Visual Cryptography Scheme With Meaningful Shares Based on QR Codes

被引:16
作者
Fu, Zhengxin [1 ]
Cheng, Yuqiao [1 ]
Yu, Bin [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Encoding redundancy; high relative difference; (k; n)-VCS; meaningful shares; probabilistic sharing method; QR codes; QUALITY;
D O I
10.1109/ACCESS.2018.2874527
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past few years, visual cryptography scheme (VCS) has aroused much research attention and developed rapidly because of its simple decryption. However, meaningless shares remain a continuing challenge of VCS to its practical applications. In this paper, we propose a (k, n)-VCS combining with QR codes. To enlarge the allowable maximum size of secret image, a probabilistic sharing model is utilized. Based on it, a secret sharing method is presented with high relative difference. Furthermore, we embed the initial shares into cover QR codes by using encoding redundancy. After that, each share is meaningful and can be read by any standard QR code reader. Different from previous work, error correction capacities of the covers are perfectly preserved. We also highlight that our scheme can be used to authenticate the security of QR codes from some uncertain sources. Finally, experimental results and comparisons are provided to show the feasibility and advantages of the proposed scheme.
引用
收藏
页码:59567 / 59574
页数:8
相关论文
共 30 条
[1]   On (k, n)*-visual cryptography scheme [J].
Arumugam, S. ;
Lakshmanan, R. ;
Nagar, Atulya K. .
DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (01) :153-162
[2]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[3]   Threshold visual secret sharing by random grids [J].
Chen, Tzung-Her ;
Tsao, Kai-Hsiang .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (07) :1197-1208
[4]   Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure [J].
Chen, Yu-Chi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) :1082-1091
[5]   Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing [J].
Chow, Yang-Wai ;
Susilo, Willy ;
Yang, Guomin ;
Phillips, James G. ;
Pranata, Ilung ;
Barmawi, Ari Moesriami .
INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 :409-425
[6]   Probabilistic visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
COMPUTER JOURNAL, 2006, 49 (01) :97-107
[7]   Threshold visual secret sharing by random grids with improved contrast [J].
Guo, Teng ;
Liu, Feng ;
Wu, ChuanKun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (08) :2094-2109
[8]   Progressive Visual Cryptography with Unexpanded Shares [J].
Hou, Young-Chang ;
Quan, Zen-Yu .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (11) :1760-1764
[9]   General construction for XOR-based visual cryptography and its extended capability [J].
Hu, Hao ;
Shen, Gang ;
Fu, Zhengxin ;
Yu, Bin ;
Wang, Jingjing .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) :13883-13911
[10]  
ISO, 2015, 18004 ISOIEC