Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions

被引:30
作者
Wan, Song [1 ]
Lu, Yuliang [1 ]
Yan, Xuehu [1 ]
Wang, Yongjie [1 ]
Chang, Chao [1 ]
机构
[1] Hefei Elect Engn Inst, Hefei 230037, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Visual secret sharing; QR code; Error correction; Lossless recovery; Threshold; Multiple decryptions; Real time;
D O I
10.1007/s11554-017-0678-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a novel visual secret sharing (VSS) scheme based on QR code (VSSQR) with (k, n) threshold is investigated. Our VSSQR exploits the error correction mechanism in the QR code structure, to generate the bits corresponding to shares (shadow images) by VSS from a secret bit in the processing of encoding QR. Each output share is a valid QR code that can be scanned and decoded utilizing a QR code reader, which may reduce the likelihood of attracting the attention of potential attackers. Due to different application scenarios, two different recovered ways of the secret image are given. The proposed VSS scheme based on QR code can visually reveal secret image with the abilities of stacking and XOR decryptions as well as scan every shadow image, i.e., a QR code, by a QR code reader. The secret image could be revealed by human visual system without any computation based on stacking when no lightweight computation device. On the other hand, if the lightweight computation device is available, the secret image can be revealed with better visual quality based on XOR operation and could be lossless revealed when sufficient shares are collected. In addition, it can assist alignment for VSS recovery. The experiment results show the effectiveness of our scheme.
引用
收藏
页码:25 / 40
页数:16
相关论文
共 21 条
  • [1] [Anonymous], 2006, INF TECHN AUT ID DAT
  • [2] Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
  • [3] Chow YW, 2016, EXPLOITING ERROR COR
  • [4] Reversible image watermarking based on integer-to-integer wavelet transform
    Lee, Sunil
    Yoo, Chang D.
    Kalker, Ton
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (03) : 321 - 330
  • [5] Naor M., 1999, LNCS, V950, P1
  • [6] Saito K, 2011, TECH REPORT IEICE IS, V111, P79
  • [7] Snyder A. J, 2012, PATTERN RECOGNIT LET, V34, P283
  • [8] Wan S, 2016, 9 EAI INT W IN PRESS
  • [9] Two secret sharing schemes based on Boolean operations
    Wang, Daoshun
    Zhang, Lei
    Ma, Ning
    Li, Xiaobo
    [J]. PATTERN RECOGNITION, 2007, 40 (10) : 2776 - 2785
  • [10] On general construction for extended visual cryptography schemes
    Wang, Daoshun
    Yi, Feng
    Li, Xiaobo
    [J]. PATTERN RECOGNITION, 2009, 42 (11) : 3071 - 3082