2020 International Conference on Information and Communication Technology Convergence (ICTC) 2020
DOI: 10.1109/ictc49870.2020.9289377
|View full text |Cite
|
Sign up to set email alerts
|

Design of an efficient image protection method based on QR code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…The following section provides a detailed overview of how the software functions. As shown in Fig [1] The software comprises three main user roles, namely students, security guards, and administrators. Users register themselves on the platform, and their data is only accessible to the administrator, who is the super user.…”
Section: System Designmentioning
confidence: 99%
“…The following section provides a detailed overview of how the software functions. As shown in Fig [1] The software comprises three main user roles, namely students, security guards, and administrators. Users register themselves on the platform, and their data is only accessible to the administrator, who is the super user.…”
Section: System Designmentioning
confidence: 99%