[1] Shankar B P, Rajkumar N, Viji C, et al. Approach to
Identifying Counterfeit Products with QR Codes and
Computational Algorithms[C]//2024 5th International
Conference on Smart Electronics and Communication
(ICOSEC). IEEE, 2024: 1203-1209.
[2] Subramanian N, Elharrouss O, Al-Maadeed S, et al. Image
steganography: A review of the recent advances[J]. IEEE
access, 2021, 9: 23409-23423.
[3] Huang P C, Chang C C, Li Y H, et al. Efficient QR code
secret embedding mechanism based on hamming code[J].
IEEE Access, 2020, 8: 86706-86714.
[4] Tan L, Liu K, Yan X, et al. Visual secret sharing scheme
for color qr code[C]//2018 IEEE 3rd International
Conference on Image, Vision and Computing (ICIVC).
IEEE, 2018: 961-965.
[5] Wahsheh H A M, Luccio F L. Security and privacy of QR
code applications: a comprehensive study, general
guidelines and solutions[J]. Information, 2020, 11(4): 217.
[6] Lou S, Shen W, Shen G, et al. QR code anti-counterfeiting
technique with lattice-based
cryptography[C]//International Conference on Cyber
Security, Artificial Intelligence, and Digital Economy
(CSAIDE 2023). SPIE, 2023, 12718: 43-50.
[7] 宋梦丽.基于二维码图像的信息隐写算法研究[D].武汉:
华 中 师 范 大
学,2022.DOI:10.27159/d.cnki.ghzsu.2022.000111.
Song Mengli. Research on information steganography
algorithm based on two-dimensional code image [D].
Wuhan: Huazhong Normal
University,2022.DOI:10.27159/d.cnki.ghzsu.2022.000111.
[8] Tkachenko I, Puech W, Destruel C, et al. Two-level QR
code for private message sharing and document
authentication[J]. IEEE Transactions on Information
Forensics and Security, 2015, 11(3): 571-583.
[9] Boujerfaoui S, Douzi H, Harba R. Print-Cam Image
Distortion Correction for Robust Image
Watermarking[C]//2024 26th International Conference on
Digital Signal Processing and its Applications (DSPA).
IEEE, 2024: 1-6.
[10] Evsutin O, Melman A, Meshcheryakov R. Digital
steganography and watermarking for digital images: A
review of current research directions[J]. IEEE Access,
2020, 8: 166589-166611.
[11] Rathnayake O, Wijesekara G, Samaranayake L. A PathPlanning Technique to Reduce the Travel Time of a
Micromouse[C]//2023 IEEE 17th International
Conference on Industrial and Information Systems (ICIIS).
IEEE, 2023: 519-523.
[12] Begum M, Uddin M S. Digital image watermarking
techniques: a review[J]. Information, 2020, 11(2): 110.
[13] Wan W, Wang J, Zhang Y, et al. A comprehensive survey
on robust image watermarking[J]. Neurocomputing, 2022,
488: 226-247.
Li Yunya, Li Dongsen, Fu Rong. A review of
attack-resistant image watermarking techniques[J].
Wireless Internet Technology,2021,18(04):96-101.
[14] 温万钦.数字图像水印算法的研究与应用[D].大连:大连
交通大学,2022.DOI:10.26990/d.cnki.gsltc.2022.000759.
Wen Wanqin. Research and application of digital image
watermarking algorithm [D]. Dalian Jiaotong
University,2022.DOI:10.26990/d.cnki.gsltc.2022.000759.
[15] Lu L, Liu X, You P, et al. Research on Micromouse Maze
Search Algorithm Based on Centripetal
Algorithm[C]//International Conference on Computing,
Control and Industrial Engineering. Singapore: Springer
Nature Singapore, 2023: 937-947.
[16] 国际智能鼠走迷宫竞赛(中国)总联络处. “启诚杯”中
国 Micromous 国际邀请赛 [OL]. [2023-02-02].
https://www.micromousechina.com /index/match/index
International Intelligent Mouse Maze Walking
Competition (China) General Liaison Office. “Qicheng
Cup” China Micromous International Invitational
Competition [OL]. [2023-02-02].
https://www.micromousechina.com /index/match/index
[17] Rathnayake O, Wijesekara G, Samaranayake L. A Path
Planning Technique to Reduce the Travel Time of a
Micromouse[C]//2023 IEEE 17th International
Conference on Industrial and Information Systems (ICIIS).
IEEE, 2023: 519-523.
[18] Pame Y G, Kottawar V G, Mahajan Y V. A Novel
Approach to Maze Solving Algorithm[C]//2023
International Conference on Emerging Smart Computing
and Informatics (ESCI). IEEE, 2023: 1-6.
[19] Wu D C, Wu Y M. Covert communication via the QR
code image by a data hiding technique based on module
shape adjustments[J]. IEEE Open Journal of the Computer
Society, 2020, 1: 12-34.
[20] Liu S, Fu Z, Yu B. Rich QR codes with three-layer
information using hamming code[J]. IEEE Access, 2019, 7:
78640-78651.
[21] Jiale Chen, Li Dong, Rangding Wang, Diqun Yan, Weiwei
Sun and Hang-Yu Fan, “Physical Anti-Copying
Semi-Robust Random Watermarking for QR Code”,
International Workshop on Digital-forensics and
Watermarking (IWDW 2022), vol. 13825, pp.
131-1418-19 Nov. 2022. Oral Presentation.
