Abstract
QR code has been widely used in our daily life due to its convenience, and the security of QR code becomes a rising problem. In this paper, we introduce a new algorithm that adds the edge of the gray image to the QR code, and the edge information is captured by the Canny detector. And then we use the random grid based visual cryptography scheme (RG-VCS) to generate shares. Each share of the VCS is an individual QR code that can be scanned by a QR code reader, and the secret information can be decoded by purely stacking without computation. Meanwhile, we can also recover the secret image with better visual quality with the help of computation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology-Eurocrypt. Workshop on the Theory and Application of Cryptographic Techniques (1995)
Liu, F., Yan, W.Q.: Visual Cryptography for Image Processing and Security, vol. 2. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-09644-5
Wang, D.S., et al.: Two secret sharing schemes based on Boolean operations. Pattern Recogn. 40(10), 2776–2785 (2007)
Chen, T.H., Li, K.C.: Multi-image encryption by circular random grids. Inf. Sci. 189, 255–265 (2012)
Revenkar, P.S., Gandhare, W.Z.: Secure iris authentication using visual cryptography. Int. J. Comput. Sci. Inf. Secur. 7(3), 217–221 (2010)
Rosking, J.A., Emign, A.T.: Visual cryptography and voting technology using a pair of enhanced contrast glyphs in overlay, USA, US, no. 7,667,871 (2010)
Standard Test Images (Online) (2004). https://www.qrcode.com/zh/. Accessed 6 Nov 2019
The Structure of QR Code (Online). http://qr.biz/articles/the_structure_of_qr_code. Accessed 6 Nov 2019
Cheng, Y., Fu, Z., Yu, B., Shen, G.: A new two-level QR code with visual cryptography scheme. Multimedia Tools Appl. 77(16), 20629–20649 (2017). https://doi.org/10.1007/s11042-017-5465-4
Yang, C.N., et al.: k out of n region-based progressive visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 29(1), 252–262 (2019)
Yang, C.N., Sun, L.Z., Cai, S.R.: Extended color visual cryptography for black and white secret image. Theory Comput. Sci. 609(P1), 143–161 (2016)
Wan, S., Lu, Y., Yan, X., et al.: Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J. Real-Time Image Proc. 9, 1–16 (2017)
Wang, G., Liu, F., Yan, W.Q.: 2D barcodes for visual cryptography. Multimedia Tools Appl. 75(2), 1223–1241 (2016)
Liu, Y., Fu, Z.X., Wang, Y.W.: Two-level information management scheme based on visual cryptography and QR code. Appl. Res. Comput. 33, 3460–3463 (2016)
Fu, Z.X., Cheng, Y., Yu, B.: Rich QR code with three-layer information using visual secret sharing scheme. Multimedia Tools Appl. 78(14), 19861–19875 (2019). https://doi.org/10.1007/s11042-019-7333-x
Wicker, S.B., Bhargava, V.K.: Reed-Solomon codes and their applications. Commun. ACM 24(9), 583–584 (1994)
Canny, J.: A computational approach to edge-detection. IEEE Trans. Pattern Anal. Mach. Intell. 8(6), 679–698 (1986)
Yang, Y.W., et al.: Watermark embedding for direct binary searched halftone images by adopting visual cryptography. Comput. Mater. Continua 55(2), 255–265 (2018)
Yi, C., Zhi, L.Z., et al.: Coverless information hiding based on the molecular structure images of material. Comput. Mater. Continua 54(2), 197–207 (2018)
Di, X., et al.: High capacity data hiding in encrypted image based on compressive sensing for nonequivalent resources. Comput. Mater. Continua 58(1), 1–13 (2019)
Acknowledgment
This work was supported by the National Key Research and Development Program of China under Grant 2018YFB0804101 and the National Natural Science Foundation of China under Grant 61802357.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Hu, F., Yao, Y., Li, W., Yu, N. (2020). A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-57881-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-57880-0
Online ISBN: 978-3-030-57881-7
eBook Packages: Computer ScienceComputer Science (R0)