|
[1] Information Technology - Automatic Identification and Data Capture Techniques - Bar Code Symbology - QR code, ISO/IEC 18004:2000, 2000. [2] Irving S. Reed and Gustave Solomon, “Polynomial Codes Over Certain Finite Fields,” Journal of the Society of Industrial and Applied Mathematics (SIAM), Vol. 8, No. 2, pp. 300-304, 1960. [3] Robin Hartshorne - Foundations of Projective Geometry, 1967. [4] Rafael C. Gonzalez, and Richard E. Woods – Digital Image Processing, 3rd edition, 2008 [5] Ki-Hyun Jung, and Kee-Young Yoo, “Data Hiding Method with Quality Control for Binary Images,” J. Software Engineering & Applications, No. 3, pp. 20-24, 2009. [6] Chin-Chen Chang, K.-N. Chen, and H.-C. Lin, “Novel Magic Matrices Generation Method for Secret Messages Embedding,” International Journal of Computer Sciences and Engineering Systems , Vol. 5, No 3, pp. 235-241, 2011. [7] C.-C. Wang, Y.-F. Chang, Chin-Chen Chang, J.-K. Jan, and Chia-Chen Lin, “A high capacity data hiding scheme for binary images based on block patterns,” The Journal of Systems and Software, pp. 152-162, 2014.
[8] Pei-Yu Lin, “Distributed Secret Sharing Approach With Cheater Prevention Based on QR code,” IEEE Transactions on Industrial Informatics, Vol. 12, No. 1, pp. 384-392, 2016. [9] I. Tkachenko, W. Puech, C. Destruel, O. Strauss, Jean-Marc Gaudin, and C. Guichard, “Two-Level QR code for Private Message Sharing and Document Authentication,” IEEE Transactions on Information Forensics and security, Vol. 11, No. 3, pp 571-583, 2016.
[10] Xinpeng Zhang, Jing Long, Zichi Wang, and Hang Cheng, “Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography,” IEEE Transactions on Circuit and systems for video technology, Vol. 26, No. 9, pp. 1622-1631, 2016. [11] 周名豪, “透過透視投影對於黏貼於柱面QR碼進行校正及解碼,” 國立臺灣科技大學電子工程研究所, 2016. [12] 韓佩倫, “使用圓錐分割法辨識球面上的QR碼影像,” 國立臺灣科技大學電子工程研究所, 2015.
|