Improved Visual Secret Sharing Scheme for QR Code Applications

Quick response (QR) codes have been widely used in applications, such as data storage and high-speed machine reading. Anyone can gain access to the information stored in QR codes; therefore, they are unsuitable for encoding secret information without the addition of cryptography or other protection. In this paper, we propose a visual secret sharing scheme to encode a secret QR code into several shares. In contrast with other techniques, the shares in our scheme are valid QR codes that can be decoded with some specific meaning by a standard QR code reader, thereby avoiding raising suspicion in potential attackers. Moreover, the secret message is recovered by XOR-ing the qualified shares, an operation that can easily be performed using smartphones or other QR scanning devices. Experimental results show that the proposed scheme is both feasible and reasonably secure. Our scheme’s high sharing efficiency is also highlighted in this paper.

[1]  Shyong Jian Shyu,et al.  Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Feng Liu,et al.  Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[3]  Hai-Dong Yuan,et al.  Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..

[4]  William Puech,et al.  Two-Level QR Code for Private Message Sharing and Document Authentication , 2016, IEEE Transactions on Information Forensics and Security.

[5]  Ming Sun,et al.  Research on embedding and extracting methods for digital watermarks applied to QR code images , 2007 .

[6]  Kalyan Mondal,et al.  Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted S , 2012 .

[7]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[8]  Gwoboa Horng,et al.  Comment on “Cheating Prevention in Visual Cryptography” , 2012, IEEE Transactions on Image Processing.

[9]  Ching-Nung Yang,et al.  Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  WeiQi Yan,et al.  Authenticating Visual Cryptography Shares Using 2D Barcodes , 2011, IWDW.

[11]  Madhu S. Nair,et al.  QR code based blind digital image watermarking with attack detection code , 2015 .

[12]  Wen-Yuan Chen,et al.  Nested image steganography scheme using QR-barcode technique , 2009 .

[13]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[14]  Li Li,et al.  A Digital Watermark Algorithm for QR Code , 2011 .

[15]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[16]  Pei-Yu Lin,et al.  High payload secret hiding technology for QR codes , 2017, EURASIP Journal on Image and Video Processing.

[17]  Feng Liu,et al.  Braille for Visual Cryptography , 2014, 2014 IEEE International Symposium on Multimedia.

[18]  Ching-Nung Yang,et al.  Developing Visual Cryptography for Authentication on Smartphones , 2016, SocInfo 2016.

[19]  Eric Jui-Lin Lu,et al.  Secret Hiding Mechanism Using QR Barcode , 2013, 2013 International Conference on Signal-Image Technology & Internet-Based Systems.

[20]  Song Wan,et al.  Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions , 2017, Journal of Real-Time Image Processing.

[21]  Pei-Yu Lin,et al.  Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code , 2016, IEEE Transactions on Industrial Informatics.

[22]  Feng Liu,et al.  2D Barcodes for visual cryptography , 2014, Multimedia Tools and Applications.