2018
DOI: 10.1109/access.2018.2874527
|View full text |Cite
|
Sign up to set email alerts
|

Visual Cryptography Scheme With Meaningful Shares Based on QR Codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 24 publications
(20 citation statements)
references
References 26 publications
0
18
0
1
Order By: Relevance
“…Algorithm 3 describes the corresponding recovery algorithm's steps. In the scheme of Fu et al [5], the authors reconstructed the secret image by performing the XOR operation on the pixel values of shadows, which is an approach different from our scheme.…”
Section: Recovery Phase Of the Proposed Schemementioning
confidence: 99%
See 3 more Smart Citations
“…Algorithm 3 describes the corresponding recovery algorithm's steps. In the scheme of Fu et al [5], the authors reconstructed the secret image by performing the XOR operation on the pixel values of shadows, which is an approach different from our scheme.…”
Section: Recovery Phase Of the Proposed Schemementioning
confidence: 99%
“…In this section, we first describe the differences between the schemes developed by Chow et al [3], Wan et al [13] and Fu et al [5] using diagrams, analyze the characteristics of various schemes, and finally present an objective evaluation in Table 2. Figure 7 shows an experimental result of the scheme of Chow et al [3].…”
Section: Comparisons With Related Studiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Researchers have previously proposed the use of QR codes for various applications in computer security. For example, for storing private and public information [22], secret sharing [5], visual cryptography [9], digital watermarking [6] and so on. The methods proposed in this paper are related to zero-based watermarking.…”
Section: Related Workmentioning
confidence: 99%