[22] Zulfiqar M I, Abdullah I, Akram A, et al. An Efficient
Autonomous Maze Solving Robot based on
Microcontroller by Avoiding Obstacles Using a
Decision-Making Algorithm[C]//2023 International
Conference on IT and Industrial Technologies (ICIT).
IEEE, 2023: 1-6.
[23] Sanchez-Ibanez J R, Pérez-del-Pulgar C J, García-Cerezo
A. Path planning for autonomous mobile robots: A
review[J]. Sensors, 2021, 21(23): 7898.
[24] Ab Wahab M N, Nefti-Meziani S, Atyabi A. A
comparative review on mobile robot path planning:
Classical or meta-heuristic methods?[J]. Annual Reviews
in Control, 2020, 50: 233-252.
[25] Wan W, Wang J, Zhang Y, et al. A comprehensive survey
on robust image watermarking[J]. Neurocomputing, 2022,
488: 226-247.
[26] Begum M, Ferdush J, Uddin M S. A Hybrid robust
watermarking system based on discrete cosine transform,
discrete wavelet transform, and singular value
decomposition[J]. Journal of King Saud
University-Computer and Information Sciences, 2022,
34(8): 5856-5867.
[27] 王文冰.基于变换域的数字图像鲁棒水印算法研究[D].
郑州: 战 略 支 援 部 队 信 息 工 程 大
学,2021.DOI:10.27188/d.cnki.gzjxu.2021.000025.
Wang Wenbing. Research on robust watermarking
algorithm for digital images based on transform domain
[D]. Zhengzhou: Strategic Support Forces Information
Engineering
University,2021.DOI:10.27188/d.cnki.gzjxu.2021.000025.
[28] Tancik M, Mildenhall B, Ng R. Stegastamp: Invisible
hyperlinks in physical photographs[C]//Proceedings of theIEEE/CVF conference on computer vision and pattern
recognition. 2020: 2117-2126.
[29] Fang H, Qiu Y, Chen K, et al. Flow-based robust
watermarking with invertible noise layer for black-box
distortions[C]//Proceedings of the AAAI conference on
artificial intelligence. 2023, 37(4): 5054-5061.
[30] Liu J, Han J, Fu K, et al. Application of QR code
watermarking and encryption in the protection of data
privacy of intelligent mouth-opening trainer[J]. IEEE
Internet of Things Journal, 2023, 10(12): 10510-10518.
[31] Lina T N, Rumetna M S. Comparison analysis of breadth
first search and depth limited search algorithms in sudoku
game[J]. Bulletin of Computer Science and Electrical
Engineering, 2021, 2(2): 74-83.
[32] Deineko Z, Sotnik S, Lyashenko V. Usage and Application
Prospects QR Codes[J]. 2022.
[33] Rachael O, Misra S, Ahuja R, et al. Image steganography
and steganalysis based on least significant bit
(LSB)[C]//Proceedings of ICETIT 2019: Emerging trends
in information technology. Springer International
Publishing, 2020: 1100-1111.
[34] Zermi N, Khaldi A, Kafi R, et al. A DWT-SVD based
robust digital watermarking for medical image security[J].
Forensic science international, 2021, 320: 110691.
[35] Zaini H, Alqadi Z. High Salt and Pepper Noise Ratio
Reduction[J]. International Journal of Computer Science
and Mobile Computing, 2021, 10: 88-97.
[36] Deng J, Yan M, Wang X, et al. Image Denoising
Algorithm Based on Gaussian-Pepper Noise[C]//2024 4th
International Conference on Machine Learning and
Intelligent Systems Engineering (MLISE). IEEE, 2024:
16-19.
[37] Chen B, Wu Y, Coatrieux G, et al. JSNet: a simulation
network of JPEG lossy compression and restoration for
robust image watermarking against JPEG attack[J].
Computer Vision and Image Understanding, 2020, 197:
103015.
[38] Qin C, Li X, Zhang Z, et al. Print-camera resistant image
watermarking with deep noise simulation and constrained
learning[J]. IEEE Transactions on Multimedia, 2023.
[39] Fang H, Zhang W, Zhou H, et al. Screen-shooting resilient
watermarking[J]. IEEE Transactions on Information
Forensics and Security, 2018, 14(6): 1403-1418.
[40] Fang H, Chen D, Wang F, et al. TERA: Screen-to-camera
image code with transparency, efficiency, robustness and
adaptability[J]. IEEE Transactions on Multimedia, 2021,
24: 955-967.
[41] Boehm B. Stegexpose-A tool for detecting LSB
steganography[J]. arXiv preprint arXiv:1410.6656, 2014.
[42] Boroumand M, Chen M, Fridrich J. Deep residual network
for steganalysis of digital images[J]. IEEE Transactions on
Information Forensics and Security, 2018, 14(5):
1181-1193.
[43] Sihotang J. Analysis Of Shortest Path Determination By
Utilizing Breadth First Search Algorithm[J]. Jurnal Info
Sains: Informatika dan Sains, 2020, 10(2): 1-5.
[44] Aliyan M, Hasan M Z, Qayoom H, et al. Analysis and
Performance Evaluation of Various Shortest Path
Algorithms[C]//2024 3rd International Conference for
Innovation in Technology (INOCON). IEEE, 2024: 1-16.
[45] Luo M, Hou X, Yang J. Surface optimal path planning
using an extended Dijkstra algorithm[J]. IEEE access,
2020, 8: 147827-147838.
[46] Tang G, Tang C, Claramunt C, et al. Geometric A-star
algorithm: An improved A-star algorithm for AGV path
planning in a port environment[J]. IEEE access, 2021, 9:
59196-59210.
|