全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Peng-Cheng Huang , Chin-Chen Chang , Yung-Hui Li ...
来源:[J].Multimedia Tools and Applications(IF 1.014), 2019, Vol.78 (16), pp.22331-22350Springer
摘要:Abstract(#br)QR code is an important approach of information transmission and is widely used in our daily life. As a public patent, the message embeded in a QR code can be easily decoded by any QR code reader, thus can lead to information leaks when delivering the secret message ...
作者:Peng-Cheng Huang , Yung-Hui Li , Chin-Chen Chang ...
来源:[J].Multimedia Tools and Applications(IF 1.014), 2019, Vol.78 (18), pp.26023-26045Springer
摘要:Abstract(#br)QR code is an important means for delivering information which has been widely used in our daily life. As an ISO international standard, the QR code encoding and decoding process are disclosed publicly, thus it is easy to decode a QR code then forge a new QR code wit...
作者:Jing Yang , Yue Zhang , Cees J. M. Lanting
来源:[J].Wireless Personal Communications(IF 0.428), 2017, Vol.96 (4), pp.5315-5334Springer
摘要:... Rooted in online users’ fear appeals, this study measures the impact of an emerging use of technology, QR codes, on authentication protection. We contribute to the extant literature by integrating two theories—protection motivation theory and the theory of planned behavi...
作者:Zhengxin Fu , Yuqiao Cheng , Bin Yu
来源:[J].Multimedia Tools and Applications(IF 1.014), 2019, Vol.78 (14), pp.19861-19875Springer
摘要:Abstract(#br)Owing to efficient machine recognition, QR codes have been widely used in many aspects such as information management, electronic identity and mobile payment. Any QR code reader has access to the message contained in a QR code; therefore, in formation security become...
作者:Yuqiao Cheng , Zhengxin Fu , Bin Yu ...
来源:[J].Multimedia Tools and Applications(IF 1.014), 2018, Vol.77 (16), pp.20629-20649Springer
摘要:Abstract(#br)The Quick Response (QR) code is designed for information storage recognizable by machine vision. With the popularity of QR code applications, the security of QR codes becomes hot issues concerned by many scholars. In this paper, a novel QR code with two-level informa...
作者:C. Patvardhan , Pragyesh Kumar , C. Vasantha Lakshmi
来源:[J].Multimedia Tools and Applications(IF 1.014), 2018, Vol.77 (10), pp.12655-12677Springer
摘要:... It uses a Quick Response (QR) code as the watermark. The QR code is a robust code from which embedded information can be extracted even if the retrieved QR code image is distorted. Thus the proposed technique employs a judicious combination of different algorithmic ideas incl...
作者:Min-Jen Tsai , Chin-Yu Hsieh
来源:[J].Multimedia Tools and Applications(IF 1.014), 2019, Vol.78 (15), pp.21423-21454Springer
摘要:Abstract(#br)A novel visual Quick Response (QR) code algorithm based on Wavelet transform and Human Visual System (HVS) approach is presented in this study and named DWT-QR. Unlike other QR codes are generally embedded in the spatial domain, the composite coefficients using globa...
作者:Hui-Li Cai , Bin Yan , Na Chen ...
来源:[J].Multimedia Tools and Applications(IF 1.014), 2019, Vol.78 (16), pp.22575-22599Springer
摘要:Abstract(#br)For the issue of beautification and capacity expansion of the Quick Response(QR) code, we proposed an algorithm based on sequential module modulation. First, the modules for the padding codewords are modulated by the module-based binarized background image. Then, to ...
作者:Pei-Yu Lin , Yi-Hui Chen
来源:[J].EURASIP Journal on Image and Video Processing(IF 0.57), 2017, Vol.2017 (1), pp.1-8Springer
摘要:Abstract(#br)Quick response (QR) code has become one of the more popular two-dimensional barcodes because of its greater data capacity and higher damage resistance. The barcode scanners can easily extract the information hidden in the QR code while scanning the data modules. Howe...
作者:Luis Rosales-Roldan , Jinhui Chao , Mariko Nakano-Miyatake ...
来源:[J].Multimedia Tools and Applications(IF 1.014), 2018, Vol.77 (13), pp.16031-16052Springer
摘要:Abstract(#br)Some watermarking authentication methods based on spectral domain using QR codes and Quantization Index Modulation (QIM) are proposed for ownership protection in color images. The QR code is created with the owners’ information and used as binary watermark seque...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×