Skip to main content

Dependable Coding of Fiducial Tags

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3598))

Abstract

Fiducial tags can be recognised successfully and decoded by computer vision systems in order to produce location information. We term a system dependable if its observable results are predictable and repeatable. The dependability of such a vision system is fundamentally dependent on the scheme used to encode data on the tag. We show that the rotational symmetry common to many tag designs requires particular consideration in order to understand the performance of the coding schemes when errors occur. We develop an abstract representation of tags carrying symbolic data which allows existing information coding techniques to achieve robust codes. An error-correcting coding scheme is presented for carrying arbitrary symbolic data in a dependable vision system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shortis, M.R., Beyer, H.A.: Close Range Photogrammetry and Machine Vision. ch. 5, pp. 106–155. Whittles Publishing (1996)

    Google Scholar 

  2. Brown, D.: Decentering distortion of lenses. Photogrammetric Engineering and Remote Sensing 32, 444–462 (1966)

    Google Scholar 

  3. Heikklä, J., Silvén, O.: A four-step camera calibration procedure with implicit image correction. In: Computer Vision and Pattern Recognition, pp. 1106–1113 (1997)

    Google Scholar 

  4. Hightower, J., Borriello, G.: Real-time error in location modeling for ubiquitous computing. In: Location Modeling for Ubiquitous Computing—Ubicomp 2001 Workshop, pp. 21–27 (2001)

    Google Scholar 

  5. Dey, A.K., Abowd, G.D.: Towards a better understanding of context and context-awareness. In: Proceedings of the CHI 2000 Workshop on The What, Who, Where, When, Why and How of Context-Awareness (2000)

    Google Scholar 

  6. Billinghurst, M., Kato, H.: Collaborative mixed reality. In: Proceedings of the First International Symposium on Mixed Reality, pp. 261–284 (1999)

    Google Scholar 

  7. Owen, C.B., Xiao, F., Middlin, P.: What is the best fiducial? In: The First IEEE International Augmented Reality Toolkit Workshop, pp. 98–105 (2002)

    Google Scholar 

  8. de Ipiña, D.L., Mendona̧, P.R.S., Hopper, A.: TRIP: a low-cost vision-based location system for ubiquitous computing. Personal and Ubiquitous Computing 6, 206–219 (2002)

    Article  Google Scholar 

  9. Rekimoto, J.: Matrix: A realtime object identification and registration method for augmented reality. In: Proceedings of Asia Pacific Computer Human Interaction, pp. 63–68 (1998)

    Google Scholar 

  10. Zhong, X., Liu, P., Georganas, N.D., Boulanger, P.: Designing a vision-based collaborative augmented reality application for industrial training. it-Information Technology 45, 7–18 (2003)

    Article  Google Scholar 

  11. Cho, Y., Neumann, U.: Multiring fiducial systems for scalable fiducial-tracking augmented reality. PRESENCE: Teleoperators and Virtual Environments 10, 599–612 (2001)

    Article  Google Scholar 

  12. Berlekamp, E.R.: Algebraic Coding Theory. McGraw-Hill, New York (1968)

    MATH  Google Scholar 

  13. Naimark, L., Foxlin, E.: Circular data matrix fiducial system and robust image processing for a wearable vision-inertial self-tracker. In: IEEE International Symposium on Mixed and Augmented Reality, pp. 27–36 (2002)

    Google Scholar 

  14. Pholig, S., Hellman, M.: An improved algorithm for computing logarithms over gf(p) and its cryptographic significance. IEEE Transactions on Information Theory 24, 106–110 (1978)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rice, A.C., Cain, C.B., Fawcett, J.K. (2005). Dependable Coding of Fiducial Tags. In: Murakami, H., Nakashima, H., Tokuda, H., Yasumura, M. (eds) Ubiquitous Computing Systems. UCS 2004. Lecture Notes in Computer Science, vol 3598. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11526858_20

Download citation

  • DOI: https://doi.org/10.1007/11526858_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27893-1

  • Online ISBN: 978-3-540-31809-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics