A secure and authenticated mobile payment protocol against off-site attack strategy

L Fang, M Li, Z Liu, C Lin, S Ji, A Zhou… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Mobile payment system has been expected to provide more efficient and convenient
payment methods. However, compared to traditional payments, mobile payment issues …

Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism

PC Huang, CC Chang, YH Li, Y Liu - Journal of Information Security and …, 2021 - Elsevier
In recent years, QR code is popular online and offline, and it is an ideal media for secret
sharing. This paper utilizes the error correction capacity of QR code to propose an (n, n) …

XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes

L Tan, Y Lu, X Yan, L Liu, X Zhou - Multimedia Tools and Applications, 2020 - Springer
Quick response (QR) codes are becoming increasingly popular in various areas of life due
to the advantages of the error correction capacity, the ability to be scanned quickly and the …

Efficient (k, n)-threshold secret sharing method with cheater prevention for QR code application

PC Huang, CC Chang, YH Li - Journal of Internet Technology, 2022 - jit.ndhu.edu.tw
To protect secret message, secret sharing technique divides it into n shares and distributes
them to n involved participants. However, it is hardly to prevent a dishonest participant to …

Secured Secret sharing of QR codes based on nonnegative matrix factorization and regularized super resolution convolutional neural network

R Velumani, H Sudalaimuthu, G Choudhary, S Bama… - Sensors, 2022 - mdpi.com
Advances in information technology have harnessed the application of Quick Response
(QR) codes in day-to-day activities, simplifying information exchange. QR codes are …

Utilizing QR codes to verify the visual fidelity of image datasets for machine learning

YW Chow, W Susilo, J Wang, R Buckland… - Journal of Network and …, 2021 - Elsevier
Abstract Machine learning is becoming increasingly popular in modern technology and has
been adopted in various application areas. However, researchers have demonstrated that …

Secured transmission design schemes based on chaotic synchronization and optimal high gain observers

I Daldoul, AS Tlili - Simulation Modelling Practice and Theory, 2022 - Elsevier
The distinguishing feature of the proposed secured transmission design scheme is the use
of chaotic nonlinear systems and optimal high gain observers for the encryption/decryption …

Comparing sustainability claims with assurance in organic agriculture standards

F Ascui, AK Farmery, F Gale - Australasian Journal of …, 2020 - Taylor & Francis
Voluntary organic standard-setting organisations (SSOs) depend upon public trust in the
truth claims implied by their labels: that the product in question has been produced using …

Research on the risk of block chain technology in Internet finance supported by wireless network

Y Chen, Y Zhang, B Zhou - EURASIP Journal on Wireless …, 2020 - Springer
In this paper, a cascaded depth learning framework is constructed. A cascaded depth model
is successfully implemented by studying and analyzing the specific feature transformation …

Privacy preservation authentication: group secret handshake with multiple groups

D Han, Z Li, M Wang, C Xu, K Sharif - Mathematics, 2023 - mdpi.com
The technique of group secret handshake (GSH) has been used to help the members
affiliated with the same group in achieving private authentication. After executing GSH …