Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3
Pages
|
Viewing 1-10 of 21 total results
A Novel Secret Sharing Technique Using QR Code - CORE
A Novel Secret Sharing Technique Using QR Code . By Jun-chou Chuang, Yu-chen Hu and Hsien-ju KoJun-chou Chuang and Hsien-ju Ko. Abstract. Any mobile device with capture function can read content from a barcode tag directly. When a barcode contains important data or privacy information, the risk of security becomes an important problem. In this ...
https://core.ac.uk/display/104070818
Average Rating (0 votes)
A Novel Secret Sharing Technique Using QR Code - CORE
A Novel Secret Sharing Technique Using QR Code . By Jun-Chou Chuang, Yu-Chen Hu and Hsien-Ju Ko. Abstract. Any mobile device with capture function can read content from a barcode tag directly. When a barcode contains important data or privacy information, the risk of security becomes an important problem. In this paper, the QR code is employed ...
https://core.ac.uk/display/28783539
Average Rating (0 votes)
IJCA - Novel QR Code Image Watermarking using Wavelet ...
A Novel Secret Sharing Technique using QR Code, International Journal of Image Processing (IJIP), Volume (4) : Issue (5),pp. 468-475, 2010. Index Terms Computer Science
A Novel Three-Layer QR Code Based on Secret Sharing Scheme ...
Input: Shares QR 1, QR 2, …, QR 2 p with size of 3m × 3n, the length l of the secret information, the shared key seed.: Output: The third level information s.: Step 1: Construct a pixel matrix block .: Step 2: Let i = 1, j = 1.i and j represent the rows and columns of the carrier QR code, respectively.: Step 3: Let ,, where “ ” represents the merger of the matrix....
Exploiting the Error Correction Mechanism in QR Codes for ...
Each share in the scheme is constructed from a cover QR code, and each share itself is a valid QR code which can be scanned and decoded by a QR code reader. The secret message can be recovered by combining the information contained in the QR code shares. Since each share is a valid QR code, the proposed scheme has the advantage of reducing the ......
HTML - AIMS Press - Open Access Journals
In this paper, we propose a novel mechanism for QR code security anti-counterfeit based on the fusion of visual secret sharing (VSS) and QR code (called VSSQR scheme), which can greatly improve the security of QR code payment. Due to different application scenarios, the background security anti-counterfeit application and the prospects security anti-counterfeit application are shown for QR ......
Exploiting the error correction mechanism in QR codes for ...
[25]. This paper investigates a novel approach to secret sharing by distributing and encoding a secret into a set of Quick Response (QR) codes. The concept of secret sharing was rst introduced independently by Blakley [3] and Shamir [18]. The secret sharing schemes that they proposed are known as. k-out-of-n, or (k, n), threshold schemes. In a ......
Reversible chromatic sensor fabricated by inkjet printing ...
J. Chuang, Y. Hu, H. KoA novel secret sharing technique using QR code. Int. J. Image Process., 4 (2010), pp. 468-475. Google Scholar. Aide Wu is a Ph.D. candidate in Flexible Electronic Devices and Sensor Laboratory, Physics Department, New Jersey Institute of Technology, USA. His major research interests focus on thin film fabrication, sensor ......
PENGGUNAAN QR CODE DALAM PRESENSI BERBASIS ANDROID ...
Chuang Jun-Chou, Yu-Chen Hu & Hsien-Ju Ko., 2010, A Novel Secret Sharing Technique Using QR Code, International Journal of Image Processing (IJIP), Volume (4) : Issue (5), pp. 468-475. Refbacks There are currently no refbacks.
"Exploiting the error correction mechanism in QR codes for ...
Each share in the scheme is constructed from a cover QR code, and each share itself is a valid QR code which can be scanned and decoded by a QR code reader. The secret message can be recovered by combining the information contained in the QR code shares. Since each share is a valid QR code, the proposed scheme has the advantage of reducing the ......
https://ro.uow.edu.au/eispapers/5937/
Average Rating (0 votes)
1 2 3
Pages
|