Research Article
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things
Table 4
Comparison of related QR code schemes.
| Methods | [6, 19] | [7, 8] | [9, 11, 12] | [10] | [14, 16] | Proposed |
| Applications | Image hiding | Image hiding | Watermarking | Watermarking | Secret hiding | Secret hiding |
| Embedding domain | Frequency | Spatial | Frequency | Spatial | Spatial | Spatial |
| Computational complexity | High | Low | High | Low | Low | Low |
| Module-based | No | No | No | No | Yes | Yes |
| Robustness of secret | High | Low | High | High | High | High |
| Against contrast analysis attack | - | - | - | - | No | Tes |
|
|