Improved Visual Secret Sharing Scheme for QR Code Applications

被引:64
作者
Cheng, Yuqiao [1 ]
Fu, Zhengxin [1 ]
Yu, Bin [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450000, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Division algorithm; error correction capacity; high security; (k; n) access structure; quick response code; visual secret sharing scheme; CRYPTOGRAPHY;
D O I
10.1109/TIFS.2018.2819125
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Quick response (QR) codes have been widely used in applications, such as data storage and high-speed machine reading. Anyone can gain access to the information stored in QR codes; therefore, they are unsuitable for encoding secret information without the addition of cryptography or other protection. In this paper, we propose a visual secret sharing scheme to encode a secret QR code into several shares. In contrast with other techniques, the shares in our scheme are valid QR codes that can be decoded with some specific meaning by a standard QR code reader, thereby avoiding raising suspicion in potential attackers. Moreover, the secret message is recovered by XOR-ing the qualified shares, an operation that can easily be performed using smartphones or other QR scanning devices. Experimental results show that the proposed scheme is both feasible and reasonably secure. Our scheme's high sharing efficiency is also highlighted in this paper.
引用
收藏
页码:2393 / 2403
页数:11
相关论文
共 26 条
[1]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[2]   Nested image steganography scheme using QR-barcode technique [J].
Chen, Wen-Yuan ;
Wang, Jing-Wein .
OPTICAL ENGINEERING, 2009, 48 (05)
[3]   Comment on "Cheating Prevention in Visual Cryptography" [J].
Chen, Yu-Chi ;
Horng, Gwoboa ;
Tsai, Du-Shiau .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (07) :3319-3323
[4]   Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing [J].
Chow, Yang-Wai ;
Susilo, Willy ;
Yang, Guomin ;
Phillips, James G. ;
Pranata, Ilung ;
Barmawi, Ari Moesriami .
INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 :409-425
[5]  
Chuang Jun-Chou., 2010, International Journal of Image Processing (IJIP), V4, P468
[6]  
Dey S., 2012, Int. J. Mod. Educ. Comput. Sci. (IJMECS), V4, P59, DOI [10.5815/ijmecs.2012.06.08, DOI 10.5815/IJMECS.2012.06.08]
[7]  
ISO, 2006, 180042006 ISOIEC
[8]  
Li L., 2011, INT J INTELL INF PRO, V2, P29, DOI 10.4156/ijiip.vol2.issue2.4
[9]   High payload secret hiding technology for QR codes [J].
Lin, Pei-Yu ;
Chen, Yi-Hui .
EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2017,
[10]   Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code [J].
Lin, Pei-Yu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (01) :384-392