{"id":"https://openalex.org/W2983664081","doi":"https://doi.org/10.1155/2019/7937816","title":"A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code","display_name":"A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code","publication_year":2019,"publication_date":"2019-11-11","ids":{"openalex":"https://openalex.org/W2983664081","doi":"https://doi.org/10.1155/2019/7937816","mag":"2983664081"},"language":"en","primary_location":{"id":"doi:10.1155/2019/7937816","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/7937816","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/7937816.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2019/7937816.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100659377","display_name":"Bin Yu","orcid":"https://orcid.org/0000-0002-2438-135X"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Yu","raw_affiliation_strings":["College of Computer, Information Engineering University, Zhengzhou 450004, China"],"raw_orcid":"https://orcid.org/0000-0002-2438-135X","affiliations":[{"raw_affiliation_string":"College of Computer, Information Engineering University, Zhengzhou 450004, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005848828","display_name":"Zhengxin Fu","orcid":"https://orcid.org/0000-0001-8587-0942"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhengxin Fu","raw_affiliation_strings":["College of Computer, Information Engineering University, Zhengzhou 450004, China"],"raw_orcid":"https://orcid.org/0000-0001-8587-0942","affiliations":[{"raw_affiliation_string":"College of Computer, Information Engineering University, Zhengzhou 450004, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100321839","display_name":"Sijia Liu","orcid":"https://orcid.org/0000-0002-9214-6861"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sijia Liu","raw_affiliation_strings":["College of Computer, Information Engineering University, Zhengzhou 450004, China"],"raw_orcid":"https://orcid.org/0000-0002-9214-6861","affiliations":[{"raw_affiliation_string":"College of Computer, Information Engineering University, Zhengzhou 450004, China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005848828"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.7618,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.89068102,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8092765808105469},{"id":"https://openalex.org/keywords/constant-weight-code","display_name":"Constant-weight code","score":0.7240859270095825},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.5748581886291504},{"id":"https://openalex.org/keywords/systematic-code","display_name":"Systematic code","score":0.5527608394622803},{"id":"https://openalex.org/keywords/cyclic-code","display_name":"Cyclic code","score":0.5409058928489685},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5087016224861145},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5084582567214966},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5018298625946045},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.47496387362480164},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4588175415992737},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.45723801851272583},{"id":"https://openalex.org/keywords/code-rate","display_name":"Code rate","score":0.40606409311294556},{"id":"https://openalex.org/keywords/linear-code","display_name":"Linear code","score":0.32806718349456787},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.24369850754737854},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.22126621007919312},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14133647084236145}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8092765808105469},{"id":"https://openalex.org/C197242373","wikidata":"https://www.wikidata.org/wiki/Q5163613","display_name":"Constant-weight code","level":5,"score":0.7240859270095825},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.5748581886291504},{"id":"https://openalex.org/C70992990","wikidata":"https://www.wikidata.org/wiki/Q1681587","display_name":"Systematic code","level":4,"score":0.5527608394622803},{"id":"https://openalex.org/C2096984","wikidata":"https://www.wikidata.org/wiki/Q245464","display_name":"Cyclic code","level":5,"score":0.5409058928489685},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5087016224861145},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5084582567214966},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5018298625946045},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.47496387362480164},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4588175415992737},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.45723801851272583},{"id":"https://openalex.org/C206468330","wikidata":"https://www.wikidata.org/wiki/Q834373","display_name":"Code rate","level":3,"score":0.40606409311294556},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.32806718349456787},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.24369850754737854},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.22126621007919312},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14133647084236145},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2019/7937816","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/7937816","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/7937816.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0e14f0552d8547708d64ee18f17956e5","is_oa":true,"landing_page_url":"https://doaj.org/article/0e14f0552d8547708d64ee18f17956e5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2019/7937816","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/7937816","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/7937816.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[{"id":"https://openalex.org/G7034644147","display_name":null,"funder_award_id":"61602513","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2983664081.pdf","grobid_xml":"https://content.openalex.org/works/W2983664081.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1970489192","https://openalex.org/W2169552486","https://openalex.org/W2206629542","https://openalex.org/W2287135185","https://openalex.org/W2290049962","https://openalex.org/W2344476896","https://openalex.org/W2489086034","https://openalex.org/W2546792521","https://openalex.org/W2586595889","https://openalex.org/W2591852218","https://openalex.org/W2772861785","https://openalex.org/W2806871901","https://openalex.org/W2889053133","https://openalex.org/W2897735586","https://openalex.org/W2949596116","https://openalex.org/W3160191762"],"related_works":["https://openalex.org/W1988258635","https://openalex.org/W2110798623","https://openalex.org/W2171391334","https://openalex.org/W1631960500","https://openalex.org/W4250402636","https://openalex.org/W2082705204","https://openalex.org/W2772956856","https://openalex.org/W4246247137","https://openalex.org/W3172258664","https://openalex.org/W2151458981"],"abstract_inverted_index":{"Quick":[0],"Response":[1],"(QR)":[2],"code,":[3,48,51,59,136,168,183],"a":[4,32,62],"machine-readable":[5],"symbol,":[6],"is":[7,121,142,177,193],"widely":[8],"employed":[9],"in":[10],"all":[11],"walks":[12],"of":[13,45,56,93,105,133,140,165,188,209],"life":[14],"due":[15],"to":[16,69,84,154],"its":[17],"large":[18],"information":[19,68,88,141,176,187,211],"capacity,":[20],"strong":[21,217],"error":[22,130],"correction":[23,131],"ability,":[24],"and":[25,52,117,148,184,216],"fast":[26],"reading":[27],"speed.":[28],"However,":[29],"anyone":[30],"with":[31,66,123,179,200],"standard":[33],"decoder":[34],"could":[35],"obtain":[36],"stored":[37],"information.":[38,73,198],"In":[39,74],"this":[40],"paper,":[41],"utilizing":[42],"the":[43,46,53,57,71,75,80,86,90,94,102,106,110,118,124,129,134,137,145,156,162,166,169,174,180,185,189,196,203,207],"characteristics":[44],"Hamming":[47,119,135],"wet":[49,151],"paper":[50,152],"recognition":[54,163],"mechanism":[55,132,164],"QR":[58,64,167,182,191],"we":[60,78],"introduce":[61],"high-capacity":[63],"code":[65,120,192],"three-layer":[67],"protect":[70],"sensitive":[72],"proposed":[76,204],"scheme,":[77],"utilize":[79],"XOR-based":[81],"secret-sharing":[82],"algorithm":[83],"embed":[85],"second-layer":[87],"on":[89,128,144,161],"column":[91,125,146],"vector":[92,147],"constructed":[95,122],"random":[96,170],"matrix":[97,111,171],"block.":[98],"Then,":[99],"without":[100],"affecting":[101],"embedding":[103],"result":[104],"second":[107],"layer":[108,139],"information,":[109],"block":[112,172],"elements":[113],"are":[114],"reused":[115],"again,":[116],"vector.":[126],"Based":[127],"third":[138],"embedded":[143],"encoded":[149],"by":[150],"coding":[153],"realize":[155],"blind":[157],"extraction.":[158],"Finally,":[159],"based":[160],"containing":[173],"secret":[175],"fused":[178],"carrier":[181,190],"public":[186],"used":[194],"as":[195],"first-layer":[197],"Compared":[199],"other":[201],"schemes,":[202],"scheme":[205],"has":[206],"advantages":[208],"high":[210],"payload,":[212],"low":[213],"computational":[214],"complexity,":[215],"robustness.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
