A Novel Approach to Store an Image in QR Code
نویسندگان
چکیده
منابع مشابه
2395 - 1621 Colored Image Embedding in QR Code
ARTICLE INFO QR Code is generated with insertion of a color image into it with minimal probability of detection errors. With standard decoding applications these insertions of vital information using QR code into color codes are possible. This insertion takes benefits of the support of QR readers against interruption of image luminance moreover, the vital information in QR code bits are transfo...
متن کاملa frame semantic approach to the study of translating cultural scripts in salingers franny and zooey
the frame semantic theory is a nascent approach in the area of translation studies which goes beyond the linguistic barriers and helps us to incorporate cognitive and cultural factors to the study of translation. based on rojos analytical model (2002b), which centered in the frames or knowledge structures activated in the text, the present research explores the various translation problems that...
15 صفحه اولQR Code Application based Reversible Watermarking in Image Processing
In digital watermarking, images which have specific pattern images. They used as digital watermarks for variety purposes in copy prevention emerging solution. Conversely, several attacks still get unsolved in a robustness of invisible watermarking techniques. An effective technique for visible watermarking can be retrieved to identify the ownership of the protected media. The purpose to show th...
متن کاملA Novel User Authentication Scheme Based on QR-Code
User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel. Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access....
متن کامل3CAuth - A Novel Multi-Factor Authentication Scheme Using QR-Code
A multi factor authentication scheme called ’3C-Auth’ is proposed in this paper. The scheme carries out a comprehensive authentication process using the smart card, secret-pin, registered finger print, and registered mobile number of the user. The user’s password is neither transmitted in plaintext form nor revealed to the authentication server. The scheme is shone to be proof against phishing,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Turkish Journal of Computer and Mathematics Education (TURCOMAT)
سال: 2021
ISSN: 1309-4653
DOI: 10.17762/turcomat.v12i2.2404