These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
228 related articles for article (PubMed ID: 31698567)
1. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Wan S; Yang GZ; Qi LL; Li LL; Yan XH; Lu YL Math Biosci Eng; 2019 Jul; 16(6):6367-6385. PubMed ID: 31698567 [TBL] [Abstract][Full Text] [Related]
2. Two-level QR code scheme based on region matrix image secret sharing algorithm. Zhang LN; Sun JQ; Zhang XY; Chen QP; Zhang J Math Biosci Eng; 2023 Aug; 20(9):16678-16704. PubMed ID: 37920029 [TBL] [Abstract][Full Text] [Related]
3. Adaptive visual cryptography scheme design based on QR codes. Zhang LN; Cui CY; Zhang XY; Wu W Math Biosci Eng; 2022 Aug; 19(12):12160-12179. PubMed ID: 36653991 [TBL] [Abstract][Full Text] [Related]
4. A Lossless-Recovery Secret Distribution Scheme Based on QR Codes. Pan JS; Liu T; Yan B; Yang HM; Chu SC Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190441 [TBL] [Abstract][Full Text] [Related]
5. Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network. Velumani R; Sudalaimuthu H; Choudhary G; Bama S; Jose MV; Dragoni N Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458944 [TBL] [Abstract][Full Text] [Related]
6. A QR code-based user-friendly visual cryptography scheme. Ren L; Zhang D Sci Rep; 2022 May; 12(1):7667. PubMed ID: 35538203 [TBL] [Abstract][Full Text] [Related]
7. A Confidential QR Code Approach with Higher Information Privacy. Lin PY; Lan WS; Chen YH; Wu WC Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205577 [TBL] [Abstract][Full Text] [Related]
8. Speckle visual cryptography for credential authentication. Jiao A; Zhu Y; Mi Z; Zhou X; Zhu Q; Ke C; Shi Y Appl Opt; 2024 Jun; 63(16):4351-4359. PubMed ID: 38856613 [TBL] [Abstract][Full Text] [Related]
9. Weighted visual secret sharing with multiple decryptions and lossless recovery. Liu F; Yan XH; Lu YL; Tan LD Math Biosci Eng; 2019 Jun; 16(5):5750-5764. PubMed ID: 31499736 [TBL] [Abstract][Full Text] [Related]
10. A compressed secret image sharing method with shadow image verification capability. Yang GZ; Liu LT; Yan XH Math Biosci Eng; 2020 Jun; 17(4):4295-4316. PubMed ID: 32987580 [TBL] [Abstract][Full Text] [Related]
11. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing. Bao L; Yi S; Zhou Y IEEE Trans Image Process; 2017 Dec; 26(12):5618-5631. PubMed ID: 28809684 [TBL] [Abstract][Full Text] [Related]
12. Experimental QR code optical encryption: noise-free data recovering. Barrera JF; Mira-Agudelo A; Torroba R Opt Lett; 2014 May; 39(10):3074-7. PubMed ID: 24978277 [TBL] [Abstract][Full Text] [Related]
13. A novel secret sharing scheme using multiple share images. Li XP; Liu YJ; Chen HF; Chang CC Math Biosci Eng; 2019 Jul; 16(6):6350-6366. PubMed ID: 31698566 [TBL] [Abstract][Full Text] [Related]
14. Visual cryptography in single-pixel imaging. Jiao S; Feng J; Gao Y; Lei T; Yuan X Opt Express; 2020 Mar; 28(5):7301-7313. PubMed ID: 32225961 [TBL] [Abstract][Full Text] [Related]
15. Meaningful Secret Image Sharing with Saliency Detection. Cheng J; Yan X; Liu L; Jiang Y; Wang X Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327851 [TBL] [Abstract][Full Text] [Related]
16. GAN-Based Key Secret-Sharing Scheme in Blockchain. Zheng W; Wang K; Wang FY IEEE Trans Cybern; 2021 Jan; 51(1):393-404. PubMed ID: 31985449 [TBL] [Abstract][Full Text] [Related]
17. Research on double camouflage encryption mechanism of QR code based on UAV landing scenario. Ye H; Xu T Sci Rep; 2023 Dec; 13(1):21786. PubMed ID: 38066099 [TBL] [Abstract][Full Text] [Related]
18. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability. Lee CW; Tsai WH IEEE Trans Image Process; 2012 Jan; 21(1):207-18. PubMed ID: 21693424 [TBL] [Abstract][Full Text] [Related]
19. Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19. Sarkar A; Sarkar M Multimed Tools Appl; 2021; 80(14):21899-21923. PubMed ID: 33776546 [TBL] [Abstract][Full Text] [Related]
20. Optical information authentication using compressed double-random-phase-encoded images and quick-response codes. Wang X; Chen W; Chen X Opt Express; 2015 Mar; 23(5):6239-53. PubMed ID: 25836845 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]