[go: nahoru, domu]

Juan et al., 2021 - Google Patents

Graphic qr code with the second hidden qr code by codeword rearrangement

Juan et al., 2021

Document ID
3309189714094958346
Author
Juan Y
Chou T
Lu C
Wang H
Publication year
Publication venue
Sensor Networks and Signal Processing: Proceedings of the 2nd Sensor Networks and Signal Processing (SNSP 2019), 19-22 November 2019, Hualien, Taiwan

External Links

Snippet

The development of science and technology has brought about tremendous changes in both the virtual and real worlds. The quick response code (QR code), a kind of two-dimensional barcode, has become an important interface between the two, playing the roles of …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00275Holistic features and representations, i.e. based on the facial image taken as a whole
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformation in the plane of the image, e.g. from bit-mapped to bit-mapped creating a different image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K2019/06215Aspects not covered by other subgroups
    • G06K2019/06225Aspects not covered by other subgroups using wavelength selection, e.g. colour code
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation

Similar Documents

Publication Publication Date Title
Tkachenko et al. Two-level QR code for private message sharing and document authentication
Rani et al. Data security through qr code encryption and steganography
Wang et al. Secured graphic QR code with infrared watermark
US20160267369A1 (en) Two dimensional barcode and method of authentication of such barcode
Galiyawala et al. To increase data capacity of QR code using multiplexing with color coding: An example of embedding speech signal in QR code
Chou et al. The nested QR code
US20150235118A1 (en) Two-Dimensional Barcodes Having A Plurality of Different Regions
JP2001195536A (en) Code, and method and device for encoding/decoding code
US10176353B2 (en) Method and system of forensic encryption
CN109816077A (en) A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium
CN110097488A (en) The generation of stealthy digital watermarking and extracting method and device
Juan et al. Graphic qr code with the second hidden qr code by codeword rearrangement
CN114461988A (en) Image encryption method and device, image decryption method and device
CN106934756B (en) Method and system for embedding information in single-color or special-color image
Liu et al. Structure aware visual cryptography
El-Sheref et al. Improving performance of the multiplexed colored QR codes
Singh et al. A novel approach for encoding and decoding of high storage capacity color QR code
Sahu et al. Encryption in QR code using stegnography
Appiah et al. Performance Evaluation of Corrupted QR Code Scanners
Zhang et al. Protection and hiding algorithm of QR code based on multi-channel visual masking
US10621482B2 (en) Graphic two-dimensional barcode and creating method thereof
CN114330621A (en) Two-dimensional code anti-counterfeiting method and device based on identification information and storage medium
Erlangga et al. Increasing Secret Data Hiding Capacity in QR Code Using Subcells
Tekade et al. Implementation of two level QR code (2LQR)
CN109784454A (en) A kind of information concealing method based on two dimensional code, device and electronic equipment