Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241000179-7.doi: 10.11896/jsjkx.241000179
• Image Processing & Multimedia Technology • Previous Articles Next Articles
KANG Bohan1, GAO Wanlin2, JIA Jingdun2,3
CLC Number:
| [1]TAO J,LUO Z H,WANG B S,et al.A Logistics Privacy Protection System Based on Quick-Response Barcodes Steganography[J].Journal of Cyber Security,2023,8(2):1-10. [2]WANG T Q,ZHANG Y Z,DI Y L,et al.Research on strong robustness watermarking algorithm based on dynamic difference expansion[J].Chinese Journal of Network and Information Security,2023,9(5):150-165. [3]ZHANG Y L,LI B.Agricultural product supply chain traceability system design based on master-slave alliance chain structure [J].Application Research of Computers,2022,39(6):1638-1644. [4]AHAMED N N,VIGNESH R,ALAM T.Tracking and tracing the halal food supply chain management using blockchain,RFID,and QR code[J].Multimedia Tools and Applications,2023(83):48987-49012. [5]QIN J,XU Z J,YANG Y,et al.Research on secure payment based on passive Internet of Things technology[J].Internet of Things Technology,2024,14(2):93-96. [6]EREN B.QR code m-payment from a customer experience perspective[J].Journal of Financial Services Marketing,2024(29):106-121. [7]TAVEERZD N,VONGPRADHIP S.Development of color-QR code for increasing capacity[C]//International Conference on Singal-Image Technology and Internet-Based Systems.2015:645-648. [8]LUAN J N,ZHANG W,SUN W,et al.High-accuracy localization algorithm based on fusion of two-dimensional code vision and laser lidar[J].Journal of Computer Applications,2021,41(5):1484-1491. [9]PENG L,WEN L,QIANG L,et al.Research on QR 2D-codegraphics correction algorithms based on morphological expansion closure and edge detection[J].Smart Innovation,Systems and Technologies,2020(180):197-209. [10]GAO F,LINGHU Q J,GE Y S,et al.Location Method of Laser QR Code Based on Position Discrimination[J].Journal of Computer-Aided Design & Computer Graphics,2017,29(6):1060-1067. [11]LIU Y,ZOU F M,CAI Q Q,et al.Modified deformation QR code correction and identification of YOLOv8n-Pose [J].Computer Systems & Applications.2024,33(12):141-152. [12]DONG H,LIU H,LI M,et al.An Algorithm for the Recognition of Motion-Blurred QR Codes Based on Generative Adversarial Networks and Attention Mechanisms[J].International Journal of Computational Intelligence Systems,2024,17:83. [13]LIU C,ZHENG H,WANG T Y.Functional patterns-relevant blind-deblurring method foranti-counterfeiting code images[J].Journal of Image and Graphics,2023,28(3):680-690. [14]FENG W,FANG C.Stable localization algorithm of QR codebased on method of least squares[J].Application Research of Computers,2018,35(3):957-960. [15]RIOUS G,SCARVELIS C,CHOKSI R,et al.Blind deblurring of barcodes via Kullback-Leibler divergence[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2021,43(1):77-88. [16]XU C J,LIU Z,HE Z F,et al.Encoding pattern selection algorithm for character two-dimension code[J].Computer System Application,2013,22(4):69-73. [17]KANG B H,JIA J D,GAO W L,et al.Research on improved characters encoding methods based on QR code[J].Chinese Journal of Electronics,2019,28(6):1170-1177. [18]RAMALHO J,ANTONIO L,CORREIA S,et al.LuminescentQR codes for smart labeling and sensing[J].Optics & Laser Technology,2018(101):304-311. [19]YUAN M Z,HAO F Z.Research and Implementation of Micro QR and QR Structured Appending Mode[J].Computer Technology and Development,2013,23(11):229-233. [20]BAN