{"id":"https://openalex.org/W2018709764","doi":"https://doi.org/10.1109/iih-msp.2014.129","title":"Compatible 2D-Code Having Tamper Detection System with QR-Code","display_name":"Compatible 2D-Code Having Tamper Detection System with QR-Code","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W2018709764","doi":"https://doi.org/10.1109/iih-msp.2014.129","mag":"2018709764"},"language":"en","primary_location":{"id":"doi:10.1109/iih-msp.2014.129","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iih-msp.2014.129","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061076136","display_name":"Takayuki Ishihara","orcid":null},"institutions":[{"id":"https://openalex.org/I207014233","display_name":"Kyushu Institute of Technology","ror":"https://ror.org/02278tr80","country_code":"JP","type":"education","lineage":["https://openalex.org/I207014233"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Takayuki Ishihara","raw_affiliation_strings":["Dept. of Computer Science and Informatics, Kyushu Institute of Technology, Iizuka-shi, Fukuoka, Japan","Dept. of Comput. Sci. & Inf., Kyushu Inst. of Technol., Iizuka, Japan"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Informatics, Kyushu Institute of Technology, Iizuka-shi, Fukuoka, Japan","institution_ids":["https://openalex.org/I207014233"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Inf., Kyushu Inst. of Technol., Iizuka, Japan","institution_ids":["https://openalex.org/I207014233"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016859525","display_name":"Michiharu Niimi","orcid":null},"institutions":[{"id":"https://openalex.org/I207014233","display_name":"Kyushu Institute of Technology","ror":"https://ror.org/02278tr80","country_code":"JP","type":"education","lineage":["https://openalex.org/I207014233"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Michiharu Niimi","raw_affiliation_strings":["Dept. of Computer Science and Informatics, Kyushu Institute of Technology, Iizuka-shi, Fukuoka, Japan","Dept. of Comput. Sci. & Inf., Kyushu Inst. of Technol., Iizuka, Japan"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Informatics, Kyushu Institute of Technology, Iizuka-shi, Fukuoka, Japan","institution_ids":["https://openalex.org/I207014233"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Inf., Kyushu Inst. of Technol., Iizuka, Japan","institution_ids":["https://openalex.org/I207014233"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5061076136"],"corresponding_institution_ids":["https://openalex.org/I207014233"],"apc_list":null,"apc_paid":null,"fwci":1.6381,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.88093002,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"94","issue":"480","first_page":"493","last_page":"496"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9758999943733215,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7448524832725525},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6602624654769897},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6590760946273804},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6002340912818909},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.5596324801445007},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5386194586753845},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5095062851905823},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.4970124065876007},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4937616288661957},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3889702260494232},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3685763478279114}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7448524832725525},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6602624654769897},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6590760946273804},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6002340912818909},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.5596324801445007},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5386194586753845},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5095062851905823},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.4970124065876007},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4937616288661957},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3889702260494232},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3685763478279114},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iih-msp.2014.129","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iih-msp.2014.129","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","raw_type":"proceedings-article"},{"id":"mag:2569778861","is_oa":false,"landing_page_url":"https://www.ieice.org/ken/paper/20140307bBM6/eng/","pdf_url":null,"source":{"id":"https://openalex.org/S4306512848","display_name":"IEICE Technical Report; IEICE Tech. Rep.","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEICE Technical Report; IEICE Tech. Rep.","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1899673144","https://openalex.org/W2127860199","https://openalex.org/W3138908063"],"related_works":["https://openalex.org/W4200497776","https://openalex.org/W1570074286","https://openalex.org/W2982222368","https://openalex.org/W1974544592","https://openalex.org/W2110701844","https://openalex.org/W179740592","https://openalex.org/W3151879525","https://openalex.org/W2011477251","https://openalex.org/W2103190493","https://openalex.org/W122749164"],"abstract_inverted_index":{"The":[0,154,168],"matrix":[1],"barcodes":[2],"known":[3],"as":[4],"Quick":[5],"Response":[6],"(QR)":[7],"codes,":[8],"which":[9,97,145,196],"are":[10,28],"enable":[11],"us":[12],"to":[13,47,117],"import":[14],"printed":[15],"digital":[16,25,74],"information":[17],"into":[18],"smart-phone":[19],"or":[20],"cell":[21],"phone":[22],"through":[23],"its":[24],"camera":[26],"easily,":[27],"rapidly":[29],"becoming":[30],"widespread":[31],"not":[32],"only":[33],"Japan":[34],"but":[35],"also":[36],"Asia,":[37],"Europe":[38],"and":[39,86,112,133,204],"America.":[40],"However,":[41],"an":[42,198],"attacker":[43],"is":[44,83,91,98,131,139,146,172],"easily":[45],"able":[46],"lead":[48],"malicious":[49],"web-sites":[50],"by":[51,93,162,174],"putting":[52],"a":[53,58,64,77,81,94,99,107,118,128,142,147],"unauthenticated":[54],"QR":[55,60,194],"code":[56,178,195,203],"on":[57],"authenticated":[59],"code.":[61],"We":[62],"propose":[63],"compatible":[65],"2d-code":[66],"having":[67],"tamper":[68],"detection":[69],"system":[70],"with":[71,137],"QR-code.":[72],"In":[73,120,183],"signature":[75],"system,":[76],"hash":[78,89,115,125,135,166,170],"value":[79,90,116,126,136,171],"of":[80,101,127,149,159,181,190,193,207,213],"message":[82,111,130,161],"calculated":[84,132],"firstly,":[85],"then":[87],"the":[88,110,113,121,124,134,160,164,188,205,208,211,214],"encrypted":[92,114,138,169],"secret":[95],"key":[96,103,144,151],"pair":[100,148],"public":[102,143,150],"cryptography":[104,152],"system.":[105,153,216],"Then,":[106],"sender":[108],"sends":[109],"receiver.":[119],"receiver":[122,155],"side,":[123],"sent":[129],"decrypted":[140],"using":[141,175],"can":[156],"detect":[157],"modification":[158],"comparing":[163],"two":[165],"values.":[167],"embedded":[173],"Wet":[176],"Paper":[177],"within":[179],"cells":[180,192],"QR-codes.":[182],"this":[184],"paper,":[185],"we":[186],"report":[187],"robustness":[189],"reading":[191],"plays":[197],"important":[199],"role":[200],"in":[201],"our":[202],"state":[206],"progress":[209],"for":[210],"implementation":[212],"proposed":[215]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
