Academic literature on the topic 'Encrypted data in QR code'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encrypted data in QR code.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encrypted data in QR code"
Alsalem, Hussain, Faisal Alotaibi, Mohsen Bamardouf, et al. "Laboratory Access Implementing QR Code Authentication Using OTP." International Journal on Cybernetics & Informatics 12, no. 5 (2023): 121–41. http://dx.doi.org/10.5121/ijci.2023.120511.
Full textVikas H. "Optimizing Passport Verification Processes with Secure QR Code Technology." Communications on Applied Nonlinear Analysis 32, no. 5s (2024): 179–91. https://doi.org/10.52783/cana.v32.3003.
Full textTsai, Chwei-Shyong, Hsin-Liang Chen, Hsien-Chu Wu, and Josh Jia-Ching Ying. "A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code." Symmetry 13, no. 10 (2021): 1896. http://dx.doi.org/10.3390/sym13101896.
Full textChaudhary, Yash. "Encryption and Decryption of Messages using QR and Steganography." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 285–89. http://dx.doi.org/10.22214/ijraset.2024.65010.
Full textNoman Abed, Hazim. "Robust and Secured Image Steganography using LSB and Encryption with QR Code." Journal of Al-Qadisiyah for computer science and mathematics 9, no. 2 (2017): 1–9. http://dx.doi.org/10.29304/jqcm.2017.9.2.144.
Full textMs. J Seetha, Dr. G Manikandan, Ms. S. Hemalatha, and Ms. Vilma Veronica. "QR Code Recognition Based on Image Processing." International Journal of Scientific Research in Science and Technology 11, no. 2 (2024): 160–68. http://dx.doi.org/10.32628/ijsrst52411227.
Full textPriya Pankaj Kumar, Om Prakash, Sudhir Kumar. "A Study of E-Authentication Systems Based on QR Codes Through Analysis." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (2023): 4631–35. http://dx.doi.org/10.52783/tjjpt.v44.i3.2616.
Full textHassan, Khalil Silman, and Ezaldeen Ali Akbas. "Survey of Web of Things and Quick Response Code." Recent Trends in Computer Graphics and Multimedia Technology 2, no. 1 (2020): 1–15. https://doi.org/10.5281/zenodo.3843235.
Full textNikam, Sakshi Santosh. "Smart ATM Using QR." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36026.
Full textLwiantoro, Gerardo Axel, Farhan Putra Salsabil, Gregorius A. N. Aditantyo, and Derwin Suhartono. "Utilization of QR Code for Tracking Digital Expenses." Engineering, MAthematics and Computer Science (EMACS) Journal 3, no. 2 (2021): 59–63. http://dx.doi.org/10.21512/emacsjournal.v3i2.6533.
Full textDissertations / Theses on the topic "Encrypted data in QR code"
Сокол, Ярослав Володимирович. "Метод розпізнавання двовимірних кодів на зображеннях". Master's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/45939.
Full textMcCaughey, John Paul Jr. "Smarter Than We Are Wise." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339644686.
Full textLiu, De-Chi, and 劉得祺. "Study on Data Hiding Scheme for QR Code." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/g5v29t.
Full textFu, Yao-Der, and 傅耀德. "Reversible Data Hiding in Color Image for QR code Applications." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/37081144936538077649.
Full textHsieh, Chi-Che, and 謝其哲. "A Dual-Biometric Finger Vein Verification System Using Data Compressions and QR Code Techniques." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/26888910214381096390.
Full textBook chapters on the topic "Encrypted data in QR code"
Choudhury, Ziaul Haque, and M. Munir Ahamed Rabbani. "Biometric Passport Security by Applying Encrypted Biometric Data Embedded in the QR Code." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1097-7_5.
Full textSabri, Puteri Nurul'Ain Adil Md, Azizi Abas, and Fazli Azzali. "Enhancing data capacity of a QR code." In The Future of Human-Computer Integration. CRC Press, 2024. http://dx.doi.org/10.1201/9781003479727-11.
Full textGupta, Avanish, Akhilesh Singh, Anurag Tripathi, and Swati Sharma. "Two-Factor Authentication Using QR Code and OTP." In Advances in Data and Information Sciences. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-6906-7_10.
Full textAinul, Rafina Destiarti, Susilo Wibowo, and Irzal Zaini. "An Encrypted QR Code Using Layered Numeral Calculation for Low Powered Devices." In Atlantis Highlights in Engineering. Atlantis Press International BV, 2023. http://dx.doi.org/10.2991/978-94-6463-288-0_50.
