Publisher
Springer Nature Switzerland
Reference31 articles.
1. JTC1/SC, I.: Information technology - automatic identification and data capture techniques - QR code 2005 bar code symbology specification (2006)
2. Arntz, P.: QR code scams are making a comeback (2020). https://blog.malwarebytes.com/scams/2020/10/qr-code-scams-are-making-a-comeback/
3. Shi, Y.Q., Li, X., Zhang, X., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016). https://doi.org/10.1109/ACCESS.2016.2573308
4. Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. Inf. Forensics Secur. IEEE Trans. 8, 553–562 (2013). https://doi.org/10.1109/TIFS.2013.2248725
5. Yan, X., Lu, Y., Yang, C.N., Zhang, X., Wang, S.: A common method of share authentication in image secret sharing. IEEE Trans. Circ. Syst. Video Technol. 31, 2896–2908 (2020)