/ý þ,/ðå /ýö · ¹
(21) Câ e Ü:DûüÕ/7ö e-.ÆÞú/ e-.kÑóÂ/Ö
(22) |õW /d:D!Â"#×ã/ >J
(23) #$%&'()*+6$ 12/6789%Ñ.
(24) ßPVW¿@A/ã @AJCâ9ij&'
(25) #$ -([ >)*ÂR8 9:h+ú×,$,. @A/´ãã@AJ%Ñ- ./012<B×÷Ñ¿3 9f/S¥°-¯4 å-¯ Q5û RS B
(26) -./ 6 7 J
(27) 3K9L
(28) NOP
(29) /B°-¯ å~/9L 89V#$9L
(30) /í×OP
(31) /ó:Ñ.;<=8-V>$/ :QßàOP
(32) RS¦B. -./678Båy ?@/AB5èéêr ësîïìíqr/ðVC ú h#$S§B|D?@ÈEFz{ G|}Htu xyË>$ 9Vh gij#$S¨:< y
(33) IE=>J>K? / 9f.;?L©.;
(34) MȼM NOPQ,ËdðVh;</5 gV&'úįRSη[ [. '()*+,-. [ >X;<³T // _¬¬]¬[ \]¬¬_\¢] N
(35) _\½¬¢¾U-./ !"B#$&'()*+V 8cW£¢¢_¬/58 °X_\]^_¬N!X^_\]^_¬/ YZ¼[
(36) :E[=>J>K? 9f\]NMNȼPQO,Ë/5 g3KOP
(37) Ä9L
(38) ^° N!3KU_È`M9Ë°%/ Ja2
(39) K9bLc/d YZ ° X§²2 /eÖ
(40) XJOP
(41) 5=/)efg 9fhi#$¿.jÈk_£¢½¬_Ë/ 5lãÈ`MÈmËËS!%/.
(42) n o pqr/d²2. j/stbu-vtuwÕ 0Hb/9L 8/Ö YZ !Xx 5fg9L
(43) M/7Ñ<=8/n:69yÌ Pz "HzfgOP
(44) M[. Encode. Decoder. Data Dat aInput Input. Data DataOutput Outpur. RS RSencoder encoder. RS RSdecoder decoder. Secret SecretData Dat aEmbedding Embedding. Secret SecretData DataExtraction Extraction. Pat tern Generat or Pattern Generator. Patt Pat ern ternReader Reader. !!!!!!!
(45) [ B
(46) -./>CD9 GHI/{ÑOPÁÂ%/:J Â;<
(47) M3KU_|/OP
(48) MÄ9L
(49) M/Ö>CD¿ °X/IE:J9L
(50) Mu}K /5g:JOP
(51) M2=/ 7ã9HI*ÂR/Ö9L !X~: #D9L
(52) M/ |tÑOP
(53) M×=/Ö¼ > CD¿ÑOPÁÂ! X/IE:s59L
(54) M /ÖP Ì/d:s5Á¿OP
(55) M g
(56) ßà/:J ²3|D_|ßPä/n| D_|:#$_
(57) / B
(58) M%:J¼ = N8HKOP
(59) M/Ñ B¸~/:$sO P
(60) M[ B -./-(J YZY__^[Z]]]\]^_§0µ _°-(/4 YZ\]^_ ´. VWX/5g¸R m½¬¢[ _¬¬]¬/9." { bu÷t%/n YZ\]^_ VW±²9¨/ J4 YZ[ \]^_ x [ YZ[ \]^_ ¿ ^µ ¢[ _¬¬]¬[ \]¬¬_\¢][ȤË[YZ[\]^_/= ¢ e 9: ¢ YZ[\]^_/¤
(61) °?K/ ² E e?¿K/ YZ[ \]^_ K¿ç09YZ/ 8 Ñ 9 Rc
(62) /¡¢9? È\]^_£]¬^Ë m¢ p/n ¢[_¬¬]¬[ \]¬¬_\¢][ ȤË[ YZ[ \]^_ = óÁµ ¥Ĭ/d´ã9¤ ¢ "H/Ö9 ¯ ¤¥¥¢ ¦:"H:;<
(63) ³ ¤/¼ã9: ¢ ȤË[ YZ[\]^_[ Ö×>8§¨ V×,$,/´ã§¨;<
(64) IEV[=J>K? .;\ ] /V[MN©ª«¬, ´ãB
(65) ;<%/@AJ®; <
(66) ¯µ9bLc/7J¢ RbLK9?´ã/°±
(67) B°:d0²x²P³´í @A°/¼ã:QX;<Ó O P"/g´@A¯Ña2¿
(68) µbLc/´ã
(69) ¿N¯J|B° ±µä/ã/: @A¶&'ú ×,F=/¼;<·¸
(70) ¹ºO»3¼¿½¾©PQ[ °%/ 8¿ − Àµ¦ Jh°?
