References
- T. Maehara, K. Nakai, R. Ikeda, K. Taniguchi, and S. Ono, "Watermark design of two-dimensional barcodes on mobile phone display by evolutionary multi-objective optimization," in Proceedings of 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), Kitakyushu, Japan, pp. 149-154, 2014. DOI: 10.1109/SCIS-ISIS.2014.7044673.
- V. Sujatha, "Auditing of Storage Security on Encryption," Asia-Pacific Journal of Convergent Research Interchange, vol. 3, no. 2, pp. 1-9, 2017. DOI: 10.21742/APJCRI.2017.06.01.
- J. H. Seo and H. B. Park, "Scalable digital watermarking techniques for optimal distributed contents," The KIPS Transactions: Part B, vol. 12, no. 3, pp. 291-300, 2005. DOI: 10.3745/KIPSTB.2005.12B.3.291.
- S. Vongpradhip and S. Rungraungsilp, "QR code using invisible watermarking in frequency domain," in Proceedings of 2011 9th International Conference on ICT and Knowledge Engineering, Bangkok, Thailand, pp. 47-52, 2012. DOI: 10.1109/ICTKE.2012.6152412.
- X. Feng and X. Ji, "A blind watermarking method with strong robust based on 2D-barcode," in Proceedings of International Conference on Information Technology and Computer Science, Kiev, Ukraine, pp. 452-456, 2009. DOI: 10.1109/ITCS.2009.231.
- N. Damera-Venkata, J. Yen, V. Monga, and B. L. Evans, "Hardcopy image barcodes via block-error diffusion," IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 1977-1989, 2005. DOI: 10.1109/TIP.2005.859776.
- A. Noore, N. Tungala, and M. M. Houck, "Embedding biometric identifiers in 2D barcodes for improved security," Computers & Security, vol. 23, no. 8, pp. 679-686, 2004. DOI: 10.1016/j.cose.2004.09.007.
- H. Q. Wang, F. Shang, Q. C. Ji, and J. C. Hao, "Robust digital watermarking adopting barcode in image," in Proceedings of 2009 1st International Conference on Information Science and Engineering (ICISE), Nanjing, China, pp. 660-662, 2009. DOI: 10.1109/ICISE.2009.1037.
- P. Premaratne and F. Safaei, "2D barcodes as watermarks in image authentication," in Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science, Melbourne, Australia, pp. 432-437, 2007. DOI: 10.1109/ICIS.2007.2.
- G. Prabakaran, R. Bhavani, and M. Ramesh, "A robust QR-code video watermarking scheme based on SVD and DWT composite domain," in Proceedings of 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), Salem, India, pp. 251-257, 2013. DOI: 10.1109/ICPRIME.2013.6496482.
- R. Xie, C. Hong, S. Zhu, and D. Tao, "Anti-counterfeiting digital watermarking algorithm for printed QR barcode," Neurocomputing, vol. 167, pp. 625-635, 2015. DOI: 10.1016/j.neucom.2015.04.026.
- P. Y. Lin, "Imperceptible visible watermarking based on postcamera histogram operation," Journal of Systems and Software, vol. 95, pp. 194-208, 2014. DOI: 10.1016/j.jss.2014.04.038.
- W. Y. Chen, "Multiple-watermarking scheme of the European Article Number Barcode using similar code division multiple access technique," Applied Mathematics and Computation, vol. 197, no. 1, pp. 243-261, 2008. DOI: 10.1016/j.amc.2007.07.078.
- M. Eyadat, H. Morris, and I. M. El-Ddin, "Barcode watermarking," in Proceedings of 2009 6th International Conference on Information Technology: New Generations, Las Vegas, NV, pp. 1296-1300, 2009. DOI: 10.1109/ITNG.2009.216.
- A. Nambutdee and S. Airphaiboon, "Medical image encryption based on DCT-DWT domain combining 2D-DataMatrix barcode," in Proceedings of the 8th Biomedical Engineering International Conference (BMEiCON), Pattaya, Thailand, pp. 1-5, 2015. DOI: 10.1109/BMEiCON.2015.7399508.
- C. M. Li, P. Hu, and W. C. Lau, "AuthPaper: protecting paper-based documents and credentials using authenticated 2D barcodes," in Proceedings of 2015 IEEE International Conference on Communications (ICC), London, UK, pp. 7400-7406, 2015. DOI: 10.1109/ICC.2015.7249509.
- P. Y. Lin, "Distributed secret sharing approach with cheater prevention based on QR code," IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 384-392, 2016. DOI: 10.1109/TII.2015.2514097.