231 research outputs found

    Confidentiality of 2D Code using Infrared with Cell-level Error Correction

    Get PDF
    Optical information media printed on paper use printing materials to absorb visible light. There is a 2D code, which may be encrypted but also can possibly be copied. Hence, we envisage an information medium that cannot possibly be copied and thereby offers high security. At the surface, the normal 2D code is printed. The inner layers consist of 2D codes printed using a variety of materials, which absorb certain distinct wavelengths, to form a multilayered 2D code. Information can be distributed among the 2D codes forming the inner layers of the multiplex. Additionally, error correction at cell level can be introduce

    2D-barcode for mobile devices

    Get PDF
    2D-barcodes were designed to carry significantly more data than its 1D counterpart. These codes are often used in industrial information tagging applications where high data capacity, mobility, and data robustness are required. Wireless mobile devices such as camera phones and Portable Digital Assistants (PDAs) have evolved from just a mobile voice communication device to what is now a mobile multimedia computing platform. Recent integration of these two mobile technologies has sparked some interesting applications where 2D-barcodes work as visual tags and/or information source and camera phones performs image processing tasks on the device itself. One of such applications is hyperlink establishment. The 2D symbol captured by a camera phone is decoded by the software installed in the phone. Then the web site indicated by the data encoded in a symbol is automatically accessed and shown in the display of the camera phone. Nonetheless, this new mobile applications area is still at its infancy. Each proposed mobile 2D-barcode application has its own choice of code, but no standard exists nor is there any study done on what are the criteria for setting a standard 2D-barcode for mobile phones. This study intends to address this void. The first phase of the study is qualitative examination. In order to select a best standard 2D-barcode, firstly, features desirable for a standard 2D-barcode that is optimized for the mobile phone platform are identified. The second step is to establish the criteria based on the features identified. These features are based on the operating limitations and attributes of camera phones in general use today. All published and accessible 2D-barcodes are thoroughly examined in terms of criteria set for the selection of a best 2D-barcode for camera phone applications. In the second phase, the 2D-barcodes that have higher potential to be chosen as a standard code are experimentally examined against the three criteria: light condition, distance, whether or not a 2D-barcode supports VGA resolution. Each sample 2D-barcode is captured by a camera phone with VGA resolution and the outcome is tested using an image analysis tool written in the scientific language called MATLAB. The outcome of this study is the selection of the most suitable 2D-barcode for applications where mobile devices such as camera phones are utilized

    2D Hierarchical Microbarcodes with Expanded Storage Capacity for Optical Multiplex and Information Encryption

    Get PDF
    The design of nanosegregated fluorescent tags/barcodes by geometrical patterning with precise dimensions and hierarchies could integrate multilevel optical information within one carrier and enhance microsized barcoding techniques for ultrahigh-density optical data storage and encryption. However, precise control of the spatial distribution in micro/nanosized matrices intrinsically limits the accessible barcoding applications in terms of material design and construction. Here, crystallization forces are leveraged to enable a rapid, programmable molecular packing and rapid epitaxial growth of fluorescent units in 2D via crystallization-driven self-assembly. The fluorescence encoding density, scalability, information storage capacity, and decoding techniques of the robust 2D polymeric barcoding platform are explored systematically. These results provide both a theoretical and an experimental foundation for expanding the fluorescence storage capacity, which is a longstanding challenge in state-of-the-art microbarcoding techniques and establish a generalized and adaptable coding platform for high-throughput analysis and optical multiplexing

    A software toolkit for radio frequency data terminals

    Get PDF
    This thesis is concerned with the computer industry of "automatic identification.” Central to automatic identification is the use of barcodes and related technologies, including wireless computer networks and Radio Frequency Data Terminals (RFDTs) RFDTs are hand held computers incorporating a screen, barcode scanner, and radio transceiver. Programming of these devices is bespoke to each customer, hence this thesis' subject: producing a toolkit for economical development of RFDT software. The work reported in this thesis was developed in a joint project between Castle Auto I D. Solutions', a barcode systems integration company, and the University of Durham. This was enabled by a TCS Programme (^2), which places a university employee within the company for "technology transfer." The thesis begins with a study of the relevant hardware and technology in the automatic identification industry. The common software components of data collection systems are then identified, and a "toolkit" of reusable software components is proposed, implemented, and refined. Particular attention is paid to code re-use. In refining the toolkit, several commercial applications are developed and deployed into industry. The final case study is a commercially successful 802.1 1b wireless site survey system, developed using the toolkit

    Digital watermarking and novel security devices

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Integrating TrustZone Protection with Communication Paths for Mobile Operating System

    Get PDF
    Nowadays, users perform various essential activities through their smartphones, including mobile payment and financial transaction. Therefore, users’ sensitive data processed by smartphones will be at risk if underlying mobile OSes are compromised. A technology called Trusted Execution Environment (TEE) has been introduced to protect sensitive data in the event of compromised OS and hypervisor. This dissertation points out the limitations of the current design model of mobile TEE, which has a low adoption rate among application developers and has a large size of Trusted Computing Base (TCB). It proposes a new design model for mobile TEE to increase the TEE adoption rate and to decrease the size of TCB. This dissertation applies a new model to protect mobile communication paths in the Android platform. Evaluations are performed to demonstrate the effectiveness of the proposed design model

    Mobile Authentication with NFC enabled Smartphones

    Get PDF
    Smartphones are becoming increasingly more deployed and as such new possibilities for utilizing the smartphones many capabilities for public and private use are arising. This project will investigate the possibility of using smartphones as a platform for authentication and access control, using near field communication (NFC). To achieve the necessary security for authentication and access control purposes, cryptographic concepts such as public keys, challenge-response and digital signatures are used. To focus the investigation a case study is performed based on the authentication and access control needs of an educational institutions student ID. To gain a more practical understanding of the challenges mobile authentication encounters, a prototype has successfully been developed on the basis of the investigation. The case study performed in this project argues that NFC as a standalone technology is not yet mature to support the advanced communication required by this case. However, combining NFC with other communication technologies such as Bluetooth has proven to be effective. As a result, a general evaluation has been performed on several aspects of the prototype, such as cost-effectiveness, usability, performance and security to evaluate the viability of mobile authentication
    • …
    corecore