(71) M/nÁÂ YZ[\]^_ ° X ¦ : Ü ) ¿ ij − À/J|²B
(72) M[ ¿ − À[ ¿e/¦µ°e
(73).
(74) M
(75) °e/@AJ°e ¿
(76) ¯µ9bLc/J¢9bL 9ÃÈbLĵ Ë©ÅÈbLĵ ÆË -Np/ÇÖÈ7É/Ö37 ¿qrÊËD·È¼MÈ£ËpË/¦: sÌN[ [ !!!!!!!!)b*!!!!!!!!!!!!!!)c*!. .
(77)
(78) !"#$%& '!
(79) !. B#$-./> ©ª> $OÈÍ^_][ \£_¬£Ë0µ#$ 8 Î / Ö × `×åy?@]W_[ _ͬ]_¢/æç.ÑÏÐ/» ¼tuȬ]¢£¢]ËxyÈ\£ÑË Ò©ÐNÈW¬]Ó_\¢_^[ ^¢]¬¢]Ë,*+9 ñÜ)/¼MÔpµE!"e *+/>d×8ÕÖ²3 -.j`aef*+5g²i# $jÕ×d/×ÌN¿ Ø ²3UÙÚ-N Û/Üã Û/ÝijúÞ5¿B t u -v/5:D%!"xy* +|×UÚ-N Ûç¿È3w ²39Ãïß -N0µ-v¿à á/Ö×cÚ-N/Á 9:"H¿Îbu -v[ [. !!. {008Î/59!4 Õ µ ¨¦Æé¦êÆ © ª > $ OÈÍ^_][ \£_¬£Ë0µ#$8Î/@ A:B §ë¥Æ ìK#$µEíp @AîV/67÷J× a3/0D9 a@AÈïðËB°X-./Mñ ípE9Ö@A0 9k»/Mñȣ˵“òó ”
(80) / = ¿ ”ôõöÈåË÷Èƥ˥¦Æ§¥øÆ“ ¦ µ O P
(81) /ãùÖ×µ=¿ /Ñ P"¿ú/MñÈm˵u}K N¯/7MñÈ\ËnµJã u×Èw7uKB !X-./MûÈ£ËëÈüË3Çíp Btuxyqrêrsr vwý/srþsr,~N :h g #$»/7M nYZE@AñG| /¼ã:BG ~ x#$7() /)e/ M
(82) Ë E! ~N[ [
(83)
(84) !"#$ %&'()*+(, *-.//0-!!#1 TEL(H):(02)240-5290. (a). !!. !!. ( )*+ ,-./ 01-23
(85) 45
(86) 67
(87) (89:
(88) . [ R@AB â_¢½[ ã3ä$/ åâ æçèO. !!. !. ( ;< =>?@ABCD >? EF
(89) GHIJ” KLM
(90) N7OP = Q
(91) (NRS>?$T&BCP >?
