that the strengths of digital images above can be max-
imized. Our experiments validate the robustness of
RIC.
To our knowledge, there is no digital image ser-
vice using embedding data technologies into images.
RIC is mainly designed for digital images for chal-
lenging to open a new Superdistribution system, com-
pared to the existing ecosystems provided by platform
companies. Using RIC, it is possible that RIC images
can spread out in any sharing way, such as E-mail,
SNS, chat-app, and the original embedded digital data
can be easily extracted by end recipients on any Inter-
net services, regardless of platforms. We had already
implemented RIC to iOS, Android, Chrome browser
extension, and so on to confirm that RIC can be oper-
ated across diverse platforms.
In spite that high robustness of RIC is realized,
the performance of RIC, such as extracting time is
not completely considered. For example, the doubt
color correction algorithm helps detect damaged im-
ages, but it is highly likely that decoding process of
terribly damaged images takes relatively long time
when N
d
is big. We keep trying the way of optimizing
a doubt color correction algorithm with a small value
of N
d
. In addition, research for image’s inclination
matching is also critically important for security pol-
icy, and we are still trying several additional image
matching features. These future works will upgrade
the completeness and stability of the system, which
also means RIC will possibly be able to be operated in
the worse conditions than the currently defined speci-
fication.
ACKNOWLEDGEMENTS
This work was supported by Tokyo Institute of Tech-
nology and Pulit Inc. The authors would like to ap-
preciate the anonymous reviewers for their valuable
suggestions and comments.
REFERENCES
Appleinsider (2014). Apple’s App Store gener-
ated over $10 billion in revenue for devel-
opers in record 2014. [Online]. Available:
http://appleinsider.com/articles/15/01/08/apples-
app-store-generated-over-10-billion-in-revenue-for-
developers-in-record-2014.
Connors, K., Connors, M., and Seemann, J.
(1996). morgueFile. [Online]. Available:
http://www.morguefile.com.
Furht, B. (1995). A Survey of Multimedia Compression
Techniques and Standards. Part I: JPEG Standard.
Real-Time Imaging, 1(1):49–67.
Grillo, A., Lentini, A., Querini, M., and Italiano, G. (2010).
High Capacity Colored Two Dimensional codes. In
Proc. Int. Multiconference on Computer Science and
Information Technology (IMCSIT), pages 709–716.
Hao, T., Zhou, R., and Xing, G. (2012). COBRA: Color
Barcode Streaming for Smartphone Systems. In Proc.
10th Int. Conf. on Mobile Systems, Applications, and
Services, MobiSys ’12, pages 85–98. ACM.
Hore, A. and Ziou, D. (2010). Image Quality Metrics:
PSNR vs. SSIM. In 20th Int. Conf. on Pattern Recog-
nition (ICPR), pages 2366–2369.
Incorporated., D. W. (2008). About QR Code. [Online].
Available: http://www.qrcode.com/.
internet.org (2013). A Focus on Efficiency. [Online]. Avail-
able: http://internet.org/efficiencypaper.
Itseez (2000). OpenCV. [Online]. Available:
http://opencv.org.
Jiang, J. and Armstrong, A. (2002). Data hiding approach
for efficient image indexing. Electronics Letters,
38(23):1424–1425.
Jiansheng, M., Sukang, L., and Xiaomei, T. (2009). A
Digital Watermarking Algorithm Based On DCT and
DWT. In Proc. Int. Symposium on Web Information
Systems and Applications, WISA ’09, pages 104–107.
Academy Publisher.
Liu, Q., Sung, A. H., and Qiao, M. (2011). Neighboring
Joint Density-based JPEG Steganalysis. ACM Trans.
Intell. Syst. Technol., 2(2):16:1–16:16.
Liu, X., Doermann, D., and Li, H. (2008). A Camera-
based Mobile Data Channel: Capacity and Analysis.
In Proc. 16th ACM Int. Conf. on Multimedia, MM ’08,
pages 359–368. ACM.
Mintzer, F., Braudaway, G., and Yeung, M. (1997). Effec-
tive and ineffective digital watermarks. In Proc. 3rd
Int. Conf. on Image Processing, volume 3, pages 9–
12.
Mohanty, S. P. and Bhargava, B. K. (2008). Invisi-
ble Watermarking Based on Creation and Robust
Insertion-extraction of Image Adaptive Watermarks.
ACM Trans. Multimedia Comput. Commun. Appl.,
5(2):12:1–12:22.
Mori, R. and Kawahara, M. (1990). Superdistribution: The
Concept and the Architecture. The Trans. of the IE-
ICE, 73(7):1133–1146.
Nurwono, K. A. H. and Kosala, R. (2009). Color Quick
Response Code for Mobile Content Distribution. In
Proc. 7th Int. Conf. on Advances in Mobile Computing
and Multimedia, MoMM ’09, pages 267–271, New
York, USA. ACM.
Ong, S. K., Chai, D., and Tan, K. (2008). The Use of Border
in Colour 2D Barcode. In Int. Symp. on Parallel and
Distributed Processing with Applications, ISPA ’08,
pages 999–1005.
Provos, N. and Honeyman, P. (2001). Detecting Stegano-
graphic Content on the Internet. Technical report, In
ISOC NDSS02.