2016
DOI: 10.1109/tifs.2015.2506546
|View full text |Cite
|
Sign up to set email alerts
|

Two-Level QR Code for Private Message Sharing and Document Authentication

Abstract: International audienceThe quick response (QR) code was designed for storage information and high-speed reading applications. In this paper, we present a new rich QR code that has two storage levels and can be used for document authentication. This new rich QR code, named two-level QR code, has public and private storage levels. The public level is the same as the standard QR code storage level; therefore, it is readable by any classical QR code application. The private level is constructed by replacing the bla… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
107
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 125 publications
(108 citation statements)
references
References 15 publications
0
107
0
1
Order By: Relevance
“…e time complexity of [2], where an optical encryption was used, was decided by parameter λ. Based on information hiding technology, [5,8,16,20] combined the characteristics of the QR code to embed sensitive information. Among them, the main operation of [8] was based on hash function, whose computational complexity is O(N 2 ).…”
Section: Methods and Recovery Computation Based On The Visual Cryptogmentioning
confidence: 99%
See 4 more Smart Citations
“…e time complexity of [2], where an optical encryption was used, was decided by parameter λ. Based on information hiding technology, [5,8,16,20] combined the characteristics of the QR code to embed sensitive information. Among them, the main operation of [8] was based on hash function, whose computational complexity is O(N 2 ).…”
Section: Methods and Recovery Computation Based On The Visual Cryptogmentioning
confidence: 99%
“…Among them, the main operation of [8] was based on hash function, whose computational complexity is O(N 2 ). e main operation of [5] focused on ECC decryption, while the operations in [16] were all addition and modulo operations, which led to a low computational complexity as O(N). Reference [23] was a secret hiding scheme by improving exploiting modi cation direction to protect the private message in QR code with the computational complexity as O(N).…”
Section: Methods and Recovery Computation Based On The Visual Cryptogmentioning
confidence: 99%
See 3 more Smart Citations