Covert QR Codes: How to Hide in the Crowd
暂无分享,去创建一个
[1] Diana K. Smetters,et al. Secret handshakes from pairing-based key agreements , 2003, 2003 Symposium on Security and Privacy, 2003..
[2] Refik Molva,et al. A provably secure secret handshake with dynamic controlled matching , 2010, Comput. Secur..
[3] Wen-Chuan Wu,et al. Application of QR-Code Steganography Using Data Embedding Technique , 2013, ITCS.
[4] Xiaobo Li,et al. On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..
[5] Edgar R. Weippl,et al. E-voting Authentication with QR-codes , 2014, HCI.
[6] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[7] James G. Phillips,et al. Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing , 2016, ACISP.
[8] Yang-Wai Chow,et al. A QR Code Watermarking Approach Based on the DWT-DCT Technique , 2017, ACISP.
[9] Thach V. Bui,et al. Robust Message Hiding for QR Code , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[10] Ilsun You,et al. Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..
[11] WeiQi Yan,et al. Authenticating Visual Cryptography Shares Using 2D Barcodes , 2011, IWDW.
[12] Eric Jui-Lin Lu,et al. Secret Hiding Mechanism Using QR Barcode , 2013, 2013 International Conference on Signal-Image Technology & Internet-Based Systems.
[13] Song Wan,et al. Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions , 2017, Journal of Real-Time Image Processing.
[14] Wen-Yuan Chen,et al. Nested image steganography scheme using QR-barcode technique , 2009 .
[15] Alfredo De Santis,et al. Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..
[16] Hsi-Chieh Lee,et al. Digital Watermarking Based on JND Model and QR Code Features , 2013 .
[17] Hsiang-Cheh Huang,et al. Reversible data hiding with histogram-based difference expansion for QR code applications , 2011, IEEE Transactions on Consumer Electronics.
[18] Bruno Carpentieri,et al. Text Compression and Encryption through Smart Devices for Mobile Communication , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[19] Rastislav Lukac,et al. Image Secret Sharing , 2006, Encyclopedia of Multimedia.
[20] Wen-Yuan Chen,et al. Image Hidden Technique Using QR-Barcode , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.