XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes

Quick response (QR) codes are becoming increasingly popular in various areas of life due to the advantages of the error correction capacity, the ability to be scanned quickly and the capacity to contain meaningful content. The distribution of dark and light modules of a QR code looks random, but the content of a code can be decoded by a standard QR reader. Thus, a QR code is often used in combination with visual secret sharing (VSS) to generate meaningful shadows. There may be some losses in the process of distribution and preservation of the shadows. To recover secret images with high quality, it is necessary to consider the scheme’s robustness. However, few studies examine robustness of VSS combined with QR codes. In this paper, we propose a robust ( k , n )-threshold XOR-ed VSS (XVSS) scheme based on a QR code with the error correction ability. Compared with OR-ed VSS (OVSS), XVSS can recover the secret image losslessly, and the amount of computation needed is low. Since the standard QR encoder does not check if the padding codewords are correct during the encoding phase, we replace padding codewords by initial shadows shared from the secret image using XVSS to generate QR code shadows. As a result, the shadows can be decoded normally, and their error correction abilities are preserved. Once all the shadows have been collected, the secret image can be recovered losslessly. More importantly, if some conventional image attacks, including rotation, JPEG compression, Gaussian noise, salt-and-pepper noise, cropping, resizing, and even the addition of camera and screen noises are performed on the shadows, the secret image can still be recovered. The experimental results and comparisons demonstrate the effectiveness of our scheme.

[1]  Bin Yu,et al.  Perfect contrast XOR-based visual cryptography schemes via linear algebra , 2017, Des. Codes Cryptogr..

[2]  Peng Li,et al.  A construction method of (t, k, n)-essential secret image sharing scheme , 2018, Signal Process. Image Commun..

[3]  Ching-Nung Yang,et al.  Developing Visual Cryptography for Authentication on Smartphones , 2016, SocInfo 2016.

[4]  Xuehu Yan,et al.  Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery , 2013, Multimedia Tools and Applications.

[5]  Wei Sun,et al.  Random grid-based visual secret sharing with abilities of OR and XOR decryptions , 2013, J. Vis. Commun. Image Represent..

[6]  Yang-Wai Chow,et al.  Cooperative Secret Sharing Using QR Codes and Symmetric Keys , 2018, Symmetry.

[7]  Feng Liu,et al.  2D Barcodes for visual cryptography , 2014, Multimedia Tools and Applications.

[8]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[9]  WeiQi Yan,et al.  Authenticating Visual Cryptography Shares Using 2D Barcodes , 2011, IWDW.

[10]  Bin Yu,et al.  Improved Visual Secret Sharing Scheme for QR Code Applications , 2018, IEEE Transactions on Information Forensics and Security.

[11]  James G. Phillips,et al.  Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing , 2016, ACISP.

[12]  Bin Yu,et al.  Visual Cryptography Scheme With Meaningful Shares Based on QR Codes , 2018, IEEE Access.

[13]  Song Wan,et al.  Visual Secret Sharing Scheme with (k, n) Threshold Based on QR Codes , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).

[14]  R. Ito,et al.  Image Size Invariant Visual Cryptography , 1999 .

[15]  Xuehu Yan,et al.  Threshold construction from specific cases in visual cryptography without the pixel expansion , 2014, Signal Process..

[16]  Stelvio Cimato,et al.  Probabilistic Visual Cryptography Schemes , 2006, Comput. J..

[17]  Xin Liu,et al.  An enhanced threshold visual secret sharing based on random grids , 2015, Journal of Real-Time Image Processing.

[18]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[19]  Amel Benazza-Benyahia,et al.  Efficient transform-based texture image retrieval techniques under quantization effects , 2016, Multimedia Tools and Applications.

[20]  Liu Yingying,et al.  Two-level information management scheme based on visual cryptography and QR code , 2016 .

[21]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[22]  Yuliang Lu,et al.  Progressive visual secret sharing for general access structure with multiple decryptions , 2016, 2016 8th International Conference on Information Technology in Medicine and Education (ITME).

[23]  Damri Samretwit,et al.  Measurement of Reading Characteristics of Multiplexed Image in QR Code , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.