Two way privacy preserving system using combine approach: QR-code & VCS

Quick Response (QR) code is a two dimensional (2D) barcode widely used in many applications such as manufacturing, advertising, retailing etc. QR code looks like a noisy structure. The appearance of QR code can be improved by generating shares of it so an information data as text form will converted into the 2n-shares Combination. This Research proposed a method where the appearance of QR code is composed of shares patterns selected by users. In this research study about the text Information hiding in QR code, VCS techniques for QR to Shares conversation. Text to QR conversation, after from QR code shares for that study different techniques of VCS. The text to share is not an easy task because 2-level privacy should be decodable by private decoding applications only and can be applied to any text data.

[1]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[2]  A. K. Deepa,et al.  Embedded Extended Visual Cryptography Scheme for Color Image using ABC algorithm , 2014, 2014 12th International Conference on Signal Processing (ICSP).

[3]  Weijun Zhang,et al.  An improved digital watermarking technology based on QR code , 2015, 2015 4th International Conference on Computer Science and Network Technology (ICCSNT).

[4]  Héctor M. Pérez Meana,et al.  New Condition for Hierarchical Secret Image Sharing Scheme , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[5]  Xiao-Yi Liu,et al.  A new color visual cryptography scheme with perfect contrast , 2013, 2013 8th International Conference on Communications and Networking in China (CHINACOM).

[6]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[7]  Ching-Nung Yang,et al.  Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Wei Sun,et al.  Extended Capabilities for XOR-Based Visual Cryptography , 2014, IEEE Transactions on Information Forensics and Security.