共 25 条
[2]
Secret handshakes from pairing-based key agreements
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:180-196
[3]
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[4]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[5]
Robust Message Hiding for QR Code
[J].
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014),
2014,
:520-523
[7]
Cheng Y., 2017, MULTIMEDIA TOOLS APP
[8]
Chin-Ho Chung, 2009, Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2009, P522, DOI 10.1109/IIH-MSP.2009.119
[9]
A QR Code Watermarking Approach Based on the DWT-DCT Technique
[J].
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II,
2017, 10343
:314-331
[10]
Covert QR Codes: How to Hide in the Crowd
[J].
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017,
2017, 10701
:678-693