S H,HAN Y J,FAN Y W,et al.QR Code Information Encryption Architecture Based on Mimic Defense[J].Journal of Chinese Computer Systems,2020,41(4):673-678. [21]LIN P Y.Distributed secret sharing approach with cheater prevention based on QR code[J].IEEE Transactions on Industrial Informatics,2016,12(1):384-392. [22]YIN X,HUANG W Q.Research on color QR code watermarking technology based on chaos theory[J].Journal on Communications,2018,39(7):50-58. [23]LIU J Q,QU Y P,LYU Y H.Design of very short antipollution error correcting code based on global distance optimization[J].Journal of Computer Applications,2023,43(2):630-635. [24]MSTAFA R.Reversible video steganography using quick re-sponse codes and modified elgamal cryptosystem[J].Computers,Materials and Continua,2022,72(2):000. [25]GB/T 18284-2000.快速响应矩阵码[S].国家质量技术监督局,2000. |
| [1] | LIU Wenfei, LIU Jiafei, WANG Qi, WU Jingli, LI Gaoshi. Component Reliability Analysis of Interconnected Networks Based on Star Graph [J]. Computer Science, 2025, 52(7): 295-306. |
| [2] | YIN Wencui, XIE Ping, YE Chengxu, HAN Jiaxin, XIA Xing. Anomaly Detection of Multi-variable Time Series Data Based on Variational Graph Auto-encoders [J]. Computer Science, 2025, 52(6A): 240700124-8. |
| [3] | WANG Liuyi, ZHOU Chun, ZENG Wenqiang, HE Xingxing, MENG Hua. High-frequency Feature Masking-based Adversarial Attack Algorithm [J]. Computer Science, 2025, 52(10): 374-381. |
| [4] | XIONG Xi, DING Guangzheng, WANG Juan, ZHANG Shuai. DLSF:A Textual Adversarial Attack Method Based on Dual-level Semantic Filtering [J]. Computer Science, 2025, 52(10): 423-432. |
| [5] | WANG Chundong, LI Quan, FU Haoran, HAO Qingbo. Face Anti-spoofing Method with Adversarial Robustness [J]. Computer Science, 2024, 51(6A): 230400022-7. |
| [6] | LI Shasha, XING Hongjie. Robust Anomaly Detection Based on Adversarial Samples and AutoEncoder [J]. Computer Science, 2024, 51(5): 363-373. |
| [7] | HAN Songyuan, WANG Hongxia, JIANG Ziyu. Robust and Multilayer Excel Document Watermarking for Source Tracing [J]. Computer Science, 2024, 51(5): 374-381. |
| [8] | ZHANG Liying, SUN Haihang, SUN Yufa , SHI Bingbo. Review of Node Classification Methods Based on Graph Convolutional Neural Networks [J]. Computer Science, 2024, 51(4): 95-105. |
| [9] | CHEN Jinyin, LI Xiao, JIN Haibo, CHEN Ruoxi, ZHENG Haibin, LI Hu. CheatKD:Knowledge Distillation Backdoor Attack Method Based on Poisoned Neuronal Assimilation [J]. Computer Science, 2024, 51(3): 351-359. |
| [10] | SUN Shounan, WANG Jingbin, WU Renfei, YOU Changkai, KE Xifan, HUANG Hao. TMGAT:Graph Attention Network with Type Matching Constraint [J]. Computer Science, 2024, 51(3): 235-243. |
| [11] | HUANG Changxi, ZHAO Chengxin, JIANG Xiaoteng, LING Hefei, LIU Hui. Screen-shooting Resilient DCT Domain Watermarking Method Based on Deep Learning [J]. Computer Science, 2024, 51(2): 343-351. |
| [12] | SHAO Yunfei, SONG You, WANG Baohui. Study on Degree of Node Based Personalized Propagation of Neural Predictions forSocial Networks [J]. Computer Science, 2023, 50(4): 16-21. |
| [13] | YAO Hongliang, YIN Zhiyuan, YANG Jing, YU Kui. Stock Market Trend Reasoning Algorithm Based on Game Dynamic Influence Diagram [J]. Computer Science, 2023, 50(11A): 221100039-7. |
| [14] | ZHAO Zitian, ZHAN Wenhan, DUAN Hancong, WU Yue. Study on Adversarial Robustness of Deep Learning Models Based on SVD [J]. Computer Science, 2023, 50(10): 362-368. |
| [15] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
|
||