Research Article
Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography
Table 2
Experimental results of Scheme II.
| Aesthetic QR code () | Aesthetic QR code () | Stacked QR code () |
| | | | (2-1) | (2-2) | (2-3) |
| | | | (2-4) | (2-5) | (2-6) |
| | | | (2-7) | (2-8) | (2-9) |
| | | | (2-10) | (2-11) | (2-12) |
| | | | (2-13) | (2-14) | (2-15) |
| | | | (2-16) | (2-17) | (2-18) |
| | | | (2-19) | (2-20) | (2-21) |
| | | | (2-22) | (2-23) | (2-24) |
|
|