Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 14, pp 19861–19875 | Cite as

Rich QR code with three-layer information using visual secret sharing scheme

  • Zhengxin Fu
  • Yuqiao ChengEmail author
  • Bin Yu
Article
  • 30 Downloads

Abstract

Owing to efficient machine recognition, QR codes have been widely used in many aspects such as information management, electronic identity and mobile payment. Any QR code reader has access to the message contained in a QR code; therefore, in formation security becomes a major challenge to QR codes for private use. Moreover, human vision is hard to distinguish a QR code from others because its appearance looks randomly. In this paper, we propose a visual secret sharing scheme to achieve a rich QR code with three-layer information storage. In the three layers, the first one and the second one are respectively recognizable by human vision and QR code readers, while the third layer is designed for storing private data. Additionally, we also highlight the low computational complexity of secret extraction from the rich QR code.

Keywords

QR code Visual secret sharing scheme Three-layer information storage Low computational complexity 

Notes

Acknowledgments

This work was supported by the National Natural Science Foundation of China (grant 61602513) and the Outstanding Youth Foundation of Zhengzhou Information Science and Technology Institute (grant 2016611303).

References

  1. 1.
    Biswas R, Sil J (2012) An improved canny edge detection algorithm based on type-2 fuzzy sets. Procedia Technology 4(11):820–824CrossRefGoogle Scholar
  2. 2.
    Chen C (2016) QR code authentication with embedded message authentication code. Mobile Networks and Applications 22:383–394CrossRefGoogle Scholar
  3. 3.
    Cheng Y, Fu Z, Yu B, Shen G (2017) A new two-level qr code with visual cryptography scheme. Multimed Tools Appl:1–21Google Scholar
  4. 4.
    Chuang JC, Hu YC, Ko HJ (2010) A novel secret sharing technique using qr code. International Journal of Image Processing 4(5):468–475Google Scholar
  5. 5.
    Huang CT, Zhang YH, Lin LC, Wang WJ, Wang SJ (2016) Mutual authentications to parties with qr-code applications in mobile systems. Int J Inf Secur:1–16Google Scholar
  6. 6.
    ISO/IEC 18004 (2000) Information technology automatic identification and data capture techniques. Bar code Symbology-QR codeGoogle Scholar
  7. 7.
    Jiang D, Xu Z, Chen Z et al (2011) Joint time-frequency sparse estimation of large-scale network traffic. Comput Netw 55(15):3533–3547CrossRefGoogle Scholar
  8. 8.
    Jiang D, Xu Z, Zhang P et al (2014) A transform domain-based anomaly detection approach to network-wide traffic. J Netw Comput Appl 40(2):292–306CrossRefGoogle Scholar
  9. 9.
    Jiang D, Xu Z, Li W et al (2015) Network coding-based energy-efficient multicast routing algorithm for multi-hop wireless networks. J Syst Softw 104:152–165CrossRefGoogle Scholar
  10. 10.
    Jiang D, Yao C, Xu Z et al (2015) Multi-scale anomaly detection for high-speed network traffic. Transactions on Emerging Telecommunications Technologies 26:308–317CrossRefGoogle Scholar
  11. 11.
    Jiang D, Zhang P, Lv Z et al (2016) Energy-efficient multi-constraint routing algorithm with load balancing for Smart City applications. IEEE Internet Things J 3(6):1437–1447CrossRefGoogle Scholar
  12. 12.
    Jiang D, Yuan Z, Zhang P et al (2016) A traffic anomaly detection approach in communication networks for applications of multimedia medical devices. Multimed Tools Appl 75(22):14281–14305CrossRefGoogle Scholar
  13. 13.
    Jiang D, Huo L, Lv Z et al (2018) A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans Intell Transp Syst pp(99):1–15Google Scholar
  14. 14.
    Jiang D, Huo L, Li Y (2018) Fine granularity inference and estimations to network traffic for SDN. PLoS One 13(5):e0194302CrossRefGoogle Scholar
  15. 15.
    Krishna MB, Dugar A (2016) Product authentication using QR codes: a mobile application to combat counterfeiting. Wirel Pers Commun 90:381–398CrossRefGoogle Scholar
  16. 16.
    Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE Transactions on Industrial Informatics 12:384–392Google Scholar
  17. 17.
    Lin PY, Chen YH (2017) High payload secret hiding technology for QR codes. EURASIP Journal on Image and Video Processing 1:14CrossRefGoogle Scholar
  18. 18.
    Liu Y, Fu ZX, Wang YW (2016) Two-level information management scheme based on visual cryptography and QR code. Application Research of Computers 33:3460–3463Google Scholar
  19. 19.
    Naor M, Shamir A (1995) Visual cryptography. EUROCRYPT 1994: advances in cryptology — EUROCRYPT’94 950:1–12Google Scholar
  20. 20.
    Patvardhan C, Kumar P, Lakshmi CV (2017) Effective color image watermarking scheme using YCbCr color space and QR code. Multimed Tools Appl 77:12655–12677CrossRefGoogle Scholar
  21. 21.
    Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C (2016) Two-level QR code for private message sharing and document authentication. IEEE Transactions on Information Forensics and Security 11:571–583CrossRefGoogle Scholar
  22. 22.
    Tuyls P, Hollmann HD, Lint JH, Tolhuizen L (2005) XOR-based visual cryptography schemes. Des Codes Crypt 37:169–186MathSciNetCrossRefzbMATHGoogle Scholar
  23. 23.
    Ulichney RA (1993) Void-and-cluster method for dither array generation. IS&T/SPIE symposium on electronic imaging science and technology. In: Proc. Conf. Human vision, visual processing and digital display IV SPIE, vol 1913, pp 332–343Google Scholar
  24. 24.
    Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J Real-Time Image Proc 9:1–16Google Scholar
  25. 25.
    Wang Z, Arce GR, Crescenzo GD (2009) Halftone visual cryptography via error diffusion. IEEE Transactions on Information Forensics & Security 4(3):383–396CrossRefzbMATHGoogle Scholar
  26. 26.
    Wang J, Song L, Liang X, Liu Y, Liu P (2016) Secure and noise-free nonlinear optical cryptosystem based on phase-truncated Fresnel diffraction and QR code. Opt Quant Electron 48:523CrossRefGoogle Scholar
  27. 27.
    Wang G, Liu F, Yan WQ (2016) 2D barcodes for visual cryptography. Multimed Tools Appl 75(2):1223–1241CrossRefGoogle Scholar
  28. 28.
    Yang CN, Sun LZ, Cai SR (2016) Extended color visual cryptography for black and white secret image. Theor Comput Sci 609(P1):143–161MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Zhengzhou Information Science and Technology InstituteZhengzhouChina

Personalised recommendations