Wu et al., 2013 - Google Patents
Application of QR-code steganography using data embedding techniqueWu et al., 2013
- Document ID
- 8419387939769450766
- Author
- Wu W
- Lin Z
- Wong W
- Publication year
- Publication venue
- Information Technology Convergence: Security, Robotics, Automations and Communication
External Links
Snippet
Quick response (QR) code is a convenient product for mobile phone user. People can use the Smartphone camera to capture the code, and then decode it through dedicated reader application. Usually the code stands for text, contact information, or a web hyperlink. Users …
- 238000000034 method 0 title description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30876—Retrieval from the Internet, e.g. browsers by using information identifiers, e.g. encoding URL in specific indicia, browsing history
- G06F17/30879—Retrieval from the Internet, e.g. browsers by using information identifiers, e.g. encoding URL in specific indicia, browsing history by using bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wu et al. | Application of QR-code steganography using data embedding technique | |
| Pandya et al. | A Survey on QR Codes: in context of Research and Application | |
| Chow et al. | Exploiting the error correction mechanism in QR codes for secret sharing | |
| Lin et al. | High payload secret hiding technology for QR codes | |
| Li et al. | Data hiding in iris image for privacy protection | |
| Chiang et al. | Blind QR code steganographic approach based upon error correction capability. | |
| Huang et al. | Efficient scheme for secret hiding in QR code by improving exploiting modification direction | |
| Shiu et al. | Data hiding on social media communications using text steganography | |
| Umaria et al. | Enhancing the data storage capacity in QR code using compression algorithm and achieving security and further data storage capacity improvement using multiplexing | |
| Bao et al. | A robust image steganography on resisting JPEG compression with no side information | |
| Huang et al. | High-payload secret hiding mechanism for QR codes | |
| Tsai et al. | A reversible steganographic algorithm for BTC-compressed images based on difference expansion and median edge detector | |
| Shaji et al. | A new data encoding based on maximum to minimum histogram in reversible data hiding | |
| Fang | Offline QR code authorization based on visual cryptography | |
| Wu et al. | A high payload hybrid data hiding scheme with LSB, EMD and MPE | |
| Hadian Dehkordi et al. | OPTP: A new steganography scheme with high capacity and security | |
| Hsu et al. | Visible watermarking with reversibility of multimedia images for ownership declarations | |
| Singh et al. | A novel approach for encoding and decoding of high storage capacity color QR code | |
| Loc et al. | An approach for tamper-proof qr code using deep learning based-data hiding | |
| Liu et al. | Toward a two-dimensional barcode with visual information using perceptual shaping watermarking in mobile applications | |
| Shamsi et al. | Securing secret information | |
| CN114070950B (en) | Image processing method, related device and equipment | |
| Erlangga et al. | Increasing secret data hiding capacity in QR code using subcells | |
| Chiou et al. | An efficient reversible data hiding scheme based on SMVQ | |
| Zhang et al. | StegEraser: Defending cybersecurity against malicious covert communications |