2005
DOI: 10.1007/11526858_7
|View full text |Cite
|
Sign up to set email alerts
|

Real-World Interaction with Camera Phones

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
71
0

Year Published

2005
2005
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(71 citation statements)
references
References 4 publications
0
71
0
Order By: Relevance
“…Despite the simplicity of the range camera image acquisition, the automatic extraction of the objects of interest, namely the (Otsu, 1979), eccentricity classification (Rohs, 2005) and the boundary point removal with image erosion. The specific procedure for target measurement extraction is to refer (Qi and Lichti, In press).…”
Section: Target Measurement Extractionmentioning
confidence: 99%
“…Despite the simplicity of the range camera image acquisition, the automatic extraction of the objects of interest, namely the (Otsu, 1979), eccentricity classification (Rohs, 2005) and the boundary point removal with image erosion. The specific procedure for target measurement extraction is to refer (Qi and Lichti, In press).…”
Section: Target Measurement Extractionmentioning
confidence: 99%
“…Rohs [9] divided incoming frames into the fixed number of blocks and then determined the relative x, y, and rotational motion using a simple block matching technique in order to to interact with an RFID tag. Another possibility is to extract distinctive features such as edges and corners from images which exist naturally in the scene.…”
Section: Related Workmentioning
confidence: 99%
“…At present, seven 2D-barcodes are used for camera phone applications among them. These are: QR Code [3], VeriCode [4], Data Matrix [5], mCode [6], Visual Code [7], ShotCode [8] and ColorCode [9]. Fig.…”
Section: D-barcodes For Camera Phone Applicationsmentioning
confidence: 99%
“…1). We encoded an identical set of data in the first 2 samples in 2 different symbol sizes 6 and repeated the same operation using another identical set of data 7 . Since some 2D-barcodes only encode URL, we used 2 different URLs as our test data: a short and a long URL.…”
Section: First Read Rate (Frr) Analysismentioning
confidence: 99%