(92) . [ [.
(93) [ [. (. . UVW. . O Æ@AMþD!a@A "aIã¿ /´µ ¶ºÐ
(94) M#%/ ¼±xº/$,$,ðdV Æ/67hi#0 {)!Â#0[ [. [. XY Z 0 [\*+=]T^_`a bcTde' f*+ EF
(95) 67
(96) 45
(97) (gh
(98) Uih
(99) Vjh
(100) W89:
(101) Xkljh
(102) Ymjh
(103) . [. n0=][opqrstuvwx+y EF
(104) +z{| =
(105) =}+y,~
(106) . [. 0*+`a EF
(107) `a
(108) 9 y[/rs
(109) . [. [ >8E9%ÑX. VW%
(110) MÀV Vij& 'ú#$¿@A/gã @A:¶&'ÄÑ: @A0Rm/CâE9Ä ¯.B-./67 :ØEF0D2 a @A
(111) `aMþþRa@A ¼Ç@AѼa$@A ípñÆÇ@APQÌ@A. >÷JB a/(íE9a @A/e@AE[U30 0 N #$Se@AB %^]£[ ø§ &'3/ (]¬£^[ Ê))[ (½^_¬ *G+vx((í D·/|Ï:ÔÕX:à"X 5gCâE' g,- 8 .[ M.ípE@A ./EF0Ä#$U 3/BU.É3wðÑ9
(112) a@A/CâÀVEF05 /905)e905905 e90²2901Iã0°2 H$3Ä45SB03/ É3w
(113) a@Añ¦%ú J
(114) op×È3w3/ 5:ÇÁÂbÏ?6Äôß/“72” HÄ72
(115) /“°” 6$0/Èwñop ¿/5gñ¦opBÈ 3w3SB#$3/: TUÖ©ª>$8ÎÈÍ^_][ \£_¬£Ë© ©ª89#$©ª/“!” 6$!#/!~ Ndñ:3opBÈ-©ªÛ ;<Û/5gñJmn²2
(116) a=¿
(117) Ã=[.
(118) [ [. . . =>?@A
(119) >? CD
(120) >?*+
(121) . [.
(122) [ [ ôü_][ â£Í^[ =_¬]_[ Z££¬¢>£^[ Ó½[ â[ %£Ñ[ “?½^£_¢£[ ]k[ m£¬[ \]^_[ [ k]¬£¢][ ¢ü_]¬¾”[ Ê]W½¢_¬[ Í]½_[ ¥ ½m_¬[ ¦W£Ñ_[ ®¦ê¨@W¬[ øøÆ[ ¥[ ABC/“
(123) MÄ ã”/øø§ D ø E]/ê¥ê® F[ [ ABC/“
(124) MÄ ã”/øø§ D E]/®¥®ê F[ ¦[ %£ÑÓ½[ ⣽âüG[ “ZW£¢£[ k]¬£¢][ £^[ \]^Ñ[ ¢ü_]¬¾”[ Z¢£¢_[ HÍ_¬¢¾[]k[I_£[]¬¤[£¢[ Z¢]¾[ (¬]]¤[ øêø[ §[ ôü_][ â£Í^=_¬]_[ Z££¬¢>£^[. Ó½[ â%£Ñ[ “Jk]¬£¢][ _\]^Ñ[ £¢ü[ ¢£]^_]£[ m£¬[ \]^_”[ Ê]W½¢_¬[ Í]½_[ ¥§½m_¬[ ¨W£Ñ_[ ê¥ê=½_[øø¥[ ¨[ Yö(¬£[ _¢[ £[ “K_¢ü]^[ £^[ @WW£¬£¢½[ k]¬[ ô¬£k]¬Ñ[ GÑ¢£¾[ õ\]^_^[ G£¢£[ ¢][ ⬢_^[ G£¢£[ Z¢¬W”[ HZ[⣢_¢[I][¦®¥ê®ê K£¬øêê[ ®[ “L_¬\]^_[J^_¢k\£¢][Z¾¢_[ ¢ü_[ õ_\¢¬]\[ ?Ñ_¬W¬¢[ ”Èm¬]\ü½¬_Ë[ L_¬¢_\[J\[Ê££m££[⣬¤Ê£k[ ê[ GMâ¬^¾[ £^[ YZ[ ʾm£¤[ “K£\ü_[ Y_£^£m_[ (£¬¾Ê]^_”[ HN⣢_¢[ @WW\£¢][ M([ ¥[ ¥ê[ ¥¦Æ[ @I]Íêøêø@WW\£¢][ I]êøÆ¥¦ø[ ø[ “G£¢£\]^_”[ Èm¬]\ü½¬_ËJGK£¢¬[ J¢‘[J\[Z£k_¢¾[壬m]¬?