A two-level QR code scheme based on polynomial secret sharing

  • Sijia Liu
  • Zhengxin FuEmail author
  • Bin Yu


Quick Response codes (QR codes) are common two-dimensional machine readable codes used extensively in all walks of life due to their high reading speeds, high data density, and strong error correction capabilities. However, public encoding using QR codes poses a threat to information security. In this paper, we introduce a Two-Level QR code that protects private data by using the recognition patterns of QR codes and by use of polynomial secret sharing algorithms. On a public level, QR codes are decodable by any standard QR reader. For secure use, QR codes simultaneously store private information, allowing transmission of secret information via an open channel. Experimental results and analysis demonstrate that this proposed approach is both feasible and reasonable. It reduces the probability of attracting the attention of potential attackers. The secret image format can accommodate either binary or grayscale. In addition, the data capacity of the secret payload of this approach is much higher than other methods.


Two-level QR code Polynomial secret sharing algorithm Secret payload 



The authors thank the anonymous reviewers for their valuable comments. This work was supported in part by the National Natural Science Foundation of China under Grant No.61602513 and the Outstanding Youth Foundation of Zhengzhou Information Science and Technology Institute under Grant No.2016611303.


  1. 1.
    Chen C (2016) QR code authentication with embedded message authentication code. Mob Netw Appl 22:383–394. CrossRefGoogle Scholar
  2. 2.
    Chen WY, Wang JW (2009) Nested image steganography scheme using qr-barcode technique. Opt Eng 48(5):057004CrossRefGoogle Scholar
  3. 3.
    Cheng Y, Fu Z, Yu B, Shen G (2017) A new two-level qr code with visual cryptography scheme. Multimedia Tools & Applications, 1–21Google Scholar
  4. 4.
    Chow YW, Susilo W, Yang G, Phillips JG, Pranata I, Barmawi AM (2016) Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. Australasian Conference on Information Security and Privacy (pp. 409–425). Springer, ChamGoogle Scholar
  5. 5.
    Chu HK, Chang CS, Lee RR, Mitra NJ (2013) Halftone QR codes. ACM Trans Graph 32:217. CrossRefGoogle Scholar
  6. 6.
    Chuang JC, Hu YC, Ko HJ (2010) A novel secret sharing technique using qr code. International Journal of Image Processing 4(5):468–475Google Scholar
  7. 7.
    Chung CH, Chen WY, Tu CM (2009) Image hidden technique using QR-Barcode. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 522–525). IEEE Computer SocietyGoogle Scholar
  8. 8.
    Dey S, Mondal K, Nath J, Nath A (2012) Advanced steganography algorithm using randomized intermediate QR host embedded with any encrypted secret message: asa_qr algorithm. International Journal of Modern Education & Computer Science 4(6):59CrossRefGoogle Scholar
  9. 9.
    Gao M, Sun B (2011) Blind Watermark Algorithm Based on QR Barcode. Foundations of Intelligent Systems. Springer Berlin HeidelbergGoogle Scholar
  10. 10.
    Hu H, Shen G, Fu Z et al (2016) General construction for XOR-based visual cryptography and its extended capability. Multimed Tools Appl 75(21):1–29CrossRefGoogle Scholar
  11. 11.
    Hu H, Shen G, Fu Z et al (2018) Improved Contrast for Threshold Random-grid-based Visual Cryptography. KSII Transactions on Internet & Inf Syst 12(7):3401–3420Google Scholar
  12. 12.
    Hu H, Shen G, Liu Y, et al (2018) Improved Schemes for Visual Secret Sharing Based on Random Grids,
  13. 13.
    Huang HC, Chang FC, Fang WC (2011) Reversible data hiding with histogram-based difference expansion for qr code applications. IEEE Trans Consum Electron 57(2):779–787CrossRefGoogle Scholar
  14. 14.
    Huang P-C et al (2018) Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction. KSII Transactions on Internet & Information Systems 12:5Google Scholar
  15. 15.
    ISO, IEC 18004: 2006 (2006) Information technology – Automatic identification and data capture techniques– QR Code 2005 bar code symbology specification, International Organization for Standardization. Geneva, SwitzerlandGoogle Scholar
  16. 16.
    Krishna MB, Dugar A (2016) Product authentication using QR codes: a mobile application to combat counterfeiting. Wirel Pers Commun 90:381–398.
  17. 17.
    Li L, Wang RL, Chang CC (2011) A digital watermark algorithm for. QR Code 2(2):29–36Google Scholar
  18. 18.
    Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE Transactions on Industrial Informatics 12(1):384–392MathSciNetGoogle Scholar
  19. 19.
    Lin PY, Chen YH (2017) High payload secret hiding technology for QR codes. EURASIP J Image Video Process.
  20. 20.
    Liu, Y., Fu, Z., & Wang, Y. (2016). Two-level information management scheme based on visual cryptography and QR code. Application Research of ComputersGoogle Scholar
  21. 21.
    Liu L, Lu Y, Yan X, Jiang Y (2016) Polynomial-based Extended Secret Image Sharing Scheme with Reversible Qr-code-like shares. Proceedings of the 14th China Information Hiding WorkshopGoogle Scholar
  22. 22.
    Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2016) Action2activity: recognizing complex activities from sensor dataGoogle Scholar
  23. 23.
    Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115CrossRefGoogle Scholar
  24. 24.
    Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune Teller: Predicting Your Career PathGoogle Scholar
  25. 25.
    MingSun JS, Zhang S (2007) Research on embedding and extracting methods for digital watermarks applied to qr code images. N Z J Agric Res 50(5):861–867CrossRefGoogle Scholar
  26. 26.
    Naor M, Shamir A (1995) Visual cryptography. Advances in Cryptology — EUROCRYPT'94 950:1–12. MathSciNetCrossRefzbMATHGoogle Scholar
  27. 27.
    Rungraungsilp S, Ketcham M, Kosolvijak V, Vongpradhip S (2012) Data hiding method for qr code based on watermark by compare DCT with DFT domain. proc. int. conf. comput. commun. technol. (pp. 144–148)Google Scholar
  28. 28.
    Shamir A (1979) How to share a secret? Commun ACM 22:612–613MathSciNetCrossRefGoogle Scholar
  29. 29.
    Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26:765–770CrossRefGoogle Scholar
  30. 30.
    Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C (2016) Two-Level QR code for private message sharing and document authentication. IEEE Trans Inf Forensics Secur 11:571–583. CrossRefGoogle Scholar
  31. 31.
    Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J Real-Time Image Proc.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Zhengzhou Information Science and Technology InstituteZhengzhouChina

Personalised recommendations