2019
DOI: 10.1016/j.measurement.2019.03.080
|View full text |Cite
|
Sign up to set email alerts
|

A new two-level information protection scheme based on visual cryptography and QR code with multiple decryptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…The QR code can be scanned by aiming the device's camera at it and making sure the whole code is inside the frame that appears on the screen. When the code is successfully scanned, it is identified and opened in a specific application, such as a web browser (Türker, 2022;Fu & Liu, 2019). A novel enhanced security method for QR code-based document identification was developed in 2016 (Revathi, Annapandi & Ramya, 2013).…”
Section: Literature Reviewmentioning
confidence: 99%
“…The QR code can be scanned by aiming the device's camera at it and making sure the whole code is inside the frame that appears on the screen. When the code is successfully scanned, it is identified and opened in a specific application, such as a web browser (Türker, 2022;Fu & Liu, 2019). A novel enhanced security method for QR code-based document identification was developed in 2016 (Revathi, Annapandi & Ramya, 2013).…”
Section: Literature Reviewmentioning
confidence: 99%
“…A novel two-level information protection scheme dependent on VC and QR code was designed by Fu et al [14]. Publiclevel information is directly read out from the shares using any generic QR reader software or device.…”
Section: Literature Surveymentioning
confidence: 99%
“…Another study emphasized the importance of two levels of security and how building information was used in the QR code by improving the information on privacy levels and lightweight accounts, which affect the rest in turn. Such approaches, however, have failed to address encoded decryption processes because a limitation of this work is the use of Base 64, which is restricted to representing 64 characters [9]. The main purpose of this research effort is to improve the data storage of QR codes.…”
Section: Related Workmentioning
confidence: 99%