£[øêø[ Æ[“@¬¬£¾\]^_[ ^_¢k\£¢][ ¢£Ñ”[ %£¬¬_[ö¢¢_ö¾[N¬§Æ§¦[ [%[ =[ Í£[ M[ “ô£]^_]£[ ^]¢[ \]^_[ k]¬[ W¬]^½\¢[ ^_¢k\£¢]”[ Jõõõ[ô¬££\¢][][Jk]¬£¢][ôü_]¬¾[ Í]½_[Jô [½m_¬[§[W£Ñ_[¨¥Æ¨ [ Z_W¢_m_¬[øê®[ ¥ü¢¢W÷OO£££\W\]O;¢_O£Pm ^ü¢[ ü¢¢W÷OO£££]W££¬\]O\]^_ ü¢[ ¦[K££[ 壢¢]¬[ £^[ ½\ü[ Z£¢]ü[ “I_£[ Ê]^_[ k]¬[ (£¬[ Ê]^_[ ô¾W_[ Y_\]¬^Ñ[Z¾¢_[ ”ZÑ£W]¬_[ JÊÊZ‘ø¦[ Ê]k_¬_\_[â¬]\__^ÑW£Ñ_[Ƨ¦Æ§ê[ §[Zö[ £^[ G=[ Ê]¢_][ =¬[ õ¬¬]¬[ Ê]¢¬][ Ê]^Ñ[ ?½^£_¢£[ £^[ @WW\£¢][ â¬_¢\_[ å£[ õÑ_£]]^[ Êkk[I=øê [ ¨[%\¤_¬õ¬¬]¬[ Ê]¢¬][ Z¾¢_[ k]¬[.
(125) GÑ¢£[Ê]½\£¢][£^[Z¢]¬£Ñ_[ [ [.
(126)
相關文件
The existence of transmission eigenvalues is closely related to the validity of some reconstruction methods for the inverse scattering problems in an inhomogeneous medium such as
For the assessment of Reading, Writing (Part 2: Correcting and Explaining Errors/Problems in a Student’s Composition) and Listening, which does not involve the use
When Wasan mathematicians propose mathematics problems, two aspects of knowledge activities related to mathematics research and practice are considered: They construct Jutsu using
For problems 1 to 9 find the general solution and/or the particular solution that satisfy the given initial conditions:. For problems 11 to 14 find the order of the ODE and
- to minimise the problems of adjusting to the new medium of instruction and to learn the subject content
Both problems are special cases of the optimum communication spanning tree problem, and are reduced to the minimum routing cost spanning tree (MRCT) prob- lem when all the
The Prajñāpāramitā-hṛdaya-sūtra (般若波羅蜜多心經) is not one of the Vijñānavāda's texts, but Kuei-chi (窺基) in his PPHV (般若波羅蜜多心經 幽賛) explains its
Biases in Pricing Continuously Monitored Options with Monte Carlo (continued).. • If all of the sampled prices are below the barrier, this sample path pays max(S(t n ) −