The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As for common RF tag, the circuitry operator part is formed with the semiconductor. Then, when radiation, such as a gamma ray, is irradiated, a recoverable soft error and unrecoverable hard error will occur. Therefore, it cannot be used depending on the exposure dose of radiation. However, a radiation-proof ability can be raised by incorporating a shielding and an error correction. Then, RF tag which...
In the now-popular two-dimensional code, bits are expressed using white and two black colors in the cell, which forms the element. However, such codes do not have confidentiality. Since confidentiality may be needed according to the use, a large-capacity and high-density two-dimensional code with compatibility and confidentiality can be realized by adding a secrecy part in addition to the existing...
Data is connected to the internet with a sensor for understanding the property of the thing for which a two-dimensional code was used. Two-dimensional codes can play the role of connecting cyberspace to physical space, and can play a significant role in the so-called Internet of Things. Moreover, the advancement of machine vision is progressing with machine-to-machine communication. On the other hand,...
In this paper, we present a method for hiding information in a conventional two-dimensional (2D) code that maintains backward compatibility with conventional 2D code readers. This is achieved by segmenting each cell into subcells that store confidential information.
Mobile phone users are being increasingly directed to WEB sites through the identification of the WEB address from a two-dimensional code on the phone. However, incidents where mobile phones direct users to malicious WEB sites are also increasing. The direct lead mechanism, in which mobile phones directly send users to an uninspected WEB address, is the most common mechanism by which users are misdirected...
Optical information media printed on paper use printing materials to absorb visible light. There is a two-dimensional code, which may be encrypted but also can possibly be copied. Hence, we envisage an information medium that cannot possibly be copied and thereby offers high security. At the surface, the normal two-dimensional code is printed. The inner layers consist of two-dimensional codes printed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.