Research Article
Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography
Table 3
Experimental results of Scheme III.
| Aesthetic QR code () | Aesthetic QR code () | Stacked QR code () |
| | | | (3-1) | (3-2) | (3-3) |
| | | | (3-4) | (3-5) | (3-6) |
| | | | (3-7) | (3-8) | (3-9) |
| | | | (3-10) | (3-11) | (3-12) |
| | | | (3-13) | (3-14) | (3-15) |
| | | | (3-16) | (3-17) | (3-18) |
| | | | (3-19) | (3-20) | (3-21) |
| | | | (3-22) | (3-23) | (3-24) |
| | | | (3-25) | (3-26) | (3-27) |
| | | | (3-28) | (3-29) | (3-30) |
|
|