References
- Abbas, T. A., and M. J. Jawad. 2013. “Digital Vector Map Watermarking: Applications,techniques and attacks[J].” Oriental Journal of Computer Science and Technology 28 (6): 333–339.
- Abubahia, A., and M. Cocea. 2016. “Advancements in GIS Map Copyright Protection schemes—A Critical review[J].” Multimedia Tools and Applications 75 (19): 12205–12232.
- Abubahia, A., and M. Cocea. 2014. “Partition Clustering for GIS Map Data protection[C].” In Proceedings of the IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI), 830–837, Limassol, Cyprus, November 12.
- Abubahia, A. M., and M. Cocea. 2015. “Exploiting Vector Map Properties for GIS Data Copyright protection[C].” In Proceedings of the IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), 575–582, Vietri sul Mare, Italy, November 9–11.
- Aung, M., and Y. S. Chang. 2014. “Traceability in a Food Supply Chain: Safety and Quality perspectives[J].” Food Control 39 (1): 172–184. doi:10.1016/j.foodcont.2013.11.007.
- Badia Melis, R., R. Mishra, and L. Ruiz García. 2015. “Food Traceability: New Trends and Recent advances—A. review[J].” Food Control 57 (1): 393–401. doi:10.1016/j.foodcont.2015.05.005.
- Bosona, T., and G. Gebresenbet. 2013. “Food Traceability as an Integral Part of Logistics Management in Food and Agricultural Supply chain[J].” Food Control 33 (1): 32–48. doi:10.1016/j.foodcont.2013.02.004.
- Dabbene, F., P. Gay, and C. Tortia. 2014. “Traceability Issues in Food Supply Chain Management: A. review[J].” Biosystems Engineering 120 (3): 65–80. doi:10.1016/j.biosystemseng.2013.09.006.
- Fu, H., C. Zhu, J. Yuan, and H. Xu. 2012. “A New Watermarking Algorithm for Geo-spatial data[C].” In The International Conference on Information Technology and Software Engineering; Lecture Notes in Electrical Engineering, Vol. 210, edited by W. Lu, G. Cai, W. Liu, and W. Xing, 945–951. Berlin, Germany: Springer:. ISBN 978-3-642-34522-7.
- Fu, Z., Y. Cheng, S. Liu, and B. Yu. 2019. “A New Two-level Information Protection Scheme Based on Visual Cryptography and QR Code with Multiple decryptions[J].” Measurement 141: 267–276. doi:10.1016/j.measurement.2019.03.080.
- Cheng, Y.,Z. Fu, B. Yu, and G. Shen. 2018. “A New Two-level QR Code with Visual Cryptography Scheme [J].” Multimedia Tools and Applications 77 (16): 20629–20649. doi:10.1007/s11042-017-5465-4.
- Gupta, B., D. P. Agrawal, and S. Yamaguchi, eds. 2016. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. USA: IGI global.
- Gupta, B. B., ed. 2018. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. USA: CRC Press.
- ISO, IEC 18004. 2006. Information Technology – Automatic Identification and Data Capture Techniques – QR Code 2005 Bar Code Symbology Specification. Geneva, Switzerland: International Organization for Standardization.
- Jang, B. J., S. H. Lee, E. J. Lee, S. Lim, and K. R. Kwon. 2016. “A Crypto Marking Method for Secure Vector Map [J].” Multimedia Tools and Applications 75 (23): 16011–16044.
- Memos, V. A., K. E. Psannis, Y. Ishibashi, B.-G. Kim, and B. B. Gupta. 2018. “An Efficient Algorithm for Media-based Surveillance System (eamsus) in IoT Smart City framework[J].” Future Generation Computer Systems 83: 619–628. doi:10.1016/j.future.2017.04.039.
- Naor, M., and A. Shamir. 1994. “Visual cryptography[C].” In Proceedings of the Advances in Cryptology—EUROCRYPT ‘94, Workshop on the Theory and Application of Cryptographic Techniques, 1–12, Perugia, Italy, May 12.
- Sahoo, S. R., and B. B. Gupta. 2019. “Classification of Various Attacks and Their Defence Mechanism in Online Social Networks: A survey[J].” Enterprise Information Systems 13 (6): 832–864. doi:10.1080/17517575.2019.1605542.
- Shamir, A. 1979. “How to Share a Secret[J].” Communications of the ACM 22 (22): 612–613. doi:10.1145/359168.359176.
- Tulapurkar, H., B. K. Mohan, and V. Bharadi. 2017. “Invisible Watermarking Algorithm for GIS Data Using Curvelet transform—Comparitive Study with wavelet[C].” In Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 3389–3392, Fort Worth, TX, USA, July 28.
- Zope-Chaudhari, S., P. Venkatachalam, and K. M. Buddhiraju. 2017. “Copyright Protection of Vector Data Using Vector watermark[C].” In Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, Fort Worth, TX, USA, 6110–6113, July 28.