Usability evaluation of designed image code interface for mobile computing environment

Cheolho Cheong, Dong Chul Kim, Tack Don Han

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Recently, image code interfaces and designed image codes, which can present visual information such as shapes, colors, text, images, and textures within the image code, have attracted increasing interest for use in mobile computing environments. In this paper, we introduce designed image codes and their basic decoding techniques; furthermore, we compare and analyze user preferences by performing a user study. We also implement a high-fidelity prototype of an image code interface based on a mobile computing environment and evaluate its usability by performing a user evaluation. From the evaluation, it is observed that the participants prefer a color-based image code, and this image code has a better merit rating.

Original languageEnglish
Title of host publicationHuman-Computer Interaction
Subtitle of host publicationInteraction Platforms and Techniques - 12th International Conference, HCI International 2007, Proceedings
PublisherSpringer Verlag
Pages241-251
Number of pages11
EditionPART 2
ISBN (Print)9783540731061
DOIs
Publication statusPublished - 2007
Event12th International Conference on Human-Computer Interaction, HCI International 2007 - Beijing, China
Duration: 2007 Jul 222007 Jul 27

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume4551 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other12th International Conference on Human-Computer Interaction, HCI International 2007
CountryChina
CityBeijing
Period07/7/2207/7/27

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Usability evaluation of designed image code interface for mobile computing environment'. Together they form a unique fingerprint.

Cite this