Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
jp.keijiro.apriltag
Advanced tools
AprilTags visual fiducial system developed by the APRIL robotics laboratory at the University of Michigan
jp.keijiro.apriltag is a Unity package that provides an implementation of the AprilTag tracker.
AprilTag is a marker based tracking system developed by the APRIL Robotics Laboratory at the University of Michigan. Please see the AprilTag web page for further details.
At the moment, this package supports the following systems:
Clone this repository and play the WebCamTest.unity
scene on Unity Editor.
The current version of the TagDetector component only supports the
tagStandard41h12
tag set. You can download those tag images from
the apriltag-imgs repository. Print some of them using a printer. You also can
use a smartphone screen to display the tags.
The WebCamTest
component uses the Field of View value of the main camera to
estimate tag positions. You can try the sample without adjusting it, but it may
give incorrect depth information. To get accurate tag positions, you should
match the FoV value with the actual camera FoV.
For example, I'm using Zoom Q2n-4K video camera for testing, which gives about 78 degrees horizontal FoV at the mid-angle mode. So I changed the FOV Axis to "Horizontal" and the Field of View value to 78.
This package uses the scoped registry feature to import dependent packages.
Please add the following sections to the package manifest file
(Packages/manifest.json
).
To the scopedRegistries
section:
{
"name": "Unity NuGet",
"url": "https://unitynuget-registry.azurewebsites.net",
"scopes": [ "org.nuget" ]
},
{
"name": "Keijiro",
"url": "https://registry.npmjs.com",
"scopes": [ "jp.keijiro" ]
}
To the dependencies
section:
"jp.keijiro.apriltag": "1.0.1"
After changes, the manifest file should look like below:
{
"scopedRegistries": [
{
"name": "Unity NuGet",
"url": "https://unitynuget-registry.azurewebsites.net",
"scopes": [ "org.nuget" ]
},
{
"name": "Keijiro",
"url": "https://registry.npmjs.com",
"scopes": [ "jp.keijiro" ]
}
],
"dependencies": {
"jp.keijiro.apriltag": "1.0.1",
...
At first, create the AprilTag.TagDetector
object specifying the input image
dimensions. You can run the detector in a lower resolution by specifying a
decimation factor. It may improve the speed at the cost of accuracy and
detection rate.
detector = new AprilTag.TagDetector(imageWidth, imageHeight, decimation);
Call the ProcessImage
method every frame to detect tags from an input image.
You can use a Color32
array to give an image. At the same time, you have to
specify the camera FoV (horizontal) in degrees and the tag size in meters.
webcamTexture.GetPixels32(buffer);
detector.ProcessImage(buffer, fov, tagSize);
You can retrieve the detected tags from the DetectedTags
property.
foreach (var tag in detector.DetectedTags)
Debug.Log($"{tag.ID} {tag.Position} {tag.Rotation}");
Dispose the detector object when you no longer need it.
detector.Dispose();
For details, please check the WebCamTest.cs example, which shows how to
detect tags from images with WebCamTexture
.
FAQs
AprilTags visual fiducial system developed by the APRIL robotics laboratory at the University of Michigan
The npm package jp.keijiro.apriltag receives a total of 785 weekly downloads. As such, jp.keijiro.apriltag popularity was classified as not popular.
We found that jp.keijiro.apriltag demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.