2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2011
DOI: 10.1109/iihmsp.2011.10
|View full text |Cite
|
Sign up to set email alerts
|

Offline QR Code Authorization Based on Visual Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
22
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(22 citation statements)
references
References 6 publications
0
22
0
Order By: Relevance
“…Function pattern should not be used for encoding data. The code is surrounded by a quiet zone on all the four sides [7].…”
Section: Human Machine Identificationmentioning
confidence: 99%
See 4 more Smart Citations
“…Function pattern should not be used for encoding data. The code is surrounded by a quiet zone on all the four sides [7].…”
Section: Human Machine Identificationmentioning
confidence: 99%
“…The code consists of a white background on which black modules are arranged in a square pattern. The information that is encoded in a QR code can be any text or URL or any other data [7]. There are six important features of a QR code [7]: 1.…”
Section: Human Machine Identificationmentioning
confidence: 99%
See 3 more Smart Citations