qrcodes are essentially 2d matrix images that can be easily displayed physically on printed media or digitally on a screen. Their popularity is due to their fast readability and storage capacity. Applications vary wi...
详细信息
qrcodes are essentially 2d matrix images that can be easily displayed physically on printed media or digitally on a screen. Their popularity is due to their fast readability and storage capacity. Applications vary widely from product tracking and identification to entertainment, advertising, encryption, and payment. In this work, we explore a novel representation of qrcodes as 3d structures that are embedded on arbitrary shapes. Specifically, our method physically prints the 3dqr-code representation on a given region on the shape. Thus, in comparison to paper printedqr-codes, our 3dqr-codes are more resilient and reliable (e.g. harder to break and reproduce). 3dqr-codes are computed from their 2d counterpart as a carefully designed set of carved geometry modules on the surface which encode the black-and-white qr pattern. At the core of our method, we utilize self-shadows which are cast by 3d geometry modules on the surface to generate a correct black-white pattern with adequate contrast which can be easily decoded by standardqr readers. Our technique allows embedding 3dqr-codes on arbitrary objects with minimal modification of the shape and even on thin shell surfaces or highly curved ones. Our technique is robust to lighting environments and scanning angles and allows to easily decode3dqr-codes with similarity to the 2d version. Finally, we demonstrate our technique feasibility by fabricating a wide range of examples using consumer-level 3d printers and common homogeneous materials. The feasibility and robust readability make 3dqr-codes a good candidate for embedding information on physical objects and open interesting directions in 3d manufacturing such as 3d printed objects ownership and3d watermarking. (C) 2019 Elsevier Ltd. All rights reserved.
Paradigms of Cloud computing are gaining prevalent acceptance due to the numerous benefits they provide. These comprise cost-effectiveness, time savings and effective deployment of computing resources. However, privac...
详细信息
ISBN:
(纸本)9781538608692
Paradigms of Cloud computing are gaining prevalent acceptance due to the numerous benefits they provide. These comprise cost-effectiveness, time savings and effective deployment of computing resources. However, privacy and security issues are among the major hindrances holding back the widespread adoption of this novel technology. In this context, enhancing the security of cloud computing demands the highest priority based on the popular encryption method RSA, Genetic Algorithm (GA), and3d Quick Response (qr) code using MAC address. This paper will show an approach of amplifying the security of cloud computing. Therefore, we are proposing advanced two-step security mechanism of cloud computing. Firstly, RSA is used to provide initial protection of the first stratum. RSA approaches message as input to the hash function and generated hash values is encrypted by using generated sender key. And the receiver will generate a hash code anddecrypts the message using the sender's public key. Finally', The Genetic algorithms (GA) are generalized search algorithms based on the mechanics of natural genetics. GA maintains a population of individuals that represent the candidate solutions. After successful completion of Genesis, mutation and crossover GA will provide a framework to match the desired pattern. Moreover, a media access control address (MAC address) of a device is a distinctive identifier assigned to network interfaces for communications at the data link layer of a network segment. In this context, the MAC address is used to generate the 3d Quick response code for user verification. Through experiments, we affirm that the combination of GA and3d qr code approach with RSA for two-step security mechanism shows strong potential to heighten the security of Cloud Computing.
暂无评论