Full textLin, Pei-Yu, Yi-Hui Chen, Wen-Chuan Wu, Yu-Tzu Huang, and Ya-Fen Chang. "Comments on the Visual Binary QR Code." In 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05491-4_2.
Full textWu, Wen-Chuan, Zi-Wei Lin, and Wei-Teng Wong. "Application of QR-Code Steganography Using Data Embedding Technique." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6996-0_63.
Full textCai, Huili, Xiaofeng Liu, and Bin Yan. "Beautified QR Code with Security Based on Data Hiding." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29933-0_35.
Full textShashikiran, B. S., K. Shaila, and K. R. Venugopal. "Hybrid Domain Steganography for Embedding DES Encrypted QR Code Using Random Bit Binary Search." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67101-3_25.
Full textPal, Kunal, and C. R. S. Kumar. "QR Code Based Smart Document Implementation Using Blockchain and Digital Signature." In Data Management, Analytics and Innovation. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5616-6_32.
Full textVidas, Timothy, Emmanuel Owusu, Shuai Wang, Cheng Zeng, Lorrie Faith Cranor, and Nicolas Christin. "QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41320-9_4.
Full textConference papers on the topic "Encrypted data in QR code"
Şeker, Özlem, Cemal Uyüklü, and Gökhan Dalkılıç. "QR Code-Based Authentication in IoT Mesh Network." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710815.
Full textZhang, Lina, Miao Liu, Limei Fu, and Junhan Yang. "Secure Data Exchange and Information Hiding through Color QR Code Technology." In 2024 6th International Conference on Intelligent Control, Measurement and Signal Processing (ICMSP). IEEE, 2024. https://doi.org/10.1109/icmsp64464.2024.10866408.
Full textP, Deepa, Jennifer D, Jackuelin T, Madhumitha V, Leela B, and Iswariya M. "Blockchain Based Expiry Date Verification For Medical Product With QR Code." In 2025 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI). IEEE, 2025. https://doi.org/10.1109/icdsaai65575.2025.11011617.
Full textHe, Dan. "Application of Data Hiding Method Based on Triplet Difference in QR Code Images." In 2025 5th International Conference on Consumer Electronics and Computer Engineering (ICCECE). IEEE, 2025. https://doi.org/10.1109/iccece65250.2025.10985268.
Full textZhang, Zhijun, Yingjian Gao, Weiping Zhu, and Kai Lu. "Privacy-Preserving QR Code Schemes for Data Access and Aggregation in Smart Distribution Grid Systems." In 2024 9th International Conference on Intelligent Computing and Signal Processing (ICSP). IEEE, 2024. http://dx.doi.org/10.1109/icsp62122.2024.10743758.
Full textKanakia, Harshil, Sakina Shaikh, Yash Koyande, and Harsh Jain. "Secure Authentication via Encrypted QR Code." In 2024 IEEE 9th International Conference for Convergence in Technology (I2CT). IEEE, 2024. http://dx.doi.org/10.1109/i2ct61223.2024.10544035.
Full textDey, S. "New generation of digital academic-transcripts using encrypted QR code™: Use of encrypted QR code™ in mark-sheets (academic transcripts)." In 2013 International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s). IEEE, 2013. http://dx.doi.org/10.1109/imac4s.2013.6526429.
Full textQi, Han, Du Chenjie, Yao Yingbiao, and Lei Lei. "A New Express Management System Based on Encrypted QR Code." In 2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA). IEEE, 2015. http://dx.doi.org/10.1109/icicta.2015.22.
Full textZhang, Xinwen, Huakang Li, Yitao Yang, Guozi Sun, and Guangxuan Chen. "LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code." In 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0167.
Full textChatterjee, Suhrid Krishna, Sudipta Saha, Zubayr Khalid, Himadri Nath Saha, Pritam Paul, and Robin Karlose. "Space effective and encrypted QR code with sender authorized security levels." In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2018. http://dx.doi.org/10.1109/ccwc.2018.8301640.
Full textReports on the topic "Encrypted data in QR code"
de Abreu, Jonas, and Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/9qu6ex.
Full textZhylenko, Tetyana I. Auto Checker of Higher Mathematics - an element of mobile cloud education. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3895.
Full textAl-Suwailem, Sami. Can We Trust the “Trust Machine”? Islamic Development Bank Institute, 2020. http://dx.doi.org/10.55780/re24015.
Full text