References
- T. Sun and D. Zhou "Automatic identification technology - Application of two-dimensional code," in Proc. of 2011 IEEE International Conference on Automation and Logistics (ICAL), pp. 164-168, 2011.
- D. H. Shin, J. Jung and B. H. Chang, "The psychology behind QR codes: User experience perspective," Computers in Human Behavior, vol. 28, no. 4, pp. 1417-1426, 2012. https://doi.org/10.1016/j.chb.2012.03.004
- C. Chen, A. C. Kot and H. Yang, "A two-stage quality measure for mobile phone captured 2D barcode images," Pattern Recognition, vol. 46, no. 9, pp. 2588-2598, 2013. https://doi.org/10.1016/j.patcog.2013.01.031
- Psytec QR code editor software, [Online]. Available: http://www.psytec.co.jp/docomo.html
- Denso-wave, [Online], Available: http://www.qrcode.com/en/index.html
- ISO/IEC 18004, "Information technology Automatic identification and data capture techniques Bar code symbology QR Code," 2000.
- J. C. Chuang, Y. C. Hu and H. J. Ko, "A novel secret sharing technique using QR code," International Journal of Image Processing, vol. 4, pp.468-475, 2010.
- C. H. Chung, W. Y. Chen and C. M. Tu, "Image hidden technique using QR-Barcode," in Proc. of Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
- W. Y. Chen and J. W. Wang, "Nested image steganography scheme using QR-barcode technique," Optical Engineering, vol. 48, no. 5, pp. 057004-01-057004-10, 2009. https://doi.org/10.1117/1.3126646
- H. C. Huang, F. C. Chang and W. C. Fang, "Reversible data hiding with histogram-based difference expansion for QR Code applications," IEEE Transactions on Consumer Electronics, vol. 57, no. 2, pp. 779-787, 2011. https://doi.org/10.1109/TCE.2011.5955222
- S. Dey, K. Mondal, J. Nath and A. Nath, "Advanced steganography algorithm using randomized intermediate QR host embedded with any encrypted secret message: ASA_QR algorithm," International Journal of Modern Education and Computer Science, vol. 6, pp. 59-67, 2012.
- M. Sun , J. Si and S. Zhang, "Research on embedding and extracting methods for digital watermarks applied to QR code images," New Zealand Journal of Agricultural Research, vol. 50, pp. 861-867, 2007. https://doi.org/10.1080/00288230709510361
- L. Li, R. L. Wang and C. C. Chang, "A digital watermark algorithm for QR code," International Journal of Intelligent Information Processing, vo1. 2, no. 2, pp.29-36, 2011.
- M. Gao and B. Sun, "Blind watermark algorithm based on QR barcode," in Proc. of Foundations of Intelligent Systems : Proceedings of the Sixth International Conference on Intelligent Systems and Knowledge Engineering, vol.122, pp. 457-462, 2011.
- S. Rungraungsilp, M. Ketcham, V. Kosolvijak and S. Vongpradhip, "Data hiding method for QR code based on watermark by compare DCT with DFT domain," in Proc. of International Conference on Computer and Communication Technologies, pp. 144-148, 2012.
- W. P. Fang, "Offline QR Code authorization based on visual cryptography," in Proc. of Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.89-92, 2011.
- N. Teraura and K. Sakurai, "Information hiding of two-dimensional code by multilayer optical method," in Proc. of IEEE 10th International Symposium on Parallel and Distributed Processing with Applications (ISPA), pp. 770-777, 2012.
- J. Fridrich, M. Goljan, P. Lisonˇek and D. Soukal, "Writing on wet paper," IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3923-3935, 2005. https://doi.org/10.1109/TSP.2005.855393
- J. Fridrich, M. Goljan and D. Soukal, "Wet paper codes with improved embedding efficiency," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 102-110, 2006. https://doi.org/10.1109/TIFS.2005.863487
- I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields," Journal of the Society for Industrial and Applied Mathematics, vol. 8, no. 2, pp.300-304, 1960. https://doi.org/10.1137/0108018
- C. C. Chang and Y. C. Chou, "A fragile digital image authentication scheme inspired by wet paper codes," Fundamenta Informaticae, vol. 90, no. 1-2, pp. 17-26, 2009.
- W. Zhang and X. Zhu, "Improving the Embedding Efficiency of Wet Paper Codes by Paper Folding," IEEE Signal Processing Letters, vol. 16, no. 9, pp. 794-797, 2009. https://doi.org/10.1109/LSP.2009.2024807
- ZXing ("Zebra Crossing"), [Online], Available: http://code.google.com/p/zxing/
Cited by
- High payload secret hiding technology for QR codes vol.2017, pp.None, 2013, https://doi.org/10.1186/s13640-016-0155-0
- A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code vol.2019, pp.None, 2019, https://doi.org/10.1155/2019/7937816
- A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things vol.2019, pp.None, 2013, https://doi.org/10.1155/2019/8105787
- High-payload secret hiding mechanism for QR codes vol.78, pp.16, 2013, https://doi.org/10.1007/s11042-019-7600-x
- Data Hiding Based on Mini Program Code vol.2021, pp.None, 2013, https://doi.org/10.1155/2021/5546344
- A QR Code-Based Approach to Differentiating the Display of Augmented Reality Content vol.11, pp.24, 2013, https://doi.org/10.3390/app112411801