Nowadays, the information processing system plays crucial part in the internet. Online information security has become the top priority in all sectors. Failing to provide online information security may cause loss of critical information or someone may use or distribute such information for malicious purpose. Recently QR barcodes have been used as an effective way to securely share information. This paper presents the survey on information hiding techniques which can share high security information over network using QR barcode
The Visual Secret Sharing is the technique in which secret information is hidden in the form image w...
Response code is a two dimensional barcode which is readable by QR code scanners, smart phones with ...
Initially barcodes have been widely used for unique product identification..QR (Quick response) code...
Any mobile device with capture function can read content from a barcode tag directly. When a barcode...
Abstract- With the vast introduction of the wireless world, the exchanged information now is more pr...
[[abstract]]Different from one-dimensional barcode, QR (quick response) code is a popular two-dimens...
The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they...
In present times, barcode decoders on mobile phones can extract the data content of QR codes. Howeve...
The technique reversible data hiding with the application associated with the Quick Response codes. ...
Digital data transmission has become prominent in this era of communication. Digital data such as te...
The information technique has developed rapidly. The technique of QR codes is widely applied in our ...
Abstract: It is important to differentiate between various objects and places in the real world. Any...
The discipline of information security must adapt to new technologies and methods of interaction wit...
Various cryptographic methods are available for completing the objective of data security across the...
The discipline of information security must adapt to new technologies and methods of interaction wit...
The Visual Secret Sharing is the technique in which secret information is hidden in the form image w...
Response code is a two dimensional barcode which is readable by QR code scanners, smart phones with ...
Initially barcodes have been widely used for unique product identification..QR (Quick response) code...
Any mobile device with capture function can read content from a barcode tag directly. When a barcode...
Abstract- With the vast introduction of the wireless world, the exchanged information now is more pr...
[[abstract]]Different from one-dimensional barcode, QR (quick response) code is a popular two-dimens...
The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they...
In present times, barcode decoders on mobile phones can extract the data content of QR codes. Howeve...
The technique reversible data hiding with the application associated with the Quick Response codes. ...
Digital data transmission has become prominent in this era of communication. Digital data such as te...
The information technique has developed rapidly. The technique of QR codes is widely applied in our ...
Abstract: It is important to differentiate between various objects and places in the real world. Any...
The discipline of information security must adapt to new technologies and methods of interaction wit...
Various cryptographic methods are available for completing the objective of data security across the...
The discipline of information security must adapt to new technologies and methods of interaction wit...
The Visual Secret Sharing is the technique in which secret information is hidden in the form image w...
Response code is a two dimensional barcode which is readable by QR code scanners, smart phones with ...
Initially barcodes have been widely used for unique product identification..QR (Quick response) code...