Skip to main content

A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12240))

Abstract

QR code has been widely used in our daily life due to its convenience, and the security of QR code becomes a rising problem. In this paper, we introduce a new algorithm that adds the edge of the gray image to the QR code, and the edge information is captured by the Canny detector. And then we use the random grid based visual cryptography scheme (RG-VCS) to generate shares. Each share of the VCS is an individual QR code that can be scanned by a QR code reader, and the secret information can be decoded by purely stacking without computation. Meanwhile, we can also recover the secret image with better visual quality with the help of computation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology-Eurocrypt. Workshop on the Theory and Application of Cryptographic Techniques (1995)

    Google Scholar 

  2. Liu, F., Yan, W.Q.: Visual Cryptography for Image Processing and Security, vol. 2. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-09644-5

    Book  MATH  Google Scholar 

  3. Wang, D.S., et al.: Two secret sharing schemes based on Boolean operations. Pattern Recogn. 40(10), 2776–2785 (2007)

    Article  Google Scholar 

  4. Chen, T.H., Li, K.C.: Multi-image encryption by circular random grids. Inf. Sci. 189, 255–265 (2012)

    Article  MathSciNet  Google Scholar 

  5. Revenkar, P.S., Gandhare, W.Z.: Secure iris authentication using visual cryptography. Int. J. Comput. Sci. Inf. Secur. 7(3), 217–221 (2010)

    Google Scholar 

  6. Rosking, J.A., Emign, A.T.: Visual cryptography and voting technology using a pair of enhanced contrast glyphs in overlay, USA, US, no. 7,667,871 (2010)

    Google Scholar 

  7. Standard Test Images (Online) (2004). https://www.qrcode.com/zh/. Accessed 6 Nov 2019

  8. The Structure of QR Code (Online). http://qr.biz/articles/the_structure_of_qr_code. Accessed 6 Nov 2019

  9. Cheng, Y., Fu, Z., Yu, B., Shen, G.: A new two-level QR code with visual cryptography scheme. Multimedia Tools Appl. 77(16), 20629–20649 (2017). https://doi.org/10.1007/s11042-017-5465-4

    Article  Google Scholar 

  10. Yang, C.N., et al.: k out of n region-based progressive visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 29(1), 252–262 (2019)

    Article  MathSciNet  Google Scholar 

  11. Yang, C.N., Sun, L.Z., Cai, S.R.: Extended color visual cryptography for black and white secret image. Theory Comput. Sci. 609(P1), 143–161 (2016)

    Article  MathSciNet  Google Scholar 

  12. Wan, S., Lu, Y., Yan, X., et al.: Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J. Real-Time Image Proc. 9, 1–16 (2017)

    Google Scholar 

  13. Wang, G., Liu, F., Yan, W.Q.: 2D barcodes for visual cryptography. Multimedia Tools Appl. 75(2), 1223–1241 (2016)

    Article  Google Scholar 

  14. Liu, Y., Fu, Z.X., Wang, Y.W.: Two-level information management scheme based on visual cryptography and QR code. Appl. Res. Comput. 33, 3460–3463 (2016)

    Google Scholar 

  15. Fu, Z.X., Cheng, Y., Yu, B.: Rich QR code with three-layer information using visual secret sharing scheme. Multimedia Tools Appl. 78(14), 19861–19875 (2019). https://doi.org/10.1007/s11042-019-7333-x

    Article  Google Scholar 

  16. Wicker, S.B., Bhargava, V.K.: Reed-Solomon codes and their applications. Commun. ACM 24(9), 583–584 (1994)

    MATH  Google Scholar 

  17. Canny, J.: A computational approach to edge-detection. IEEE Trans. Pattern Anal. Mach. Intell. 8(6), 679–698 (1986)

    Article  Google Scholar 

  18. Yang, Y.W., et al.: Watermark embedding for direct binary searched halftone images by adopting visual cryptography. Comput. Mater. Continua 55(2), 255–265 (2018)

    Google Scholar 

  19. Yi, C., Zhi, L.Z., et al.: Coverless information hiding based on the molecular structure images of material. Comput. Mater. Continua 54(2), 197–207 (2018)

    Google Scholar 

  20. Di, X., et al.: High capacity data hiding in encrypted image based on compressive sensing for nonequivalent resources. Comput. Mater. Continua 58(1), 1–13 (2019)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by the National Key Research and Development Program of China under Grant 2018YFB0804101 and the National Natural Science Foundation of China under Grant 61802357.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yuanzhi Yao or Weihai Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hu, F., Yao, Y., Li, W., Yu, N. (2020). A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57881-7_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57880-0

  • Online ISBN: 978-3-030-57881-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics