References
- Denso Wave Inc. "QR Code Standardization," 2003.
- J. Z. Gao, L. Prakash, and R. Jagatesan, "Understanding 2d-Barcode Technology and Applications in M-Commerce-Design and Implementation of a 2d Barcode Processing Solution," in Proc. of Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International, Vol. 2, pp. 49-56, Aug. 2007.
- L. Bi, Z. Feng, M. Liu, and W. Wang, "Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR Code," in Proc. of Electronic Commerce and Security, 2008 International Symposium on, pp. 527-530, 2008.
- N. Teraura, and K. Sakurai, "Information Hiding in Subcells of a Two-Dimensional Code," in Proc. of 2012 IEEE 1st Global Conference on Consumer Electronics (GCCE), pp. 652-656, Oct. 2012.
- I. Tkachenko, W. Puech, C. Destruel, O. Strauss, J.-M. Gaudin, and C. Guichard, "Two-Level QR Code for Private Message Sharing and Document Authentication," IEEE Transactions on Information Forensics and Security, Vol. 11, No. 3, pp. 571-583, 2016. https://doi.org/10.1109/TIFS.2015.2506546
- I. S. Reed, and G. Solomon, "Polynomial Codes over Certain Finite Fields," Journal of the Society for Industrial and Applied Mathematics, Vol. 8, No. 2, pp. 300-304, 1960. https://doi.org/10.1137/0108018
- Y.-J. Chiang, P.-Y. Lin, R.-Z. Wang, and Y.-H. Chen, "Blind QR Code Steganographic Approach Based Upon Error Correction Capability," KSII Transactions on Internet & Information Systems, Vol. 7, No. 10, pp. 2572-2543, 2013.
- J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on Wet Paper," IEEE Transactions on signal processing, Vol. 53, No. 10, pp. 3923-3935, 2005. https://doi.org/10.1109/TSP.2005.855393
- T. V. Bui, N. K. Vu, T. T. Nguyen, I. Echizen, and T. D. Nguyen, "Robust Message Hiding for Qr Code," in Proc. of 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520-523, Aug. 2014.
- P. Elias, "Error-Correcting Codes for List Decoding," IEEE Transactions on Information Theory, Vol. 37, No. 1, pp. 5-12, 1991. https://doi.org/10.1109/18.61123
- P.-Y. Lin, and Y.-H. Chen, "QR Code Steganography with Secret Payload Enhancement," in Proc. of 2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pp. 1-5, Jul. 2016, Seattle, USA.
- X. Zhang, and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," IEEE Communications Letters, Vol. 10, No. 11, pp. 781-783, 2006. https://doi.org/10.1109/LCOMM.2006.060863
- P.-Y. Lin, and Y.-H. Chen, "High Payload Secret Hiding Technology for QR Codes," EURASIP Journal on Image and Video Processing, Vol. 2017, No. 1, pp. 14, 2017. https://doi.org/10.1186/s13640-016-0155-0
- S.-Y. Shen, and L.-H. Huang, "A Data Hiding Scheme Using Pixel Value Differencing and Improving Exploiting Modification Directions," Computers & Security, Vol. 48, pp. 131-141, 2015. https://doi.org/10.1016/j.cose.2014.07.008
- X.-T. Wang, C.-C. Chang, C.-C. Lin, and M.-C. Li, "A Novel Multi-Group Exploiting Modification Direction Method Based on Switch Map," Signal Processing, Vol. 92, No. 6, pp. 1525-1535, 2012. https://doi.org/10.1016/j.sigpro.2011.12.013
Cited by
- A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code vol.2019, pp.None, 2019, https://doi.org/10.1155/2019/7937816
- High-payload secret hiding mechanism for QR codes vol.78, pp.16, 2018, https://doi.org/10.1007/s11042-019-7600-x
- An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission vol.14, pp.7, 2018, https://doi.org/10.3837/tiis.2020.07.007