Stylized Aesthetic QR Code

被引:48
|
作者
Xu, Mingliang [1 ]
Su, Hao [1 ]
Li, Yafei [1 ]
Li, Xi [2 ]
Liao, Jing [3 ]
Niu, Jianwei [4 ]
Lv, Pei [1 ]
Zhou, Bing [1 ]
机构
[1] Zhengzhou Univ, Zhengzhou 450066, Henan, Peoples R China
[2] Zhejiang Univ, Hangzhou 310027, Zhejiang, Peoples R China
[3] Microsoft Res Lab Asia, Beijing 100080, Peoples R China
[4] Beihang Univ, Beijing 100083, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划; 中国博士后科学基金;
关键词
QR code; style-oriented; visual aesthetics; robust;
D O I
10.1109/TMM.2019.2891420
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the continued proliferation of smart mobile devices, the Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the visual-unpleasant appearance of QR codes, existing works have developed a series of techniques. However, these works still leave much to be desired, such as personalization, artistry, and robustness. To address these issues, in this paper, we propose a novel type of aesthetic QR codes, Stylized a EsthEtic (SEE) QR code, and a three-stage approach to automatically produce such robust style-oriented codes. Specifically, in the first stage, we propose a method to generate an optimized baseline aesthetic QR code, which reduces the visual contrast between the noise-like black/white modules and the blended image. In the second stage, to obtain an art style QR code, we tailor an appropriate neural style transformation network to endow the baseline aesthetic QR code with artistic elements. In the third stage, we design a module-based robustness-optimization mechanism to ensure the performance robust by balancing two competing terms: visual quality and readability. Extensive experiments demonstrate that the SEE QR code has high quality in terms of both visual appearance and robustness and also offers a greater variety of personalized choices to users.
引用
收藏
页码:1960 / 1970
页数:11
相关论文
共 50 条
  • [1] Aesthetic QR Code Based on Modified Systematic Encoding Function
    Kuribayashi, Minoru
    Morii, Masakatu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (01): : 42 - 51
  • [2] Efficient access control system based on aesthetic QR code
    Peng-Cheng Huang
    Chin-Chen Chang
    Yung-Hui Li
    Yanjun Liu
    [J]. Personal and Ubiquitous Computing, 2018, 22 : 81 - 91
  • [3] An aesthetic QR code solution based on error correction mechanism
    Li, Li
    Qiu, Jinxia
    Lu, Jianfeng
    Chang, Chin-Chen
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 85 - 94
  • [4] Efficient access control system based on aesthetic QR code
    Huang, Peng-Cheng
    Chang, Chin-Chen
    Li, Yung-Hui
    Liu, Yanjun
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (01) : 81 - 91
  • [5] Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern
    Li, Li
    He, Min
    Yu, Jier
    Lu, Jianfeng
    Zhou, Qili
    Feng, Xiaoqing
    Chang, Chin-Chen
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 251 - 266
  • [6] Aesthetic QR code authentication based on directed periodic texture pattern
    Li, Li
    He, Min
    Yu, Jier
    Lu, Jianfeng
    Zhou, Qili
    Feng, Xiaoqing
    Chang, Chin-Chen
    [J]. Journal of Computers (Taiwan), 2019, 30 (06): : 263 - 275
  • [7] Aesthetic QR code generation with background contrast enhancement and user interaction
    Lin, Lijian
    Zou, Xinyi
    He, Liping
    Liu, Sijiang
    Jiang, Bo
    [J]. THIRD INTERNATIONAL WORKSHOP ON PATTERN RECOGNITION, 2018, 10828
  • [8] A Novel Aesthetic QR Code Algorithm Based on Hybrid Basis Vector Matrices
    Lu, Jianfeng
    Cheng, Weiling
    Zhang, Shanqing
    Li, Li
    Yang, Zaorang
    Chang, Chin-Chen
    [J]. SYMMETRY-BASEL, 2018, 10 (11):
  • [9] A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM
    Li, Li
    Wang, Bing
    Lu, Jianfeng
    Zhang, Shanqing
    Chang, Chin-Chen
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (03): : 935 - 946
  • [10] Watermarking QR Code
    Barmawi, Ari Moesriami
    Yulianto, Fazmah Arif
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 65 - 68