Rich QR code with three-layer information using visual secret sharing scheme

被引:0
|
作者
Zhengxin Fu
Yuqiao Cheng
Bin Yu
机构
[1] Zhengzhou Information Science and Technology Institute,
来源
关键词
QR code; Visual secret sharing scheme; Three-layer information storage; Low computational complexity;
D O I
暂无
中图分类号
学科分类号
摘要
Owing to efficient machine recognition, QR codes have been widely used in many aspects such as information management, electronic identity and mobile payment. Any QR code reader has access to the message contained in a QR code; therefore, in formation security becomes a major challenge to QR codes for private use. Moreover, human vision is hard to distinguish a QR code from others because its appearance looks randomly. In this paper, we propose a visual secret sharing scheme to achieve a rich QR code with three-layer information storage. In the three layers, the first one and the second one are respectively recognizable by human vision and QR code readers, while the third layer is designed for storing private data. Additionally, we also highlight the low computational complexity of secret extraction from the rich QR code.
引用
收藏
页码:19861 / 19875
页数:14
相关论文
共 50 条
  • [21] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [22] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [23] An Improved Grayscale Visual Secret Sharing Scheme for Visual Information Security
    Blesswin, A. John
    Visalakshi, P.
    2013 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2013, : 560 - 564
  • [24] Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes
    Wan, Song
    Qi, Lanlan
    Yang, Guozheng
    Lu, Yuliang
    Yan, Xuehu
    Li, Longlong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (3-4) : 2789 - 2811
  • [25] Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes
    Song Wan
    Lanlan Qi
    Guozheng Yang
    Yuliang Lu
    Xuehu Yan
    Longlong Li
    Multimedia Tools and Applications, 2020, 79 : 2789 - 2811
  • [26] Information hiding using secret sharing scheme
    Zou Xinguang
    Sun Shenghe
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 484 - +
  • [27] An immune secret QR-Code sharing based on a twofold zero-watermarking scheme
    School of information Science and Engineering, Central South University, Changsha, China
    不详
    不详
    不详
    Int. J. Multimedia Ubiquitous Eng., 4 (399-412): : 399 - 412
  • [28] PUF Authentication using Visual Secret Sharing Scheme
    Naveen, Devarapalli
    Praveen, K.
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 472 - 475
  • [29] Hierarchical Visual Secret Sharing Scheme Using Steganography
    Jana, Biswapati
    Samanta, Amita
    Giri, Debasis
    MATHEMATICS AND COMPUTING, 2015, 139 : 363 - 389
  • [30] Secret sharing scheme using Gray code and XOR operation
    Deepika, M. P.
    Sreekumar, A.
    PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,