Web
Education
Viewing 1-4 of 4 total results
Impementation of QR Code Based Secure System for ...
In the era of technology data security and information sharing is always a hot topic to talk on. There are lot of methods that are being used in security for secret information sharing such as cryptography, steganography, watermarking etc. another technology that is being used by people is QR code based information sharing but this technology is not enough to provide privacy in information ......
A novel image watermarking method based on center ...
1. Introduction. With the widely using of information and multimedia technologies, image sharing has become very easy and fast, but the same technology has made it imperative to provide information security for images [, , ].Nowadays, there are many advanced multimedia editing tools, and the images can be modified, so that the individuals might not distinguish the difference.
General Construction for Extended Visual Cryptography ...
In addition, to achieve high sharing efficiency, a method of simultaneously sharing a secret QR code among multiple subsets is presented. Also, sufficient and necessary conditions of the method are analyzed with an integer programming model, providing a general construction approach for EVCS under arbitrary access structures.
Payal Shah - Software Validation Engineer - A123 Systems ...
Data security method using Shamir’s secret sharing technique and QR codes July 2013 – May 2014. Programmed Shamir’s secret sharing technique using Java and Eclipse and embedded it in QR codes....
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.