Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes

  • Song Wan
  • Lanlan Qi
  • Guozheng Yang
  • Yuliang Lu
  • Xuehu YanEmail author
  • Longlong Li


In this paper, a visual secret sharing (VSS) scheme with (n, n)(n ≥ 2) threshold for selective secret content using QR codes is investigated. Firstly, the secret message which can include different types of information(selective secret content) could be encoded into a secret QR code. Secondly, the secret QR code can be embedded into n cover QR codes. Finally, the proposed QR code visual secret sharing scheme(QRVSS) can visually reveal secret QR code with the abilities of stacking and XOR decryptions. Our QRVSS exploits the error correction mechanism inherent in the QR code structure, to embed the bits corresponding to shares that generated by VSS from a secret QR code bit into the same locations of the cover QR codes in the processing of encoding QRs. Each output share is a valid QR code that can be decoded and it may reduce the likelihood of attracting the attention of potential attackers. The reconstructed secret QR code can be decoded as same as the secret contents. In addition, QR codes can assist alignment for VSS recovery and the proposed scheme can be applied to many applications, such as express delivery. The experiment results show the effectiveness of our scheme.


Visual secret sharing QR code Visual cryptography application Error correction Express delivery Security 



  1. 1.
    Beimel A (2011) Secret-sharing schemes: a survey. In: International workshop, pp 11–46Google Scholar
  2. 2.
    Buckley N, Nagar AK, Arumugam S (2014) Visual secret sharing between remote participants. Int J Comput Appl 8-17:103Google Scholar
  3. 3.
    Cheng Y, Fu Z, Yu B (2018) Improved visual secret sharing scheme for QR code applications. IEEE Trans Inf Foren Sec 99:1–1Google Scholar
  4. 4.
    Chow YW, Susilo W, Yang G, Phillips JG, Pranata I, Barmawi AM (2016) Exploiting the error correction mechanism in QR codes for secret sharing. Springer International PublishingGoogle Scholar
  5. 5.
    Denso WI (2002)
  6. 6.
    Jtc1/Sc I (2006) Information technology – automatic identification and data capture techniques – QR code 2005 bar code symbology specificationGoogle Scholar
  7. 7.
    Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Foren Sec 2(3):321–330CrossRefGoogle Scholar
  8. 8.
    Li L, Qiu J, Lu J, Chang CC (2016) An aesthetic QR code solution based on error correction mechanism. Journal of Systems & Software 116(C):85–94CrossRefGoogle Scholar
  9. 9.
    Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE Trans Ind Informat 12(1):1–1MathSciNetCrossRefGoogle Scholar
  10. 10.
    Liu Y, Chang C (2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools and Applications 77:1–16CrossRefGoogle Scholar
  11. 11.
    Liu Z, Zeng Q, Wang C, Lu Q (2011) Application research of qrcode barcode in validation of express delivery. Communications in Computer & Information Science 143:346–351CrossRefGoogle Scholar
  12. 12.
    Naor M, Shamir A (1999) Visual cryptography. Lect Notes Comput Sci 950 (9):1–12MathSciNetzbMATHGoogle Scholar
  13. 13.
    Snyder AJ (2012) Visual cryptography and secret image sharing. Pattern Recogn Lett 34(3):283–291Google Scholar
  14. 14.
    Wan S, Lu Y, Yan X, Liu L (2016) High capacity embedding methods of QR codes error correction accepted by 9th EAI International Wireless Internet ConferenceGoogle Scholar
  15. 15.
    Wan S, Lu Y, Yan X, Wan Y, Chang C (2017) Visual secret sharing scheme with (k, n) threshold based on QR codes with multiple decryptions. Accepted by Journal of Real-Time Image ProcessingGoogle Scholar
  16. 16.
    Wang D, Yi F, Li X (2009) On general construction for extended visual cryptography schemes. Pattern Recogn 42(11):3071–3082CrossRefGoogle Scholar
  17. 17.
    Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognit 40(10):2776–2785CrossRefGoogle Scholar
  18. 18.
    Wang G, Liu F, Yan WQ (2016) 2d barcodes for visual cryptography. Multimedia Tools and Applications, pp 1–19Google Scholar
  19. 19.
    Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensics Security 4(3):383–396CrossRefGoogle Scholar
  20. 20.
    Weir J, Yan W (2012) Authenticating visual cryptography shares using 2D barcodes. In: Digital forensics and watermarking: 10th international workshop, IWDW 2011, Atlantic City, NY, October 23–26, 2011, Revised selected papers. Springer, Berlin, pp 196–210CrossRefGoogle Scholar
  21. 21.
    Weir J, Yan WQ (2010) A comprehensive study of visual cryptography. Springer, BerlinCrossRefGoogle Scholar
  22. 22.
    Yan X, Guan S, Niu X (2008) Research on the capacity of error-correcting codes-based information hiding. IEEE Computer Society, pp 1158–1161Google Scholar
  23. 23.
    Yan X, Lu Y, Huang H, Liu L, Wan S (2016) Clarity corresponding to contrast in visual cryptography. Springer, SingaporeCrossRefGoogle Scholar
  24. 24.
    Yan X, Wang S, El-Latif AAA, Niu X (2013) Visual secret sharing based on random grids with abilities of and and xor lossless recovery. Multimedia Tools and Applications, pp 1–22Google Scholar
  25. 25.
    Yan X, Shen W, El-Latif AA, Niu X (2015) Visual secret sharing based on random grids with abilities of and and xor lossless recovery. Multimedia Tools and Applications 74:3231–3252CrossRefGoogle Scholar
  26. 26.
    Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25(4):481–494CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.National University of Defense TechnologyHefeiChina

Personalised recommendations