Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing

被引:45
作者
Chow, Yang-Wai [1 ]
Susilo, Willy [1 ]
Yang, Guomin [1 ]
Phillips, James G. [2 ]
Pranata, Ilung [3 ]
Barmawi, Ari Moesriami [4 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW, Australia
[2] Auckland Univ Technol, Dept Psychol, Auckland, New Zealand
[3] Univ Newcastle, Sch Design Commun & Informat Technol, Callaghan, NSW, Australia
[4] Telkom Univ, Sch Comp, Bandung, Indonesia
来源
INFORMATION SECURITY AND PRIVACY, PT I | 2016年 / 9722卷
关键词
Error correction; QR code; Secret sharing;
D O I
10.1007/978-3-319-40253-6_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates a novel approach to secret sharing using QR codes. The proposed QR code secret sharing approach exploits the error correction mechanism inherent in the QR code structure, to distribute and encode information about a secret message in a number of shares. Each share in the scheme is constructed from a cover QR code, and each share itself is a valid QR code which can be scanned and decoded by a QR code reader. The secret message can be recovered by combining the information contained in the QR code shares. Since each share is a valid QR code, the proposed scheme has the advantage of reducing the likelihood of attracting the attention of potential attackers. In addition, the shares can be distributed via public channels without raising suspicion. Moreover, shares do not have to be stored or transmitted electronically, as QR codes can be distributed via printed media.
引用
收藏
页码:409 / 425
页数:17
相关论文
共 26 条
  • [1] Extended capabilities for visual cryptography
    Ateniese, G
    Blundo, C
    De Santis, A
    Stinson, DR
    [J]. THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) : 143 - 161
  • [2] Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
  • [3] Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
  • [4] Contrast optimal threshold visual cryptography schemes
    Blundo, C
    D'Arco, P
    De Santis, A
    Stinson, DR
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 2003, 16 (02) : 224 - 261
  • [5] Robust Message Hiding for QR Code
    Bui, Thach V.
    Vu, Nguyen K.
    Nguyen, Thong T. P.
    Echizen, Isao
    Nguyen, Thuc D.
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 520 - 523
  • [6] Nested image steganography scheme using QR-barcode technique
    Chen, Wen-Yuan
    Wang, Jing-Wein
    [J]. OPTICAL ENGINEERING, 2009, 48 (05)
  • [7] Chin-Ho Chung, 2009, Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2009, P522, DOI 10.1109/IIH-MSP.2009.119
  • [8] A Visual One-Time Password Authentication Scheme Using Mobile Devices
    Chow, Yang-Wai
    Susilo, Willy
    Au, Man Ho
    Barmawi, Ari Moesriami
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 243 - 257
  • [9] Denso Wave Incorporated, QRCODE COM
  • [10] Falkner Stefanie, 2014, Human Aspects of Information Security, Privacy, and Trust. Second International Conference, HAS 2014, Held as Part of HCI International 2014. Proceedings: LNCS 8533, P149, DOI 10.1007/978-3-319-07620-1_14