Visual Secret Sharing Scheme with (k, n) Threshold Based on QR Codes

In this paper, a novel visual secret sharing (VSS) scheme with using QR codes is investigated. The proposed visual secret sharing scheme based on QR codes(VSSQR) can visually reveal secret image by stacking k or more shares (shadow images) from all the n QR codes as well as scan the QR code by a QR code reader. Our VSSQR exploits the error correction mechanism in the QR code structure, to embed the bits corresponding to shares generated by VSS from a secret bit into the same locations of QR codes in the processing of encoding QR. Each output share is a valid QR code, which may reduce the likelihood of attracting the attention of potential attackers, that can be scanned and decoded utilizing a QR code reader. The secret image can be recovered by stacking for case (k, n) based on the human visual system without any computation. In addition, it can assist alignment for VSS recovery. The experiment results show the effectiveness of our scheme.

[1]  WeiQi Yan,et al.  A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..

[2]  WeiQi Yan,et al.  Authenticating Visual Cryptography Shares Using 2D Barcodes , 2011, IWDW.

[3]  Song Wan,et al.  Clarity Corresponding to Contrast in Visual Cryptography , 2016, ICYCSEE.

[4]  James G. Phillips,et al.  Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing , 2016, ACISP.

[5]  Rastislav Lukac,et al.  Image Secret Sharing , 2006, Encyclopedia of Multimedia.

[6]  Ton Kalker,et al.  Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.

[7]  Amos Beimel,et al.  Secret-Sharing Schemes: A Survey , 2011, IWCC.

[8]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[9]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[10]  Xuehu Yan,et al.  Threshold progressive visual cryptography construction with unexpanded shares , 2015, Multimedia Tools and Applications.

[11]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[12]  Feng Liu,et al.  2D Barcodes for visual cryptography , 2014, Multimedia Tools and Applications.

[13]  Xuehu Yan,et al.  Research on the Capacity of Error-Correcting Codes-Based Information Hiding , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[14]  Xiaobo Li,et al.  On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..

[15]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..